16+

INFORMATION SYSTEM AND TECHNOLOGIES

ON THE ISSUE OF DIGITAL TRANSFORMATION OF ORGANIZATIONAL AND BUSINESS PROCESSES

Volume 9, Issue №4, 2024
The paper considers the problems of digital transformation of organizational and business processes. The analysis of such concepts as "digital transformation" and "digitalization" is given. From the standpoint ...

MATHEMATICAL MODEL OF THE DELIVERY PROCESS OF TELEMETRY MESSAGES IN THE MEDICAL INTERNET OF THINGS SYSTEM

Volume 9, Issue №3, 2024
Currently, research and development are relevant aimed at increasing the efficiency of transmission of telemetry messages in wireless remote monitoring systems used by medical workers to provide timely ...

SYSTEM-OBJECT SIMULATION OF THE ATMEL ATMEGA 168 MICROCONTROLLER

Volume 9, Issue №3, 2024
The paper presents the process of developing a simulation model, including a description of the functionality of the microcontroller, determination of the main characteristics and parameters of the ...

MATHEMATICAL ANALYSIS OF SIR MODEL WITH INCUBATION PERIOD

Volume 9, Issue №3, 2024
The SIP model is a fundamental tool for simulating epidemic dynamics, but it has limitations in accurately representing real-world scenarios. This paper presents a comprehensive review and mathematical ...

THE USE OF PREDICTIVE ANALYTICS TOOLS TO PREDICT THE RECOVERY OF LARGE-SIZED EQUIPMENT

Volume 9, Issue №3, 2024
The article presents the results of a study in the field of predictive analytics for the repair of large-sized equipment in the building materials industry. New data processing ...

METHODS OF EMBEDDING CONTROL INFORMATION IN IMAGES

Volume 9, Issue №2, 2024
The paper discusses various methods of steganography used to embed control information in digital images. The main focus is on the principles of operation, advantages and disadvantages of ...

INVESTIGATION OF AUTHENTICATION METHODS ON WEB SERVICES. CURRENT TRENDS AND DEVELOPMENT PROSPECTS

Volume 9, Issue №2, 2024
In the development of information technology, software and data protection on web services are of great importance. To ensure security, various methods are used, and one of the ...

ANALYSIS OF OPEN-SOURCE INTRUSION DETECTION AND PREVENTION SYSTEMS FOR INTEGRATION WITH RUSSIAN OPERATING SYSTEMS

Volume 9, Issue №2, 2024
The article reviewed IDS/IPS such as Snort, Suricata, Fail2Ban and OSSEC, which have open-source code. Their mechanisms for ensuring network security, including architecture, functions, tools and implemented tasks, ...

INSTRUMENTAL SUPPORT FOR CONSTRUCTING AND USING SYSTEM-OBJECT THREE-DIMENSIONAL CLASSIFICATION

Volume 9, Issue №2, 2024
The article discusses the problem of instrumental support for construction and use procedures using the system-object approach of three-dimensional classification (SO3K). The possibilities of forecasting and management support ...

ON ESTIMATING THE SIZE OF INFORMATIVE FRAGMENTS IN THE SEA SURFACE IMAGES

Volume 9, Issue №2, 2024
The paper proposes a solution to one of the problems arising in the construction of modern traffic safety systems in marine areas, namely, estimating the size of informative ...

ANALYSIS OF IMPENETRABLE ENCRYPTION ALGORITHMS

Volume 9, Issue №1, 2024
This article explores impenetrable ciphers, including DES, RSA and AES, with the stated goal of determining the most reliable and secure encryption algorithm. The article analyzes the characteristics ...

OVERVIEW OF CRYPTOGRAPHIC GATEWAYS FOR PROTECTION INFORMATION IN CORPORATE NETWORKS

Volume 9, Issue №1, 2024
This article discusses solutions from domestic manufacturers for the organization of a secure corporate network (cryptoslocks, VPN gateways), the basic principles of operation of this equipment, connection scenarios ...

PHENOMENOLOGICAL ANALYSIS OF EXISTING AUTHENTICATION METHODS

Volume 9, Issue №1, 2024
The article discusses authentication methods for users of local area networks and automated workplaces in order to determine the most relevant ways to counter internal intruders using other ...

ENSURING INFORMATION SECURITY IN EXECUTIVE AUTHORITIES. PROBLEMS AND SOLUTIONS

Volume 9, Issue №1, 2024
The article discusses the main problems and, accordingly, the security measures taken by executive authorities, which define goals and objectives, risk assessment. The basic principles of the choice ...

COMPUTER MODELLING OF MATERIAL OBJECTS’ STRUCTURE. PART III. CLUSTERING OF NUCLEON SYSTEMS

Volume 8, Issue №4, 2023
The structure of light atomic nuclei, such as hydrogen, helium and lithium nuclides, was studied based on the cluster approach. Atomic nuclei are formed as systems consisting of free ...

ANALYSIS OF SOFTWARE AND HARDWARE-SOFTWARE TOOLS FOR INFORMATION PROTECTION IN INFORMATION SYSTEMS OF PUBLIC AUTHORITIES

Volume 8, Issue №4, 2023
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. When considering security measures to ensure the security of information ...

RESEARCH AND ANALYSIS OF PROBLEMS OF TEACHING DISCRETE MATHEMATICS IN AN EDUCATIONAL INSTITUTION AND VIA THE INTERNET

Volume 8, Issue №4, 2023
This article raises the problem of teaching discrete mathematics in an educational institution and on the Internet, and also explores problems and solutions in the field of distance interactive ...

ANALYSIS CODE SIMILARITY AND SEARCH FOR ITS BORROWINGS

Volume 8, Issue №3, 2023
This article discusses an actual problem in the field of programming — the borrowing of code and the possibility of its analysis. With the increase in the number of ...

ABOUT RUSSIAN SPEECH SYNTHESIS SOFTWARE

Volume 8, Issue №2, 2023
In modern information technologies, an important place is occupied by interactive methods for entering information with the subsequent use of processed data. Voice input, gesture control, motion capture, ...
Page 1 of 4 | Next