16+

INFORMATION SYSTEM AND TECHNOLOGIES

MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM

Volume 6, Issue №1, 2021
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a ...

APPLICATION OF THE VOICE IDENTIFICATION METHOD ADAPTED TO THE QUIET PRESENCE OF PASSWORD PHRASES TO COUNTER THE LEAKAGE OF SPEECH INFORMATION

Volume 6, Issue №1, 2021
The article discusses the features of biometric voice identification under the condition of quiet pronunciation of password phrases. Biometric voice identification differs significantly from standard identification systems and ...

IMPLEMENTATION OF THE SPEECH ACTIVITY DETECTING ALGORITHM AT CONDUCTING PARALINGUISTIC ANALYSIS

Volume 6, Issue №1, 2021
Algorithms for the speech activity detecting are now widely used. Such algorithms are used in various tasks: transmitting a human speech stream, storing information for compressing audio recordings, ...

COMPUTER MODELING OF PARAMETERS OF THE ELECTRONIC SHELL OF THE ATOM

Volume 6, Issue №1, 2021
In work results of computer modeling of parameters of an electron shell of atom such as orbital radiuses and constants of shielding are presented. It is shown that ...

COMPARATIVE ANALYSIS OF TEXT DATA STORAGE FORMATS FOR FURTHER PROCESSING BY METHODS OF MACHINE LEARNING

Volume 6, Issue №1, 2021
Today, one of the most promising areas in the field of information technology is machine learning. It is used in many areas of activity, including text data analysis. Between ...

ON THE USE OF VIRTUAL LABORATORY WORKS IN ONLINE EDUCATION

Volume 5, Issue №4, 2020
The article deals with the creation of virtual laboratory works on the PC device for first-year students with the aim of their further use in distance learning. Virtual ...

INFORMATION SECURITY AS A SERVICE IN THE NEW REMOTE WORLD

Volume 5, Issue №4, 2020
The year 2020 in the Russian Federation led to changes in the work of companies, government agencies, and information security departments in particular, which in turn ...

COMPARATIVE ANALYSIS OF METHODS FOR DETECTING OBJECTS ON RADAR IMAGES USING NEURAL NETWORKS

Volume 5, Issue №4, 2020
Radar systems are an effective means of obtaining operational information about the state and dynamics of objects and areas of the globe at different scales regardless of meteorological ...

ON DETECTION OF UNMANNED AERIAL VEHICLES

Volume 5, Issue №4, 2020
The use of unmanned aerial vehicles has recently become an integral part in the life of modern society; they are used in solving video surveillance tasks, for photo and ...

INTELLIGENT ASSISTANCE IN ONLINE INTERVIEWING. EMOTIONAL ROUTING METHOD

Volume 5, Issue №4, 2020
In the era of the coronavirus pandemic, traditional human communication has undergone several significant changes. Most of the usual offline activities went online, which made it necessary to ...

REVIEW AND ANALYSIS OF THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE

Volume 5, Issue №4, 2020
One of the most pressing questions of the modern world is what is artificial intelligence (AI) – an assistant or a threat to all of humanity? Since the beginning ...

RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS

Volume 5, Issue №3, 2020
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number of advantages over conventional currency, and the number of advantages ...

DEVELOPING A METHOD FOR CREATING A RESISTANT TO AUTOMATIC RECOGNITION AND GUESSING CAPTCHA

Volume 5, Issue №3, 2020
The relevance of the problem considered in the article is due to the growing number of web resources of various government organizations and commercial companies on the Internet, and ...

MAIN TYPES OF COMPUTER THREATS

Volume 5, Issue №3, 2020
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, and these sequences of operations are called programs. Most often ...

APPLICATION OF METHODS OF PHONETIC ANALYSIS  OF SPEECH FOR IDENTIFICATION OF EMOTIONALLY  SUSTAINABLE AND UNSTABLE STUDENTS OF UNIVERSITY 

Volume 5, Issue №2, 2020
This article is devoted to the development of a computer system designed to study the emotional stability of a person according to a speech signal in normal and conditions ...

ALGORITHM OF MULTI-SPECTRAL SATELLITE  DATA PREPARATION FOR AGRICULTURAL CROP  CLASSIFICATION

Volume 5, Issue №2, 2020
The article describes a developed algorithm of multispectral satellite data preprocessing for agricultural crop classification. The procedure for downloading data from the Copernicus Sentinel-2 satellite from the SentinelHub resource ...

IMPROVED GRAPHICAL AUTHENTICATION  ALGORITHM WITH ANTI-SPYING PROTECTION 

Volume 5, Issue №2, 2020
This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the research is due to the need to protect user-entered identifiers ...

COMPUTER SYSTEM OF PRELIMINARY PROCESSING MRI IMAGES OF THE BRAIN

Volume 5, Issue №1, 2020
One of the most common methods for diagnosing the brain is using magnetic resonance imaging (MRI). The segmentation of brain MRI images using a computer pre-processing system is an ...
Page 1 of 2 | Next