Recently Published
Multidimensional Databases In Information Systems Of Universities Image
Journal article

Multidimensional Databases In Information Systems Of Universities

Application Of Information Systems And Tools In Bioinformatics Image
Journal article

Application Of Information Systems And Tools In Bioinformatics

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment Image
Journal article

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment

Methods Of Project\u002Dvector Management Of Educational Environments Image
Journal article

Methods Of Project-vector Management Of Educational Environments

Multidimensional Databases In Information Systems Of Universities Image
Multidimensional Databases In Information Systems Of Universities Image
Journal article

Multidimensional Databases In Information Systems Of Universities

Application Of Information Systems And Tools In Bioinformatics Image
Application Of Information Systems And Tools In Bioinformatics Image
Journal article

Application Of Information Systems And Tools In Bioinformatics

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment Image
A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment Image
Journal article

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment

Methods Of Project\u002Dvector Management Of Educational Environments Image
Methods Of Project\u002Dvector Management Of Educational Environments Image
Journal article

Methods Of Project-vector Management Of Educational Environments

Most Viewed
Использование Дополнительных Методов Авторизации Пользователей Image
Journal article

Использование Дополнительных Методов Авторизации Пользователей

Статья рассматривает методы дополнительной авторизации пользователей информационных систем, их достоинства и недостатки, типичные примеры использования. Мульти (много) факторная авторизация становится стандартным инструментом для подтверждения личности и прав доступа информационных систем, от банковских операций, до доступа к базам данных предприятия. С расширением сфер использования различных информационных систем, приложений и сервисов, пользователи систем получают новые возможности, удобство и мобильность. Но в то же время, возникает проблема безопасного и контролируемого доступа, авторизация и идентификация пользователя, подтверждение его полномочий. Авторы проанализировали различные методы, наиболее широко распространённые на рынке безопасности, их возможности, преимущества и недостатки. Рассматриваемые варианты не могут относиться только к одной лишь сфере предоставления услуг: механизмы могут и должны быть использованы в различных комбинациях. Помимо анализа, были проведены опыты по внедрению и тестированию механизмов дополнительной авторизации, собраны отзывы конечных пользователей. Каждый из методов был оценён со множества сторон: лёгкость внедрения, простота использования конечным пользователем, доступность и адекватность применения. В то же время нет возможности выявить оптимальный и универсальный метод дополнительной авторизации, поскольку различные сферы услуг предъявляют собственные требования к доступности, надёжности и безопасности. Как наиболее перспективные направления для внедрения, можно выделить корпоративные сервисы, которые предоставляют обмен данными, их обработку или аналитику или сервисы удалённого управления, в частности управления промышленными сетями. Авторы не ставили целью выдвижение одного выделенного механизма как приоритетного, поэтому и не даются рекомендации по использованию отдельного взятого метода.
Feasibility Analysis Of Air Floating Design For Electricity Generation Image
Journal article

Feasibility Analysis Of Air Floating Design For Electricity Generation

In the past several decades, there were presented different innovative technologies rather than traditional wind turbines for renewable energy that uses wind kinetic energy and remains in the air through aerodynamic forces. Unlike wind turbines with towers, their systems operate in a flight, and they are connected to a foundation by a cable that either transmits the energy generated at the airfoil or transmits mechanical energy to the ground. Nowadays, there are several existing and developing technologies; however, each of them has limitations and challenges. This work will present an analysis of air floating design for electricity generation at high altitudes. It is a tethered wind turbine with a Balloon system, which has a simple controlling system, relatively higher efficiency, and low-cost technology. The concept of the design is to model the electricity generation device powered by clean renewable energy, mainly wind power. Base on the concept of kite or helium balloon to provide enough buoyancy to keep the device working at certain altitude. To increase the energy conversion efficiency and the feasibility of the device, it is mostly used in the country, open area. Despite high efficiency which needs further investigation, the designed device is moveable, pollution free and little space consumed.
The Emotional Infection of the Virtual Innovation Project Team Image
The Emotional Infection of the Virtual Innovation Project Team Image
Journal article

The Emotional Infection of the Virtual Innovation Project Team

Modelling Agile\u002Dtransformation Organizational Development Project Portfolio Image
Modelling Agile\u002Dtransformation Organizational Development Project Portfolio Image
Journal article

Modelling Agile-transformation Organizational Development Project Portfolio

Suggested For You
Complex Event Processing Approach On Subscribers\u0027 Data Of Telecom Operator Image
Journal article

Complex Event Processing Approach On Subscribers' Data Of Telecom Operator

Nowadays the usage of mobile phones has reached extremely large worldwide proportions and is increasing dramatically. There is a stronger need to decrypt the important information that is hidden among them. Even all required information is gained, processes of companies remain static and can not be changed dynamically to adapt to actual business needs, reducing the advantages that can be achieved. Every second millions of raw information are being generated by mobile users, which handled by Telecom operators in data servers. By using Complex Event Processing (CEP) approach in real-time, we can obtain the information that really matters to our business and use it to monetize the vast amount of data that is being collected through mobile phone usage. In this paper, we present an internally developed framework that combines the strengths of CEP and business process implementations which allows us to react to the needs of today's Fast-changing environment and requirements. We demonstrate 3 simple use case scenarios to show the effectiveness of the CEP approach in our situation. The importance of implementing the CEP approach on subscribers' data should not be overlooked as means of trying to capitalize on new services, however, have to be considered as a challenge to give subscribers the opportunity to get more customized offers and services.
Journal article

Determination of the Most Polluted Atmospheric Air Pollution Category of Almaty City

Determination of the Most Polluted Atmospheric Air Pollution Category of Almaty City Image
Journal article

Information and Analytical Tools for Monitoring the Prices of Material and Technical Resources (Mtr) of Construction

Information and Analytical Tools for Monitoring the Prices of Material and Technical Resources (Mtr) of Construction Image
Journal article

Оценка ПАРаметров Помех Технологии Lte

Оценка ПАРаметров Помех Технологии Lte Image
Read more articles