The chemical composition of any food material can be analyzed well by employing various analytical techniques. The physical properties of food are no less important than chemical composition as results obtained from authentic measurement data are able to provide detailed information about the food. Several techniques have been used for years for this purpose but most of them are destructive in nature. The aim of this present study is to identify the emerging techniques that have been used by different researchers for the analysis of the physical characteristics of food. It is highly recommended to practice novel methods as these are non-destructive, extremely sophisticated, and provide results closer to true quantitative values. The physical properties are classified into different groups based on their characteristics. The concise view of conventional techniques mostly used to analyze food material are documented in this work.
he article notes that the faster the digitalization of the transport industry takes place, and, consequently, the emergence of new vulnerabilities and risks, the more acute is the question of developing new and improving the already used means to ensure information security of trans-port infrastructure, protect information of limited access. The author gives examples of in mation security incidents in transport in Russia and worldwide since 2018. Statistical analysis made it possible to conclude that the main motive of cybercriminals in carrying out information attacks is information theft, mostly personal data, including from cloud storage. Social engi-neering and cyber-attacks using malicious software are likely to remain the most popular and successful methods of infiltrating corporate information systems.
Artificial intelligence technologies are being implemented in various fields, replacing the human mind with the help of specially designed algorithms. These systems are able to learn in the course of their functioning, free us from routine work, save time and material resources. The article presents the results of research on trust in breakthrough digital technologies as an important condition for their use, including in social life. There was revealed a high demand for «smart» technologies with an insufficient level of knowledge in this area, lack of interest in professional development. The article identifies the factors causing a negative attitude towards innovation. In the current conditions of the pandemic, a tendency has been revealed of an increase in the need for solutions using artificial intelligence and machine learning technologies, including in ensuring information security.
Распространение вредоносных программ, с помощью которых злоумышленники реализуют угрозы на информационные ресурсы компьютерных сетей, следует рассматривать как вредоносное воздействие. С помощью вредоносного программного обеспечения злоумышленники получают персональные данные пользователей и коммерческую тайну организаций, учетные данные от различных сервисов и систем, что позволяет совершать кибератаки на внутреннюю инфраструктуру сети. Причиной успешных атак на информационные ресурсы следует считать неэффективную организацию защитных механизмов корпоративных сетей передачи данных, не обеспечивающую требуемый уровень противодействия вредоносным воздействиям. В статье предложена математическая модель, на основе использования которой возможно определение наиболее важных характеристик процесса устранения вредоносных воздействий, в том числе математического ожидания времени устранения воздействий, математического ожидания времени поиска заданного числа вредоносных воздействий, дисперсии этих величин и т.д., в условиях ограниченного времени (ресурсов), а также при последовательном устранении вредоносных воздействий в режиме неограниченного времени. Использование предложенной математической модели позволит не только оценить трудоемкость устроения вредоносных воздействий в узлах сети, но оценить качество функционирования корпоративной сети в различные моменты времени в зависимости от начального числа вредоносных воздействий. Ключевые слова: корпоративная сеть передачи данных, система защиты информации, вредоносное программное обеспечение, вредоносное воздействие
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.