Skoči na glavni sadržaj

Izvorni znanstveni članak

https://doi.org/10.7906/indecs.20.1.6

The energy importance of additional information

Albininé Budavári Edina ; Obuda University, Doctoral School on Safety and Security Sciences
Rajnai Zoltán ; Obuda University, Doctoral School on Safety and Security Sciences


Puni tekst: engleski pdf 361 Kb

str. 44-49

preuzimanja: 181

citiraj

Preuzmi JATS datoteku


Sažetak

The cornerstone of the Smart City conception is the application of an advanced info-communication infrastructure. One of the main tasks of info-communication systems is the transmission of information. During transmission, however, not only the data representing the required information is transmitted, but also extra data. According to the receiver-side monitoring aspect of the communication, this involves some additional information. This additional information can be examined in many ways. The aim of the present study is to investigate the energy significance of additional information. During the investigation, the appearance of additional information is represented with an older Internet game. This game provides an opportunity to detect the incorporation and decoding of extra data. The study is then based on the energy balance modeling of the systems to point out the nature of the energy problems of such supplementary information

Ključne riječi

infocommunication, additional information, social engineering, energy model, energy importance

Hrčak ID:

272656

URI

https://hrcak.srce.hr/272656

Datum izdavanja:

21.2.2022.

Posjeta: 517 *




INTRODUCTION

The basis of the implementation of the systems related to the storage, processing and transmission of information is the infocommunication infrastructure[1][2]. In the practical transmission of information, not only the absolutely necessary information is transmitted. Usually, additional information is displayed next to it. In public communication, the information is not always sent to a specific person or object. Therefore, the additional information can be obtained by anyone. In this way, the additional information facilitates the unsolicited acquisition of the information and later its use[3][4][5][6]. At the same time, the energy problem of handling information in practice also appears to have a connection with additional information. To model the energy consequences, the problem is approached from the point of the control theory, and the systems are examined according to their energy balance. The components used for modeling are defined on a philosophical basis for universal usability[7][8][9][10][11]. Thus, the modeling procedure is multidisciplinary and can be generally used in RDI[12][13][14][15][16][17] and education[18][19][20], and in legal regulations[21][22] each in its territory. This study presents the role of additional public information in the possibility of obtaining information and in the practical handling of information[23] through the example of an internet game. The Open Source Information Acquisition (OSINT) is one element of the social engineering information acquisition palette, among others[24]. The conscious planning of information management is also important due to its sensitive use. This design should include the energy requirement of handling additional information, and it should also limit the possibilities of intentionally reducing deduplication procedures, by taking into account unnecessary redundancy[1][2]. Based on the analysis of the game, the study also points out that the additional information can be a very significant part of the transmitted information set. This is, among other considerations, one of the major drivers of the growing energy demand of systems and of the big data effect

ADDITIONAL INFORMATION

The communication can be formulated with the additional information on the receiving side: the additional information is the information that appears next to the content that is intended to be conveyed, and from a certain research aspect, it represents an added value[23]. Through the example of an older online game, it was shown that in addition to the intentionally disclosed information, the transmitted data carries additional information for the receiving party. More specifically, it showed an example of incorporating additional information and decoding it. The game proceeded as follows: based on the selfies made by toy dolls from different geographical locations, players had to guess where the dolls were[23]. A photo montage related to the game is shown in Figure 1. The evaluation of the game revealed that players were able to find the location within half an hour, usually based on the landscape and the construction details in the selfie’s background. But some additional information that had not originally been requested was also decoded: they were able to establish, among other things, the manufacturer of the dolls, the vintage or the originality of their clothing. They also provided information about the owner’s attachment to toys. Thus, it became certain that the additional information could be decoded from many more aspects than originally planned[23].

Figure 1. Photo montage from the online game.
indecs-20-44-g1.png
ENERGY MODEL

The additional information can be examined from several aspects. This is an examination of energy problems, and the amount of data is proportional to the energy required to deal with it. Therefore, the examination is made in terms of the amount of data representing the additional information. For modeling, it is worth calling the general energy model for help[9]. The general energy model is based on philosophical foundations. It adapts the abstract categories of human thinking. These categories are Object, Property, and Relationship. The energy equivalents of these are Transformation, Storage and Transmission. The system model is accordingly based on three types of basic elements. The energy balance shows that some of the energy flowing into the system from the outside is stored and the rest is radiated out of the system. Meanwhile, the energy can be transformed[9]. The general model is shown in Figure 2.

Figure 2. Energy model.
indecs-20-44-g2.png
ENERGY IMPORTANCE

To explore the energy problems, it is worth starting from the energy balance formula (1) of the aforementioned system model.The formula (2) corresponding to the other initial condition is the energy demand formula, which expresses the amount of required and added energy.

E(in) = delta E(store) + E(out), (1)

E(all) = E(need) + E (add). (2)

Since the two formulas represent independent test aspects, the simple (3) and elaborated form of the formula derived from the matrix of the two formulas can also be given (4).

E(in/all/) = delta E(store/all/) + E(out/all/), (3)

E(in/need/) + E(in/add/) = delta E(store/need/) + delta E(store/add/) + E(out/need/) + E(out/add/). (4)

Formula (4) can be decomposed into two equations: to a formula representing the aspect of the energy required (5), and to a formula representing the added energy (6).

E(in/need/) = delta E(store/need/) + E(out/need/), (5)

E(in/add/) = delta E(store/add/) + E(out/add/). (6)

The identical form of formulas (1) (5) and (6) shows that the energy problems in the handling of additional information can be included in the same system of aspects as in the case of general information handling problems. This is a logical conclusion, since the abstraction of information takes place through the interpretation of data. Accordingly, the additional information must be stored, so it binds excessive processing capacity, and it requires additional bandwidth.

SUMMARY

In order to implement the smart city concept[25][26][27][28][29], it is essential that its implementation is based on a high-availability, long-term, sustainable, and reliable infocommunication infrastructure[1][2]. The main purposes of infocommunication systems are data storage, processing and transmission[1]. During data transmission, more data is transferred than is required. This is not just due to intentional redundancy.When transferring media materials, a much larger amount of extra data is added to the data representing the useful information. The present study has shown, through the example of an online game, that a considerable amount of extra data can be transferred due to the possible negligence from the part of the tax side of the data transfer[23].The receiving side can interpret the data in several ways, so this data can contain additional information. In published data streams, the decoding of this additional information is a form of information acquisition (OSINT) that is part of the technical palette of social engineering[24]. Furthermore, the study has shown, using the energy modeling of systems, that the additional information has the same energy problems as useful information. Accordingly, the additional information must be stored, an additional processing capacity and extra bandwidth is required. This need must be taken into account when designing systems. Given that much of the amount of the data generated is a media stream in which significant extra data is present, the additional information also plays a significant role in the rapid increase in the energy demand of systems, as well as in the big data effect.

References

1 

Rajnai Z. 2019. Theoretical Study of Cloud Technologies. Interdisciplinary Description of Complex Systems, 17, 3A 511-519. https://doi.org/10.7906/indecs.17.3.11http://dx.doi.org/10.7906/indecs.17.3.11

2 

Rajnai Z. 2018. General Architecture of Cloud. Procedia Manufacturing, 2018, 22 485-490. https://doi.org/10.1016/j.promfg.2018.03.074http://dx.doi.org/10.1016/j.promfg.2018.03.074

3 

Flammini F. 2017. Smart Systems for the Protection of Individuals. Key Engineering Materials, 2017, 755 190-197. https://doi.org/10.4028/www.scientific.net/KEM.755.190http://dx.doi.org/10.4028/www.scientific.net/KEM.755.190

4 

Pető R. 2019. Security of Smart City. Interdisciplinary Description of Complex Systems, 17, 1 13-19. https://doi.org/10.7906/indecs.17.1.3http://dx.doi.org/10.7906/indecs.17.1.3

5 

Shatnawi M.M. 2019. Applying Information Security Risk Management Standards Process for Automated Vehicles. Bánki Reports, 2, 1 70-74. https://doi.org/10.1017/S0040298219001050http://dx.doi.org/10.1017/S0040298219001050

6 

Varga P.J. 2019. Drone systems for factory security and surveillance. Interdisciplinary Description of Complex Systems, 17, 3A 458-467. https://doi.org/10.7906/indecs.17.3.4http://dx.doi.org/10.7906/indecs.17.3.4

7 

Mester G. 2019. Unified Aspect Search Algorithm. Interdisciplinary Description of Complex Systems, 17, 1A 20-25. https://doi.org/10.7906/indecs.17.1.4http://dx.doi.org/10.7906/indecs.17.1.4

8 

Stefancic H. 2004. Comparison of social and physical free energies on a toy model. Physical Review E, 70, 1 16117-16124. https://doi.org/10.1103/PhysRevE.70.016117http://dx.doi.org/10.1103/PhysRevE.70.016117

9 

Rajnai Z. 2019. Modeling general energy balance of systems. Procedia Manufacturing, 2019, 32 374-379. https://doi.org/10.1016/j.promfg.2019.02.228http://doi.org/10.1016/j.promfg.2019.02.228

10 

Pletl S.. Structure Optimization of Fuzzy Control Systems by Multi-Population Genetic Algorithm. Aachen: Proceedings of the 6th European Congress on Intelligent Techniques and Soft Computing, 1998.

11 

Duta L. 2010. The Cognitive Complexity in Modelling the Group Decision Process. BRAIN Broad Research in Artificial Intelligence and Neuroscience, 2010, 1 69-79.http://edusoft.ro/brain/index.php/brain/article/view/105

12 

Jovanovic M.. Scalable Experimental Platform for Research, Development and Testing of Networked Robotic Systems in Informationally Structured Environments. Paris: Symposium Series on Computional Intelligence, Workshop on Robotic Intelligence in Informationally Structured Space, 2011.

13 

Szucs E. 2018. Illustrating Training Opportunities Related to Manpower Facility Protection through the Example of Máv Co. Interdisciplinary Description of Complex Systems, 16, 3 320-326 https://doi.org/10.7906/indecs.16.3.3http://dx.doi.org/10.7906/indecs.16.3.3

14 

Rodic A.. Simulation of Quad-rotor Flight Dynamics for the Analysis of Control, Spatial Navigation and Obstacle Avoidance. Shanghai: Proceedings of the 3rd International Workshop on Advanced Computational Intelligence and Intelligent Informatics, 2011.

15 

Mester G.. Obstacle Avoidance and Velocity Control of Mobile Robots. Subotica: Proceedings of the 6th International Symposium on Intelligent Systems and Informatics SISY 2008, 2011.

16 

Rodic A. 2010. Sensor-Based Intelligent Mobile Robot Navigation in Unknown Environments. International Journal of Electrical and Computer Engineering Systems, 1, 2 1-8.

17 

Pletl S.. Adaptive Control of Rigid-Link Flexible-Joint Robots. Berkeley: Proceedings of 3rd International Workshop of Advanced Motion Control, 1994.

18 

Mester G. 2016. Rankings Scientists, Journals and Countries Using h-index. Interdisciplinary Description of Complex Systems, 14, 1 1-9. https://doi.org/10.7906/indecs.14.1.1http://dx.doi.org/10.7906/indecs.14.1.1

19 

Odadzic B. 2008. Virtualization Technology as a Tool for Teaching Computer Networks. International Journal of Educational and Pedagogical Sciences, 2, 1 41-45.

20 

Mester G. 2011. Academic Ranking of World Universities 2009/2010. Ipsi Journal, Transactions on Internet Research, 7, 1 44-47.

21 

Rubóczky E.S. 2015. Moving Towards Cloud Security. Interdisciplinary Description of Complex Systems, 13, 1 9-14. https://doi.org/10.7906/indecs.13.1.2http://dx.doi.org/10.7906/indecs.13.1.2

22 

Kovács Z. 2012. Cloud Security in Terms of the Law Enforcement Agencies. Hadmérnök, 7, 1 144-156.

23 

Rajnai Z. 2019. The Role of Additional Information in Obtaining information. Interdisciplinary Description of Complex Systems, 17, 3A 438-443. https://doi.org/10.7906/indecs.17.3.2http://dx.doi.org/10.7906/indecs.17.3.2

24 

Kunwar S. 2019. Social Engineering: A Technique for Managing Human Behavior. Journal of Information Technology and Sciences, 5, 1 18-22. https://doi.org/10.5281/zenodo.2580822http://dx.doi.org/10.5281/zenodo.2580822

25 

Tokody D. 2018. Digitising the European industry – holonic systems approach. Procedia Manufacturing, 2018, 22 1015-1022. https://doi.org/10.1016/j.promfg.2018.03.144http://dx.doi.org/10.1016/j.promfg.2018.03.144

26 

Rodriguez R.J. 2015. On synergies of cyber and physical security modelling in vulnerability assessment of railway systems. Computers and Electrical Engineering, 2015, 47 275-285. https://doi.org/10.1016/j.compeleceng.2015.07.011http://dx.doi.org/10.1016/j.compeleceng.2015.07.011

27 

Schuszter G.. Study of How to Implement an Intelligent Railway System in Hungary. New York: SISY 2015: IEEE 13th International Symposium on Intelligent Systems and Informatics, 2015.

28 

Breda G. 2019. Information security aspects of Industry 4.0.. Procedia Manufacturing, 2019, 32 848-855. https://doi.org/10.1016/j.promfg.2019.02.293http://dx.doi.org/10.1016/j.promfg.2019.02.293

29 

Szabó Z. 2019. The effects of globalization and cyber security on smart cities. Interdisciplinary Description of Complex Systems, 17, 3A 503-510. https://doi.org/10.7906/indecs.17.3.10http://dx.doi.org/10.7906/indecs.17.3.10


This display is generated from NISO JATS XML with jats-html.xsl. The XSLT engine is libxslt.