Full Issue
Theoretical and applied mathematics
-
Introduction: Data are often protected by encryption with algorithms using random or pseudo-random numbers...
Information processing and control
-
Introduction: We discuss a wide range of problems about revealing hidden regularities in rearrangement of bio-electric activity of living organisms when it is registered on the background of various impacts, using look-up and temporal localization of event-related patterns in electrograms with noise...
Information and control systems
-
Introduction: Up-to-date design rules used in computer engineering make hardware unreliable when working under radiation...
-
Introduction: The current trend in solving identification problems is applying the multiplex functional approach when an identification problem is treated as a large-dimension problem of mathematical programming, making it possible to use standard ways of solving such problems...
System and process modeling
-
Introduction: Live experiments with detachable elements (final stages) of carrier rockets, transfer orbit stages and satellites in order to evaluate the potential for receiving automatic identification system signals in space are expensive...
-
Introduction: Conventional algorithms for pulse width modulation or predictive relay-vector control over active current converters do not fully meet the requirements of practical application...
Hardware and software resources
-
Introduction: When building a system for students’ remote work with their virtual machines, it is important to correctly choose the main principle of virtualization, which will reliably and easily split the sets of virtual machines of different users, and most efficiently use the computing resources...
-
Introduction: Nowadays, software development is commonly based on the reuse of previously created components united into software libraries and frameworks...
Information coding and transmission
-
Introduction: Telecommunication system developers always try to reduce the time of authentication protocol execution using algorithmic implementation of authentication protocols...
Information and measuring systems
-
Introduction: When providing protection against external terrorist threats, there is no comprehensive solution which would allow you to detect threats by smell, i...
-
Introduction: During a low-altitude flight over a disturbed sea surface, the wave profiles have variable elevations, gradients and orbital velocities, resulting in specific conditions for the operation of the measuring devices...
Information instrumentation and education
-
Introduction: Computerization of educational process and the use of remote adaptive learning systems provide opportunities for inclusive continuous training of highly qualified personnel capable of solving a wide range of applied engineering tasks...
-
Introduction: The symbolic method of formal program verification is an effective way to evaluate students’ practical skills automatically, especially for tasks with an unsolvable set of correct answers, which significantly simplifies the development of evaluation software...
-
...