CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

2020: 1 (49)
20.04.2020

Pechenyy E.A., Nuriev N.K., Starygina S.D.
SELF-ORGANIZING CLUSTERING OF GREAT DATA FLOW
10-20
Chastikova V.A., Zherlitsyn S.A., Volya Y.I., Sotnikov V.V.
NEURAL NETWORK TECHNOLOGY FOR DETECTING ANOMALOUS NETWORK TRAFFIC
20-32
Milovidova A.A.
CREATION OF THE FUZZY MEASUREMENT SYSTEM FOR DECISION SUPPORT SYSTEM WHEN MANAGING THE PRODUCTION PROCESS IN AN UNCERTAIN INFORMATION ABOUT THE QUALITY OF THE MATERIAL BEING PROCESSED
33-48
Sai V.C., Shcherbakov M.V.
FAILURE PREDICTION OF COMPLEX MULTIPLE-COMPONENT SYSTEMS BASED ON A COMBINATION OF NEURAL NETWORKS: WAYS TO IMPROVE THE ACCURACY OF FORECASTING
49-60
Bondarev A.A., Vasilyev N.V., Konovalova D.I., Brumshteyn Y.M.
DEVELOPMENT, COMMISSIONING AND USE OF “BUSINESS CARD SITES”: ANALYSIS OF TARGETS, POSSIBLE APPROACHES, LABOR CONSUMPTION, RISK STRUCTURE
61-76
Iglina N.A., Brumshteyn Y.M., Vrublevskaya K.A., Konovalova D.I.
NON-LIABILITY OF ORGANIZATION PERSONNEL IN THE CONDITIONS OF INFORMATION-TELECOMMUNICATION TECHNOLOGIES DEVELOPMENT: ANALYSIS OF POSSIBLE INFORMATION SOURCES, IDENTIFICATION APPROACHES, MODELS AND MANAGEMENT METHODS
77-93
Gordeev I.I., Ovcharenro S.S., Sizova A.A.
THE DETERMINATION OF THE CONDUCTING BACKBONE IN A TWO-DIMENSIONAL LATTICE BY THE FLOODING METHOD
94-111
Rotkin V.M., Sokolovsky Y.B., Azhmukhamedov I.M.
DARIER ROTOR AND OPTIMIZED WIND TURBINES: COMPARATIVE ANALYSIS
111-121
Kryukova E.S., Parashchuk I.B.
MATHEMATICAL MODEL FOR ESTIMATING THE QUALITY OF ELECTRONIC LIBRARY: SYNTHESIS OF THE NUMBER OF GRADATIONS OF SPACE STATES
121-131
Solovjev D.S., Solovjeva I.A., Litovka Y.V.
INVERSE PROBLEM SOLUTION OF THE MATHEMATICAL MODELING FOR GALVANIC PROCESS TO OPTIMIZE THE NON-UNIFORMITY OF THE COATING THICKNESS
131-143
Vlasenko A.V., Dzoban P.I., Zhuk R.V.
ANALYTICAL REVIEW OF MACHINE LEARNING TOOLS AND THEIR APPLICATIONS IN THE FIELD OF CYBER SECURITY
144-155
Novoseltseva A.V., Klyuev S.G.
MODERN METHODS OF ATTACS OF DEANIMONIZATION ON THE TOR NETWORK
155-161
Zhuk R.V., Dzoban P.I., Vlasenko A.V.
BUILDING A RELATIONSHIP BETWEEN AN INFORMATION SECURITY INTRUDER AND VULNERABILITIES OF INFORMATION ASSETS IN INFORMATION SYSTEMS FOR PROCESSING PERSONAL DATA
162-169
Zhuk R.V., Dzoban P.I., Vlasenko A.V.
DETERMINING THE RELEVANCE OF INFORMATION SECURITY THREATS IN INFORMATION SYSTEMS FOR PROCESSING PERSONAL DATA USING THE MATHEMATICAL APPARATUS OF NEURAL NETWORKS
169-178