The use of unmanned aerial vehicles has recently become an integral part in the life of modern society; they are used in solving video surveillance tasks, for photo and ...
The article deals with the creation of virtual laboratory works on the PC device for first-year students with the aim of their further use in distance learning. Virtual ...
The year 2020 in the Russian Federation led to changes in the work of companies, government agencies, and information security departments in particular, which in turn ...
The relevance of the problem considered in the article is due to the growing number of web resources of various government organizations and commercial companies on the Internet, and ...
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number of advantages over conventional currency, and the number of advantages ...
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, and these sequences of operations are called programs. Most often ...
This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the research is due to the need to protect user-entered identifiers ...
This article is devoted to the development of a computer system designed to study the emotional stability of a person according to a speech signal in normal and conditions ...
The article describes a developed algorithm of multispectral satellite data preprocessing for agricultural crop classification. The procedure for downloading data from the Copernicus Sentinel-2 satellite from the SentinelHub resource ...
Currently, there are a fairly large number of different methods, the use of which allows to one degree or another to solve the problem of ensuring a given level ...
The current level of prevalence of mobile devices makes them available to everyone. Many important files are stored on smartphones and financial transactions and authorization operations are performed using ...
The article deals with the issues of computer modeling of the formation of error in forecasting the state of the object of control. To analyze the process of error ...
IP networks are actively used by public services and now provide information transfer which includes different services, such as IP telephony, video conference, data exchange and others. Such services ...
This article is devoted to solving the problem of classifying chest x-ray images by using the retraining of a pre-trained convolutional neural network trained on small data sets. A ...
One of the most common methods for diagnosing the brain is using magnetic resonance imaging (MRI). The segmentation of brain MRI images using a computer pre-processing system is an ...
The article considers a method for constructing of automatic differentiators using Butterworth polynomials. The synthesis of differentiators is reduced to the construction of a tracking system for a plant ...
Previous
|
Page 4 of 4
All journals
Send article
Research result. Information technologies is included in the scientific database of the RINTs (license agreement No. 765-12/2014 dated 08.12.2014).
Журнал включен в перечень рецензируемых научных изданий, рекомендуемых ВАК