Research result. Information technologies最新文献

筛选
英文 中文
RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY GSM移动通信技术中语音加密可靠性研究
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-2
A.D. Buhantsov, A.Yu. Sadjiid, A. Ustinov, C.V. Rodionov
{"title":"RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY","authors":"A.D. Buhantsov, A.Yu. Sadjiid, A. Ustinov, C.V. Rodionov","doi":"10.18413/2518-1092-2021-6-2-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-2","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS AND SELECTION OF A MATHEMATICAL MODEL USING THE HIERARCHY ANALYSIS METHOD 采用层次分析法对数学模型进行分析和选择
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-6
I. I. Skripina, T. Zaitseva, N. Putivtseva
{"title":"ANALYSIS AND SELECTION OF A MATHEMATICAL MODEL USING THE HIERARCHY ANALYSIS METHOD","authors":"I. I. Skripina, T. Zaitseva, N. Putivtseva","doi":"10.18413/2518-1092-2021-6-2-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-6","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE RATIO OF THE SYSTEM-OBJECT AND AGENT-BASED APPROACHES TO THE CONSTRUCTION OF SIMULATION MODELS 基于系统对象和基于智能体的仿真模型构建方法的比值
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-4
A. Zhikharev, R. Mamatov
{"title":"THE RATIO OF THE SYSTEM-OBJECT AND AGENT-BASED APPROACHES TO THE CONSTRUCTION OF SIMULATION MODELS","authors":"A. Zhikharev, R. Mamatov","doi":"10.18413/2518-1092-2021-6-2-0-4","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-4","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS 自动检测javascript嗅探器
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-3
Y. Goncharenko, S. Devitsyna, P.A. Shapovalov
{"title":"AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS","authors":"Y. Goncharenko, S. Devitsyna, P.A. Shapovalov","doi":"10.18413/2518-1092-2021-6-2-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-3","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ON HIDDEN DATA EMBEDDING INTO THE VIDEO STREAM BASED ON THREE-DIMENSIONAL SUBBAND ANALYSIS 基于三维子带分析的视频流隐藏数据嵌入
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-7
А.А. Chernomorets, Е.V. Bolgova, D. Chernomorets
{"title":"ON HIDDEN DATA EMBEDDING INTO THE VIDEO STREAM BASED ON THREE-DIMENSIONAL SUBBAND ANALYSIS","authors":"А.А. Chernomorets, Е.V. Bolgova, D. Chernomorets","doi":"10.18413/2518-1092-2021-6-2-0-7","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-7","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DATA MINING METHODS USING DBMS TOOLS 使用DBMS工具的数据挖掘方法
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-5
R. K. Naumov, M.S. Samylkin, M.V. Kopeikin
{"title":"DATA MINING METHODS USING DBMS TOOLS","authors":"R. K. Naumov, M.S. Samylkin, M.V. Kopeikin","doi":"10.18413/2518-1092-2021-6-2-0-5","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-5","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
USING BLOCKCHAIN TECHNOLOGY TO ENSURE SECURITY IN THE DISTRIBUTED INTERNET OF THINGS 利用区块链技术,确保分布式物联网的安全
Research result. Information technologies Pub Date : 2021-06-30 DOI: 10.18413/2518-1092-2021-6-2-0-1
R. Nesterenko, M. A. Maslovа
{"title":"USING BLOCKCHAIN TECHNOLOGY TO ENSURE SECURITY IN THE DISTRIBUTED INTERNET OF THINGS","authors":"R. Nesterenko, M. A. Maslovа","doi":"10.18413/2518-1092-2021-6-2-0-1","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-1","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTATION OF THE SPEECH ACTIVITY DETECTING ALGORITHM AT CONDUCTING PARALINGUISTIC ANALYSIS 语音活动检测算法在辅助语言分析中的实现
Research result. Information technologies Pub Date : 2021-03-30 DOI: 10.18413/2518-1092-2021-6-1-0-2
A. Diachenko, D. Podolsky
{"title":"IMPLEMENTATION OF THE SPEECH ACTIVITY DETECTING ALGORITHM AT CONDUCTING PARALINGUISTIC ANALYSIS","authors":"A. Diachenko, D. Podolsky","doi":"10.18413/2518-1092-2021-6-1-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-1-0-2","url":null,"abstract":"Algorithms for the speech activity detecting are now widely used. Such algorithms are used in various tasks: transmitting a human speech stream, maintaining its accuracy. The aim of this work is to modify and implement an algorithm for detecting speech activity in a room based on the speech flow in the Csound environment for conducting paralinguistic analysis of human speech activity.","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPUTER MODELING OF PARAMETERS OF THE ELECTRONIC SHELL OF THE ATOM 原子电子壳层参数的计算机建模
Research result. Information technologies Pub Date : 2021-03-30 DOI: 10.18413/2518-1092-2021-6-1-0-4
L. V. Migal, V. G. Bondarev, T. P. Bondareva
{"title":"COMPUTER MODELING OF PARAMETERS OF THE ELECTRONIC SHELL OF THE ATOM","authors":"L. V. Migal, V. G. Bondarev, T. P. Bondareva","doi":"10.18413/2518-1092-2021-6-1-0-4","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-1-0-4","url":null,"abstract":"Аbstract In work results of computer modeling of parameters of an electron shell of atom such as orbital radiuses and constants of shielding are presented. It is shown that for atoms with completely filled electronic subshells, the dependence of the orbital radii from the nuclear charge (atomic number) can be described by application of a computing experiment, and to consider the received equations as a basis for extrapolation of data on orbital radiuses on all range of atomic numbers of elements what gives the chance of creation of the full scheme of dependence of orbital radii on charging number of the nucleus and calculation of the average size of atom.","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"73 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM 现代公共云信息安全的挑战与威胁及其工作方法
Research result. Information technologies Pub Date : 2021-03-30 DOI: 10.18413/2518-1092-2021-6-1-0-6
R. Nesterenko, M. A. Maslovа
{"title":"MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM","authors":"R. Nesterenko, M. A. Maslovа","doi":"10.18413/2518-1092-2021-6-1-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-1-0-6","url":null,"abstract":"Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, for 2020, 39% of respondents noted the importance of protecting their cloud infrastructure, and 52% emphasized protecting public and hybrid clouds. The development of methods and means to counter threats to the security of cloud services is one of the priority tasks of the industry. In a quarantine environment, the security issues of cloud services are especially acute, as more and more users and organizations store important information in the cloud, conduct workflow in the cloud, and migrate or associate their business processes with cloud technologies. Most of the problems of information security of cloud services can be solved with the introduction of cryptographic protection, competent administrative measures on the part of the provider and service provider. These measures should take into account the individual requirements of the client.","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信