Infokommunikacionnye tehnologii最新文献

筛选
英文 中文
WEB APPLICATION «ELECTRONIC READER’S DIARY» BY AGILE TECHNOLOGY 敏捷技术 "电子读者日记本 "网络应用程序
Infokommunikacionnye tehnologii Pub Date : 2024-07-24 DOI: 10.18469/ikt.2023.21.4.10
{"title":"WEB APPLICATION «ELECTRONIC READER’S DIARY» BY AGILE TECHNOLOGY","authors":"","doi":"10.18469/ikt.2023.21.4.10","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.4.10","url":null,"abstract":"The article relate to the development of an reader’s electronic diary by AGILE technology. It is needed for reader competency of primary school students. The current students were born in a new information environment. They master information and software faster than adults (for example, gadgets, tablet PC, mobile devices, etc.) The disadvantage is this information environment is reluctance to read. One of the stimulation tools to reading is electronic reader’s diary technology applied in the educational process. The regular reader’s diary is a report about books read. The aim of the reader’s diary is skills reflection and development of the critical analysis skills formation. The project software is designed for primary school students (age 7-10 years). Independent reading skills form at primary school age. It improves cognitive interests of school students, enhances knowledge, and is the formation of a harmoniously developed personality. The electronic reader’s diary stimulates the knowledge interests and consolidates the reading material by AGILE technology and additional interactivity with the school students. The research relates to the architecture of the developed solution, in particular, the issue of the «automated process control system of education system resources» integration. Also, the article contains the map of the developed graphical user interface screen and describing main electronic reader’s diary screens. This research will be intended to boost cognitive and creative activity of students.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141807137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CONCEPT OF APPLICATION OF CONTROL ALGORITHMS FOR MANIPULATION ROBOTS TO PERFORM COMPLEX TECHNOLOGICAL OPERATIONS IN INDUSTRY 应用操纵机器人控制算法的概念,在工业中执行复杂的技术操作
Infokommunikacionnye tehnologii Pub Date : 2024-07-24 DOI: 10.18469/ikt.2023.21.4.12
{"title":"CONCEPT OF APPLICATION OF CONTROL ALGORITHMS FOR MANIPULATION ROBOTS TO PERFORM COMPLEX TECHNOLOGICAL OPERATIONS IN INDUSTRY","authors":"","doi":"10.18469/ikt.2023.21.4.12","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.4.12","url":null,"abstract":"The article is devoted to the study of control algorithms for manipulation robots to perform complex technological operations at enterprises in order to optimize working process time. In today’s business environment, in order to maximize efficiency of production management in highly competitive environment, enterprises need to constantly improve work process automating methods using robots and artificial intelligence. Authors of this article take an in-depth look at the real-world challenges that manipulation robots face in performing complex operations in industrial environment. The work discusses various approaches to control manipulation robots. These approaches include adaptive control method, program control method, sensor control method and collaborative control method. Application of artificial intelligence in the control of manipulation robots allows making decisions based on analyzing of large data amounts, learning from experience and adapting to the environment.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STRUCTURE FEATURES OF MINIMUM FREQUENCY SHIFT KEYING SIGNAL MODEMS 最小频移键控信号调制解调器的结构特点
Infokommunikacionnye tehnologii Pub Date : 2024-07-24 DOI: 10.18469/ikt.2023.21.4.08
{"title":"STRUCTURE FEATURES OF MINIMUM FREQUENCY SHIFT KEYING SIGNAL MODEMS","authors":"","doi":"10.18469/ikt.2023.21.4.08","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.4.08","url":null,"abstract":"The article discusses specific features of constructing modems for minimum frequency shift keying signals using various schemes with high noise immunity levels. An analysis of the formation of these signals and frequency modulation signals, which are orthogonal if enhanced, is provided, including quantitative indicators and comparative characteristics. Two schemes of minimum frequency shift keying signal demodulators (coherent and autocorrelation) are examined, including their comparative features. Operation principles of these demodulator circuits with the use of timing diagrams are described, requirements for the reference oscillator generators included in coherent demodulators are formulated, as well as the requirements for minimum frequency shift keying signals, which ensure the greatest noise immunity in autocorrelation demodulators of minimum frequency shift keying signals with binary signals quantization.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"2 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REINFORCEMENT LEARNING METHOD FOR DYNAMIC ALLOCATION OF PRIORITIES IN TSN 在 tsn 中动态分配优先权的强化学习方法
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.03
{"title":"REINFORCEMENT LEARNING METHOD FOR DYNAMIC ALLOCATION OF PRIORITIES IN TSN","authors":"","doi":"10.18469/ikt.2023.21.3.03","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.03","url":null,"abstract":"This article explores the possibility of using reinforcement learning to dynamically assign priorities in time-sensitive networks. The presented approach purposefully optimizes the process of managing time constraints in the network. Using reinforcement learning techniques, the system independently adjusts priorities depending on the requirements of network traffic. To achieve this goal, two configu ration schemes based on TSN standards are proposed: centralized and distributed. Having considered these schemes, we will identify their limitations necessary in meeting requirements close to real time and ensuring strict quality of service guarantees, taking into account the restrictions applied to a time-sensitive environment. The work also reveals the need to use additional equipment, a centralized controller, to reallocate priorities.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"99 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QUEUE DISPERSION IN QUEUE SYSTEMS WITH GROUP POISSON FLOWS 有群组泊松流的队列系统中的队列分散
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.01
{"title":"QUEUE DISPERSION IN QUEUE SYSTEMS WITH GROUP POISSON FLOWS","authors":"","doi":"10.18469/ikt.2023.21.3.01","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.01","url":null,"abstract":"The application of interval methods for queue analysis in queuing systems with group Poisson flows is considered. It is shown that, for a given load, the average value of queue sizes in systems with such flows is determined by the dispersion of the numbers of requests arriving during the processing time intervals of one request, and the specified dispersion depends linearly on the load factor. Relations are obtained that determine the dispersion of queue sizes in queuing systems with group Poisson flows. It is shown that this dispersion depends on the third central moment of the numbers of applications arriving during the time intervals of processing one application. The dispersions of the queues of two different group flows, which have the same dependencies of the average values of the queues, differ in the values of the indicated central moments.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"21 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOFTWARE OPTIMIZATION OF RESOURCE ALLOCATION PROCESS IN METRO CONSTRUCTION ORGANIZATIONS: ANALYSIS OF EFFICIENCY OF EXISTING METHODS 地铁施工组织资源分配过程的软件优化:现有方法的效率分析
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.09
{"title":"SOFTWARE OPTIMIZATION OF RESOURCE ALLOCATION PROCESS IN METRO CONSTRUCTION ORGANIZATIONS: ANALYSIS OF EFFICIENCY OF EXISTING METHODS","authors":"","doi":"10.18469/ikt.2023.21.3.09","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.09","url":null,"abstract":"This article explores the objectives of optimal resource allocation in metro construction organizations, including improving work efficiency, reducing project duration, and minimizing costs. The primary optimization methods, such as mathematical modeling, critical path analysis, and the use of network graphs, are discussed in the context of achieving these goals. The role of project management software in providing comprehensive control over planning, resources, and execution is emphasized. Additionally, the article underscores the significance of utilizing the Python programming language and its libraries, such as Pandas, Scikit-learn, and Matplotlib, in analyzing and optimizing resource allocation in metro construction. The paper contains a case study of a software implementation of risk analysis of delivery delays in metro construction using the Python programming language and its key libraries. Pandas for data processing and analysis, NumPy for performing complex mathematical calculations, and Matplotlib for visualizing the results were used.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"8 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMBINED METHOD FOR TUNING HYPERPARAMETERS OF A MATHEMATICAL MODEL 调整数学模型超参数的组合方法
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.08
{"title":"COMBINED METHOD FOR TUNING HYPERPARAMETERS OF A MATHEMATICAL MODEL","authors":"","doi":"10.18469/ikt.2023.21.3.08","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.08","url":null,"abstract":"Automation of data processing processes is an important direction in the field of information technology. The main focus of researchers is usually on training intelligent systems. One of the key aspects of this process is the selection of hyperparameters for models. This research paper analyzes a combined method for tuning hyperparameters in a classification mathematical model. The method integrates the functionalities of two well-established approaches: exhaustive search and limited search. Initially, the first approach is employed to discover a preliminary estimation of the model’s quality metric’s maximum value. Subsequently, the second approach is utilized to generate a final estimation of achievable quality and compile a list of hyperparameter value combinations that optimize the classifier’s efficiency. To verify the validity of the method, custom software was developed using the stochastic gradient descent algorithm. The results obtained from the experiment demonstrate the effectiveness of the proposed method.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"113 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140985789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPACE INTEGRATED NETWORK: ROUTED INTER-SATELLITE NETWORK PRIMARY MODELING RESULTS 空间综合网络:路由卫星间网络主要建模结果
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.12
{"title":"SPACE INTEGRATED NETWORK: ROUTED INTER-SATELLITE NETWORK PRIMARY MODELING RESULTS","authors":"","doi":"10.18469/ikt.2023.21.3.12","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.12","url":null,"abstract":"The paper presents the first results obtained by modeling a routed inter-satellite network based on the parameters of the ReshUCube-3 space mission. ReshUCube-3 is a mission in which it is planned to launch a satellite constellation of four CubeSats. A network stack was proposed to provide the concept of a space integrated network. It is planned to use LoRa technology on the physical layer, and RPL as a routing protocol on the network layer. The model takes into account the orbital parameters of the satellite constellation, the antenna systems of spacecraft and ground station, and the parameters of radio modules. Based on this information, the analysis of inter-satellite communication channels was carried out. The maximum distance between the satellites, the energy properties of the channels, the average daily coverage time, etc. are determined. An important feature is the consideration of existing routes between satellites. It is planned that the proposed model will serve as a basis in the process of designing and operating an inter-satellite network.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"17 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KNOWLEDGE AND SKILLS FOR SOFTWARE-DEFINED NETWORKS MAINTENANCE ENGINEER 软件定义网络维护工程师的知识和技能
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.06
{"title":"KNOWLEDGE AND SKILLS FOR SOFTWARE-DEFINED NETWORKS MAINTENANCE ENGINEER","authors":"","doi":"10.18469/ikt.2023.21.3.06","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.06","url":null,"abstract":"In this article we analyze the Russian developments in the field of software-defined networks and software-defined wide area networks, professional standards and job vacancies in order to determine knowledge and skills required of specialists. We conclude that there is a lack of practical manuals for training network engineers, and suggest possible topics for laboratory exercises for educational textbooks. This article can be useful for teachers of educational institutions of vocational secondary education, higher education, supplementary education in the development of work programs of disciplines, lecture material and laboratory workshops in the field of software-defined networks, as well as for students of the educational institutions and for junior network engineers.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"32 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USING MACHINE LEARNING ALGORITHMS TO DETECT ANOMALOUS TRAFFIC BEHAVIOR 使用机器学习算法检测异常流量行为
Infokommunikacionnye tehnologii Pub Date : 2024-05-13 DOI: 10.18469/ikt.2023.21.3.04
{"title":"USING MACHINE LEARNING ALGORITHMS TO DETECT ANOMALOUS TRAFFIC BEHAVIOR","authors":"","doi":"10.18469/ikt.2023.21.3.04","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.3.04","url":null,"abstract":"The article describes a method of using machine learning for detecting anomalous traffic behavior. For this purpose, a data set containing a significant amount of traffic collected at the time of the attack on the Web application is used. The set contains three attack options: Brute Force, XSS, SQL injection. A traffic dump containing an Infiltration attack is considered separately. A comparative analysis of machine learning models was carried out with the selection of the most optimal one. The article also provides a description of the data preprocessing procedure, which is carried out in order to eliminate anomalies and voids in array records, which can lead to incorrect operation of the trained model. Models were trained on selected data in order to identify anomalous traffic behavior indicating a specific type of attack. In addition, a study was conducted on a data set that does not contain information about attacks.","PeriodicalId":508406,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"34 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140982663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信