Ukrainian and Foreign Science: Yesterday, Today, Tomorrow

Total Page:16

File Type:pdf, Size:1020Kb

Ukrainian and Foreign Science: Yesterday, Today, Tomorrow MINISTRY OF EDUCATION AND SCIENCE OF UKRAINE THE NATIONAL TECHNICAL UNIVERSITY OF UKRAINE "IGOR SIKORSKY KYIV POLYTECHNIC INSTITUTE" FACULTY OF LINGUISTICS IX INTERNATIONAL STUDENTS’ RESEARCH AND DEVELOPMENT CONFERENCE Ukrainian and Foreign Science: Yesterday, Today, Tomorrow CONFERENCE PROCEEDINGS December 2, 2020 Kyiv, Ukraine UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW ENGINEERING SCIENCES THE USE OF INFORMATION TECHNOLOGIES CUSTODIANS Egor Morskyi Politechnika Rzeszowska im. Ignacego Łukasiewicza, Poland The on-line processing of information from a remote terminal is needed due to the increasing multiplicity of information systems and growing requirements for the speed of information processing. A general requirement for all remote access technologies is the protection of information from unauthorized access (2020). The largest custodians in the world are developing their remote access systems, with the help of which the client can initiate an order from his computer. The experts are seriously interested in the problem solving of the stock information system integrating with banking and accounting systems. So, they do not ignore the issues of data protection, access, and maintaining their integrity. These tasks require new approaches and make scientists pay attention to modern solutions that are already available on the information technology market. The basis of the modern approach to building an information system is the "client-server" technology. One of the most important conditions for the development of a civilized securities market in Poland is the creation of information systems that allow paperless office (storage and circulation of documents in electronic form). Due to the fact that the secondary securities market in the country has been underdeveloped, special attention of the developers is drawn to the constantly increasing demand for systems operating with securities of private enterprises, the main of which is the depository system. It is the development of electronic depository systems that can have a significant impact on the widespread transition to electronic technologies in the securities market, an increase in their turnover and, as a result, to the formation of a network of participants with remote access, which, taking into account the size of the country. The introduction of new information technologies should contribute to solving the problem of improving the information support of custodians. The most knowledge-intensive and objectively necessary elements of such new information technologies are methods of simulation and forecasting depository activities. One of the topical directions for improving custodians’ activities is the use of the mathematical apparatus. It implies the need for research in this area and, first of all, a critical assessment of approaches and mathematical apparatus, the choice of a class of mathematical models and methods, the use of which is advisable for considering the subject area. Engineering Sciences 3 UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW To sum up, only the correct choice of technology for creating a system allows experts to extend its life cycle, carrying out continuous development and expansion without radical alteration of the main basic components of the system. References: 1. Joshi, M. P. (2020). Custodians of Rationality: Data Science Professionals and the Process of Information Production in Organizations, AMCIS 2020, Proceedings. https://aisel.aisnet.org/amcis2020/org_transformation_is/org_transformation_is/1 BITCOIN REASONS FOR ITS GROWTH AND A BRIEF HISTORY Danylo Antolyk Faculty of Informatics and Computer Science National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Bitcoin, created in January 2009 after the housing market crash, is a cryptocurrency. The creator is an anonymous user under the pseudonym Satoshi Nakamoto. His identity is a mystery. It is run by a decentralized body, so it is not the official currency. (Jake Frankenfield 2020) Also, Bitcoin is not physical, it is absolutely virtual cash. We use it wherever they are supported. For example: from 2018 in Kyiv on the Bessarabian market it is possible to buy food for bitcoins. But in some eastern countries, they are completely prohibited. Basically, bitcoin is a computer file that is entered in an application on a PC or smartphone. Folk can easily exchange bitcoins for each other and all deals are listed in a publicly available catalog designating a blockchain. This allows you to track Bitcoins history so that people do not spend coins that do not belong to them, copy or cancel transactions. (BBC 2018) People can receive bitcoins in three ways: from other people, by selling certain things, or by creating them with a PC. For this system to work, people have to make persistent transactions on their PC. Computers are capable of calculating surprisingly complex amounts. Sometimes their owners receive bitcoins as a reward. For it, you need a more powerful computer. It is - mining. However, now it's getting harder and harder to end creating too many Bitcoins. At the moment it is almost useless to start mining because you can spend more on electric power than you earn This system is highly commendable, because you can exchange not a physical object for real things, but even for real money. People like it because it is not guided by the state. It is used by both ordinary lovers of anonymity and criminals. This is safe since every deal is open. This means that it is hard to duplicate bitcoins, create unreal ones, or use some you don't have. All risks are: you can lose access to your "storage", accidentally remove it, or someone can steal it from an untrusted website which one allows you to keep your currency. (BBC 2018) Engineering Sciences 4 UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW Throughout history, Bitcoin has managed to rise, fall, and rise again. The first take-off - new technologies, limited edition, potential digital currency. The collapse is the refusal of the digital community to accept it due to the rules of using fiat currencies, competition in the form of huge financial investments, and their unwillingness to support the transition, which led to a drop in demand. The second take-off is the transfer of almost most of the same financial assets to their blockchain platform (which has led to a reputation for being a secure system), increased use of the network in connection with the coronavirus, and an increase in the number of electronic payments. To conclude, cryptocurrencies are not a solution for everyone. It has its pros and cons, and the defect of entry is extremely low. So, making the decision to switch to cryptocurrency is not easy. However, it is definitely a very interesting currency to look out for. References: 1. Jake Frankenfield (2020). Guide to Bitcoin. Retrieved from https://www.investopedia.com/terms/b/bitcoin.asp 2. BBC (2018). Guide: What is Bitcoin and how does Bitcoin work? Retrieved from https://www.bbc.co.uk/newsround/25622442 CYBER CRIMES Kateryna Artemenko Faculty of Informatics and Computer Science National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Cybercrimes are claimed to be a great threat to our society, personal confidentially, and capitalism, on its own. Offenses such as hacking or identity theft are becoming more and more common. It is unarguable that an enormous part of humanity has experienced some sorts of cyber attacks, for example in 2019 over 60% of businesses, worldwide, experienced phishing and social engineering attacks, 70% of which were actually small businesses. The goal is obvious — to take over some kind of confidential data (Vuleta, 2020). Needless to say, almost half of all property crimes are done via the Internet (The Guardian, 2019), where it is harder to defend yourself from violations. The question is: “are we doing enough to secure ourselves and data online?” First and foremost, cybersecurity departments are lacking employees, right now there are 300,000 unfilled jobs and the number will continue to increase, it is supposed that by 2021 this number will be up to 3.5 million (InfoSec Newsflash, 2019). Whilst everyone doing their work online, owning to quarantine, the cybersecurity specialist will be one of the most wanted positions. We cannot but mention that despite security online is highly important, there will be a lack of finances, to further support my argument the President of the United States in 2019 allocated 15 billion on cyber security needs (The White House, 2018, Engineering Sciences 5 UKRAINIAN AND FOREIGN SCIENCE: YESTERDAY, TODAY, TOMORROW p 1), but it is still the bare minimum since the cases of cyber-attacks won’t be leaning back. The current COVID-19 crisis and the need for investments in medicine will not let any government the opportunity to spend this much on cybersecurity. All things considered, the problem of the Internet not being a “safe place” for anyone, it is terrifying to see that even a teenager could wreck up the justice system of the whole country (Daniel Kelley’s case) (BBC, 2019), so you have to be aware of risks not just as an everyday user, but as businessmen or a public figure. Therefore, we should attract investments to the cybersecurity companies or maybe to become this type if specialist. It is up to you to decide, but do not take too long, the criminals are still on their way. References: 1. Vuleta, B. (2020, February 13). 39 Worrying Cyber Crime Statistics [Updated for 2020]. Retrieved from https://legaljobsite.net/cyber-crime-statistics. 2. The Guardian. (2020). International edition. Editorial. (2019, June 3). The Guardian view on cybercrime: the law must be enforced. Retrieved from https://www.theguardian.com/commentisfree/2019/jun/03/the-guardian-view-on- cybercrime-the-law-must-be-enforced. 3. Newsflash, I. (2019, March 21). Cyber Security Statistics for 2019. Cyber Defense Magazine, Retrieved from https://www.cyberdefensemagazine.com/cyber-security- statistics-for-2019/. 4. The White House. (2018). Federal Budget Authority. Cybersecurity Funding (pp.
Recommended publications
  • Getting to Know Siri
    Chapter 1 Getting to Know Siri In This Chapter ▶ Seeing what — or rather, who — Siri is ▶ Setting up Siri for your personal use ▶ Exploring different ways to use Siri ▶ Finding out how to get fast and reliable replies ▶ Teaching Siri what to call you ongratulations! You’re now the owner of the most definitive Cguide to Siri on the planet. This easy-to-read For Dummies title will teach you everything you need to know about Siri — and then some. Be prepared to master all of Siri’s amazing features, at your own pace, so you can get a lot more out of your beloved iPhone, iPad (and iPad mini), or iPod touch. But first, a few words about my introduction to Siri, what Siri is exactly, and a bit of history. As a longtime technology reviewer, I firmly believe Siri (pronounced SEAR-ree) is the start of something very special, and it was love at first sight — er, speech. Here I am, sitting in the crowd at Apple headquarters in Cupertino, California, on October 4, 2011. The exclusive press event is called “Let’s Talk iPhone,” and like many other journalists and analysts in theCOPYRIGHTED room, I was expecting Apple CEO MATERIAL Tim Cook to take the wraps off the iPhone 5. When the iPhone 4S was initially debuted, you could sense the ini- tial disappointment among the attendees — after all, there were so many rumors leading up to the event that it seemed inevitable that a dramatically new smartphone would be unveiled that day. But that letdown feeling completely vanished the moment Siri was introduced.
    [Show full text]
  • Case 2:17-Cv-00592-JRG Document 1 Filed 08/18/17 Page 1 of 49 Pageid #: 1
    Case 2:17-cv-00592-JRG Document 1 Filed 08/18/17 Page 1 of 49 PageID #: 1 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION WORD TO INFO, INC., Plaintiff, Civil Action No.: 2:17-cv-592 v. JURY TRIAL DEMANDED APPLE INC., Defendant. COMPLAINT FOR PATENT INFRINGEMENT Plaintiff Word to Info, Inc. (“Word to Info”), by way of its Complaint for Patent Infringement (“Complaint”) against the above-named Defendant Apple Inc. (“Apple” or “Defendant”), alleges the following: NATURE OF THE ACTION 1. This is an action for patent infringement arising under the Patent Laws of the United States, Title 35 of the United States Code. THE PARTIES 2. Plaintiff Word to Info, Inc. is a corporation organized under the laws of the State of Texas with a place of business at 1106 Edgewood Dr., Richardson, Texas 75081. 3. Upon information and belief, Defendant Apple is a corporation organized under the laws of the State of California with its principal place of business at 1 Infinite Loop, Cupertino, California 95014. JURISDICTION AND VENUE 4. This Court has subject matter jurisdiction under 28 U.S.C. §§ 1331 and 1338. Case 2:17-cv-00592-JRG Document 1 Filed 08/18/17 Page 2 of 49 PageID #: 2 5. This Court has personal jurisdiction over Apple at least because Apple has ongoing and systematic contacts with this District and the United States. Specifically, Apple does business in the Eastern District of Texas and has thereby availed itself of the privileges and the protections of the laws of the State of Texas and this Judicial District.
    [Show full text]
  • Ontology and Information Systems
    Ontology and Information Systems 1 Barry Smith Philosophical Ontology Ontology as a branch of philosophy is the science of what is, of the kinds and structures of objects, properties, events, processes and relations in every area of reality. ‘Ontology’ is often used by philosophers as a synonym for ‘metaphysics’ (literally: ‘what comes after the Physics’), a term which was used by early students of Aristotle to refer to what Aristotle himself called ‘first philosophy’.2 The term ‘ontology’ (or ontologia) was itself coined in 1613, independently, by two philosophers, Rudolf Göckel (Goclenius), in his Lexicon philosophicum and Jacob Lorhard (Lorhardus), in his Theatrum philosophicum. The first occurrence in English recorded by the OED appears in Bailey’s dictionary of 1721, which defines ontology as ‘an Account of being in the Abstract’. Methods and Goals of Philosophical Ontology The methods of philosophical ontology are the methods of philosophy in general. They include the development of theories of wider or narrower scope and the testing and refinement of such theories by measuring them up, either against difficult 1 This paper is based upon work supported by the National Science Foundation under Grant No. BCS-9975557 (“Ontology and Geographic Categories”) and by the Alexander von Humboldt Foundation under the auspices of its Wolfgang Paul Program. Thanks go to Thomas Bittner, Olivier Bodenreider, Anita Burgun, Charles Dement, Andrew Frank, Angelika Franzke, Wolfgang Grassl, Pierre Grenon, Nicola Guarino, Patrick Hayes, Kathleen Hornsby, Ingvar Johansson, Fritz Lehmann, Chris Menzel, Kevin Mulligan, Chris Partridge, David W. Smith, William Rapaport, Daniel von Wachter, Chris Welty and Graham White for helpful comments.
    [Show full text]
  • United States Patent ( 10 ) Patent No.: US 10,706,841 B2 Gruber Et Al
    US010706841B2 (12 ) United States Patent ( 10 ) Patent No.: US 10,706,841 B2 Gruber et al. (45 ) Date of Patent : * Jul. 7 , 2020 (54 ) TASK FLOW IDENTIFICATION BASED ON (52 ) U.S. CI. USER INTENT CPC GIOL 15/1815 (2013.01 ) ; B60K 35/00 ( 2013.01 ) ; G06F 3/167 (2013.01 ) ; (71 ) Applicant: Apple Inc., Cupertino , CA (US ) ( Continued ) (58 ) Field of Classification Search (72 ) Inventors : Thomas Robert Gruber , Emerald CPC GIOL 15/22 ; G10L 15/28 ; G1OL 15/285 ; Hills , CA (US ) ; Adam John Cheyer , GIOL 15/30 ; G1OL 15/32 ; G1OL 15/34 Oakland, CA ( US ) ; Dag Kittlaus, See application file for complete search history . Cupertino , CA ( US ) ; Didier Rene Guzzoni, Mont sur- Rolle (CH ) ; (56 ) References Cited Christopher Dean Brigham , San Jose, CA (US ) ; Richard Donald Giuli, U.S. PATENT DOCUMENTS Arroyo Grande, CA ( US ) ; Marcello 1,559,320 A 10/1925 Hirsh Bastea -Forte , Cupertino , CA (US ) ; 2,180,522 A 11/1939 Henne Harry Joseph Saddler , Berkeley , CA ( Continued ) (US ) FOREIGN PATENT DOCUMENTS ( 73 ) Assignee : Apple Inc., Cupertino , CA (US ) CA 2694314 A1 8/2010 ( * ) Notice: Subject to any disclaimer , the term of this CA 2792412 A1 7/2011 patent is extended or adjusted under 35 ( Continued ) U.S.C. 154 ( b ) by 402 days. OTHER PUBLICATIONS This patent is subject to a terminal dis claimer . Advisory Action received for U.S. Appl .No. 13 /913,336 , dated Feb. 20 , 2018 , 3 pages . ( 21 ) Appl. No .: 15 /394,162 (Continued ) ( 22 ) Filed : Dec. 29 , 2016 Primary Examiner Michael N Opsasnick ( 74 ) Attorney , Agent, or Firm - Dentons US LLP (65 ) Prior Publication Data US 2017/0178626 A1 Jun .
    [Show full text]
  • Getting to Know Siri
    Chapter 1 Getting to Know Siri In This Chapter ▶ Seeing what — or rather, who — Siri is ▶ Setting up Siri for your personal use ▶ Exploring different ways to use Siri ▶ Finding out how to get fast and reliable replies ▶ Teaching Siri what to call you ongratulations! You’re now the owner of the most defini- Ctive guide to Siri on the planet. This easy-to-read For Dummies title will teach you everything you need to know about Siri — and then some. Be prepared to master all of Siri’s amazing features, at your own pace, so you can get a lot more out of your beloved iPhone 4S. But first, a few words about my introduction to Siri, what Siri is exactly, and a bit of history. As a longtime technology reviewer, I firmly believe Siri (pro- nounced SEAR-ree) is the start of something very special, and it was love at first sight — er, speech. Here I am, sitting in the crowd at Apple’s headquarters in Cupertino,COPYRIGHTED California, on October MATERIAL 4, 2011. The exclusive press event is called “Let’s Talk iPhone,” and like many other jour- nalists and analysts in the room, I was expecting Apple’s CEO Tim Cook to take the wraps off the iPhone 5. When the iPhone 4S was initially debuted, you could sense the initial disappointment among the attendees — after all, there were so many rumors leading up to the event that it seemed inevitable that a dramatically new smartphone would be unveiled that day. 004_9781118299289-ch01.indd4_9781118299289-ch01.indd 7 33/16/12/16/12 22:51:51 PMPM 8 Siri For Dummies, Portable Edition But that letdown feeling completely vanished the moment Siri was introduced.
    [Show full text]