Linguistic support for the formation ofa consolidated information resource of socialmemory institutions

The role of linguistic means as backbone elements of any information and library system, a consolidated information resource of institutions of social memory. Criteria for the selection of linguistic tools for the development of their descriptions.

Подобные документы

  • Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.

    ???????????, добавлен 19.12.2014

  • The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

    ??????, добавлен 14.02.2022

  • Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.

    ?????, добавлен 08.03.2014

  • Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.

    ??????, добавлен 21.01.2022

  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    ??????, добавлен 15.04.2024

  • The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.

    ??????, добавлен 24.08.2022

  • Forecasting the development of the statistical reporting network. Improving the accuracy of predicting the development of the Internet of things in the context of the dynamics of primary information flows. Deterministic models of mathematical programming.

    ??????, добавлен 07.09.2022

  • Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.

    ??????, добавлен 28.02.2016

  • Suggestion information model of environment of computer-aided design, consisting of a ?ontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    ??????, добавлен 22.12.2016

  • The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.

    ??????, добавлен 10.05.2018

  • Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.

    ??????, добавлен 06.05.2018

  • Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.

    ??????, добавлен 08.08.2021

  • In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.

    ??????, добавлен 21.03.2024

  • Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.

    ?????, добавлен 08.03.2014

  • The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.

    ??????, добавлен 08.04.2022

  • Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.

    ??????, добавлен 04.09.2022

  • The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.

    ??????, добавлен 08.05.2018

  • The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.

    ??????, добавлен 04.10.2022

  • The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.

    ???????, добавлен 20.03.2016

  • Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.

    ??????, добавлен 12.08.2016

  • The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.

    ??????, добавлен 15.06.2012

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    ??????, добавлен 06.05.2018

  • Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.

    ??????, добавлен 22.12.2016

  • Recommendations on the application of the system of advance passenger information and registration of passenger data (API/PNR). Use as a tool to counter cross-border threats. The role of biometrics in the connection between the document and its owner.

    ??????, добавлен 20.07.2024

  • Code switching as an aspect of studying results within the framework of the theory of language contacts. The structure of a sentence at the level of its morphological and syntactic structures, the nature of linguistic borrowings in a synchronous plan.

    ??????, добавлен 09.04.2021

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.