- 181. CD – новая жизнь
Принцип устройства CD дисков. Особенности наиболее распространенных видов их повреждений. Анализ методов их устранения: применение различных красителей, использования свойства поверхностного натяжения, полировка с применением паст и подручных средств.
Анализ устройства лазерного и компакт-диска. Изучение CD-дисков и типов информации, которая может на них сохраняться (звуко-, видеозапись, компьютерная информация). Отличия лазерных дисков, на которые записывается преимущественно программное обеспечение.
The main situations and problems that inevitably arise during the work of testing engineers, which can be solved by using mobile applications in the Charles program. Conducting testing of mobile applications on iOS and Android operating systems.
- 184. Choosing a printer
Learn the basic requirements when choosing a printer: manufacturer, print speed and quality, comfort of use. Types of home printers, their advantages and disadvantages. The principle of operation of multi-function devices, inkjet and laser printers.
Методы churn modeling, их преимущества и недостатки. Сравнение методов машинного обучения, которые могут помочь улучшить точность прогноза оттока клиентов. Оценки их эффективности с помощью метрик качества: точность, auc, precision, recall и fl-score.
Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.
Development of classification method, graphic and text area of the image. Building a narrative function that characterizes the size of objects in the picture. Consideration the classification of text and graphic regions on a fragment of document image.
Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.
Модель выполнения кода в среде CLR. Развертывание и администрирование приложений и типов. Совместно используемые сборки и сборки со строгим именем. Проектирование примитивных, ссылочных и значимых типов. Асинхронные вычислительные операции в программе.
Code switching as an aspect of studying results within the framework of the theory of language contacts. The structure of a sentence at the level of its morphological and syntactic structures, the nature of linguistic borrowings in a synchronous plan.
Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.
Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.
- 195. Cognitive models
Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.
The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.
Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".
Silicon Valley - home to many of the world's largest technology corporations as well as thousands of small startups. Zhongguancun as a technology hub in Haidian District, Beijing, China. Features of notable education and research centers in the USA.
Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
Application an extension of the well-known Abadi-Rogaway logic with hashes. Description extends Micciancio and Warinschi's completeness result for the original logic to this setting, interpretation of this extension using Canetti's oracle hashing.
Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.
An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
- 206. CompTIA Security+
Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.
The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.
Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.
Disclosure as a mechanism to identify lines with Romanian chromatic words on the basis of computer technologies as a stage in the development of a dictionary of poetic meanings of colors. The collaboration of computer science specialists and linguists.