Headings of the journal
"Educational Resources and Technologies"

Educational environmentMethods and technologies of training and educationInformation technologyMathematical cyberneticsMethodological researchManagement in social and economic systemsApplied GeoinformaticsEducation for sustainable developmentAll rubrics

All rubrics

Hardware, technology and software innovations 2010-2015 proton radiation therapy of ocular tumors

Page:71-77

Release: 2015-4 (12)

Annotation: Recently we investigate new methods for proton therapy treatment planning of ocular tumors: the refined anatomical model eye, algorithms, a preliminary stage of planning. It allows as increasing an accuracy of treatment planning, so decreasштп the time of a patient’s installing. These methods have not been applied in existed planning systems, so we consider development new one. It’ll be based on the irradiation technology, which was developed by specialists of ITEP in a collaboration with Moscow Helmholtz Research Institute of Eye Diseases

Information technology in management of banking business

Page:89-95

Release: 2015-3 (11)

Annotation: The article analyzes the use of information technology in the management of banking activities. The article reveals the importance of information models and technologies in management. The features of information management in the banking sector. The article shows the difference between information management and information control . This article describes methods of fuzzy logic and the theory of preferences, which are used in the management of activities in the banking sector.

On the requirements for intelligent data model

Page:63-70

Release: 2015-2 (10)

Annotation: The concept of the model in the predicate calculus [15] includes a pair: the predicate (propositional function [6]) and set as an interpretation of the predicate. From this point of view, the database is an interpretation of predicates that are not explicitly specified. At the same time, the explicit inclusion of the predicate in the description of the database models useful for solving a large range of practical tasks. This paper studies the features of the predicates that should be added to the traditional description of the database models

Methods of analysis and risk assessment Information security

Page:73-79

Release: 2015-1 (9)

Annotation: In General, risk understand the possibility of the occurrence of certain adverse events, which leads to a different kind of loss. In accordance with GOST R 51897-2002 «Management of risk. Terms and definitions» and the international standard ISO 27001 management System information security – risk management process is a coordinated action to manage and control an organization's information security risk (IB). Risk management includes risk assessment, treatment of risk, assumption of risk and the message about the risk

Methods of estimating the benefits of information

Page:77-90

Release: 2015-4 (12)

Annotation: The article describes the characteristics of the new information – information advantage. This article describes the methods of analysis of information advantage. The article reveals the contents of the new concepts. This article contains analytical expressions that allow for evaluation under fuzzy and semistructured information. The proposed methods allow to simulate real situations of competition.