• Принцип устройства CD дисков. Особенности наиболее распространенных видов их повреждений. Анализ методов их устранения: применение различных красителей, использования свойства поверхностного натяжения, полировка с применением паст и подручных средств.

    доклад (16,9 K)
  • Анализ устройства лазерного и компакт-диска. Изучение CD-дисков и типов информации, которая может на них сохраняться (звуко-, видеозапись, компьютерная информация). Отличия лазерных дисков, на которые записывается преимущественно программное обеспечение.

    реферат (11,9 K)
  • The main situations and problems that inevitably arise during the work of testing engineers, which can be solved by using mobile applications in the Charles program. Conducting testing of mobile applications on iOS and Android operating systems.

    статья (661,7 K)
  • Learn the basic requirements when choosing a printer: manufacturer, print speed and quality, comfort of use. Types of home printers, their advantages and disadvantages. The principle of operation of multi-function devices, inkjet and laser printers.

    презентация (2,1 M)
  • Методы churn modeling, их преимущества и недостатки. Сравнение методов машинного обучения, которые могут помочь улучшить точность прогноза оттока клиентов. Оценки их эффективности с помощью метрик качества: точность, auc, precision, recall и fl-score.

    статья (11,0 K)
  • Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.

    статья (427,0 K)
  • Development of classification method, graphic and text area of the image. Building a narrative function that characterizes the size of objects in the picture. Consideration the classification of text and graphic regions on a fragment of document image.

    статья (427,0 K)
  • Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.

    статья (427,0 K)
  • Модель выполнения кода в среде CLR. Развертывание и администрирование приложений и типов. Совместно используемые сборки и сборки со строгим именем. Проектирование примитивных, ссылочных и значимых типов. Асинхронные вычислительные операции в программе.

    книга (5,8 M)
  • Code switching as an aspect of studying results within the framework of the theory of language contacts. The structure of a sentence at the level of its morphological and syntactic structures, the nature of linguistic borrowings in a synchronous plan.

    статья (948,7 K)
  • Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.

    книга (2,2 M)
  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга (4,7 M)
  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие (1,8 M)
  • Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.

    книга (8,4 M)
  • Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.

    лекция (250,1 K)
  • The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.

    статья (347,5 K)
  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья (190,1 K)
  • General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.

    статья (34,2 K)
  • Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".

    реферат (613,9 K)
  • Silicon Valley - home to many of the world's largest technology corporations as well as thousands of small startups. Zhongguancun as a technology hub in Haidian District, Beijing, China. Features of notable education and research centers in the USA.

    доклад (11,5 K)
  • Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.

    статья (171,8 K)
  • Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.

    статья (51,6 K)
  • Application an extension of the well-known Abadi-Rogaway logic with hashes. Description extends Micciancio and Warinschi's completeness result for the original logic to this setting, interpretation of this extension using Canetti's oracle hashing.

    статья (182,3 K)
  • Radix-22 Algorithms has been chosen to implement and the different blocks in the architecture. After implementing the blocks, the complex multiplier implementation has been done in four different approaches starting from the basic complex multiplication.

    дипломная работа (4,3 M)
  • An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.

    книга (8,8 M)
  • Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.

    книга (7,0 M)
  • The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.

    лабораторная работа (1,7 M)
  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    статья (313,3 K)
  • Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.

    статья (192,7 K)
  • Disclosure as a mechanism to identify lines with Romanian chromatic words on the basis of computer technologies as a stage in the development of a dictionary of poetic meanings of colors. The collaboration of computer science specialists and linguists.

    статья (192,7 K)