Информация о социальной сети Facebook, история ее основания, количество ежедневных пользователей. Оформление сайта, его отличие от "ВКонтакте", список доступных возможностей для пользователей. Преимущество и удобство "ВКонтакте" для посетителя сайта.
- 362. Facebook: how to use
Facebook as a social networking service launched in February 2004. Facts and expert’s opinion concerning using it. Join common-interest user groups or organized by workplace. Update like enough to keep your page interesting. Questions for beginners.
Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.
Эффективность использования FSD в контексте персонального проекта и его положительном влиянии на стандартизацию разработки, упрощение навигации по кодовой базе и облегчение адаптации новых сотрудников. Компоненты приложения, их функции и взаимодействия.
Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.
Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.
Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.
Research of the problem of training IT industry specialists, experience in teaching the basics of programming to educational applicants. Description of the Applied Technologies that contribute to the formation of competencies of IT industry specialists.
Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
- 373. Flash-память
Изобретение флэш-памяти. Энергонезависимая перезаписываемая полупроводниковая память. Ячейка флэш-памяти. Преимущества флэш-памяти перед жесткими дисками и носителями CD-ROM. Стирание содержимого ячеек, скорость записи, оптимизация быстродействия.
- 374. Flash-память
Что такое Flash-память. Процесс записи и стирания информации для ячеек NOR и NAND. Основные характеристики Flash-памяти. Сравнение времени доступа, скорости чтения и записи Flash-памяти разных производителей. Карты Flash-памяти. USB Flash-диски.
FlexMaster System box with sequences for root canals. Torque-controlled rotary motion. The cutting blade design of K-type files. FlexMasters instruments are among the most comprehensively investigated rotary NiTi instruments. Geometry, design of files.
The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.
Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
Type theory introduced by Russell and Whitehead to overcome a paradox found in Frege’s work. The design of lambda-calculus in functional programming languages. The isomorphism between concepts of logic and concepts in type theory and programming.
The article is devoted to the issue of development and application of an interactive electronic textbook for students of "Applied Mechanics" and "Industrial Mechanical Engineering" from the discipline "English". Integration of an interactive e-textbook.
Изучение внешнего вида программы. Построение страницы в режиме "конструктор" и "код". Выбор темы и фоновых рисунков. Вставка гиперссылки, фотоколлекции, таблиц. Детальное описание процесса создания сайта. Использование таблиц для выравнивания текста.
Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
- 383. Funds of the library
Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
- 384. Game Guides
Анализ особенностей выбора операционной системы, для которой будет разрабатываться приложение. Характеристика основ определения среды разработки. Проведение тестирования приложения на работоспособность. Исследование основных сайтов, посвященные играм.
- 385. Gamifying "Whole-person education": the development of a mobile application with augmented reality
Description of the development of a gaming mobile application that integrates augmented reality. Augmented reality and gamification "Formation of a holistic personality" as educational strategies in learning in the period of innovative technologies.
Настройки отображения комментариев на диаграмме. Рассмотрение простой задачи по созданию календарного плана-графика проекта. Формирование списка официальных праздников. Сохранение проекта, экспорт-импорт данных. Календарное планирование проектных работ.
Gartner Hype Cycle methodology як спроба виявлення закономірностей розвитку сучасних інформаційно-комунікаційних технологій. Розробка та використання в сферах життєдіяльності людини NBIC-технологій. Сфера інформаційних і комунікаційних технологій.
Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
A wireless sensor network of distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network. The analysis of models of wireless sensor network with random access is presented.