?
СИСТЕМА ДИСТАНЦИОННОГО ПРОВЕДЕНИЯ ЛАБОРАТОРНЫХ ПРАКТИКУМОВ НА БАЗЕ КОНЦЕПЦИИ ИНТЕРНЕТА ВЕЩЕЙ И ОБОРУДОВАНИЯ NATIONAL INSTRUMENTS
С. 173-174.
Fakhrazeev A., Щербаков Г. П.
In book
М. : МИЭМ НИУ ВШЭ, 2017
Fakhrazeev A., Щербаков Г. П., В кн. : Сборник трудов конференции NI Academic Days 2017, Москва 13-14 апреля 2017 г. : М. : National Instruments Russia, 2017. С. 51-54.
The article discusses the remote control and data acquisition system for laboratory workshops based on the National Instruments Company equipment within the concept of the Industrial Internet of Things. In this paper, we have considered structure of the system and the basic principles of the interaction of its parts, process of interaction with the system ...
Added: October 6, 2017
Dvornikov A. A., Качество. Инновации. Образование 2014 № 8 С. 64-70
Wireless sensor networks are offered as a platform for fog computing. This paradigm describes a computation process that executes on a new structural layer situated between cloud computing and end devices. A problems' analysis provided that arise in case of using wireless sensor network for fog computing, offered researching way for problems salvation. ...
Added: October 9, 2014
Rolich A., Качество. Инновации. Образование 2014 № 6 С. 50-58
This article analyzes the possible applications of the system provide automated access to electricity in public places “Public socket”, identifies the technical requirements for this kind of systems, assesses the volumes of market segments, analyzes competing technologies and generates recommendations to promote this product to market.
Research area is automated systems to provide users with access ...
Added: December 8, 2014
Fakhrazeev A., Щербаков Г. П., Rolich A. et al., В кн. : Сборник трудов XV международной конференции NIDays 2016. : М. : ДМК-пресс, 2016. С. 444-446.
The article discusses the process of creating a remote control and data acquisition systems for laboratory workshops based on the equipment «Elvis II» National Instruments company within the concept of the Industrial Internet of Things. In this paper, we have considered structure of the system and the basic principles of the interaction of its parts, ...
Added: December 1, 2016
Komarov M. M., Nemova M., , in : IEEE 10th International Conference on e-Business Engineering (ICEBE), 2013. : Los Alamitos : IEEE Computer Society, 2013. Ch. 66. P. 429-434.
The article is viewing basic notions of the Internet of the Future: Internet services, Internet of things and cloud computing. Due to advances in technology and the rapid growth of online services, social networks and mobile applications a significant number of new and inventive web-based service models have been introduced. There are many discussions and ...
Added: January 21, 2014
Galinina O., Andreev S., Komarov M. M. et al., Computer Networks 2017 No. 128 P. 123-132
As mobile communications technology is completing its fifth-generation (5G) cycle, it becomes increasingly capable of supporting novel usage scenarios with stringent performance requirements. Beyond seamless broadband connectivity for humans, 5G systems are preparing to enable a wide range of machine-type applications, thus advancing the vision of the Internet of Things (IoT). Facilitated by the rapidly ...
Added: August 9, 2017
Komarov M. M., Konovalov N., Kazantsev N., Foundations of Computing and Decision Sciences 2016 Vol. 41 No. 3 P. 197-210
The paper discovers potential human interactions with growing amount of internet of things (IoT) via proposed concept of Social Web of Services (classical social web with smart things - daily life objects connected to the internet). To investigate the impact of IoT on user behaviour patterns we modelled human-thing interactions using agent-based simulation (ABM). We ...
Added: November 15, 2016
Tsaregorodtsev A. V., Мухин И. Н., Боридько С. И., Информация и безопасность 2015 Т. 18 № 3 С. 400-403
Due to the fact that cloud computing bring the new challenges in the field of information security, it is imperative for the organization to control the process of information security management in the cloud. The level of confidence in the services provided can vary significantly depending on the goals of the organization, the structure of ...
Added: March 15, 2016
Kychkin A., Deryabin A. I., Vikentyeva O. et al., Прикладная информатика 2018 Т. 13 № 4 С. 29-41
The problem of designing a cyberphysical system used as a service for Smart buildings control using Internet technologies — Internet of Things (IoT) is considered. Such software platforms are part of the complex systems of the BEMS — Building Energy Management Systems and are an instrument for implementing energy savings in buildings. IoT servers and ...
Added: September 5, 2018
Zakharov V., Varnovsky N. P., Shokurov A. V., Moscow University Computational Mathematics and Cybernetics 2016 Vol. 36 No. 2 P. 83-88
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. ...
Added: October 13, 2016
Rolich A., В кн. : Научно-техническая конференция студентов, аспирантов и молодых специалистов НИУ ВШЭ. Материалы конференции. : М. : МИЭМ НИУ ВШЭ, 2014. С. 50-51.
В работе проводится обзор существующих систем автоматизированного конструирования интерфейсов интернет-вещей. Рассматривается концепция энергоэффективного программирования и ее применимость в рамках проектирования пользовательских интерфейсов интернет-вещей. ...
Added: December 8, 2014
Zakharov V., Шокуров А. В., Варновский Н. П., В кн. : Дискретные модели в теории управляющих систем : IX Международная конференция, Москва и Подмосковье, 20-22 мая 2015 г.: Труды. : М. : МАКС Пресс, 2015. С. 50-52.
Предложенная нами система ОВ строится на основе ограниченной гомоморфной пороговой криптосистемы (TSHE) и включает в себя облачный вычислитель (CP), центр аутентификации (AC), криптосерверы, пользователей и клиентов. Все пользователи, клиенты и криптосерверы соединены каналами связи с CP. AC имеет каналы связи с CP, а также с каждым из криптосерверов. Сеть связи между криптосерверами представляет собой полный ...
Added: October 12, 2015
Alexandrov D., Савицкий М., В кн. : Научно-образовательная информационная среда XXI века : материалы X Всероссийской научн.-практ. конф. (20-23 сентября 2016 года). – Петрозаводск, 2016. - 188 с. : Петрозаводск : Петрозаводский государственный университет, 2016. С. 177-180.
Discusses the formulation of the problem of increasing the efficiency of modelling of multicomponent IoT systems ...
Added: March 15, 2017
Борисенко О. Д., Пастухов Р. К., С.Д. Кузнецов, Труды Института системного программирования РАН 2016 Т. 28 № 6 С. 111-120
Apache Spark is a framework providing fast computations on Big Data using MapReduce model. With cloud environments Big Data processing becomes more flexible since they allow to create virtual clusters on-demand. One of the most powerful open-source cloud environments is Openstack. The main goal of this project is to provide an ability to create virtual ...
Added: January 25, 2018
Dvornikov A. A., В кн. : Новые информационные технологии в автоматизированных системах: материалы шестнадцатого научно-технического семинара. : М. : Московский государственный институт электроники и математики, 2013. С. 124-126.
...
Added: March 19, 2014
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
Tsaregorodtsev A. V., Нелинейный мир 2013 Т. 11 № 9 С. 610-621
Use of cloud computing applications and services requires review and adaptation of existing formal models for informational telecommunication systems security. It is necessary to consider the benefits of cloud deployment models and provide the procedure for allocating process among components of cloud computing environment for achieving confidentiality and data protection. ...
Added: March 26, 2015
Tsaregorodtsev A. V., Los A., Sorokin A., Национальная безопасность / nota bene 2015
В статье рассматриваются вопросы обеспечения информационной безопасности при проведении облачных вычислений. Информационно-телекоммуникационные системы, функционирующие на основе технологии облачных вычислений, в последнее время получают все большее распространение в связи с постоянно растущими потребностями в вопросах обработки и хранения больших объемов данных, что подтверждает актуальность рассматриваемых в статье вопросов. При этом ключевым моментом при использовании облачных вычислений ...
Added: October 20, 2015
Vikentyeva O., Deryabin A. I., Shestakova L. V. et al., Вестник Московского государственного строительного университета 2017 Т. 12 № 10 С. 1191-1201
Subject: smart house maintenance requires taking into account a number of factors - resource conservation, mitigating working expenditures, safety enhancement, ensuring comfort of leisure and operation. Automation of such engineering systems networks as illumination, climate control, security and communication, may be achieved through utilization of contemporary technologies (e.g. IoT – Internet of Things). However, storing ...
Added: November 21, 2017
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
Chuprikov P., Davydov A., Kogan K. et al., Computer Networks 2021 Vol. 189 Article 107915
Efficient representation of data aggregations is a fundamental problem in modern big data applications, where network topologies and deployed routing and transport mechanisms play a fundamental role in optimizing desired objectives such as cost, latency, and others. In traditional networking, applications use TCP and UDP transports as a primary interface for implemented applications that hide ...
Added: March 14, 2022
Kuznetsov S. D., Turdakov D. Y., Борисенко О. Д., Труды Института системного программирования РАН 2014 Т. 26 № 4 С. 33-44
This article is dedicated to automation of cluster creation and management for Apache Spark MapReduce implementation in Openstack environments. As a result of this project open-source (Apache 2.0 license) implementation of toolchain for virtual cluster on-demand creation in Openstack environments was presented. The article contains an overview of existing solutions for clustering automation in cloud ...
Added: November 26, 2017