• Proposing to use complex methods to improve the efficiency of solving linear programming problems using large-scale classical approaches and technologies parallel processing CUDA. Specificity of program and algorithmic features use of the technology.

    статья (102,5 K)
  • The performance of transmission Multi Input Multi Output beamforming for the multi subscriber in large cell with effective channel throughput has been investigated. Singular value decomposition (SVD) using Single User in 3GPP Long Term Evolution (LTE).

    статья (528,4 K)
  • Hardware-in-the-loop test bench for testing and verification navigational equipment structure is investigated. Equation for determination hardware-in-the-loop test bench for testing and verification navigational equipment effectiveness is determined.

    статья (381,0 K)
  • Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.

    презентация (1,1 M)
  • Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.

    статья (117,5 K)
  • Характеристика Industrial Ethernet как это мощных вычислительных сетей, соответствующих международным стандартам. Анализ скоростей передачи данных по витой паре или оптоволоконному кабелю Industrial Ethernet. Резервирование связей в сетях Ethernet.

    реферат (854,3 K)
  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    курс лекций (393,9 K)
  • Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.

    презентация (1,3 M)
  • Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций (17,6 M)
  • Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья (574,9 K)
  • Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.

    книга (6,4 M)
  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья (285,8 K)
  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    книга (6,1 M)
  • The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.

    книга (4,8 M)
  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа (1,6 M)
  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    статья (940,0 K)
  • Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.

    учебное пособие (4,8 M)
  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья (1,4 M)
  • Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.

    реферат (60,4 K)
  • Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.

    статья (164,1 K)
  • The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

    статья (24,6 K)
  • With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.

    статья (33,4 K)
  • Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.

    презентация (580,8 K)
  • Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.

    статья (803,6 K)
  • Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.

    презентация (587,8 K)
  • Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.

    статья (433,3 K)
  • Способи передачі інформації, інтерфейси під’єднання та протоколи роботи пристроїв. Використання стандарту USB, технології бездротової передачі даних. Технології бездротової передачі даних на не велику відстань з малими витратами енергії через Bluetooth.

    курсовая работа (129,3 K)
  • Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.

    статья (292,0 K)
  • Соединение таблиц с использованием оператора join, типы и формы данного процесса. Описание синтаксиса прямого и перекрестного соединения, анализ соответственных запросов. Порядок и этапы реализации операции декартова произведения двух заданных таблиц.

    контрольная работа (228,0 K)
  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга (5,5 M)