Nnonlinear and linear distortions of modern dome-type tweeters and ribbon emitters are considered in this article. Recommendations for the selection of high -frequency heads for constructing a near -field monitor system are given. The statement of the optimization problem was carried out with the aim of selecting audio tweeters and ribbon emitters models or serial specimen.
The key factors for the success of an IT organization project are its people and professional quality. To meet the need for professional growth, management adheres to the constant assessment of the employee’s qualification. However, the low level of reliability and accuracy of the assessment results associated with the subjective opinion of the management may lead to the negative consequences of decisions. For fast results and high accuracy of proficiency testing, assessment models and software testers have been developed to support decision-making based on a large number of results obtained using data mining of information systems in the work of IT specialists. In the present work, a factor analysis was carried out to identify detection of such cases. The results of measurements, which are determined when evaluating the qualifications of IT specialists, cause factors associated with the occurrence of technical problems, the effectiveness and efficiency of testing as well as communication skills.
We present the developed system of estimating the digital maturity of an educational organization. The objective of estimating digital maturity has been formalized thanks to analyzing the existing approaches to validation of the digital maturity for an organizational object. The novelty of the given study is in introducing the fuzzy mechanism of integral estimation calculation of digital maturity into the digital maturity evaluation methodology. The methods of expert estimation, discrete mathematics and fuzzy logical inference were used to create the model. The utilization of the model developed is demonstrated on the example of higher education in the Russian Federation. The technique is adaptive and can be applied not only in educational organizations but also in organizations in other spheres of activity.
The problems arising with the tasks of constructing an attack vector in a network infrastructure are considered. The varieties of various tactics and techniques of FSTEC techniques used in the construction of a network attack vector are presented and characterized as well as the specifics of their interrelations with the use of Markov chains in the modeling of attacking influences, their suitability for various procedures for determining vector parameters. When constructing a network attack vector, the features of determining the probabilities of system transitions to various states of network compromise are considered. The formation of the attack vector is studied taking into account the specifics of the multilevel organization of the corporate information system. The features of the construction of a simplified vector are determined taking into account the specifics of tactical relationships (states).
Introduction. Protecting outer perimeter is not enough to ensure secure data communication in the information system of local area network. Analytical reports of leading information security companies confirm this fact. Usually, an attacker having overcome the outer perimeter conducts network reconnaissance before carrying out an attack. The success of a network attack depends on the completeness of the information collected. The constantly changing network topology does not provide an attacker with long-term network topology information, as a result, the attacker is forced to collect information more intensively thereby identifying himself. Otherwise, the effectiveness of the planned attack is reduced. The aim of this research is to increase the intra-network data transfer security level by means of network topology dynamic reconfiguration. The authors proposed a new solution for ensuring secure node interaction countering both internal and external attackers having overcome an outer perimeter.
Materials and methods. The proposed solution is based on a software-defined network and VxLAN technology. The solution involves constant network reconfiguration both with a certain frequency and on the occurrence of certain events, so that an attacker could not have long-term information. If an intruder is detected or an information security incident occurs, the network is automatically reconfigured in such a way as to lessen or prevent possible consequences.
Results. The obtained results show that periodic network changes do not allow an attacker to covertly collect complete information about the network, and the proposed solution may allow to detect and isolate the attacker.
Discussion and conclusion. The obtained results show that it is possible to apply the proposed solution for organizing secure data communication within the local computer network of the information system.
In this paper, complex information infrastructure of the government of the Altai Region is considered. The authors identify three possible stages of information infrastructure development of the government of the Altai Region, such as requirements definition, design, and implementation.
An analytical solution of the heat conduction problem for a two-layer plate based on the Galerkin method and usage of additional boundary conditions (ABC) is obtained. The ABCs are found in such a way that their implementation is to be adequate to the implementation of the original equations at the boundary points. Execution of equations at boundary points leads to their execution over the entire range of spatial coordinates. The use of ABC allows us to obtain chain systems of algebraic equations for unknown solution coefficients. The equations of these systems have highly sparse well-conditioned square matrices. In this connection, their solutions are so simplified that with a large number of approximations, in general form, a system of only two algebraic equations should be solved. A high accuracy of finding the eigenvalues is observed that is explained by the use of a special ABC design.
The 5G mobile networks is a New Radio for finding wireless access solutions for Internet access of users with the most demanding requirements for quality service. To implement it radio interface resource allocation functions implemented by hardware and software vendors at base stations must notify subscribers about their decisions with so-called control channels the functions of which are distributed in the CORESET configuration area. The settings of the CORESET parameters affect the efficiency of using radio channel resources. This article discusses CORESET issues and their impact on the efficiency of using radio resources.
The method of universal coding of an arbitrary set of Markov sources with finite memory is proposed. An estimation of the universal coding is obtained depending on the ε-entropy of the set of sources describing the massive of this set.