Review of the features and abilities of content-monitoring of national segment inside the Internet
Journal Title: Реєстрація, зберігання і обробка даних - Year 2016, Vol 18, Issue 3
Abstract
On the example of the Chinese segment of network information space the main comparative characteristics of representation of a national information resource and a world segment of the Internet are considered. Abilities to collect of the Chinese segment of the content by using RSS feeds and software tools for web resources monitoring are shown. Tabl.: 1. Fig.: 18. Refs: 31 titles.
Authors and Affiliations
D. Lande, B. Berezin, V. Dodonov
Prediction of lifetime of data storage on optical disks
The results of analysis of usage of accelerated guaranteed information lifetime estimation methods are presented. Particular attention is paid to testing of media for long-term storage of information. The main causes of...
Functionally oriented model of adaptive short-term forecasting of electrical load
A method for adaptively selecting of threshold projected wavelet coefficients and the method of electrical load forecasting by segmenting the information signal on the low and high frequency components have been proposed...
A study of efficiency usage of representations for functions of hype-complex variable
It is investigated the reduction of the amount of calculation when using representations for functions of hyper-complex variable such as exponent, trigonometric and hyperbolic ones as compared with their direct calculati...
Features of the ultrasonic welding of optical mikroprismatic elements wih a dosing of energy
Because of the existence of thermal defects of the microstructure as result of ultrasonic welding of optical elements on the basis of microprism the permissible range of absorbed ultrasound energy is significantly reduce...
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
For error-correcting codes, it is introduced the concept of the integrity of the signs of collisions and showed that their presence leads to the recipient before the message undetected, often deliberate modification, and...