40 research outputs found

    The creation and development of multilingual environment in the Ural State University of Economics

    Full text link
    Π’ ΡΡ‚Π°Ρ‚ΡŒΠ΅ рассматриваСтся созданиС ΠΈ Ρ€Π°Π·Π²ΠΈΡ‚ΠΈΠ΅ полиязычной срСды Π² Π£Ρ€Π°Π»ΡŒΡΠΊΠΎΠΌ государствСнном экономичСском унивСрситСтС. На этот процСсс Π²Π»ΠΈΡΡŽΡ‚ ΠΌΠ΅ΠΆΠ΄ΡƒΠ½Π°Ρ€ΠΎΠ΄Π½Ρ‹Π΅ ΠΊΠΎΠ½Ρ„Π΅Ρ€Π΅Π½Ρ†ΠΈΠΈ, выставки, мСроприятия, ΡƒΡ‡Π΅Π±Π° ΠΏΠΎ ΠΎΠ±ΠΌΠ΅Π½Ρƒ, Ρ€Π°Π±ΠΎΡ‚Π° Π·Π° Π³Ρ€Π°Π½ΠΈΡ†Π΅ΠΉ. Авторы Π½Π΅ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ приводят ΠΏΡ€ΠΈΠΌΠ΅Ρ€Ρ‹ использования ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΈ создания полиязычной срСды Π² Π£Ρ€Π°Π»ΡŒΡΠΊΠΎΠΌ государствСнном экономичСском унивСрситСтС, Π½ΠΎ ΠΈ Ρ€Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°ΡŽΡ‚ ΠΏΡ€ΠΈΡ‡ΠΈΠ½Ρ‹, ΠΏΠΎΡΠ»ΡƒΠΆΠΈΠ²ΡˆΠΈΠ΅ Ρ€Π°Π·Π²ΠΈΡ‚ΠΈΡŽ этого процСсса Π² ΠΌΠΈΡ€Π΅ ΠΈ Π² Π£Ρ€Π“Π­Π£. Π‘Ρ‚Π°Ρ‚ΡŒΡ содСрТит ΠΎΡ‚Π²Π΅Ρ‚Ρ‹ Π½Π° ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ вопросы: ΠΊΠ°ΠΊΠΎΠ²Ρ‹ ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΈ создания ΠΈ развития полиязычной срСды Π² Π£Ρ€Π°Π»ΡŒΡΠΊΠΎΠΌ государствСнном экономичСском унивСрситСтС, Ρ‡Π΅ΠΌ обусловлСн Π²Ρ‹Π±ΠΎΡ€ Π£Ρ€Π“Π­Π£ иностранными студСнтами.The paper deals with the creation and development of multilingual environment in the Ural State University of Economics. International conferences, exhibitions, meetings, study exchange, work abroad lead to it. The author does not only give examples of practices used to create multilingual environment, but also examines the reasons for the development of this process in the world and in the USUE. This paper answers the following questions: what are practices for the creation and development of multilingual environment at the Ural State University of Economics? Why do foreign students choose the USUE

    Metals from the ritual site of Shaitanskoye Ozero II (Sverdlovsk Oblast, Russia) [Metales del yacimiento ritual de Shaitanskoye Ozero II (provincia de Sverdlovsk Oblast, Rusia)]

    Get PDF
    The present article describes materials from the ritual site of Shaitanskoye Ozero II, Sverdlovsk Oblast. Few excavations carried out at the site measuring less than 240 sq. m in size, yielded more than 160 bronze artifacts: utensils, weapons, rolled copper ornaments, and abundant smelting and casting waste. Apart from Seima-Turbino (celts and laminar knives) and Eurasian types (daggers with cast hilts, truncated knives with guards, fluted bracelets and rings), several metal artifacts were revealed manufactured in the style of the Samus-Kizhirovo tradition. Bronze artifacts, stone knives and scrapers, and numerous arrowheads are accompanied by ceramics of the Koptyaki type. Metals use mainly a copper-tin alloy. This assemblage is shown to be relevant to the local tradition of metalworking, which, in this particular region, was comparatively ancient having been left uninterrupted by the rapid migrations of the Seima-Turbino people. In addition, the assemblage indicates the sources from which post-Seima artifacts reached the Alakul people. These artifacts may also have been linked with a large metalworking center located in the Middle Urals

    The Challenges with Internet of Things for Business

    Get PDF
    9 pages, 42 referencesMany companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact of IoT security measures on the security challenges. This paper presents a review of the current state of security of IoT in companies that produce IoT products and have begun a transformation towards the digitalization of their products and the associated production processes. The analysis of challenges in IoT security was conducted based on the review of resources and reports on IoT security, while mapping the relevant solutions/measures for strengthening security to the existing challenges. This mapping assists stakeholders in understanding the IoT security initiatives regarding their business needs and issues. Based on the analysis, we conclude that almost all companies have an understanding of basic security measures as encryption, but do not understand threat surface and not aware of advanced methods of protecting data and devices. The analysis shows that most companies do not have internal experts in IoT security and prefer to outsource security operations to security providers

    Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions

    Get PDF
    Copy draft with 10 pages, 4 figures,35 referencesAuthentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, can be used in remote display access to guarantee the security of use of remote connectivity systems during the access control phase or throughout the session. This paper investigates how network conditions and additional host interaction may impact the behavioural pattern of keystrokes when used in a remote desktop application scenario. We focus on the timing of adjacent keys and investigate this impact by calculating the variations of the Euclidean distance between a reference profile and resulting profiles following such impairments. The experimental results indicate that variations of congestion latency, whether produced by adjacent traffic sources or by additional remote desktop interactions, have a substantive impact on the Euclidian distance, which in turn may affect the effectiveness of the biometric authentication algorithm. Results also indicate that data flows within remote desktop protocol are not prioritized and therefore additional traffic will have a significant impact on the keystroke timings, which renders continuous authentication less effective for remote access and more appropriate for one-time login

    The Relationship between Student Engagement and Academic Performance in Online Education

    Get PDF
    In recent years, online education has become a mature, recognised, and heavily used alternative for delivering higher education programmes. Beyond its benefits, online education faces a number of challenges, some of which relate to its engagement and impact on student performance. To support the ongoing research into the complex relationships developed, this research investigated the relationship between engagement and academic performance for students that undertake standalone online programmes. The study uses as input the module content engagement data, as collected from an e-learning platform, including the number of content views, forum posts, completed assignments, and watching of videos. The study used Pearson correlation to evaluate the relationship between learner engagement and academic performance. The analysis revealed that the student engagement was positively correlated to the student performance both for individual modules as well as across the cohort. In addition, correlation between initial engagement with individual subjects and the overall engagement was also strong, indicating both variables lead to improved academic results

    Information Security Risk Assessment

    Get PDF
    Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the information system, subject to an acceptable cost of protection means that contain a risk analysis, analysis of the β€œcost-effectiveness” parameter, and selection, construction, and testing of the security subsystem, as well as the study of all aspects of security.</jats:p

    THE DEVELOPMENT OF LOGISTICS SCIENCE IN RUSSIA

    Get PDF
    The formation and development of logistics science in Russia has been shown as well as the place occupied in this process by the State University of Management and the Department of Logistics has been revealed. The structure of the scientific school of the Department of Logistics and its relationship with the domestic school of logistics have been shown. An attempt to comprehend critically the directions of development of logistics as a science has been made. The problems of the definition of logistics, discrepancies in the use of this term in scientific and practical activities have been adduced. Perspective directions of the development of modern logistics, developed by the Department of Logistics, have been shown. The system-forming trends in the development of supply chains, determining the further development of logistics as a science and field of activity, have been identified
    corecore