Funds of the library
Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
Подобные документы
Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
учебное пособие, добавлен 08.03.2014The theoretical workbench for real time network modeling. Implement different transition firing rules in A-nets. The Matlab as a Simulink block library. Execution time and facilitating model understanding. A-nets for message transmission modeling.
статья, добавлен 22.07.2014Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.
статья, добавлен 29.07.2016The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
презентация, добавлен 25.09.2016Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
статья, добавлен 23.02.2016Знакомство с основными типами адаптеров: связыватели для использования функционального объекта с двумя аргументами, отрицатели для инверсии значения предиката. Общая характеристика стандартных обобщенных алгоритмов библиотеки Standard Template Library.
лабораторная работа, добавлен 10.08.2013The submission of a fully closed model of the turbulent boundary layer, obtained from the Navier-Stokes equations. Study of numerical solutions of equations system of turbulent migration of impurities in the surface atmospheric layer for a large scale.
статья, добавлен 27.04.2017Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.
лекция, добавлен 28.12.2013Study the history of the development of high-tech equipment to help people in case of natural disasters. The description of creating a rescue robot with wireless control sensor. Its main advantages: high noise immunity and low power consumption.
презентация, добавлен 23.02.2016Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.
статья, добавлен 22.07.2022Pulsation effects and the directional diagram on the basis of mathematical modeling of the system "antenna–fuselage of helicopter". Causes of the pulsations and their characteristics. Effects that may result from the pulsations of the radiation pattern.
статья, добавлен 26.06.2016Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
курс лекций, добавлен 11.10.2014- 90. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 - 91. Virtual Memory
Levels in Memory Hierarchy. Design of DRAM caches. Locating an Object in a "Cache". A System with Physical Memory Only and with Virtual Memory. Servicing a Page Fault. Multiple processes in physical memory. Macintosh Memory Model. Page Table Operation.
презентация, добавлен 03.06.2012 The method and algorithm for realization of arithmetic operations in the system of remainder classes. The principal advantage of the suggested method. The algorithms for realization of arithmetic operations of summation, deduction and multiplication.
статья, добавлен 14.07.2016Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.
статья, добавлен 22.12.2016The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021The cognitive simulation of AstroDatabank records by using the artificial intelligence system with the neuron-net training and recognition. Structure of the analytical system. Studying the technology of simulation. Discussing the mostly important results.
статья, добавлен 26.04.2017The purpose of the scientific work is to identify the features of the use of cloud computing in higher educational institutions for colleges and universities. The risks and benefits of cloud architecture are considered. Analysis main activities.
статья, добавлен 06.04.2022The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.
статья, добавлен 22.09.2022A concentrator intended for collect and processing signals of the origin of fire from different sensors is developed. Information from the sensors is transmitted through the system of main and remote concentrators to the fire extinguishing system.
статья, добавлен 21.06.2016Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
статья, добавлен 25.03.2016- 100. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018