Study of continuous search optimization algorithm efficiency by particle swarm
Authors: Yamchenko Yu.V., Andrusenko A.S. | Published: 06.09.2016 |
Published in issue: #1(1)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-1-7 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: global optimization, method of particle swarm, ranked FIPS algorithm, unconstrained optimization |
Mathematical statistics and graph theory methods preventing financial fraud
Authors: Portnova A.S. | Published: 20.10.2016 |
Published in issue: #2(2)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-2-13 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: antifraud, Benford’s Law, Markov network, insider network |
Detecting information technology risk factors in a telemedicine system
Authors: Mikov D.A. | Published: 02.12.2016 |
Published in issue: #3(3)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-3-24 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: remote health condition monitoring system, IDEF model, information technology risk analysis, risk factors, information security threats, potential damage, vulnerabilities of an automated system, countermeasures |
Designing an efficient user interface
Authors: Andreeva E.G. | Published: 02.12.2016 |
Published in issue: #3(3)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-3-27 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: interface, user, design, efficiency, method, interface principles, behavioural principle |
Ensuring local area network security for small businesses
Authors: Zhukova D.E. | Published: 06.12.2016 |
Published in issue: #3(3)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-3-28 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: security, local area network, user, intruder, attack |
Automated control of hydraulic mounting complex for constructing overhead power transmission lines
Authors: Kartovenko A.V. | Published: 14.02.2017 |
Published in issue: #4(4)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-4-32 | |
Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control | |
Keywords: hydraulic mounting complex, automation of hydraulic systems, computer experiment |
3D-space object conversion
Authors: Kop’ev E.V. | Published: 16.03.2017 |
Published in issue: #1(6)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-1-57 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: computer graphics, computer graphics algorithms, 3D-editors, modular algorithm library, unstructured topology, STL |
Algorithm of generating a text graph based on syntactic relations
Authors: Shaforost B.N. | Published: 30.03.2017 |
Published in issue: #2(7)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-2-63 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: graph, coordinates, algorithm vertex, arrow, syntactic relation, linguistics, visualisation |
Using the tight-binding model to derive a dispersion relation for graphene energy
Authors: Mosin M.A. | Published: 10.04.2017 |
Published in issue: #4(9)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-4-77 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: carbon nanotubes, graphene, graphene conductivity, tight-binding model, dispersion relation for energy, Bloch functions, Brillouin zones, Dirac points |
Comparison of multithreading models in Scala programming language
Authors: Semenchenko I.I. | Published: 19.04.2017 |
Published in issue: #3(8)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-3-87 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: multithreading, Scala, thread pool, futuras |