The proceedings contain 56 papers. The topics discussed include: software for presenting a scientist’s personal brand;methodology for applying IIoT architecture to design IIoT systems in the agricultural sector of th...
ISBN:
(纸本)9798350369830
The proceedings contain 56 papers. The topics discussed include: software for presenting a scientist’s personal brand;methodology for applying IIoT architecture to design IIoT systems in the agricultural sector of the Russian Federation;regarding the stability assessment of the informatization object under the conditions of computer attacks at the exponential distribution law of time to an enemy impact;scientific gamification of students in the study of artificial intelligence technology;advanced fog neural network design method;study of pseudo-random number generators with feedback shift register;the problem of ensuring the information security of robots in the implementation of the laws of robotics;overview of the accelerated platform for robotics and artificial intelligence NVIDIA Isaac;and semantic text summarization for Myanmar language using word embedding and graph based approach.
The article considers the use of AI methods for creation of a knowledge base in the field of recreation using a national interactive map of local cultural trends. The map contains thousands of brands classified into 9...
详细信息
Nowadays, modern universities organise units in which students of IT can obtain additional practical skills in IT during extracurricular time. Most often, their work is organized according to the clinic principle and,...
详细信息
The paper describes a technology for sending and assembling data packets based on a random selection of servers. It is this approach that avoids a lot of problems in the field of information security. The given soluti...
详细信息
Existing distributed ledger systems ensure the integrity and availability of information, but they lack built-in mechanisms to ensure the confidentiality of transaction data recorded in the ledger. Any intruder can ob...
详细信息
The article analyzes the didactic potential of using social networks as components of electronic information and educational systems of educational institutions. It is noted that social educational networks are increa...
详细信息
In today's world, data subjects daily express consents to the processing of a variety of personal data, including sensitive data. Consents are expressed both on paper and electronically, e.g., for profiling, targe...
详细信息
To apply machine learning in practice, you often need to process a large amount of data and this takes a lot of time. The use of parallel computing and other types of parallelism can significantly speed up calculation...
详细信息
In this paper, forecasting algorithms were tested on renewable energy production data and their comparative analysis was carried outThe machine learning methods that were used in the work are DecisionTree, AdaBoost, R...
详细信息
The work is devoted to the development of a method and means of protecting acoustic information from leakage due to high-frequency irradiation based on SDR technology. One of the dangerous technical channels for leaka...
详细信息
暂无评论