16+

INFORMATION SYSTEM AND TECHNOLOGIES

THE USE OF WEB-BASED ROADMAPS TO SOLVE PROBLEMS IN BUILDING AN INDIVIDUAL EDUCATIONAL TRAJECTORY

Volume 10, Issue №2, 2025
The article discusses the actual problem of information redundancy in the modern world, especially in the context of planning an educational trajectory to achieve professional goals. The authors ...

NUMERICAL SOLUTION BY THE SELF-CONSISTENT BASIS METHOD OF SCHRÖDINGER EQUATIONS THAT ARE INVARIANT WITH RESPECT TRANSFORMATIONS OF DISCRETE Cnv GROUPS

Volume 10, Issue №2, 2025
In this work, using the so-called self-consistent basis method, solutions to three two-dimensional Schrödinger equations are found, which are invariant under transformations of discrete groups Cnv, n=2,3,4. In the ...

USAGE OF HASH TABLES IN THE MECHANISM OF PROTECTION AGAINST DOS ATTACKS USING THE PYTHON LANGUAGE

Volume 10, Issue №2, 2025
This article addresses the current problem of hash table security in the context of DoS attacks caused by deliberate collisions. Hash collisions can be exploited by attackers to ...

ANALYSIS OF CONSENSUS MECHANISMS IN BLOCKCHAIN SYSTEMS

Volume 10, Issue №1, 2025
This article provides an analysis of the primary consensus mechanisms employed in blockchain networks, namely Proof-of-Work (PoW), Proof-of-Stake (PoS), Delegated Proof-of-Stake (DPoS), Proof-of-Authority (PoA), and Proof-of-Capacity (PoC). The ...

SPLITTING THE CONTOUR OF AN IMAGE OF A GRAPHIC OBJECT INTO FRAGMENTS IN CLASSIFICATION TASKS

Volume 10, Issue №1, 2025
The article substantiates a method for recognizing graphic objects based on the analysis of image contours, including the extraction of special points and the use of skeletal representation ...

DIGITALIZATION OF TEACHER AND STUDENT COMMUNICATIONS WITH THE POSSIBILITY OF PRESENTING, STORING AND DEMONSTRATING STUDENT MULTIMEDIA PROJECTS

Volume 10, Issue №1, 2025
The article presents the results of an analysis of communication processes between teachers and students during training, as well as a description of the implementation of a web-based ...

ON THE ISSUE OF DIGITAL TRANSFORMATION OF ORGANIZATIONAL AND BUSINESS PROCESSES

Volume 9, Issue №4, 2024
The paper considers the problems of digital transformation of organizational and business processes. The analysis of such concepts as "digital transformation" and "digitalization" is given. From the standpoint ...

THE USE OF PREDICTIVE ANALYTICS TOOLS TO PREDICT THE RECOVERY OF LARGE-SIZED EQUIPMENT

Volume 9, Issue №3, 2024
The article presents the results of a study in the field of predictive analytics for the repair of large-sized equipment in the building materials industry. New data processing ...

MATHEMATICAL ANALYSIS OF SIR MODEL WITH INCUBATION PERIOD

Volume 9, Issue №3, 2024
The SIP model is a fundamental tool for simulating epidemic dynamics, but it has limitations in accurately representing real-world scenarios. This paper presents a comprehensive review and mathematical ...

SYSTEM-OBJECT SIMULATION OF THE ATMEL ATMEGA 168 MICROCONTROLLER

Volume 9, Issue №3, 2024
The paper presents the process of developing a simulation model, including a description of the functionality of the microcontroller, determination of the main characteristics and parameters of the ...

MATHEMATICAL MODEL OF THE DELIVERY PROCESS OF TELEMETRY MESSAGES IN THE MEDICAL INTERNET OF THINGS SYSTEM

Volume 9, Issue №3, 2024
Currently, research and development are relevant aimed at increasing the efficiency of transmission of telemetry messages in wireless remote monitoring systems used by medical workers to provide timely ...

METHODS OF EMBEDDING CONTROL INFORMATION IN IMAGES

Volume 9, Issue №2, 2024
The paper discusses various methods of steganography used to embed control information in digital images. The main focus is on the principles of operation, advantages and disadvantages of ...

INVESTIGATION OF AUTHENTICATION METHODS ON WEB SERVICES. CURRENT TRENDS AND DEVELOPMENT PROSPECTS

Volume 9, Issue №2, 2024
In the development of information technology, software and data protection on web services are of great importance. To ensure security, various methods are used, and one of the ...

INSTRUMENTAL SUPPORT FOR CONSTRUCTING AND USING SYSTEM-OBJECT THREE-DIMENSIONAL CLASSIFICATION

Volume 9, Issue №2, 2024
The article discusses the problem of instrumental support for construction and use procedures using the system-object approach of three-dimensional classification (SO3K). The possibilities of forecasting and management support ...

ANALYSIS OF OPEN-SOURCE INTRUSION DETECTION AND PREVENTION SYSTEMS FOR INTEGRATION WITH RUSSIAN OPERATING SYSTEMS

Volume 9, Issue №2, 2024
The article reviewed IDS/IPS such as Snort, Suricata, Fail2Ban and OSSEC, which have open-source code. Their mechanisms for ensuring network security, including architecture, functions, tools and implemented tasks, ...

ON ESTIMATING THE SIZE OF INFORMATIVE FRAGMENTS IN THE SEA SURFACE IMAGES

Volume 9, Issue №2, 2024
The paper proposes a solution to one of the problems arising in the construction of modern traffic safety systems in marine areas, namely, estimating the size of informative ...

ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS

Volume 9, Issue №1, 2024
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most reliable and secure encryption algorithm. The article analyzes the characteristics ...
Page 1 of 5 | Next