16+

INFORMATION SYSTEM AND TECHNOLOGIES

RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY

Volume 6, Issue №2, 2021
The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based on the developed program for modeling the PSP process with ...

AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS

Volume 6, Issue №2, 2021
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well as its software implementation, which allows you to detect embedded ...

USING BLOCKCHAIN TECHNOLOGY TO ENSURE SECURITY IN THE DISTRIBUTED INTERNET OF THINGS

Volume 6, Issue №2, 2021
The use of Blockchain in the Internet of Things networks is an innovative approach that can make communication between devices of such a network distributed, autonomous and secure. ...

COMPUTER MODELING OF PARAMETERS OF THE ELECTRONIC SHELL OF THE ATOM

Volume 6, Issue №1, 2021
In work results of computer modeling of parameters of an electron shell of atom such as orbital radiuses and constants of shielding are presented. It is shown that ...

APPLICATION OF THE VOICE IDENTIFICATION METHOD ADAPTED TO THE QUIET PRESENCE OF PASSWORD PHRASES TO COUNTER THE LEAKAGE OF SPEECH INFORMATION

Volume 6, Issue №1, 2021
The article discusses the features of biometric voice identification under the condition of quiet pronunciation of password phrases. Biometric voice identification differs significantly from standard identification systems and ...

COMPARATIVE ANALYSIS OF TEXT DATA STORAGE FORMATS FOR FURTHER PROCESSING BY METHODS OF MACHINE LEARNING

Volume 6, Issue №1, 2021
Today, one of the most promising areas in the field of information technology is machine learning. It is used in many areas of activity, including text data analysis. Between ...

MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM

Volume 6, Issue №1, 2021
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a ...

IMPLEMENTATION OF THE SPEECH ACTIVITY DETECTING ALGORITHM AT CONDUCTING PARALINGUISTIC ANALYSIS

Volume 6, Issue №1, 2021
Algorithms for the speech activity detecting are now widely used. Such algorithms are used in various tasks: transmitting a human speech stream, storing information for compressing audio recordings, ...

INTELLIGENT ASSISTANCE IN ONLINE INTERVIEWING. EMOTIONAL ROUTING METHOD

Volume 5, Issue №4, 2020
In the era of the coronavirus pandemic, traditional human communication has undergone several significant changes. Most of the usual offline activities went online, which made it necessary to ...

COMPARATIVE ANALYSIS OF METHODS FOR DETECTING OBJECTS ON RADAR IMAGES USING NEURAL NETWORKS

Volume 5, Issue №4, 2020
Radar systems are an effective means of obtaining operational information about the state and dynamics of objects and areas of the globe at different scales regardless of meteorological ...

REVIEW AND ANALYSIS OF THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE

Volume 5, Issue №4, 2020
One of the most pressing questions of the modern world is what is artificial intelligence (AI) – an assistant or a threat to all of humanity? Since the beginning ...

ON THE USE OF VIRTUAL LABORATORY WORKS IN ONLINE EDUCATION

Volume 5, Issue №4, 2020
The article deals with the creation of virtual laboratory works on the PC device for first-year students with the aim of their further use in distance learning. Virtual ...

INFORMATION SECURITY AS A SERVICE IN THE NEW REMOTE WORLD

Volume 5, Issue №4, 2020
The year 2020 in the Russian Federation led to changes in the work of companies, government agencies, and information security departments in particular, which in turn ...

ON DETECTION OF UNMANNED AERIAL VEHICLES

Volume 5, Issue №4, 2020
The use of unmanned aerial vehicles has recently become an integral part in the life of modern society; they are used in solving video surveillance tasks, for photo and ...

RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS

Volume 5, Issue №3, 2020
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number of advantages over conventional currency, and the number of advantages ...

MAIN TYPES OF COMPUTER THREATS

Volume 5, Issue №3, 2020
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, and these sequences of operations are called programs. Most often ...

DEVELOPING A METHOD FOR CREATING A RESISTANT TO AUTOMATIC RECOGNITION AND GUESSING CAPTCHA

Volume 5, Issue №3, 2020
The relevance of the problem considered in the article is due to the growing number of web resources of various government organizations and commercial companies on the Internet, and ...

APPLICATION OF METHODS OF PHONETIC ANALYSIS  OF SPEECH FOR IDENTIFICATION OF EMOTIONALLY  SUSTAINABLE AND UNSTABLE STUDENTS OF UNIVERSITY 

Volume 5, Issue №2, 2020
This article is devoted to the development of a computer system designed to study the emotional stability of a person according to a speech signal in normal and conditions ...

IMPROVED GRAPHICAL AUTHENTICATION  ALGORITHM WITH ANTI-SPYING PROTECTION 

Volume 5, Issue №2, 2020
This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the research is due to the need to protect user-entered identifiers ...
Previous | Page 4 of 5 | Next