Problems and prospects of land information systems in land resources management
The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
Подобные документы
Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
статья, добавлен 31.08.2022- 102. Modern office
The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.
контрольная работа, добавлен 04.03.2016 Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.
дипломная работа, добавлен 08.03.2014An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.
презентация, добавлен 10.06.2016- 109. Relational Databases
One of the important functions of science is the organization of information storage for searching some data. The basic principle of the database and Relational Database Management System. The SQL Language, Web-page, Macros and Integrity Constraints.
презентация, добавлен 07.03.2018 New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.
статья, добавлен 26.06.2016- 111. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
статья, добавлен 18.11.2018 Processes of ordering and delivery of the ingredients to the warehouse and the costumers. Overview of the ERP system’s logistic unit. Management system for solving a variety of transport logistics problems. Application solution "1С: Enterprise 8".
реферат, добавлен 20.03.2016Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
статья, добавлен 18.09.2020Method of continuous pumping of fluids and reagents through the analytical module and detector in the respective volume relations with a fixed speed using an electromagnetic pump. The design parameters and optimum operating conditions of the pump.
статья, добавлен 30.08.2016Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
статья, добавлен 23.02.2016Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.
статья, добавлен 28.09.2016- 118. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
статья, добавлен 07.04.2021The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012Программные средства интегрированного комплекса сетевых автоматизированных лабораторий. Уровень мониторинга, контроля и управления многофункциональных объектов. Plant Information Management System в составе данного интегрированного комплекса, его функции.
статья, добавлен 28.09.2012Главная характеристика информационной технологии обработки данных, автоматизированного офиса, поддержки принятия решений и экспертных систем. Анализ сетевого управления Network Management Systems. Особенность программного обеспечения и обслуживания.
курсовая работа, добавлен 25.02.2016- 123. CompTIA Security+
Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
книга, добавлен 08.03.2014 The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
презентация, добавлен 13.09.2015Створення бази даних, яка буде зберігати інформацію користувачів, інтерфейсу користувача, а також серверної частини Web-додатку. Web-додаток, який буде надавати відвідувачам сайту всю необхідну інформацію про салон,його розцінки та місцезнаходження.
курсовая работа, добавлен 05.06.2020