The proceedings contain 56 papers. The topics discussed include: software for presenting a scientist’s personal brand;methodology for applying IIoT architecture to design IIoT systems in the agricultural sector of th...
ISBN:
(纸本)9798350369830
The proceedings contain 56 papers. The topics discussed include: software for presenting a scientist’s personal brand;methodology for applying IIoT architecture to design IIoT systems in the agricultural sector of the Russian Federation;regarding the stability assessment of the informatization object under the conditions of computer attacks at the exponential distribution law of time to an enemy impact;scientific gamification of students in the study of artificial intelligence technology;advanced fog neural network design method;study of pseudo-random number generators with feedback shift register;the problem of ensuring the information security of robots in the implementation of the laws of robotics;overview of the accelerated platform for robotics and artificial intelligence NVIDIA Isaac;and semantic text summarization for Myanmar language using word embedding and graph based approach.
The article considers the use of AI methods for creation of a knowledge base in the field of recreation using a national interactive map of local cultural trends. The map contains thousands of brands classified into 9...
详细信息
Nowadays, modern universities organise units in which students of IT can obtain additional practical skills in IT during extracurricular time. Most often, their work is organized according to the clinic principle and,...
详细信息
In today's world, data subjects daily express consents to the processing of a variety of personal data, including sensitive data. Consents are expressed both on paper and electronically, e.g., for profiling, targe...
详细信息
The paper describes a technology for sending and assembling data packets based on a random selection of servers. It is this approach that avoids a lot of problems in the field of information security. The given soluti...
详细信息
Existing distributed ledger systems ensure the integrity and availability of information, but they lack built-in mechanisms to ensure the confidentiality of transaction data recorded in the ledger. Any intruder can ob...
详细信息
The article analyzes the didactic potential of using social networks as components of electronic information and educational systems of educational institutions. It is noted that social educational networks are increa...
详细信息
The aim of the study is to develop a mathematical model for assessing the informatization object (IO) stability functioning under the conditions of computer attacks (CA). The problem formulation differs from the known...
详细信息
To apply machine learning in practice, you often need to process a large amount of data and this takes a lot of time. The use of parallel computing and other types of parallelism can significantly speed up calculation...
详细信息
Electronic voting is a complex but widely demanded technology. The generally accepted opinion is that electronic voting guarantees the anonymity of voters and at the same time allows verify the correctness of registra...
详细信息
暂无评论