A.D. Buhantsov, A.Yu. Sadjiid, A. Ustinov, C.V. Rodionov
{"title":"RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY","authors":"A.D. Buhantsov, A.Yu. Sadjiid, A. Ustinov, C.V. Rodionov","doi":"10.18413/2518-1092-2021-6-2-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-2","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS AND SELECTION OF A MATHEMATICAL MODEL USING THE HIERARCHY ANALYSIS METHOD","authors":"I. I. Skripina, T. Zaitseva, N. Putivtseva","doi":"10.18413/2518-1092-2021-6-2-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-6","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE RATIO OF THE SYSTEM-OBJECT AND AGENT-BASED APPROACHES TO THE CONSTRUCTION OF SIMULATION MODELS","authors":"A. Zhikharev, R. Mamatov","doi":"10.18413/2518-1092-2021-6-2-0-4","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-4","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS","authors":"Y. Goncharenko, S. Devitsyna, P.A. Shapovalov","doi":"10.18413/2518-1092-2021-6-2-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-3","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ON HIDDEN DATA EMBEDDING INTO THE VIDEO STREAM BASED ON THREE-DIMENSIONAL SUBBAND ANALYSIS","authors":"А.А. Chernomorets, Е.V. Bolgova, D. Chernomorets","doi":"10.18413/2518-1092-2021-6-2-0-7","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-7","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DATA MINING METHODS USING DBMS TOOLS","authors":"R. K. Naumov, M.S. Samylkin, M.V. Kopeikin","doi":"10.18413/2518-1092-2021-6-2-0-5","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-5","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USING BLOCKCHAIN TECHNOLOGY TO ENSURE SECURITY IN THE DISTRIBUTED INTERNET OF THINGS","authors":"R. Nesterenko, M. A. Maslovа","doi":"10.18413/2518-1092-2021-6-2-0-1","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-2-0-1","url":null,"abstract":"","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTATION OF THE SPEECH ACTIVITY DETECTING ALGORITHM AT CONDUCTING PARALINGUISTIC ANALYSIS","authors":"A. Diachenko, D. Podolsky","doi":"10.18413/2518-1092-2021-6-1-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-1-0-2","url":null,"abstract":"Algorithms for the speech activity detecting are now widely used. Such algorithms are used in various tasks: transmitting a human speech stream, maintaining its accuracy. The aim of this work is to modify and implement an algorithm for detecting speech activity in a room based on the speech flow in the Csound environment for conducting paralinguistic analysis of human speech activity.","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMPUTER MODELING OF PARAMETERS OF THE ELECTRONIC SHELL OF THE ATOM","authors":"L. V. Migal, V. G. Bondarev, T. P. Bondareva","doi":"10.18413/2518-1092-2021-6-1-0-4","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-1-0-4","url":null,"abstract":"Аbstract In work results of computer modeling of parameters of an electron shell of atom such as orbital radiuses and constants of shielding are presented. It is shown that for atoms with completely filled electronic subshells, the dependence of the orbital radii from the nuclear charge (atomic number) can be described by application of a computing experiment, and to consider the received equations as a basis for extrapolation of data on orbital radiuses on all range of atomic numbers of elements what gives the chance of creation of the full scheme of dependence of orbital radii on charging number of the nucleus and calculation of the average size of atom.","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"73 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MODERN CHALLENGES AND THREATS INFORMATION SECURITY PUBLIC CLOUD MAKING AND METHODS OF WORK WITH THEM","authors":"R. Nesterenko, M. A. Maslovа","doi":"10.18413/2518-1092-2021-6-1-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-1-0-6","url":null,"abstract":"Some organizations use cloud services to store service information, while other organizations build their business processes using cloud solutions. According to Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, for 2020, 39% of respondents noted the importance of protecting their cloud infrastructure, and 52% emphasized protecting public and hybrid clouds. The development of methods and means to counter threats to the security of cloud services is one of the priority tasks of the industry. In a quarantine environment, the security issues of cloud services are especially acute, as more and more users and organizations store important information in the cloud, conduct workflow in the cloud, and migrate or associate their business processes with cloud technologies. Most of the problems of information security of cloud services can be solved with the introduction of cryptographic protection, competent administrative measures on the part of the provider and service provider. These measures should take into account the individual requirements of the client.","PeriodicalId":342164,"journal":{"name":"Research result. Information technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}