• главная
  • рубрики
  • по алфавиту
  • реклама на сайте
  • обратная связь
коллекция "otherreferats"
Главная Коллекция "Otherreferats" I
  • 0..9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

  • А
  • Б
  • В
  • Г
  • Д
  • Ґ
  • Е
  • Є
  • Ё
  • Ж
  • З
  • И
  • І
  • Ї
  • Й
  • К
  • Л
  • М
  • Н
  • О
  • П
  • Р
  • С
  • Т
  • Ќ
  • У
  • Ў
  • Ф
  • Х
  • Ц
  • Ч
  • Ш
  • Щ
  • Э
  • Ю
  • Я
  • 661. Information and computer technologies for assessing the effectiveness of educational processes in EU universities

    Aspects of the application of information and computer technologies in educational processes to assess their effectiveness in European universities. Requirements of European educational standards that affect the structure and methods of teaching.

    статья (20,6 K)
  • 662. Information and computer technologies in physical education and sports

    Modern requirements for the athlete in game sports. The search for effective means and methods of teaching basketball. Creation of a computer system for accounting and analysis of training loads. Control over the level of physical fitness of the players.

    статья (281,3 K)
  • 663. Information and criminal cases of polish law enforcement agencies against the Ukrainians during the period of Carpathian Ukraine as a statistical source

    In the scientific article, the author analyzed the time of illegal crossing of the Polish-Czechoslovak border by Ukrainians, the forms of participation of volunteers in the life of Carpathian Ukraine, and the number of people killed in confrontations.

    статья (34,2 K)
  • 664. Information and psychological warfare in the context of the war between Azerbaijan and Armenia

    The purpose of the this paper is to highlight the development of information- psychological warfare, its history, concepts, technologies and methods, which are one of the most important areas of work in the field of modern international relations.

    статья (38,6 K)
  • 665. Information as a weapon: features of application in modern realities

    The features of using information as a weapon in modern society. As of today, information legal relations are rapidly developing, which is due to scientific progress, the use of innovative technologies and the emergence of new information resources.

    статья (19,5 K)
  • 666. Information competence as an important component of a modern foreign language teacher’s professionogram

    The importance of information competence as a necessary component of professional training of a modern foreign language teacher; as the ability of a teacher to work effectively with information, use information technologies to achieve educational goals.

    статья (22,4 K)
  • 667. Information competence formation in international medical students: motivation-targetive criterion

    Determination of indicators of the level of information competence, which include cognitive interest in information activity, attitude to the acquisition of competence. Awareness of the need for lifelong learning, the desire to perceive new information.

    статья (39,3 K)
  • 668. Information engineering and activity of libraries

    Modern library activity as information engineering. Sorting, systematization, protection, promotion and use of information in the classical library. Introduction of modern information technologies for the formation, storage and use of library funds.

    статья (19,7 K)
  • 669. Information exchange tools in the financial monitoring system of the usa and benchmarking for Ukraine

    The relevance of the study is determined by the high risks of legalization of funds and financing of terrorism in the Ukrainian economy and the risks of conducting financial transactions related to states that carry out armed aggression against Ukraine.

    статья (1,3 M)
  • 670. Information exposure of microorganisms to extremely low frequency electromagnetic waves: usefulness for space medicine

    The basis for effects of electromagnetic radiation on microorganisms. Specific effects on microorganisms by the Apparatus "KSK-BARS". The treatment of participants in space missions as an to antibacterial and antiviral therapy by non-pharmaceutic means.

    статья (121,0 K)
  • 671. Information Hiding

    Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций (17,6 M)
  • 672. Information linguistics as one of the newest areas of linguistic research

    Goals and characteristics of the areas of cognitive linguistics. Analysis of the interaction of the information subsystem of the language with other communication systems of the environment. Language unit as a type of information and virtual objects.

    статья (17,2 K)
  • 673. Information literacy as a factor of success at lateral reading

    Shifting liability for trust. Literacy research. Feature of vertical and side reading. Impact of fake news on the audience. Using web search during a validation task. Applying of lateral reading by respondents with a high level of information literacy.

    дипломная работа (267,8 K)
  • 674. Information model of computer-aided design environment

    Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья (574,9 K)
  • 675. Information modelling and knowledge bases XVII

    Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.

    книга (6,4 M)
  • 676. Information portal of the enterprise of high-tech business: diagnostics, modernization

    Research tasks for the modernization of the site of the enterprise. Determination of critical areas in the development of the enterprise as a diversified structure. Methodical support of high-tech business management in the field of information portal.

    статья (14,5 K)
  • 677. Information protection in computer networks

    The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья (285,8 K)
  • 678. Information revelation and certification intermediaries

    The role of intermediaries in search the information of private. Revealed to uninformed parties. Strategic manipulation of certification. The choice a monopoly intermediary. Capture a large share of the surplus. The competition among intermediaries.

    статья (405,1 K)
  • 679. Information Security and Privacy

    Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    книга (6,1 M)
  • 680. Information security as a component of Ukrainian national security

    The importance and role of information security in the context of ensuring the national security of the state. Analysis of the main threats to information security, such as cyber attacks, consideration of strategic approaches to their neutralization.

    статья (18,6 K)
  • 681. Information security fundamentals

    The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.

    книга (4,8 M)
  • 682. Information security in computer systems

    Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа (1,6 M)
  • 683. Information security management: american experience

    The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    статья (940,0 K)
  • 684. Information security of public sphere bodies

    The tasks of information provision of public authorities. Role in securing the state apparatus of information management for the adoption and resolution of state, local and district current issues. Legal and informational aspects of the indicated issues.

    статья (1,1 M)
  • 685. Information security of the public governance system in the conditions of digitalization

    The need for management decisions to ensure information security. Consideration of the comprehensive policy aimed at preventing and combating cybercrime. Implementation of the official line of information security in the context of digitalization.

    статья (95,7 K)
  • 686. Information security, coding theory and related combinatorics

    Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие (4,8 M)
  • 687. Information security: key threats and remedies

    Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья (1,4 M)
  • 688. Information security: role of national stability, mobilization and territorial defense

    It was the determined that the definition of the management process, mode of operation and monitoring of the relevant industry is also relevant to the issue of information openness in the field of civil protection. The latter should be based on.

    статья (18,4 K)
  • 689. Information space of controlling information in the context of joint activities: economic security aspect

    The category of "information space of controlling". Such an approach made it possible to identify the main centres of its production and specific features of different types of controlling information, their role in the process of enterprise management.

    статья (21,0 K)
  • 690. Information structure of comparisons of inequality in old english riddles

    Comparison - a means to overload, confuse and puzzle the recipient in order to block easy ways to solve the riddle. Analysis of the main reasons for violation of the canonical principle of information structure in comparisons of old english riddles.

    статья (23,1 K)

Страница:

  •  « 
  •  18 
  •  19 
  •  20 
  •  21 
  •  22 
  •  23 
  •  24 
  •  25 
  •  26 
  •  27 
  •  28 
  •  » 
  • главная
  • рубрики
  • по алфавиту
  • Рубрики
  • По алфавиту
  • Закачать файл

© 2000 — 2025, ООО «Олбест» Все наилучшее для вас