The characteristics and features of the topic model in the form of stochastic matrices, their purpose and application. Creation and distinctive features of the new algorithm to build a Sub-hierarchy Galois, the specificity of the visualization tools.
Характеристика систем сбора и передачи данных, построенных на платформе tagnet. Исследование и анализ структуры тега. Определение сущности буферной передачи, которая используется при передачи данных в системы, требующие гарантированной доставки.
- 543. Task models
Methods to analyse people's jobs. Approaches to task analysis. Development of the script processing, review grammar. Description of the procedure subtasks, hierarchical evaluation tasks using temporary operators. Refinement description of the model.
Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.
Analysis of the prospects for using artificial intelligence technologies in the field of photo processing. Research of modern technologies and AI methods that are used in processing photo materials. Review of areas of AI use in image processing.
The application of NBIC technologies, combining ideas of nano-, bio-, information and communication technologies and robotics. Prospects of using these technologies in the management of production processes, interaction between the state and society.
Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.
Assessing the acceptability of the developed IDE. C-SOLVIS is a web-based application designed to facilitate the teaching and learning of C programming in higher education institutions. An iterative prototyping process followed by program creation.
The working with excel. The basic operations in the work: creating, editing, copying, removing different data. Editing the cell by using the formula bar and by double-clicking, using the formatting toolbar. Changing the font size and formatting numbers.
- 550. The bias of the initial information flows intensities estimates of the global cyber-physical network
Forecasting the development of the statistical reporting network. Improving the accuracy of predicting the development of the Internet of things in the context of the dynamics of primary information flows. Deterministic models of mathematical programming.
- 551. The bias of the initial information flows intensities estimates of the global cyber-physical network
Estimation of input flow intensities measured by the number of devices connected to the CPS (accumulated, living things plus unliving things) as a function of accumulated product flows. Statistics on the number of non-living devices connected to the CPS.
The purpose of the scientific work is to identify the features of the use of cloud computing in higher educational institutions for colleges and universities. The risks and benefits of cloud architecture are considered. Analysis main activities.
- 553. The code book
The history of codes and ciphers as the story of the centuries-old battle between codemakers and codebreakers, an intellectual arms race that has had a dramatic impact on the course of history. The mechanization of secrecy. A qantum leap into the future.
The comparison of the computer development in the USA and Ukraine. At the time when the computer science was just uprising this two countries were one of the most noticeably influential. Howard Aiken's contributions to the development of the computer.
- 555. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
Sending messages with numbers. The study of breaking Caesar ciphers. Introduction to modular arithmetic. The process of cracking Vigenere ciphers when you know the key length. Letter frequencies in code. Using common factors to crack Vigenere ciphers.
Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.
An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
The invention of the computer. Babbage's demonstration model mechanical calculator. Sequence of operations for column. The logical structure of the Analytical Engine. The programming language. Mechanical calculation device based on the design in 1853.
Features and functions widget bits. Link to the base program. The structure of the appearance, inclusion of the words: verbs, adjectives, nouns. Software tools for application development, identifying a user. A inactive variants of dynamic interaction.
The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
- 567. The Main memory
Types of main memory: Random Access Memory and Read Only Memory. The operation of cache memory. Electrically Erasable Programmable Read Only Memory. Memory configurations for Intel CPU’s. Erasable Programmable Read Only Memory and Virtual memory.
Method of continuous pumping of fluids and reagents through the analytical module and detector in the respective volume relations with a fixed speed using an electromagnetic pump. The design parameters and optimum operating conditions of the pump.
A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.
Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.