Digitization and friendly artificial intelligence for future life
Assessment of the impact of digitalization on society, economy and business. Ensuring the protection of individual data and commercial secrets. The use of artificial intelligence in everyday life. Integration of digital tools into the management system.
Подобные документы
???????????? ??????????? ?????????? ???? ???????? ??? ???????? ?????????? ?? ??????? ? ???????? threat intelligence. ?????? ???????????????? ???????????? ???????? ????????? ????? ?????? ?? ???????. ??????? ????????? ?????????? ??????????????? ???????.
??????, добавлен 12.08.2020The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
??????, добавлен 01.11.2021Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
????????? ??????, добавлен 23.09.2018Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
?????, добавлен 15.09.2012The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.
??????, добавлен 26.06.2016Examine the possibility of employing the Greenstone system to create a digital tourism library for the city of Petra. The stages of building a digital library. students’ opinions about the characteristics of the Greenstone system and its suitability.
??????, добавлен 05.09.2022Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014- 83. Strategies of information and innovation activity development at enterprise in digital conditions
The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.
??????, добавлен 08.04.2022 Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.
??????, добавлен 11.03.2025Identification of retail market trends, values, and key performance indicators. Technology driven revolutions in retail business models. Existing techniques in technology assessment research. IoT in retail national level approach: the case of Russia.
???????????, добавлен 30.09.2016Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
??????, добавлен 22.12.2016?????????????? ??????????????? ?????? ??????? ??? ???????????? ??????????? ??????? ??????? ??? ???????? ???? ????????????. ???????? ?? ????????????. ??????? ????????? Business Intelligence. ????????? Cognos. ????????? ????????, ?? ??????? ?? ?? ??????.
???????, добавлен 22.07.2017??? ?????????? ?????????????????????, ??????????? ??????? ??????????????? ?????? ??????-?????????, ???? ???? — ?????????????? ?????? ????????? ?????, ??????????? ????? ???? ?? ???????? ???????? ????????????, ????????? ????????? ?????? ????????? ???.
???????, добавлен 18.12.2021The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
??????, добавлен 24.03.2016?????? ??????????? Open Data Readiness Assessment Ukraine. ???????????? ??? ??????? ????? ? ????????? ????? ??? ???????? ????????? ??????? ?? ?????????? ????????? ? ?????? ???????????? ?????????? ???? ???????????? ?????? ?? ??????????? ????????? ?????.
??????, добавлен 30.08.2018Proposing of the risk management models for IT projects based on Markov chains. Analysis of tools of the buffer management concept, principles of agile methodologies, and knowledge management to address the issues connected with use of Morkovian model.
??????, добавлен 30.07.2017Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
???????, добавлен 04.04.2016Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
???????????, добавлен 27.01.2015?????????????? ? ?????????? ???????????? ?????????? ? ??????? WebTutor ?? ?????? ??????????? ????????? ?????? Business Intelligence ??? ?????????????? ?????????????? ???????????? ???????? ??????-?????????????. ??????? ????????? ???????????????? ????????.
????????? ??????, добавлен 30.08.2016Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
???????????? ??????, добавлен 29.11.2014Studying the possibility of using the Greenstone system to create an integrated digital tourist library for the city of Petra. A survey of students' opinions about the materials and information that should be included in the digital tourism library.
??????, добавлен 15.03.2023???????? ???????????? ????????????? ??????????? ?? ?????? ?????????? ?????????? ????????????. ??????????? ?????? ??????? "??????????? ??????????". ???????? ??????????? ?????? ? ??????????? ????, ???????????? ???????????? ?? ????????????? SECOND LIFE.
??????, добавлен 11.05.2022The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
??????, добавлен 06.05.2018Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
??????, добавлен 03.02.2019The key problems of the use of digital technologies in the financing of social protection mechanisms for military personnel. Special software for automatization of the processes of financing the mechanisms of social protection of military personnel.
??????, добавлен 04.12.2023