<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Цель работы – анализ алгоритмов машинного Ð¾Ð±ÑƒÑ‡ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¿Ð¾Ð²Ñ‹ÑˆÐµÐ½Ð¸Ñ ÐºÐ°Ñ‡ÐµÑтва жизни пациентов. Были решены Ñледующие задачи: - анализ перÑпектив иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð½Ð¾Ñимых уÑтройÑтв; - Ð²Ð°Ð»Ð¸Ð´Ð°Ñ†Ð¸Ñ Ñ…Ð°Ñ€Ð°ÐºÑ‚ÐµÑ€Ð¸Ñтик ноÑимых уÑтройÑтв (Ñравнительный анализ); - иÑÑледование Ñтруктуры защиты и передачи данных в ноÑимых уÑтройÑтвах; - выработка рекомендации по их иÑпользованию и защите пользователей от дейÑтвий кибер-преÑтупников; - анализ результатов. ÐктуальноÑть темы обуÑловлена тем, что вÑе больше информационных ÑиÑтем подвергаетÑÑ Ñ€Ð°Ð·Ð»Ð¸Ñ‡Ð½Ñ‹Ð¼ мошенничеÑким атакам, целью которых ÑвлÑетÑÑ ÐºÑ€Ð°Ð¶Ð° перÑональных данных пользователей и пациентов. ИÑпользованные методы иÑÑледованиÑ: Ñбор информации, Ñравнительный анализ ноÑимых уÑтройÑтв Ñ ÐºÐ¾Ð½ÐºÑƒÑ€ÐµÐ½Ñ‚Ð°Ð¼Ð¸-аналогами, выÑвление их Ñлабых и Ñильных Ñторон, моделирование алгоритма защиты данных, методы оценки ÑффективноÑти проекта, поÑледующий анализ результатов. Результаты работы: - проведен Ñравнительный анализ функциональных возможноÑтей ноÑимых уÑтройÑтв; - Ñмоделирован алгоритм защиты данных; - обоÑнована ÑкономичеÑÐºÐ°Ñ ÑффективноÑть решениÑ; - Ñформированы рекомендации Ð´Ð»Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÐµÐ¹; - опиÑаны результаты от проекта. ПрактичеÑÐºÐ°Ñ Ð·Ð½Ð°Ñ‡Ð¸Ð¼Ð¾Ñть работы обуÑловлена результатами по разработке алгоритма защиты информации Ð´Ð»Ñ Ð½Ð¾Ñимых уÑтройÑтв. Ð’ качеÑтве возможной поддержки имеющихÑÑ Ð¼ÐµÑ…Ð°Ð½Ð¸Ð·Ð¼Ð¾Ð² защиты были предложены методы машинного Ð¾Ð±ÑƒÑ‡ÐµÐ½Ð¸Ñ Ð¸ различные Ñертификаты шифрованиÑ.
The purpose of this work was to analyze machine learning algorithms to improve the quality of life of patients. Tasks that were solved in the course of the study: - analysis of the prospects for the use of wearable devices; - validation of wearable device characteristics (comparative analysis); - investigation of the structure of data protection and transmission in wearable devices; - development of recommendations on their use and protection of users from the actions of cyber criminals; - analysis of the results obtained. The relevance of the topic is due to the fact that more and more information systems are being subjected to various deceptive attacks, which purpose is stole personal data of users and patients. The research methods used: information collection, comparative analysis of wearable devices with competitors-analogues, identification of their weaknesses and strengths, modeling of the data protection algorithm, methods for evaluating the effectiveness of the project, subsequent analysis of the results. Results of the work: - a comparative analysis of the functionality of wearable devices was carried out; - the data protection algorithm is modeled; - the economic efficiency of the solution is justified; - recommendations for users have been formed; - the results of the project are described. The practical significance of the work is due to the results of the development of an information protection algorithm for wearable devices. Machine learning methods and various encryption certificates have been proposed as possible support for existing security mechanisms.
data protection, wearable devices, Bluetooth, BLE, ноÑимÑе ÑÑÑÑойÑÑва, заÑиÑа даннÑÑ
data protection, wearable devices, Bluetooth, BLE, ноÑимÑе ÑÑÑÑойÑÑва, заÑиÑа даннÑÑ
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |