From boole’s logic to boolean applications in computer science

Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

Подобные документы

  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга, добавлен 08.03.2014

  • The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.

    книга, добавлен 08.03.2014

  • The modern computer technologies. Drawing of clock-pulse generator that from pulse sequence for all programming system. Engineering graphics OrCAD Capture. Projecting and design of principal schemes in electronics, microelectronics and electrotechniques.

    книга, добавлен 11.10.2014

  • Designing for maximum usability. The essential characteristics of rules in the form of standards and guidelines in order to enhance the interactive properties of the system. Principles of flexibility and robustness. HCI design patterns and golden rules.

    презентация, добавлен 28.12.2013

  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа, добавлен 17.03.2016

  • The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.

    статья, добавлен 22.08.2021

  • Stages of development and analysis of the effectiveness of the mechanism, which will help identify the line with Romanian chromatic words on the basis of computer technology as the first phase of development of the dictionary meanings of poetic colors.

    статья, добавлен 23.02.2016

  • Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.

    курс лекций, добавлен 08.03.2014

  • Programming of Intel microprocessors. Studying systems on universal microprocessors and problems of its programming. The scheme and the description of laboratory installation, variants of tasks and order of the laboratory work execution are presented.

    лабораторная работа, добавлен 11.10.2014

  • Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.

    книга, добавлен 08.03.2014

  • Natural Language Processing as a subfield of computer science and artificial intelligence is concerned with interactions between computers and human languages. The purpose of this paper, is to outline the linguistic and NLP methods for textual processing.

    статья, добавлен 18.05.2022

  • Проблема интеграции программного обеспечения инженера: Computer Aided Modeling, Computer Aided Engineering, Computer Aided Design. Объемное конструирование и геометрическое моделирование. Системы разработки рабочих чертежей инженерных конструкций.

    реферат, добавлен 10.05.2015

  • Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.

    книга, добавлен 08.03.2014

  • Acquaintance with methods of data processing and transmission in computer mathematics. Consideration of the features of teaching computer skills in computer mathematics. General characteristics of the stages of development of a conceptual database schema.

    статья, добавлен 29.05.2021

  • Introduction to cryptography and data security. The study of random numbers and an unbreakable stream cipher. The data encryption standard and alternatives. Practical aspects of public-key cryptography. Principles of message authentication codes.

    книга, добавлен 08.03.2014

  • The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.

    статья, добавлен 25.03.2016

  • The creating and operating an arbitrary Database in computer mathematics. The conceptual design acts as the construction of an information model of the subject area of the. The definition of the objects of the subject area of the DB, their properties.

    статья, добавлен 17.02.2021

  • New computer arithmetics doing the parallel process of multiplying and division. A scoring in accuracy of representation of numbers is as result of the development of arithmetics. Factorizations of operands is in a basis of parallel computer arithmetics.

    статья, добавлен 10.08.2013

  • Features of the mechanism that will help to identify lines with Romanian chromatic words on the basis of computer technology. Steps develop a dictionary of poetic meanings of colors. Development of the dictionary linguists and computer scientists.

    статья, добавлен 23.02.2016

  • Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.

    учебное пособие, добавлен 11.10.2014

  • The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.

    книга, добавлен 08.03.2014

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    книга, добавлен 25.11.2013

  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие, добавлен 08.03.2014

  • Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.

    презентация, добавлен 06.02.2017

  • History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.

    курсовая работа, добавлен 07.03.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.