Research Result Information Technologies最新文献

筛选
英文 中文
Information technologies in the management of industrial enterprises 信息技术在工业企业管理中的应用
Research Result Information Technologies Pub Date : 2021-12-30 DOI: 10.18413/2518-1092-2021-6-4-0-8
{"title":"Information technologies in the management of industrial enterprises","authors":"","doi":"10.18413/2518-1092-2021-6-4-0-8","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-4-0-8","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic prediction of deterministic signals 确定性信号的自动预测
Research Result Information Technologies Pub Date : 2021-12-30 DOI: 10.18413/2518-1092-2021-6-4-0-3
{"title":"Automatic prediction of deterministic signals","authors":"","doi":"10.18413/2518-1092-2021-6-4-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-4-0-3","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The structure of intellectual information technology of subinterval hidden embedding information into images 基于子区间隐藏的智能信息技术将信息嵌入到图像中
Research Result Information Technologies Pub Date : 2021-12-30 DOI: 10.18413/2518-1092-2021-6-4-0-6
{"title":"The structure of intellectual information technology of subinterval hidden embedding information into images","authors":"","doi":"10.18413/2518-1092-2021-6-4-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-4-0-6","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of remote work and ways to protect it 远程工作的方法和保护方法
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-2
Yegor S. Kuzminykh, M. Maslova
{"title":"Methods of remote work and ways to protect it","authors":"Yegor S. Kuzminykh, M. Maslova","doi":"10.18413/2518-1092-2021-6-3-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-2","url":null,"abstract":"The topic of remote work with the arrival of the pandemic was an unusual way of working for many companies and organizations, but as time goes on, it continues to become more and more relevant and even becomes more convenient and applicable for different fields of activity. This form of organization of work has brought many innovations both in the work and in the organization of the protection of processed and transmitted information in the process of work. Both ordinary workers and managers faced a lot of problems, but also acquired a lot of positive moments. We will analyze the negative and positive aspects of \"remote work\" and methods of protecting the processed information in this process.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing information security incidents 预防资讯保安事故
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-3
Anastasia A. Voronina, I. I. Skripina
{"title":"Preventing information security incidents","authors":"Anastasia A. Voronina, I. I. Skripina","doi":"10.18413/2518-1092-2021-6-3-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-3","url":null,"abstract":"Information is becoming a very important resource and begins to exceed even tangible assets in importance. In connection with the rapid development of the importance of information in the modern world, encroachments on information resources began to grow. A group of information security tools was developed to prevent unauthorized access to it or its elements. This group of tools is defined as the term \"information security\". It should be noted that it is precisely the preventive measures to ensure the security of information that are important, and not the elimination of the consequences of these problems. In the course of his work, the developer may accidentally make a mistake as a consequence of which a future vulnerability may be formed at this point. Vulnerability is a weak point of a program or software; having discovered this point, an attacker can easily harm information. If the threat came out deliberate, then there are methods to ensure the security of information. This article discusses information protection measures.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127735007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of generative design methods using multimodal data in the field of architecture and urban planning 多模态数据在建筑和城市规划领域的生成设计方法应用
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-1
А.А Laushkina, Oleg O. Basov
{"title":"Application of generative design methods using multimodal data in the field of architecture and urban planning","authors":"А.А Laushkina, Oleg O. Basov","doi":"10.18413/2518-1092-2021-6-3-0-1","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-1","url":null,"abstract":"This paper is devoted to the study of generative modeling in design used: this is an iterative process that generates several output data with consideration to certain restrictions of the input parameters. Generative design can offer advantages to traditional design as specifically defined criteria are taken into account early as the conceptual design stage. The purpose of the work was to study the existing methods and algorithms of generative design in urban planning, taking into account changes in environmental characteristics. The first step was to determine the input data for the design of the urban structure. The second stage was the analysis of existing solutions. In conclusion, it was The conclusion was made about the various constraints faced by developers, namely: the requirement to make changes in the user mode imposes restrictions on the use of such systems. It is also established that at the moment there is no clear logic by which generative systems can identify contradictions in a set of multimodal data and make a decision on the correspondence of the obtained result to dynamically changing parameters.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reengineering of business processes Teta Food LLC Teta Food LLC的业务流程再造
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-8
Darya S. Migulina, T. V. Zaitseva
{"title":"Reengineering of business processes Teta Food LLC","authors":"Darya S. Migulina, T. V. Zaitseva","doi":"10.18413/2518-1092-2021-6-3-0-8","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-8","url":null,"abstract":"This article discusses the improvement of the work of an enterprise in the production sphere of LLC \"TETA FOOD\", which consists in increasing the efficiency of employees of the enterprise by reducing the time for the formation of a full package of documents (UPD) for submission to the tax office for the purpose of refunding VAT to the exporting enterprise. In the analytical part, the features of the VAT refund to the exporting company are analyzed in detail. To formalize and describe business processes, the notation IDEF0 and IDEF3 was chosen. In the design part, the ―AS IS‖ model was analyzed and the main problems of the model were identified. A strategy for the future strategy based on the IDEF0 methodology was developed.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124171897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About ensuring security in the field of the internet of things 关于确保物联网领域的安全
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-5
Oleg O. Viushchenko, M. Maslova
{"title":"About ensuring security in the field of the internet of things","authors":"Oleg O. Viushchenko, M. Maslova","doi":"10.18413/2518-1092-2021-6-3-0-5","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-5","url":null,"abstract":"The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using education software to educate speciasists in telecommunication 利用教育软件对电信专业人员进行教育
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-7
Maxim E. Ershov, Vasiliy R. Golyatkin, S. Chistyakov
{"title":"Using education software to educate speciasists in telecommunication","authors":"Maxim E. Ershov, Vasiliy R. Golyatkin, S. Chistyakov","doi":"10.18413/2518-1092-2021-6-3-0-7","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-7","url":null,"abstract":"In modern world humanity regular interact with information technologies that someone creates and maintains. In these conditions, high-quality and fast training of specialists, who will have the skills and knowledge necessary for the operation of telecommunication technologies is required. One of the solutions to this problem is the development of training software complexes capable of individualizing personnel training with support of the required quality. Since in modern realities this type of training is still not widespread enough, it has a number of requirements: a friendly interface, a method for presenting educational material, consolidating the material learned, etc. Training with the help of computer programs has a number of advantages in contradistinction to traditional training, for example, such as minimal financial costs; there is not need to send an employee to courses, thereby interrupting his performance of his job duties. The main task of such programs is the effectiveness of employee training with minimal time waste. The article considers an example of the structural organization of such programs and the correct presentation of educational material in them.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132959504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The choice of software and hardware for determining the psychoemotional state of users in the development of an adaptive lighting system 在开发自适应照明系统时,确定用户心理情绪状态的软硬件选择
Research Result Information Technologies Pub Date : 2021-10-04 DOI: 10.18413/2518-1092-2021-6-3-0-6
A. Leonov, Nikita E. Osmulkevich, T. R. Samigulin
{"title":"The choice of software and hardware for determining the psychoemotional state of users in the development of an adaptive lighting system","authors":"A. Leonov, Nikita E. Osmulkevich, T. R. Samigulin","doi":"10.18413/2518-1092-2021-6-3-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2021-6-3-0-6","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114453824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信