• Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.

    статья (14,4 K)
  • Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.

    статья (49,0 K)
  • Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

    реферат (680,6 K)
  • A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - а semantic cyber-physical system approach.

    статья (887,7 K)
  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    статья (885,4 K)
  • The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.

    статья (497,9 K)
  • The characteristics and features of the method for assessing the changes of health system with multiple levels of efficiency, depending on the state change of its elements. The essence, the specificity of logical differential calculus, multivalue logic.

    статья (326,4 K)
  • In a scientific article, attention is paid to a subject that has evolved from the stage of a futuristic description as a buzzword to the realization of its emergence and consistent deployment - artificial intelligence (hereinafter referred to as AI).

    статья (16,1 K)
  • The improving the network traffic analysis systems, including deep analysis systems, taking into account existing threats and vulnerabilities of network equipment and software of computer networks based on methods and algorithms of machine learning.

    статья (8,8 K)
  • The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.

    статья (13,1 K)
  • The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.

    статья (127,7 K)
  • The submission of a fully closed model of the turbulent boundary layer, obtained from the Navier-Stokes equations. Study of numerical solutions of equations system of turbulent migration of impurities in the surface atmospheric layer for a large scale.

    статья (589,8 K)
  • Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.

    дипломная работа (964,6 K)
  • TLS – современный протокол безопасной передачи данных по небезопасной сети, который пришел на смену SSL, который уже не рекомендуется к использованию. Принцип работы TLS (TLS Record и TLS Handshake). TLS-сертификаты. Алгоритмы, использующиеся в TLS.

    реферат (866,9 K)
  • Характеристика архітектури мереж Token Ring з кільцевою логічною топологією і детермінованим методом доступу. Визначення головних форматів кадрів. Розгляд фізичного рівню технології Token Ring. Головні аспекти підключення станції до концентратору.

    курсовая работа (46,9 K)
  • Research of the effectiveness of using the Blender 3D software for independent and individual work of students. Creating videos, creating and editing videos with video resources. Organization of video conferencing during online classes and seminars.

    статья (960,1 K)
  • Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.

    материалы конференции (3,8 M)
  • Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.

    статья (748,2 K)
  • Поняття та структура програмного забезпечення Total Commander як файлового менеджера Windows, подібно Провіднику, оцінка його можливостей. Загальний вигляд екрана та призначення функціональних клавіш. Робота з дисками, папками (каталогами) і файлами.

    методичка (253,2 K)
  • Использование принципа пошагового контроля целостности для гарантированной защиты данных от несанкционированного доступа. Применение аппаратных модулей доверенной загрузки на IBM-совместимых средствах вычислительной техники архитектуры x86/x86-64.

    статья (21,9 K)
  • Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.

    курс лекций (10,2 M)
  • An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.

    дипломная работа (1,5 M)
  • Экспертные системы как сложные программные комплексы, аккумулирующие знания специалистов в конкретных предметных областях и тиражирующие этот эмпирический опыт. Их структура и компоненты, отличия от других программ, а также основополагающие функции.

    контрольная работа (123,9 K)
  • The purpose of the article is to consider the concept of a trusted digital repository (TDR) - not only in a broad context, but also in fundamental terms, in evaluating the efforts of professionals to set up processes and technical infrastructure.

    статья (39,4 K)
  • The model of the turbulent boundary layer over a rough surface is presented. The roughness density effect on the shift of the mean velocity logarithmic profile has been estimated in the case of 2D and 3D roughness elements. Surface layer transformation.

    статья (673,3 K)
  • Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.

    статья (2,5 M)
  • Эволюция BIOS (basic input/output system). Интерфейс между операционной системой и микропрограммами, управляющими низкоуровневыми функциями оборудования. Этапы загрузки BIOS и UEFI. Платформы, использующие EFI или инструментарий. Операционные системы.

    контрольная работа (774,1 K)
  • Анализ возможных действий клиента и разработка диаграммы вариантов использования. Описание отношений классов и формирование соответствующей схемы. Компоненты и анализ диаграмм деятельности, размещения, состояний, кооперации и последовательности.

    контрольная работа (621,0 K)
  • Разработка в Rational Rose модели терминала приема платежей, которая содержит следующие диаграммы: диаграмма бизнес-прецедентов, диаграмма классов бизнес-анализа, диаграмма видов деятельности основного сценария процесса, диаграмма состояний.

    практическая работа (398,6 K)
  • Introduction to cryptography and data security. The study of random numbers and an unbreakable stream cipher. The data encryption standard and alternatives. Practical aspects of public-key cryptography. Principles of message authentication codes.

    книга (3,7 M)