The creation of digital image of cultural heritage: world and domestic experience

The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.

Подобные документы

  • Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.

    статья, добавлен 16.02.2016

  • Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.

    статья, добавлен 27.05.2021

  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    статья, добавлен 13.08.2023

  • Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.

    реферат, добавлен 04.04.2016

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга, добавлен 09.04.2013

  • Method for automated digital image processing. The specialties of the synthesis of automaton, the defining of channels management class of objects. Construction regular expressions to defining a plurality of channels management of software objects class.

    статья, добавлен 27.06.2016

  • Рассмотрение основных аспектов пребывания на ежегодной конференции "CHNT Congress Visual Heritage". Анализ ключевых докладов, описание работавших на мероприятии секций. Обзор методологических проблем работы исследователя с цифровым культурным наследием.

    материалы конференции, добавлен 08.04.2019

  • The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.

    статья, добавлен 09.04.2022

  • Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.

    статья, добавлен 22.12.2016

  • Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.

    презентация, добавлен 28.12.2013

  • The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.

    контрольная работа, добавлен 07.08.2017

  • Basic security skills on the World Wide Web. Cryptology, Web site protection and attacks. One-way encryptions and message digests. Some strong symmetric-key ciphers. Practical software-based stream ciphers. Block ciphers with variable key lengths.

    учебное пособие, добавлен 04.12.2012

  • Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.

    статья, добавлен 28.08.2016

  • Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.

    статья, добавлен 29.10.2020

  • Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.

    статья, добавлен 03.02.2019

  • Assessment of the impact of digitalization on society, economy and business. Ensuring the protection of individual data and commercial secrets. The use of artificial intelligence in everyday life. Integration of digital tools into the management system.

    статья, добавлен 13.11.2023

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.

    статья, добавлен 23.02.2016

  • Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.

    статья, добавлен 09.01.2024

  • Peculiarities of the reception of the figure of M. Hrushevsky in cyberspace, the frequency of searching for information about him in the search engine Google, in the largest digital encyclopedia Wikipedia. Analysis of requests regarding M. Hrushevskyi.

    статья, добавлен 28.07.2023

  • Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.

    статья, добавлен 23.02.2016

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    книга, добавлен 08.03.2014

  • Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.

    статья, добавлен 01.12.2017

  • Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.

    статья, добавлен 23.02.2016

  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга, добавлен 18.09.2012

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.