At the moment, there is a high tendency towards investing financial resources for additional earnings on stock exchanges, their speculations, etc. A large number of people work on trading platforms, buy or sell stocks, which causes their price to change in different periods. On the basis of their prices, charts are formed, according to which technical and fundamental analysis is performed to build a strategy for earning and forecast not even the price of a stock, but the direction of movement of its value in the direction of growth or decrease. To obtain an answer to this question, they resort to various methods of studying the historical data of stocks, studying their qualitative indicators, as well as mathematical forecasting methods. This article examines an example of how the algorithm for predicting the stock price at the close of the trading day on the market. The method, which will provide information about the stock price, is based on the use of linear regression analysis. This method is best suited for research, because stock price charts are linear. The method of regression analysis allows you to take into account such factors as the cyclical recurrence of trends and tendencies of increase or decrease in the value of a stock, the length of the trading period, during which historical data is obtained and studied, etc. The authors also studied the work of the forecasting algorithm based on regression analysis and studied factors affecting accuracy – the size of the training sample, the amount of historical data, the number of days for which the price will be predicted in the future. In the course of the study, information was obtained on the accuracy of forecasting stock prices, which is 96 % depending on the currency in which the stock is traded and the company that issued it. It should be noted that the accuracy of the forecast is also affected by the volume of historical data and the financial position of the corporation in the market. The materials are of practical importance for the development of decision support systems in economic sectors. The developed model can be used as a basis for helping to make decisions for trading on the stock exchange.
Currently, with the advent of smart devices, our life has become more convenient – it is now easier to do household chores, track the movement of goods, etc. The development of smart devices with the advent of new wireless communication standards helped to give impulse to the unification of smart gadgets into a network, which is often used in smart homes. With this approach, there are some security problems, such as unauthorized access to devices by third parties, interference with the operation of devices, failure of routers, limiting the radius of data transfer between devices, reducing the bandwidth of devices with increasing distance between the gadget and the router, etc. This article talks about IoT technology and how I use it for home automation. The modern view of building wireless home automation networks, which allows you to solve some of these problems, involves a decentralized approach, for example, the usage of mesh-network. This article describes how mesh networking works, and lists the benefits of using it in home automation. When using mesh networking technologies such as Z-Wave or Zigbee, it is possible to link multiple devices into a «seamless» network using Bluetooth or Wi-Fi. The authors reviewed the most popular technologies that use mesh network topology for home automation. These technologies increase the throughput of devices several times. It also allows you to protect devices from third-party intrusion into the system by assigning unique private keys to each device of the network, which decrypts only those packets that are intended for this device.
This article describes the process of converting the program from single-threaded to multithreaded mode. The influence of the number of threads of execution on the total execution time of the code. The problem of spending much time to run programs solved by incremental parallelization when the code is designed for sequential execution, are added to the parallelizing directives. Are similar libraries for working with threads in other programming languages and the advantages of OpenMP over other libraries. Considered a model of parallelizing OpenMP directives, which is time-consuming to run the snippet in multi-threaded mode. The article also presents example code implemented using the C++ language, which built the parallelizing directives of OpenMP. In this model, the estimated execution time of a code snippet of a program with different number of threads. The study showed that with increasing the number of threads the run time is significantly reduced on the average in 1,5–2 times. This happens until the moment when the number of threads will be equal to the number of processor cores. If the number of threads becomes greater than the number of processor cores, the execution time of the program remains virtually unchanged. Are the OpenMP library allows to significantly shorten the program, which can be critical for works of real-time systems, to reduce the time of creating multithreaded applications is simple inserts directives of the library, to reduce the number of errors made by the programmer in the course of working with multi-threaded applications.
This article is about tokenization of assets and products based on blockchain technology. Tokenization continues the idea of securities, but only in the field of digital technologies. Various financial instruments have long been used that eliminate the risks of turnover of valuable physical assets, such as precious metals, by replacing them with less valuable equivalents. This is, for example, the use of banknotes and coins made of non-precious metals, Bank checks, and so on. Tokenization allows you to convert rights to a valuable physical asset into a digital token. The objects of tokenization can be real estate, various securities, manufactured products or raw materials, and so on. Such a token can be put into circulation on primary and secondary markets, as well as, often, «cashed» – that is, it can be exchanged from the manufacturer for the corresponding products. An important feature of tokenization is the ability to divide the value of indivisible assets, such as art and collectibles. This allows you to attract investors with small capital and makes it easier to benefit from initially expensive and low-liquid assets. However, this technology has a number of problems. The main problem with tokenization is that there is still no clear regulation of these digital assets in all countries of the world. In the United States, for example, tokens are often equated with securities. In Germany, it is considered that each case of tokenization should be considered separately, but tokens that grant rights similar to those granted by traditional shares are classified as financial instruments and are subject to appropriate regulation. In the future, after the problems are resolved, tokenization can replace the traditional way of representing the value of physical assets – securities, and also become a convenient financial tool for trading products and assets.
During the period of rapid digitalization of society, modern technologies have become firmly established in many areas of the economy. Modern enterprises do not conduct business activity without modern means of digital communications, which allow the exchange of information both between the objects of the enterprise and the transmission of data to users outside the external perimeter of the enterprise network. The enterprise infrastructure may have information vulnerabilities that attackers use to intercept data, attack enterprise systems, or to attack the devices of system users. Such attacks can lead to hardware failures, service failures, software errors, data loss, etc. According to statistics from Positive Technologies in 2021, 33 % of Russian companies were exposed to cyberattacks using the vulnerability of the company's data transmission protocols, and 55 % of major global companies have serious vulnerabilities in the perimeter of the system. This article discusses the most common data transmission protocols that are used in automated process control systems. Types of vulnerabilities of protocols of various levels of the OSI model are given. The mechanisms of vulnerability implementation and methods of analyzing enterprise network traffic are considered. The statistics of impacts on data transmission protocols in various industries of their use, as well as statistics on violations of information security regulations in companies are provided. The article is based on the task of determining the signs of impacts and assessing the security of protocols in order to further develop solutions for measures to counteract the impact on the system of companies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.