Recently Published
Multidimensional Databases In Information Systems Of Universities Image
Journal article

Multidimensional Databases In Information Systems Of Universities

Application Of Information Systems And Tools In Bioinformatics Image
Journal article

Application Of Information Systems And Tools In Bioinformatics

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment Image
Journal article

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment

Methods Of Project\u002Dvector Management Of Educational Environments Image
Journal article

Methods Of Project-vector Management Of Educational Environments

Multidimensional Databases In Information Systems Of Universities Image
Multidimensional Databases In Information Systems Of Universities Image
Journal article

Multidimensional Databases In Information Systems Of Universities

Application Of Information Systems And Tools In Bioinformatics Image
Application Of Information Systems And Tools In Bioinformatics Image
Journal article

Application Of Information Systems And Tools In Bioinformatics

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment Image
A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment Image
Journal article

A Conceptual Model and Process Management Method of the Planning and Monitoring of the Workload in the Educational Environment

Methods Of Project\u002Dvector Management Of Educational Environments Image
Methods Of Project\u002Dvector Management Of Educational Environments Image
Journal article

Methods Of Project-vector Management Of Educational Environments

Most Viewed
Использование Дополнительных Методов Авторизации Пользователей Image
Journal article

Использование Дополнительных Методов Авторизации Пользователей

Статья рассматривает методы дополнительной авторизации пользователей информационных систем, их достоинства и недостатки, типичные примеры использования. Мульти (много) факторная авторизация становится стандартным инструментом для подтверждения личности и прав доступа информационных систем, от банковских операций, до доступа к базам данных предприятия. С расширением сфер использования различных информационных систем, приложений и сервисов, пользователи систем получают новые возможности, удобство и мобильность. Но в то же время, возникает проблема безопасного и контролируемого доступа, авторизация и идентификация пользователя, подтверждение его полномочий. Авторы проанализировали различные методы, наиболее широко распространённые на рынке безопасности, их возможности, преимущества и недостатки. Рассматриваемые варианты не могут относиться только к одной лишь сфере предоставления услуг: механизмы могут и должны быть использованы в различных комбинациях. Помимо анализа, были проведены опыты по внедрению и тестированию механизмов дополнительной авторизации, собраны отзывы конечных пользователей. Каждый из методов был оценён со множества сторон: лёгкость внедрения, простота использования конечным пользователем, доступность и адекватность применения. В то же время нет возможности выявить оптимальный и универсальный метод дополнительной авторизации, поскольку различные сферы услуг предъявляют собственные требования к доступности, надёжности и безопасности. Как наиболее перспективные направления для внедрения, можно выделить корпоративные сервисы, которые предоставляют обмен данными, их обработку или аналитику или сервисы удалённого управления, в частности управления промышленными сетями. Авторы не ставили целью выдвижение одного выделенного механизма как приоритетного, поэтому и не даются рекомендации по использованию отдельного взятого метода.
Feasibility Analysis Of Air Floating Design For Electricity Generation Image
Journal article

Feasibility Analysis Of Air Floating Design For Electricity Generation

In the past several decades, there were presented different innovative technologies rather than traditional wind turbines for renewable energy that uses wind kinetic energy and remains in the air through aerodynamic forces. Unlike wind turbines with towers, their systems operate in a flight, and they are connected to a foundation by a cable that either transmits the energy generated at the airfoil or transmits mechanical energy to the ground. Nowadays, there are several existing and developing technologies; however, each of them has limitations and challenges. This work will present an analysis of air floating design for electricity generation at high altitudes. It is a tethered wind turbine with a Balloon system, which has a simple controlling system, relatively higher efficiency, and low-cost technology. The concept of the design is to model the electricity generation device powered by clean renewable energy, mainly wind power. Base on the concept of kite or helium balloon to provide enough buoyancy to keep the device working at certain altitude. To increase the energy conversion efficiency and the feasibility of the device, it is mostly used in the country, open area. Despite high efficiency which needs further investigation, the designed device is moveable, pollution free and little space consumed.
The Emotional Infection of the Virtual Innovation Project Team Image
The Emotional Infection of the Virtual Innovation Project Team Image
Journal article

The Emotional Infection of the Virtual Innovation Project Team

Modelling Agile\u002Dtransformation Organizational Development Project Portfolio Image
Modelling Agile\u002Dtransformation Organizational Development Project Portfolio Image
Journal article

Modelling Agile-transformation Organizational Development Project Portfolio

Suggested For You
Determination of the Most Polluted Atmospheric Air Pollution Category of Almaty City Image
Journal article

Determination of the Most Polluted Atmospheric Air Pollution Category of Almaty City

This article discusses the impact of suspended particles on human health, by providing small definitions of PM2.5, including how they appear, what particles they consist of, and how they harm the respiratory and circulatory systems. In addition, the analysis of the pollution level of the city of Almaty for the last three years from March 22, 2017, to October 6, 2020, with categorical intermediate values of suspended particles was carried out. Careful work was done with the SCV file such as data was skipped in the cells, that is, there were empty values; translation to a single data type; filling in empty cells. It also considers making a decision on the six categories provided to identify the average meeting categories. The authors identified specific categories based on digital readings of values received from sensors, where each category has its own verbal values that are understandable for each person. The indicator displays with weights as a graph for a specific Seifullin-Dulatov sensor location with categorical and without categorical division. Then for each intersection or location of the sensors is shown in a table. It is also revealed which level or category is the rarest among the others and the most common category as well.
Synergetic Approach to the Study of Control Systems Image
Journal article

Synergetic Approach to the Study of Control Systems

Dependence of Competitiveness on the Level of Business Confidence of the Enterprise Image
Journal article

Dependence of Competitiveness on the Level of Business Confidence of the Enterprise

Synergetic Approach to the Study of Control Systems Image
Synergetic Approach to the Study of Control Systems Image
Journal article

Synergetic Approach to the Study of Control Systems

Dependence of Competitiveness on the Level of Business Confidence of the Enterprise Image
Dependence of Competitiveness on the Level of Business Confidence of the Enterprise Image
Journal article

Dependence of Competitiveness on the Level of Business Confidence of the Enterprise

Journal article

Управление Проектами В Борьбе С Энтропией Организации

Управление Проектами В Борьбе С Энтропией Организации Image
Journal article

Strategies And Operation Principles Of Logistic Information Systems

Strategies And Operation Principles Of Logistic Information Systems Image
Journal article

Defender-attacker Models For Resource Allocation In Information Security

Defender\u002Dattacker Models For Resource Allocation In Information Security Image
Read more articles