Дослідження актуальності заміни стандартної реалізації гіпертекстової розмітки HTML та стилей CSS на спрощену розмітку HAML та скриптову метамову SASS, яка інтерпретується в каскадні таблиці стилів CSS, при написанні клієнтської частники веб-сайту.
The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
- 273. History of Laptops
The laptop as a portable personal computer, in the case of which combined typical PC components, including display, keyboard, and the device instructions and the battery. Active matrix display technology and color screens. Wireless: Enabler for Mobility.
Создание и использование форм в WWW для получения отклика пользователя на предоставленную информацию, сбора данных о нем. Особенности работы фреймов. Задание фреймовой структуры. Подготовка содержимого фрейма. Вложенные и множественные кадровые структуры.
- 275. HTML-редакторы
Специализированные HTML-редакторы. Текстовые процессоры. Создание одиночных Web-страниц. Стандартный подход к изготовлению документов. Краткая характеристика HTML-редакторов, и компаний-производителей. Профессиональная разработка сайтов. Векторная графика
- 276. HTML. Первые шаги
Технологии, базирующиеся на использовании гипертекстовых документов, предназначенных для просмотра информации на экране компьютера с помощью программы-браузера. Структура и команды форматирования WEB-документа. Использование основных тегов языка HTML.
- 277. HTML–формы и фреймы
Получение отклика пользователя на предоставленную информацию и сбор данных. Создание многострочных областей ввода текста. Как работают фреймы. Задание фреймовой структуры. Создание простой страницы с фреймами. Вложенные и множественные кадровые структуры.
Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
Requirements for users support. Approaches to user modeling. Problems of adaptive help. Techniques for knowledge representation. Implementation of advisory strategies. Demands for effective presentation. The need for system-oriented documentation.
The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.
Вatch generation of web pages, local interaction. Non-linear structure: blocks of text, links between pages create a mesh or network, users follow their own path through information. Delivery technology: on the computer, on the web, on the move.
Возможности утилиты IBExpert и практика работы с инструментом. Создание учебной базы данных средствами SQL. Построение однотабличных запросов на выборку, определение и модификацию данных. Восстановление таблиц базы. Обеспечение целостности информации.
Ознакомление с особенностями когнитивной системы искусственного интеллекта. Рассмотрение примера использования облачного сервиса IBM Watson Analytics для магазина товаров повседневного спроса. Исследование процесса применения системы в электронике.
- 284. ICARE model
Using the ICARE Format for Structuring Online Courses. Instructional design is a system of procedures for developing education and training programs in a consistent and reliable fashion. Model concentrates on the connection between content, context.
The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.
The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
Hardware-in-the-loop test bench for testing and verification navigational equipment structure is investigated. Equation for determination hardware-in-the-loop test bench for testing and verification navigational equipment effectiveness is determined.
- 289. Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.
Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
- 293. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.
Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.