- 511. Identifying the suitable program for queue management through analysis: Apache Kafka or RabbitMQ
Comparative analysis of prominent message queuing solutions Apache Kafka and RabbitMQ, aimed at identifying the most suitable program for queue management. Evaluation of technology's capability to handle high-throughput scenarios and fault resilience.
Основи інтегрування системи для динамічного і частотного аналізу методом кінцевих елементів в Autodesk Inventor. Особливості функціонування програмного комплексу Impact, методи оптимізації плагіну. Характеристика інструментального інтерфейсу програми.
A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.
Principles of development of the markets of the National Technological Initiative "AutoNet", aimed at the creation of unmanned vehicles. Ways of modernization of the motor transport network and its prospects. The need to develop a roadmap "AutoNet".
The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
The article provides guidance on choosing cloud-based ML and data science solutions that meet operational strategies and crisis management needs. Further research is encouraged to examine the long-term effects on business innovation and market dynamics.
Improved algorithm for object tracking is for using as part of the machine vision system of image acquisition and processing capable mobile robots. Classical implementation of normalized cross-correlation for face tracking. Experimental results.
Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
- 519. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
- 520. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Proposing to use complex methods to improve the efficiency of solving linear programming problems using large-scale classical approaches and technologies parallel processing CUDA. Specificity of program and algorithmic features use of the technology.
The performance of transmission Multi Input Multi Output beamforming for the multi subscriber in large cell with effective channel throughput has been investigated. Singular value decomposition (SVD) using Single User in 3GPP Long Term Evolution (LTE).
Hardware-in-the-loop test bench for testing and verification navigational equipment structure is investigated. Equation for determination hardware-in-the-loop test bench for testing and verification navigational equipment effectiveness is determined.
- 523. Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.
Характеристика Industrial Ethernet как это мощных вычислительных сетей, соответствующих международным стандартам. Анализ скоростей передачи данных по витой паре или оптоволоконному кабелю Industrial Ethernet. Резервирование связей в сетях Ethernet.
Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
- 529. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
