The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based on the developed program for modeling the PSP process with ...
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well as its software implementation, which allows you to detect embedded ...
The use of Blockchain in the Internet of Things networks is an innovative approach that can make communication between devices of such a network distributed, autonomous and secure. ...
In work results of computer modeling of parameters of an electron shell of atom such as orbital radiuses and constants of shielding are presented. It is shown that ...
The use of hardware and software technologies in medicine has developed significantly over the past two decades thanks to such advances as the exoskeleton and bioengineering. One of ...
The article discusses the features of biometric voice identification under the condition of quiet pronunciation of password phrases. Biometric voice identification differs significantly from standard identification systems and ...
Today, one of the most promising areas in the field of information technology is machine learning. It is used in many areas of activity, including text data analysis. Between ...
Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a ...
Algorithms for the speech activity detecting are now widely used. Such algorithms are used in various tasks: transmitting a human speech stream, storing information for compressing audio recordings, ...
In the era of the coronavirus pandemic, traditional human communication has undergone several significant changes. Most of the usual offline activities went online, which made it necessary to ...
Radar systems are an effective means of obtaining operational information about the state and dynamics of objects and areas of the globe at different scales regardless of meteorological ...
One of the most pressing questions of the modern world is what is artificial intelligence (AI) – an assistant or a threat to all of humanity? Since the beginning ...
The article deals with the creation of virtual laboratory works on the PC device for first-year students with the aim of their further use in distance learning. Virtual ...
The year 2020 in the Russian Federation led to changes in the work of companies, government agencies, and information security departments in particular, which in turn ...
The use of unmanned aerial vehicles has recently become an integral part in the life of modern society; they are used in solving video surveillance tasks, for photo and ...
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number of advantages over conventional currency, and the number of advantages ...
Computer – a device created for performing operations on this device. These operations are defined and specified by the user, and these sequences of operations are called programs. Most often ...
The relevance of the problem considered in the article is due to the growing number of web resources of various government organizations and commercial companies on the Internet, and ...
This article is devoted to the development of a computer system designed to study the emotional stability of a person according to a speech signal in normal and conditions ...
This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the research is due to the need to protect user-entered identifiers ...
All journals
Send article
Research result. Information technologies is included in the scientific database of the RINTs (license agreement No. 765-12/2014 dated 08.12.2014).
Журнал включен в перечень рецензируемых научных изданий, рекомендуемых ВАК















