• Sending messages with numbers. The study of breaking Caesar ciphers. Introduction to modular arithmetic. The process of cracking Vigenere ciphers when you know the key length. Letter frequencies in code. Using common factors to crack Vigenere ciphers.

    книга (4,5 M)
  • Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.

    практическая работа (26,5 K)
  • Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.

    статья (188,7 K)
  • An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.

    статья (49,6 K)
  • Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.

    реферат (24,4 K)
  • Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.

    статья (17,4 K)
  • This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.

    статья (411,3 K)
  • The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.

    статья (423,7 K)
  • Features and functions widget bits. Link to the base program. The structure of the appearance, inclusion of the words: verbs, adjectives, nouns. Software tools for application development, identifying a user. A inactive variants of dynamic interaction.

    лекция (442,5 K)
  • The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.

    статья (25,2 K)
  • Types of main memory: Random Access Memory and Read Only Memory. The operation of cache memory. Electrically Erasable Programmable Read Only Memory. Memory configurations for Intel CPU’s. Erasable Programmable Read Only Memory and Virtual memory.

    презентация (209,7 K)
  • A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.

    статья (14,1 K)
  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    статья (22,1 K)
  • The detailed description of the existing HRM system in the retail company. The advantages and disadvantages of its components and business intelligence applications. System drawbacks and the main directions for necessary additions and improvements.

    реферат (23,8 K)
  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    статья (110,8 K)
  • На основі the theory of plafales, показані основні кроки алгоритму конструювання базисних функцій в МСЕ на основі двовимірного симплексу — трикутника першого порядку. Конструювання базисних функцій в автоматичному режимі з компонентом штучного інтелекту.

    статья (423,0 K)
  • The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.

    презентация (1,4 M)
  • The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.

    презентация (440,6 K)
  • Transactional memory, the interface matters. Programmability is the key motivation for transactional memory. Processors support small (few memory operations) easily. Unlimited transactions are convenient for software. Virtualize transactional memory.

    презентация (89,2 K)
  • Tillypad XL как система автоматизации ресторанов, которая помогает значительно эффективнее решать актуальные, каждодневные задачи рестораторов и успешнее работать в высококонкурентной среде, ее механизмы и конфигурация, возможности и эффективность.

    контрольная работа (18,0 K)
  • Маркерный метод доступа в сети. Стандарт 802.5 как метод доступа к кольцу с передачей маркера. Функционирование сети Token Ring. Максимальное время оборота маркера. Механизм раннего освобождения токена. Конфигурация кольца и обеспечение надежности FDDI.

    реферат (430,8 K)
  • Методики проектирования технических средств, обеспечивающих использование коммуникатора или сотового телефона не только контролировать технологический процесс, но и программировать в удаленном доступе. Использование современных языков программирования.

    статья (1,3 M)
  • With the help of business intelligence (an analytical report of Power BI)tools developed visualization of rating indicators of lecturers and departments for making successful management decisions that will contribute to the quality of higher education.

    статья (997,7 K)
  • Consideration of the reception of transmedia narration and intertextuality based on the material of the game universe "Military Craft" and novels by the Finnish writer Johanna Sinisalo. The potential of using transmedia storytelling in gaming universes.

    статья (55,8 K)
  • Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.

    статья (385,2 K)
  • A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.

    лекция (66,9 K)
  • Target Server Memory Pool. A pool of memory on the target reserved for use by the Tornado tools. The target server manages the pool, keeping overhead such as block lists on the host. Additional memory is allocated from the system memory pool if needed.

    презентация (49,1 K)
  • Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.

    презентация (855,7 K)
  • Технология проектирования объектно-ориентированного программирования. Этапы разработки программных систем с использованием ООП. Унифицированный язык моделирования UML. Проектирование приложения "Магазин бытовой техники". Создание графического интерфейса.

    дипломная работа (5,3 M)
  • Понятие битов, байтов, килобайтов, их измерение. Основные черты файловой системы. Графический интерфейс и компьютерная интернациональность. Учет прикладных программ. Поиск и загрузка ресурсов, шрифтов. Удаленный доступ и подключение через модем.

    книга (5,3 M)