The detailed description of the existing HRM system in the retail company. The advantages and disadvantages of its components and business intelligence applications. System drawbacks and the main directions for necessary additions and improvements.
Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.
Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - а semantic cyber-physical system approach.
The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
The characteristics and features of the method for assessing the changes of health system with multiple levels of efficiency, depending on the state change of its elements. The essence, the specificity of logical differential calculus, multivalue logic.
- 727. The theory of plafales: новий підхід до конструювання базисних функцій на трикутнику першого порядку
На основі the theory of plafales, показані основні кроки алгоритму конструювання базисних функцій в МСЕ на основі двовимірного симплексу — трикутника першого порядку. Конструювання базисних функцій в автоматичному режимі з компонентом штучного інтелекту.
In a scientific article, attention is paid to a subject that has evolved from the stage of a futuristic description as a buzzword to the realization of its emergence and consistent deployment - artificial intelligence (hereinafter referred to as AI).
The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.
The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.
The submission of a fully closed model of the turbulent boundary layer, obtained from the Navier-Stokes equations. Study of numerical solutions of equations system of turbulent migration of impurities in the surface atmospheric layer for a large scale.
- 733. Tillypad XL
Tillypad XL как система автоматизации ресторанов, которая помогает значительно эффективнее решать актуальные, каждодневные задачи рестораторов и успешнее работать в высококонкурентной среде, ее механизмы и конфигурация, возможности и эффективность.
TLS – современный протокол безопасной передачи данных по небезопасной сети, который пришел на смену SSL, который уже не рекомендуется к использованию. Принцип работы TLS (TLS Record и TLS Handshake). TLS-сертификаты. Алгоритмы, использующиеся в TLS.
- 735. Token Ring
Характеристика архітектури мереж Token Ring з кільцевою логічною топологією і детермінованим методом доступу. Визначення головних форматів кадрів. Розгляд фізичного рівню технології Token Ring. Головні аспекти підключення станції до концентратору.
Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
- 737. Total Commander
Поняття та структура програмного забезпечення Total Commander як файлового менеджера Windows, подібно Провіднику, оцінка його можливостей. Загальний вигляд екрана та призначення функціональних клавіш. Робота з дисками, папками (каталогами) і файлами.
Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.
Методики проектирования технических средств, обеспечивающих использование коммуникатора или сотового телефона не только контролировать технологический процесс, но и программировать в удаленном доступе. Использование современных языков программирования.
With the help of business intelligence (an analytical report of Power BI)tools developed visualization of rating indicators of lecturers and departments for making successful management decisions that will contribute to the quality of higher education.
Consideration of the reception of transmedia narration and intertextuality based on the material of the game universe "Military Craft" and novels by the Finnish writer Johanna Sinisalo. The potential of using transmedia storytelling in gaming universes.
An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.
Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.
Экспертные системы как сложные программные комплексы, аккумулирующие знания специалистов в конкретных предметных областях и тиражирующие этот эмпирический опыт. Их структура и компоненты, отличия от других программ, а также основополагающие функции.
A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.
Target Server Memory Pool. A pool of memory on the target reserved for use by the Tornado tools. The target server manages the pool, keeping overhead such as block lists on the host. Additional memory is allocated from the system memory pool if needed.
Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
Анализ возможных действий клиента и разработка диаграммы вариантов использования. Описание отношений классов и формирование соответствующей схемы. Компоненты и анализ диаграмм деятельности, размещения, состояний, кооперации и последовательности.
Introduction to cryptography and data security. The study of random numbers and an unbreakable stream cipher. The data encryption standard and alternatives. Practical aspects of public-key cryptography. Principles of message authentication codes.
- 750. UNIX для всех
Понятие битов, байтов, килобайтов, их измерение. Основные черты файловой системы. Графический интерфейс и компьютерная интернациональность. Учет прикладных программ. Поиск и загрузка ресурсов, шрифтов. Удаленный доступ и подключение через модем.