Memory Basics
Memory Definitions. Memory Block Diagram. Memory Organization Example. Basic Memory Operations. Timing of signal changes and data observation. RAM Integrated Circuits. Cell Arrays and Coincident Selection. Storage of information on different capacitors.
Подобные документы
Характеристика особливостей мови програмування LD (Ladder Diagram), мови релейно-контактної логіки, складової частини стандарту IEC-61131. Вивчення особливостей синтаксису, особливостей практичного використання, цілей та завдань мови Ladder Diagram.
реферат, добавлен 17.12.2014The data collection algorithm to systematically track gender equality metrics across universities. The advantages of leveraging advanced scraping and analysis techniques to gather nuanced insights from diverse online data sources like university websites.
статья, добавлен 12.12.2024A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.
книга, добавлен 08.03.2014Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
практическая работа, добавлен 13.02.2016A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
книга, добавлен 08.03.2014Понятие термина Data Mining, его история возникновения. Понятие искусственного интеллекта. Сравнение статистики, машинного обучения и Data Mining. Развитие технологии баз данных начиная с 1960-х г. Data Mining как часть рынка информационных технологий.
реферат, добавлен 14.01.2015Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
статья, добавлен 06.05.2018Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.
статья, добавлен 26.06.2016- 87. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 - 88. Big Data
Определение термина "Big Data" и его применение в работе с информацией огромного объема и разнообразного состава. Определение основных источников получения компаниями информации. Методики анализа массивов данных и технологии Big Data в разных отраслях.
курсовая работа, добавлен 28.09.2015 - 89. Algorithms of selection of essential features of signals, which are invariant to move and rotation
Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.
статья, добавлен 22.12.2016 Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.
статья, добавлен 25.12.2016Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
дипломная работа, добавлен 13.07.2020Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.
курсовая работа, добавлен 13.07.2014История Visual Basic, назначение среды программирования Visual Basic. Основные понятия объектно-ориентированного визуального программирования. Возможность ускорения и упрощения доступа к командам меню Visual Basic при помощи панели инструментов Toolbar.
реферат, добавлен 25.12.2014Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
книга, добавлен 09.04.2013Visual Basic for Applications. Еволюція Visual Basic, основні різновиди, переваги, недоліки. Розробка користувальницького інтерфейсу Excel, опис. Проектування програмного модуля. Опис використаних операторів. Створення макросів в редакторі Visual Basic.
курсовая работа, добавлен 19.06.2021- 96. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014Задачи Data Mining: описательные и предсказательные, классификации и регрессии, поиска ассоциативных правил, кластеризации. Практическое применение Data Mining. Особенности нечеткой логики, виды физической неопределенности. Процесс обнаружения знаний.
презентация, добавлен 27.04.2023Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.
статья, добавлен 08.06.2024Структура Fortran-программы. Описание переменных, правила умолчания и операторы. Стандартные математические функции. Вычисляемый оператор перехода. Общие области, подпрограмма Block Data. Обработка внешних файлов. Файлы с графическими шрифтами.
реферат, добавлен 10.06.2013