The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.
Основи інтегрування системи для динамічного і частотного аналізу методом кінцевих елементів в Autodesk Inventor. Особливості функціонування програмного комплексу Impact, методи оптимізації плагіну. Характеристика інструментального інтерфейсу програми.
Principles of development of the markets of the National Technological Initiative "AutoNet", aimed at the creation of unmanned vehicles. Ways of modernization of the motor transport network and its prospects. The need to develop a roadmap "AutoNet".
The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
- 396. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
- 397. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Proposing to use complex methods to improve the efficiency of solving linear programming problems using large-scale classical approaches and technologies parallel processing CUDA. Specificity of program and algorithmic features use of the technology.
Hardware-in-the-loop test bench for testing and verification navigational equipment structure is investigated. Equation for determination hardware-in-the-loop test bench for testing and verification navigational equipment effectiveness is determined.
- 399. Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.
Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
- 403. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.
Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.
Способи передачі інформації, інтерфейси під’єднання та протоколи роботи пристроїв. Використання стандарту USB, технології бездротової передачі даних. Технології бездротової передачі даних на не велику відстань з малими витратами енергії через Bluetooth.
Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
Соединение таблиц с использованием оператора join, типы и формы данного процесса. Описание синтаксиса прямого и перекрестного соединения, анализ соответственных запросов. Порядок и этапы реализации операции декартова произведения двух заданных таблиц.