Headings of the journal
"Educational Resources and Technologies"
All rubrics
Release: 2015-2 (10)
Keywords: Predicates databases; Model databases; Conceptual data model; The semantics of the da-tabase; Ontology
Annotation: The concept of the model in the predicate calculus [15] includes a pair: the predicate (propositional function [6]) and set as an interpretation of the predicate. From this point of view, the database is an interpretation of predicates that are not explicitly specified. At the same time, the explicit inclusion of the predicate in the description of the database models useful for solving a large range of practical tasks. This paper studies the features of the predicates that should be added to the traditional description of the database models
Methods of analysis and risk assessment Information security
Release: 2015-1 (9)
Keywords: information security; information security audit; the risks of information security; information security; risk management
Annotation: In General, risk understand the possibility of the occurrence of certain adverse events, which leads to a different kind of loss. In accordance with GOST R 51897-2002 «Management of risk. Terms and definitions» and the international standard ISO 27001 management System information security – risk management process is a coordinated action to manage and control an organization's information security risk (IB). Risk management includes risk assessment, treatment of risk, assumption of risk and the message about the risk
Methods of estimating the benefits of information
Release: 2015-4 (12)
Keywords: management, decision making, risk, information, information asymmetry, information advantage, communication, risk minimization
Annotation: The article describes the characteristics of the new information – information advantage. This article describes the methods of analysis of information advantage. The article reveals the contents of the new concepts. This article contains analytical expressions that allow for evaluation under fuzzy and semistructured information. The proposed methods allow to simulate real situations of competition.
Space sphere of military action
Release: 2015-3 (11)
Keywords: outer space, space exploration, remote sensing, near space, defense
Annotation: The paper considers the near-Earth space as a potential area of operations. The paper describes the properties of space, which are important to the war effort and military intelligence. The paper describes the scope of space warfare and space military apparatuses. The article noted close to Geoinformatics geospatial intelligence. This article describes the features of space weapons and their means of delivery. The article mentioned the nuclear tests in outer space. The article describes the characteristics of space groups in the wars of today
Development of computer science
Release: 2015-2 (10)
Keywords: information, information, information semantics, information theory.
Annotation: The article analyzes the development of the two areas of computer science. One direction is called informatics 1. The second direction is called Informatics 2. Computer 1 examines the content side information. Computer 2 explores questions of transmission and processing of information. Article shows that in each subject area computer science becomes specialized. Article shows the difference between the specialized informatics and geoinformatics.