Search by keyword: "software"
Review of human iris identification methods
Authors: Kandrina P.I. | Published: 23.03.2020 |
Published in issue: #3(44)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-3-587 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: mobile robot-nurse, vibration load, simulation, software, automated modeling, dynamics of a system of bodies, model of tire-road interaction, information protection, iris, biometric system, methods for identifying a person, intensity fluctuation, integral and differential operator, analysis of independent components, texture analysis |
Analysis of vibration load of a wheeled robot-nurse using simulation
Authors: Parubets P.E. | Published: 23.03.2020 |
Published in issue: #3(44)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-3-586 | |
Category: Mechanical Engineering and Machine Science | Chapter: Robots, Mechatronics, and Robotic Systems | |
Keywords: mobile robot-nurse, vibration load, simulation, software, automated modeling, dynamics of a system of bodies, model of tire-road interaction |
Analysis of domestic software protection licensing systems
Authors: Marchenko A.V. | Published: 25.12.2019 |
Published in issue: #12(41)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-12-561 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: electronic keys, digital signature, certificates, protection, flash-cards, information security, analysis, licensing system, software, cryptographic algorithms |
Methods of preparing and recognizing software patterns using machine learning models
Authors: Shaker Alaa | Published: 15.02.2019 |
Published in issue: #2(31)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-2-442 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: design, microstructure, pattern, design pattern recognition, machine learning, software, reverse engineering, software development |
Forensic investigation of the installation of allegedly counterfeit software products
Authors: Karlova A.V. | Published: 17.12.2018 |
Published in issue: #12(29)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-12-415 | |
Category: Jurisprudence | Chapter: Criminal Law and Criminology | |
Keywords: counterfeit products, copyrights, software, Defacto, software classification, software protection methods, cybercrime, unauthorized using of software products |
Product testing techniques from its development to production
Authors: Kisareva N.Yu., Levinskiy A.T. | Published: 17.12.2018 |
Published in issue: #12(29)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-12-413 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: testing, software, methodology, development, module, unit testing, integration, alpha-testing |
3D simulation basics with the use of Autodesk Fusion 360 CAD system
Authors: Dolova A.A., Konstantinidi A.Yu., Traore Dauda Amara | Published: 17.10.2018 |
Published in issue: #10(27)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-10-389 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: 3D-simulation, computer-aided design system, software, case detail, Autodesk, Fusion 360, design, numerically controlled machine tool |
Analysis of today’s logistical operations software
Authors: Serebryanskaya N.A. | Published: 28.05.2018 |
Published in issue: #5(22)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-5-318 | |
Category: Economics and Production Organization | |
Keywords: logistic operation, software, transport enterprise, mixed traffic, multimodal transportation, information system, software products, transportation management |
Study of USB drives in work of a computer forensic expert
Authors: Pavlova A.A. | Published: 29.11.2017 |
Published in issue: #12(17)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-12-215 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: USB drive, computer forensic examination, software, damaged devices, data recovery, data retrieval |