• Develop a mechanism that identifies the line with Romanian chromatic words on the basis of computer technologies. The first phase of development of the dictionary meanings of poetic colors. Cooperation of linguists and specialists in informatics.

    статья (192,7 K)
  • Stages of development and analysis of the effectiveness of the mechanism, which will help identify the line with Romanian chromatic words on the basis of computer technology as the first phase of development of the dictionary meanings of poetic colors.

    статья (192,7 K)
  • The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.

    статья (194,4 K)
  • History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.

    курсовая работа (436,0 K)
  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    лекция (1,5 M)
  • Programming of Intel microprocessors. Studying systems on universal microprocessors and problems of its programming. The scheme and the description of laboratory installation, variants of tasks and order of the laboratory work execution are presented.

    лабораторная работа (187,1 K)
  • The results of program modeling of biological "molecular current generator" are described. Simulation was done on the base of experimental studying of electrical currents through molecular channel-receptor complex in membrane of natural brain neurons.

    статья (522,2 K)
  • Consideration and analysis of nanoelectronic three-input element "and", which consists of five tunnel junctions, three capacitors and four voltage sources. Consideration and characteristic features of the single-electron circle with tunnel junctions.

    статья (496,8 K)
  • Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.

    статья (376,5 K)
  • Learning English for working with the computer and other information technology. Working with computer programs, discussion of problems and project planning. Use for intermediate level students and above. Using software: useful verbs, the control panel.

    учебное пособие (787,8 K)
  • One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.

    статья (198,2 K)
  • Основное назначение CorelDRAW. Этапы построения преобразования перспективы, ее добавление к объекту и инструменты, необходимые для осуществления данных операций. Приемы в CorelDRAW: добавление и настройка фаски, заливка, подсветка тела экструзии.

    контрольная работа (1,2 M)
  • Тeopeтичecкиe acпeкты opгaнизaции cиcтeмы упpaвлeния элeктpoнным дoкумeнтooбopoтoм в opгaнизaции. Дoкумeнтaциoннoe oбecпeчeниe и анaлиз движeния дoкумeнтoв. Пoлитикa лицeнзиpoвaния "1C: Дoкумeнтooбopoт 8". Лицeнзии нa дoпoлнитeльныe paбoчиe мecтa.

    курсовая работа (477,4 K)
  • Rule of formation of positional structural and weight numbers with variable length that provides potential for implementation of the principle of a codes formation on the code word’s maximum filling of the given length in the conditions of an exception.

    статья (287,2 K)
  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга (17,1 M)
  • Система взаимоотношения с клиентами как эффективный инструмент развития бизнеса. Прикладное программное обеспечение для организаций, предназначенное для автоматизации стратегий взаимодействия с заказчиками. Классификации CRM-систем и их возможности.

    реферат (1,6 M)
  • CRM — модель взаимодействия, полагающая, что центром всей философии бизнеса является клиент. Средства автоматизации (программные приложения) CRM-стратегии. Проблемы, возникающие при отсутствии единой системы CRM. Взаимодействие между отделами компании.

    реферат (21,6 K)
  • Рассмотрение CRM-систем как инструмента совершенствования деятельности организаций и обеспечения защиты информации при работе в условиях цифровой экономики. Необходимость повышения качества взаимодействия с клиентами. Комплексная защита информации.

    статья (18,9 K)
  • The relevance of the problem of integrating crowdsourced data and artificial intelligence technologies into online platforms for volunteer initiatives is becoming more and more obvious. The integration of crowdsourcing and AI has significant potentialю

    статья (26,9 K)
  • Finding Small Solutions to Univariate and Bivariate Polynomial Congruences. The RSA Public Key Cryptosystem. Coppersmith Attack on Short Random Pads. Cryptanalysis via the Defining Equation. The Lattice Factoring Method. Improved Determinant Bounds.

    диссертация (498,9 K)
  • Random generators for cryptographic applications. Evaluation criteria for the principle design. Multiplication in binary extension fields. Time simulations and spectral algorithms. Limits on the maximum clock frequency of pipelined architectures.

    учебное пособие (9,3 M)
  • The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.

    курс лекций (4,9 M)
  • Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.

    курс лекций (14,5 M)
  • Resistance of randomized projective coordinates against power analysis. Energy-efficient software implementation of long integer modular arithmetic. Special hardware sieving device for factoring 1024-bit integers. Hardware attacks and countermeasures.

    курс лекций (15,8 M)
  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие (1,6 M)
  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    книга (6,6 M)
  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга (57,2 M)
  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    книга (3,7 M)
  • Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

    книга (1,5 M)
  • The book is organized into three parts. The first part covers private-key cryptography. Chapters 4-9 concern the main topics in public-key cryptography. The remaining four chapters provide introductions to four active research areas in cryptography.

    книга (10,7 M)