Mostrando 4 resultados de: 4
Publisher
Proceedings of SPIE - The International Society for Optical Engineering(3)
Przeglad Elektrotechniczny(1)
Área temáticas
Física aplicada(2)
Ciencias de la computación(1)
Dibujo técnico, materiales peligrosos(1)
Dirección general(1)
Gestión y servicios auxiliares(1)
Área de conocimiento
Ciencias de la computación(3)
Red informática(2)
Gestión(1)
Ingeniería de sistemas(1)
Ingeniería industrial(1)
Objetivos de Desarrollo Sostenible
ODS 9: Industria, innovación e infraestructura(4)
ODS 8: Trabajo decente y crecimiento económico(3)
ODS 17: Alianzas para lograr los objetivos(2)
ODS 12: Producción y consumo responsables(1)
ODS 16: Paz, justicia e instituciones sólidas(1)
Origen
scopus(4)
Functional integration of automated system databases by means of artificial intelligence
Conference ObjectAbstract: The paper presents approaches for functional integration of automated system databases by means of aPalabras claves:DATABASES, fuzzy logicAutores:Gromaszek K., Iskakova A., Kalimoldayev M., Kotyra A., Nikitenko O.D., V. M. DubovoyFuentes:scopusFunctional safety assessment of one-level coordination of distributed cyber-physical objects
ArticleAbstract: An approach to solving the problem of analysis and improving the functional safety of cyber-physicalPalabras claves:Coordination control, Cyber-physical control system, Distributed object, Functional safety, One-level systemsAutores:Bukhun A.H., Gromaszek K., Homonyuk O.M., Kalimoldayev M., Kyrylenko N.M., Smailova S., V. M. Dubovoy, Yukhymchuk M.S.Fuentes:scopusOptimization of hierarchical management of technological processes
Conference ObjectAbstract: The advisability of clustering of control tasks providing reduction of information flows needed to cPalabras claves:algorithm for optimal clustering, coordination of control, hierarchical structure, information flowAutores:Gromaszek K., M. M. Bayas, Shegebaeva J., V. M. DubovoyFuentes:scopusThreats and risks to information security: A practical analysis of free access wireless networks
Conference ObjectAbstract: Nowadays, there is an ever-growing need to investigate, consult and communicate through the internetPalabras claves:802.11 protocol, Computer security, CYBERCRIME, ETHICAL HACKING, IT audit, PentestingAutores:Daniel I. Quirumbay, Gromaszek K., Iván A. Coronel, Kozbekova A., M. M. Bayas, Ronald H. Rovira, Tleshova A.Fuentes:scopus