{"title":"Information technologies in the management of industrial enterprises","authors":"","doi":"10.18413/2518-1092-2021-6-4-0-8","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-4-0-8","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic prediction of deterministic signals","authors":"","doi":"10.18413/2518-1092-2021-6-4-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-4-0-3","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The structure of intellectual information technology of subinterval hidden embedding information into images","authors":"","doi":"10.18413/2518-1092-2021-6-4-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-4-0-6","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of remote work and ways to protect it","authors":"Yegor S. Kuzminykh, M. Maslova","doi":"10.18413/2518-1092-2021-6-3-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-2","url":null,"abstract":"The topic of remote work with the arrival of the pandemic was an unusual way of working for many companies and organizations, but as time goes on, it continues to become more and more relevant and even becomes more convenient and applicable for different fields of activity. This form of organization of work has brought many innovations both in the work and in the organization of the protection of processed and transmitted information in the process of work. Both ordinary workers and managers faced a lot of problems, but also acquired a lot of positive moments. We will analyze the negative and positive aspects of \"remote work\" and methods of protecting the processed information in this process.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing information security incidents","authors":"Anastasia A. Voronina, I. I. Skripina","doi":"10.18413/2518-1092-2021-6-3-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-3","url":null,"abstract":"Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term \"information security\". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of these problems. In the course of his work, the developer may accidentally make a mistake as a consequence of which a future vulnerability may be formed at this point. Vulnerability is a weak point of a program or software; having discovered this point, an attacker can easily harm information. If the threat came out deliberate, then there are methods to ensure the security of information. This article discusses information protection measures.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127735007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of generative design methods using multimodal data in the field of architecture and urban planning","authors":"А.А Laushkina, Oleg O. Basov","doi":"10.18413/2518-1092-2021-6-3-0-1","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-1","url":null,"abstract":"This paper is devoted to the study of generative modeling in design used: this is an iterative process that generates several output data with consideration to certain restrictions of the input parameters. Generative design can offer advantages to traditional design as specifically defined criteria are taken into account early as the conceptual design stage. The purpose of the work was to study the existing methods and algorithms of generative design in urban planning, taking into account changes in environmental characteristics. The first step was to determine the input data for the design of the urban structure. The second stage was the analysis of existing solutions. In conclusion, it was The conclusion was made about the various constraints faced by developers, namely: the requirement to make changes in the user mode imposes restrictions on the use of such systems. It is also established that at the moment there is no clear logic by which generative systems can identify contradictions in a set of multimodal data and make a decision on the correspondence of the obtained result to dynamically changing parameters.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reengineering of business processes Teta Food LLC","authors":"Darya S. Migulina, T. V. Zaitseva","doi":"10.18413/2518-1092-2021-6-3-0-8","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-8","url":null,"abstract":"This article discusses the improvement of the work of an enterprise in the production sphere of LLC \"TETA FOOD\", which consists in increasing the efficiency of employees of the enterprise by reducing the time for the formation of a full package of documents (UPD) for submission to the tax office for the purpose of refunding VAT to the exporting enterprise. In the analytical part, the features of the VAT refund to the exporting company are analyzed in detail. To formalize and describe business processes, the notation IDEF0 and IDEF3 was chosen. In the design part, the ―AS IS‖ model was analyzed and the main problems of the model were identified. A strategy for the future strategy based on the IDEF0 methodology was developed.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124171897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About ensuring security in the field of the internet of things","authors":"Oleg O. Viushchenko, M. Maslova","doi":"10.18413/2518-1092-2021-6-3-0-5","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-5","url":null,"abstract":"The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maxim E. Ershov, Vasiliy R. Golyatkin, S. Chistyakov
{"title":"Using education software to educate speciasists in telecommunication","authors":"Maxim E. Ershov, Vasiliy R. Golyatkin, S. Chistyakov","doi":"10.18413/2518-1092-2021-6-3-0-7","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-7","url":null,"abstract":"In modern world humanity regular interact with information technologies that someone creates and maintains. In these conditions, high-quality and fast training of specialists, who will have the skills and knowledge necessary for the operation of telecommunication technologies is required. One of the solutions to this problem is the development of training software complexes capable of individualizing personnel training with support of the required quality. Since in modern realities this type of training is still not widespread enough, it has a number of requirements: a friendly interface, a method for presenting educational material, consolidating the material learned, etc. Training with the help of computer programs has a number of advantages in contradistinction to traditional training, for example, such as minimal financial costs; there is not need to send an employee to courses, thereby interrupting his performance of his job duties. The main task of such programs is the effectiveness of employee training with minimal time waste. The article considers an example of the structural organization of such programs and the correct presentation of educational material in them.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132959504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The choice of software and hardware for determining the psychoemotional state of users in the development of an adaptive lighting system","authors":"A. Leonov, Nikita E. Osmulkevich, T. R. Samigulin","doi":"10.18413/2518-1092-2021-6-3-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-6","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114453824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}