Comprehensive review on development of smart cities using industry 4.0 technologies

M Talebkhah, A Sali, M Gordan, SJ Hashim… - IEEE …, 2023 - ieeexplore.ieee.org
Smart Cities (SCs) have recently opened new lifestyles as they introduce effective
approaches for improving urban management. These cities integrate Industry 4.0 …

Ensuring security the movement of foreign direct investment: Ukraine and the EU economic relations

NV Trusova, TA Cherniavska, YY Kyrylov… - … of Engineering and …, 2021 - pen.ius.edu.ba
It is well known that an important positive result of attracting foreign direct investment for the
country's economy can be the receipt and subsequent distribution of more advanced …

Cloud based evaluation of databases for stock market data

B Singh, R Martyr, T Medland, J Astin, G Hunter… - Journal of Cloud …, 2022 - Springer
About fifty years ago, the world's first fully automated system for trading securities was
introduced by Instinet in the US. Since then the world of trading has been revolutionised by …

Special issue “Security threats and countermeasures in cyber-physical systems”

M Hammoudeh, P Watters, G Epiphaniou… - Journal of Sensor and …, 2021 - mdpi.com
Wireless, sensor and actuator technologies are often central to sensing or communication
critical systems. The last two decades have witnessed a revolution in the design of sensors …

Метод обнаружения сетевой стеганографии на основе машинного обучения

АВ Красов - … наука: актуальные проблемы теории и практики …, 2022 - elibrary.ru
Классификация стеганографических методов преобразования информации описано в
базовой модели угроз безопасности персональных данных при их обработке в …

Monitoring Simulation of Athlete Dynamic Injury Based on NoSQL Database and Localization Algorithm

Y Cheng, H Lu, Y Qian, Q Li, B He… - Mobile Information …, 2022 - Wiley Online Library
This article analyzes NoSQL databases, including three NoSQL data models, and analyzes
the principles of two NoSQL representative products, Redis and MongoDB. Secondly …

METHOD FOR ESTIMATING THE EFFECTIVE DATA RATE IN 802.11 CHANNEL BASED STANDARD ON MONITORING ALGORITHM.

DV Mykhalevskiy - Journal of the Balkan Tribological …, 2021 - search.ebscohost.com
One of the common channel-building technologies, which includes the function to quickly
deploy local area networks in corporate and home sectors, easy connection of user …

Network Stegoinsider Detection

A Salita, A Krasov - 2023 International Russian Smart Industry …, 2023 - ieeexplore.ieee.org
The number of crimes committed by insiders has increased dramatically over the past 10
years. Insiders use various technologies, including steganography, to bypass security …

INFORMATION PROTECTION IN SYSTEMS OF CRITICAL INFORMATION INFRASTRUCTURES.

VA Konyavsky, GV Ross, AM Sychev… - Journal of the Balkan …, 2021 - search.ebscohost.com
The article is devoted to the main problems of protecting the network interaction of critical
information infrastructures and the lines of solving the ones. The major reasons of …

ADVANTAGES AND CHALLENGES OF NOSQL COMPARED TO SQL DATABASES-A SYSTEMATIC LITERATURE REVIEW

R Božić - 2022 - doisrpska.nub.rs
Relational data models represent a long-standing standard in database technologies. A
unique language for writing queries, fixed schema, vertical scalability, consistency, durability …