Using ICTs in education allows the effective integration of new technologies into the educational process. Developing information and communication technologies also require timely changes in knowledge evaluation and use. As a result, methods, techniques, and technologies used in learning are being updated. In this study, a method for developing an automated educational and methodical complex based on a semantic network is described. Requirements for such educational and methodological complex have been formulated. Structural and formal models of tools based on a semantic network have been presented. The purpose of developing the model is to make it easier for students to perceive the various educational and methodological complexes through its compilation on the basis of a holistic view of the subject area, as well as to optimize the work of the teacher.
The need to protect smartphones and mobile devices from attacks on their internal resources is due to their multiple growth in number, as well as their share among gadgets with Internet access. The paper aims to analyze and create mathematical models of the most common types of attacks on mobile devices. Based on the constructed models and their analysis, ways are proposed to prevent and neutralize intrusions into the operating system of smartphones and other mobile gadgets. Methods: applied analysis using elements of probability theory and mathematical modeling. Results: the features of the mechanisms for the formation of vulnerabilities in mobile devices are determined. Important aspects of determining the effectiveness of modern technologies for protection against cyber attacks on mobile devices are identified. A brief review of the main approaches to mathematical modeling of typical attacks on mobile networks is given. Requirements for the effective choice of protection methods depending on the type of attack class are formulated. Basic recommendations for ensuring the security of a mobile device are formulated. Methods are proposed to reduce the probability of hacking the system through the most common and typical attacks.
The article considers approaches and methods for modeling the wave process resulting from blasting operations. The analysis of modeling methods has shown that in the context of the task it is advisable to conduct a study based on the application of the method of behavioral characteristics, which was optimized using the splitting method. The defining equations were calculated, the point scheme of the template was selected, the resolving difference equations for dynamic boundary value problems of a seismic nature were calculated. Based on the method, an algorithm for calculating the relationship between the voltage and the seismic medium was developed, which allowed generating a code and designing an information system for calculating the wave process.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.