The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.
Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
Extracting meaningful features from speech signals and classifying them into male or female categories. Implementation of gender recognition system using Python programming. Potential of using machine learning techniques for gender recognition of voice.
Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
Способи передачі інформації, інтерфейси під’єднання та протоколи роботи пристроїв. Використання стандарту USB, технології бездротової передачі даних. Технології бездротової передачі даних на не велику відстань з малими витратами енергії через Bluetooth.
Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
Соединение таблиц с использованием оператора join, типы и формы данного процесса. Описание синтаксиса прямого и перекрестного соединения, анализ соответственных запросов. Порядок и этапы реализации операции декартова произведения двух заданных таблиц.
Insights–as–a–Service как способ аутсорсинга информационных технологий для бизнеса, ее отличия от других видов облачных решений. Основные компоненты данного сервиса, а также общий алгоритм его работы. Тенденции рынка Insights–as–a–Service решений.
Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
The main tasks of artificial intelligence: creation and work in systems of symbolic calculations, systems with fuzzy logic, cognitive psychology, understanding of natural language, creation of expert systems. Its importance in business processes.
История создания процессоров Intel и AMD. Характеристики современных процессоров для персональных компьютеров. Модельный ряд процессоров Intel и AMD. Сравнение основных преимуществ и недостатков линеек исследуемых процессоров, их характерные отличия.
Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
Разработка плагина для интегрированной среды разработки IntelliJ IDEA, позволяющего редактировать Javadoc комментарии с использованием графического интерфейса. Архитектура приложения, редактирование полей, сохранение изменений, сопровождение разработки.
The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
Peculiarities of the reception of the figure of M. Hrushevsky in cyberspace, the frequency of searching for information about him in the search engine Google, in the largest digital encyclopedia Wikipedia. Analysis of requests regarding M. Hrushevskyi.
Способ применения WiFi-модуля ESP8266, предназначенного для применения в "Интернете вещей", при разработке сложных алгоритмов управления, сборе экспериментальных данных. Использование систем компьютерной математики для моделирования работы алгоритма.
- 446. Internet security
The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
Исследование сущности и специфики использования сети Internet в режиме On-Line. Рассмотрение основных направлений использования Internet-технологий в бизнесе, выявление их преимуществ. Определение возможностей использования Web-порталов в бизнесе.
Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.
New computer arithmetics doing the parallel process of multiplying and division. A scoring in accuracy of representation of numbers is as result of the development of arithmetics. Factorizations of operands is in a basis of parallel computer arithmetics.
Облачный сервис: облачные технологии, простота инсталляции, низкий порог входа. Поэтапное внедрение, простор для разработки сценариев без обновления. Контроллер – исполнительное устройство, улучшения выполняются в программной части (высокая скорость).