• Comparative analysis of prominent message queuing solutions Apache Kafka and RabbitMQ, aimed at identifying the most suitable program for queue management. Evaluation of technology's capability to handle high-throughput scenarios and fault resilience.

    статья (26,0 K)
  • Основи інтегрування системи для динамічного і частотного аналізу методом кінцевих елементів в Autodesk Inventor. Особливості функціонування програмного комплексу Impact, методи оптимізації плагіну. Характеристика інструментального інтерфейсу програми.

    статья (710,1 K)
  • A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.

    статья (23,6 K)
  • Principles of development of the markets of the National Technological Initiative "AutoNet", aimed at the creation of unmanned vehicles. Ways of modernization of the motor transport network and its prospects. The need to develop a roadmap "AutoNet".

    статья (1,0 M)
  • The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.

    статья (201,5 K)
  • The article provides guidance on choosing cloud-based ML and data science solutions that meet operational strategies and crisis management needs. Further research is encouraged to examine the long-term effects on business innovation and market dynamics.

    статья (37,9 K)
  • Improved algorithm for object tracking is for using as part of the machine vision system of image acquisition and processing capable mobile robots. Classical implementation of normalized cross-correlation for face tracking. Experimental results.

    статья (296,0 K)
  • Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.

    статья (1,6 M)
  • Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.

    статья (102,5 K)
  • Proposing to use complex methods to improve the efficiency of solving linear programming problems using large-scale classical approaches and technologies parallel processing CUDA. Specificity of program and algorithmic features use of the technology.

    статья (102,5 K)
  • The performance of transmission Multi Input Multi Output beamforming for the multi subscriber in large cell with effective channel throughput has been investigated. Singular value decomposition (SVD) using Single User in 3GPP Long Term Evolution (LTE).

    статья (528,4 K)
  • Hardware-in-the-loop test bench for testing and verification navigational equipment structure is investigated. Equation for determination hardware-in-the-loop test bench for testing and verification navigational equipment effectiveness is determined.

    статья (381,0 K)
  • Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.

    презентация (1,1 M)
  • Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.

    статья (117,5 K)
  • Характеристика Industrial Ethernet как это мощных вычислительных сетей, соответствующих международным стандартам. Анализ скоростей передачи данных по витой паре или оптоволоконному кабелю Industrial Ethernet. Резервирование связей в сетях Ethernet.

    реферат (854,3 K)
  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    курс лекций (393,9 K)
  • Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.

    презентация (1,3 M)
  • The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.

    статья (105,1 K)
  • Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций (17,6 M)
  • Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья (574,9 K)
  • Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.

    книга (6,4 M)
  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья (285,8 K)
  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    книга (6,1 M)
  • The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.

    книга (4,8 M)
  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа (1,6 M)
  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    статья (940,0 K)
  • Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие (4,8 M)
  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья (1,4 M)
  • Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.

    реферат (60,4 K)
  • Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.

    статья (164,1 K)