40 research outputs found
The creation and development of multilingual environment in the Ural State University of Economics
Π ΡΡΠ°ΡΡΠ΅ ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°Π΅ΡΡΡ ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΠΈ ΡΠ°Π·Π²ΠΈΡΠΈΠ΅ ΠΏΠΎΠ»ΠΈΡΠ·ΡΡΠ½ΠΎΠΉ ΡΡΠ΅Π΄Ρ Π² Π£ΡΠ°Π»ΡΡΠΊΠΎΠΌ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π΅Π½Π½ΠΎΠΌ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΎΠΌ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ΅. ΠΠ° ΡΡΠΎΡ ΠΏΡΠΎΡΠ΅ΡΡ Π²Π»ΠΈΡΡΡ ΠΌΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½ΡΠ΅ ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΠΈΠΈ, Π²ΡΡΡΠ°Π²ΠΊΠΈ, ΠΌΠ΅ΡΠΎΠΏΡΠΈΡΡΠΈΡ, ΡΡΠ΅Π±Π° ΠΏΠΎ ΠΎΠ±ΠΌΠ΅Π½Ρ, ΡΠ°Π±ΠΎΡΠ° Π·Π° Π³ΡΠ°Π½ΠΈΡΠ΅ΠΉ. ΠΠ²ΡΠΎΡΡ Π½Π΅ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΡΠΈΠ²ΠΎΠ΄ΡΡ ΠΏΡΠΈΠΌΠ΅ΡΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΠΊΠΈ ΡΠΎΠ·Π΄Π°Π½ΠΈΡ ΠΏΠΎΠ»ΠΈΡΠ·ΡΡΠ½ΠΎΠΉ ΡΡΠ΅Π΄Ρ Π² Π£ΡΠ°Π»ΡΡΠΊΠΎΠΌ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π΅Π½Π½ΠΎΠΌ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΎΠΌ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ΅, Π½ΠΎ ΠΈ ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°ΡΡ ΠΏΡΠΈΡΠΈΠ½Ρ, ΠΏΠΎΡΠ»ΡΠΆΠΈΠ²ΡΠΈΠ΅ ΡΠ°Π·Π²ΠΈΡΠΈΡ ΡΡΠΎΠ³ΠΎ ΠΏΡΠΎΡΠ΅ΡΡΠ° Π² ΠΌΠΈΡΠ΅ ΠΈ Π² Π£ΡΠΠΠ£. Π‘ΡΠ°ΡΡΡ ΡΠΎΠ΄Π΅ΡΠΆΠΈΡ ΠΎΡΠ²Π΅ΡΡ Π½Π° ΡΠ»Π΅Π΄ΡΡΡΠΈΠ΅ Π²ΠΎΠΏΡΠΎΡΡ: ΠΊΠ°ΠΊΠΎΠ²Ρ ΠΏΡΠ°ΠΊΡΠΈΠΊΠΈ ΡΠΎΠ·Π΄Π°Π½ΠΈΡ ΠΈ ΡΠ°Π·Π²ΠΈΡΠΈΡ ΠΏΠΎΠ»ΠΈΡΠ·ΡΡΠ½ΠΎΠΉ ΡΡΠ΅Π΄Ρ Π² Π£ΡΠ°Π»ΡΡΠΊΠΎΠΌ Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π΅Π½Π½ΠΎΠΌ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΎΠΌ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ΅, ΡΠ΅ΠΌ ΠΎΠ±ΡΡΠ»ΠΎΠ²Π»Π΅Π½ Π²ΡΠ±ΠΎΡ Π£ΡΠΠΠ£ ΠΈΠ½ΠΎΡΡΡΠ°Π½Π½ΡΠΌΠΈ ΡΡΡΠ΄Π΅Π½ΡΠ°ΠΌΠΈ.The paper deals with the creation and development of multilingual environment in the Ural State University of Economics. International conferences, exhibitions, meetings, study exchange, work abroad lead to it. The author does not only give examples of practices used to create multilingual environment, but also examines the reasons for the development of this process in the world and in the USUE. This paper answers the following questions: what are practices for the creation and development of multilingual environment at the Ural State University of Economics? Why do foreign students choose the USUE
Metals from the ritual site of Shaitanskoye Ozero II (Sverdlovsk Oblast, Russia) [Metales del yacimiento ritual de Shaitanskoye Ozero II (provincia de Sverdlovsk Oblast, Rusia)]
The present article describes materials from the ritual site of Shaitanskoye Ozero II, Sverdlovsk Oblast. Few excavations carried out at the site measuring less than 240 sq. m in size, yielded more than 160 bronze artifacts: utensils, weapons, rolled copper ornaments, and abundant smelting and casting waste. Apart from Seima-Turbino (celts and laminar knives) and Eurasian types (daggers with cast hilts, truncated knives with guards, fluted bracelets and rings), several metal artifacts were revealed manufactured in the style of the Samus-Kizhirovo tradition. Bronze artifacts, stone knives and scrapers, and numerous arrowheads are accompanied by ceramics of the Koptyaki type. Metals use mainly a copper-tin alloy. This assemblage is shown to be relevant to the local tradition of metalworking, which, in this particular region, was comparatively ancient having been left uninterrupted by the rapid migrations of the Seima-Turbino people. In addition, the assemblage indicates the sources from which post-Seima artifacts reached the Alakul people. These artifacts may also have been linked with a large metalworking center located in the Middle Urals
The Challenges with Internet of Things for Business
9 pages, 42 referencesMany companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact of IoT security measures on the security challenges. This paper presents a review of the current state of security of IoT in companies that produce IoT products and have begun a transformation towards the digitalization of their products and the associated production processes. The analysis of challenges in IoT security was conducted based on the review of resources and reports on IoT security, while mapping the relevant solutions/measures for strengthening security to the existing challenges. This mapping assists stakeholders in understanding the IoT security initiatives regarding their business needs and issues. Based on the analysis, we conclude that almost all companies have an understanding of basic security measures as encryption, but do not understand threat surface and not aware of advanced methods of protecting data and devices. The analysis shows that most companies do not have internal experts in IoT security and prefer to outsource security operations to security providers
Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions
Copy draft with 10 pages, 4 figures,35 referencesAuthentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, can be used in remote display access to guarantee the security of use of remote connectivity systems during the access control phase or throughout the session. This paper investigates how network conditions and additional host interaction may impact the behavioural pattern of keystrokes when used in a remote desktop application scenario. We focus on the timing of adjacent keys and investigate this impact by calculating the variations of the Euclidean distance between a reference profile and resulting profiles following such impairments. The experimental results indicate that variations of congestion latency, whether produced by adjacent traffic sources or by additional remote desktop interactions, have a substantive impact on the Euclidian distance, which in turn may affect the effectiveness of the biometric authentication algorithm. Results also indicate that data flows within remote desktop protocol are not prioritized and therefore additional traffic will have a significant impact on the keystroke timings, which renders continuous authentication less effective for remote access and more appropriate for one-time login
The Relationship between Student Engagement and Academic Performance in Online Education
In recent years, online education has become a mature, recognised, and heavily used alternative for delivering higher education programmes. Beyond its benefits, online education faces a number of challenges, some of which relate to its engagement and impact on student performance. To support the ongoing research into the complex relationships developed, this research investigated the relationship between engagement and academic performance for students that undertake standalone online programmes. The study uses as input the module content engagement data, as collected from an e-learning platform, including the number of content views, forum posts, completed assignments, and watching of videos. The study used Pearson correlation to evaluate the relationship between learner engagement and academic performance. The analysis revealed that the student engagement was positively correlated to the student performance both for individual modules as well as across the cohort. In addition, correlation between initial engagement with individual subjects and the overall engagement was also strong, indicating both variables lead to improved academic results
Information Security Risk Assessment
Information security risk assessment is an important part of enterprisesβ management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification, management, and elimination or reduction of the likelihood of events that can negatively affect the resources of the information system to reduce security risks that potentially have the ability to affect the information system, subject to an acceptable cost of protection means that contain a risk analysis, analysis of the βcost-effectivenessβ parameter, and selection, construction, and testing of the security subsystem, as well as the study of all aspects of security.</jats:p
THE DEVELOPMENT OF LOGISTICS SCIENCE IN RUSSIA
The formation and development of logistics science in Russia has been shown as well as the place occupied in this process by the State University of Management and the Department of Logistics has been revealed. The structure of the scientific school of the Department of Logistics and its relationship with the domestic school of logistics have been shown. An attempt to comprehend critically the directions of development of logistics as a science has been made. The problems of the definition of logistics, discrepancies in the use of this term in scientific and practical activities have been adduced. Perspective directions of the development of modern logistics, developed by the Department of Logistics, have been shown. The system-forming trends in the development of supply chains, determining the further development of logistics as a science and field of activity, have been identified