Comparative analysis of methods of searching signatures of computer attacks in the dictionary of symbols
Authors: Cheredanova E.M., Pechkurova I.R., Pechkurova V.R., Mamchenko E.A. | Published: 09.08.2018 |
Published in issue: #8(25)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-8-359 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: signature method, DDoS attack, feature dictionary, iteration, hash-function, sequential method, iterative method, hash addressing method |
Comparative analysis of efficiency of hardware and program implementation of compression algorithm of video
Authors: Kobetskiy V.A., Kazakov N.D. | Published: 09.08.2018 |
Published in issue: #8(25)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-8-360 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: video coding, FPGA, processor system, compression efficiency, video codec scheme, implementation of the video codec, encryption algorithm, video stream compression |
Synthesis and investigation of filtering algorithms used in the secondary processing of radar information
Authors: Zinova V.V. | Published: 09.08.2018 |
Published in issue: #8(25)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-8-361 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: classic Kalman filter, alpha-beta filter, advanced Kalman filter, secondary processing, filtering algorithm, trajectory processing, dynamic system, simulation modeling, criterion of optimality, motion mode |
Modelling the mathematical curves in computer-aided design systems
Authors: Gusev M.R. | Published: 13.09.2018 |
Published in issue: #9(26)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-9-371 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: curved lines, computer-aided design systems, modelling, transcendental curves, sinusoid, Archimedes' spiral, cycloidal curves, modelling complex parts |
Investigation of generally-standing network
Authors: Ayrapetov A.E., Kovalenko A.A. | Published: 01.10.2018 |
Published in issue: #10(27)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-10-380 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: generative-adversarial network, machine learning, neural networks, training without a teacher, generator, discriminator, perceptron, autocoder |
Methods of creating the trunk fiber optic data transmission lines based on binary conductors and fiber-optic information and energy channels
Authors: Dem’yanchuk G.V. | Published: 11.10.2018 |
Published in issue: #9(26)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-9-383 | |
Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control | |
Keywords: trunk, fiber optic, information, flow, model, dispersion, attenuation, channel, data transfer |
Review of libraries for constructing the multiagent systems in the Python environment
Authors: Zhuravlev A.M. | Published: 16.10.2018 |
Published in issue: #10(27)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-10-385 | |
Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control | |
Keywords: multiagent systems, artificial intelligence, framework, Python, terminal, Windows, FIPA (Foundation for Intelligent Physical Agents), BDI (belief, desire, and intention) |
3D simulation basics with the use of Autodesk Fusion 360 CAD system
Authors: Dolova A.A., Konstantinidi A.Yu., Traore Dauda Amara | Published: 17.10.2018 |
Published in issue: #10(27)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-10-389 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: 3D-simulation, computer-aided design system, software, case detail, Autodesk, Fusion 360, design, numerically controlled machine tool |
S-aloha protocol application in in the satellite subsystem with multiple access demand
Authors: Borukaeva A.O., Berdikov P.G., Filatov V.I. | Published: 07.11.2018 |
Published in issue: #10(27)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-10-396 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: satellite communication system, multiple access protocol, packet collision rate, radio channel bandwidth, S-aloha random multiple access protocol, traffic source, radiochannel, radiochannel multiplexing ratio |
Determined key phrases search and recognition in continuous speech
Authors: Levinskiy A.T., Bykovskiy M.K. | Published: 12.11.2018 |
Published in issue: #11(28)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-11-399 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: recognition, error, interface, testing, Levenshtein method, w-shingling, comparison, function |