Digitization and friendly artificial intelligence for future life
Assessment of the impact of digitalization on society, economy and business. Ensuring the protection of individual data and commercial secrets. The use of artificial intelligence in everyday life. Integration of digital tools into the management system.
Подобные документы
Рассмотрение возможности применения сети блокчейн для доставки информации об угрозах в системах threat intelligence. Анализ распространённых инструментов служащих средством сбора данных об угрозах. Примеры внедрения технологии распределённого реестра.
статья, добавлен 12.08.2020The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
дипломная работа, добавлен 23.09.2018Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.
статья, добавлен 26.06.2016Examine the possibility of employing the Greenstone system to create a digital tourism library for the city of Petra. The stages of building a digital library. students’ opinions about the characteristics of the Greenstone system and its suitability.
статья, добавлен 05.09.2022Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014- 83. Strategies of information and innovation activity development at enterprise in digital conditions
The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.
статья, добавлен 08.04.2022 Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.
статья, добавлен 11.03.2025Identification of retail market trends, values, and key performance indicators. Technology driven revolutions in retail business models. Existing techniques in technology assessment research. IoT in retail national level approach: the case of Russia.
диссертация, добавлен 30.09.2016Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016Характеристика інтелектуальних систем аналізу для забезпечення оптимізації ведення бізнесу для широкого кола користувачів. Приклади їх використання. Сучасні тенденції Business Intelligence. Структура Cognos. Програмні продукти, що входять до її складу.
реферат, добавлен 22.07.2017Щоб залишатися конкурентоспроможними, бухгалтерія повинна використовувати методи бізнес-аналітики, мета яких — інтерпретувати велику кількість даних, загострюючи увагу лише на ключових факторах ефективності, моделюючи результат різних варіантів дій.
реферат, добавлен 18.12.2021The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
статья, добавлен 24.03.2016Аналіз дослідження Open Data Readiness Assessment Ukraine. Рекомендації для Робочої групи з відкритих даних при Кабінеті Міністрів України та Державного агентства з питань електронного урядування щодо забезпечення якості та доступності відкритих даних.
статья, добавлен 30.08.2018Proposing of the risk management models for IT projects based on Markov chains. Analysis of tools of the buffer management concept, principles of agile methodologies, and knowledge management to address the issues connected with use of Morkovian model.
статья, добавлен 30.07.2017Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
диссертация, добавлен 27.01.2015Проектирование и разработка специального дополнения к системе WebTutor на основе программных продуктов класса Business Intelligence для удовлетворения информационных потребностей основных бизнес-пользователей. Система поддержки образовательного процесса.
дипломная работа, добавлен 30.08.2016Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
практическая работа, добавлен 29.11.2014Studying the possibility of using the Greenstone system to create an integrated digital tourist library for the city of Petra. A survey of students' opinions about the materials and information that should be included in the digital tourism library.
статья, добавлен 15.03.2023Методика формирования межкультурной компетенции на основе технологии трехмерной визуализации. Философский анализ понятия "виртуальная реальность". Обучение иностранным языкам в виртуальном мире, методические рекомендации по использованию SECOND LIFE.
статья, добавлен 11.05.2022The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
статья, добавлен 06.05.2018Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
статья, добавлен 03.02.2019The key problems of the use of digital technologies in the financing of social protection mechanisms for military personnel. Special software for automatization of the processes of financing the mechanisms of social protection of military personnel.
статья, добавлен 04.12.2023