Boolean retrieval
Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.
Подобные документы
Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
статья, добавлен 26.06.2018Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.
статья, добавлен 29.01.2016The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.
статья, добавлен 27.09.2016Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
курс лекций, добавлен 08.03.2014Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
книга, добавлен 08.03.2014Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.
статья, добавлен 09.01.2024Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.
статья, добавлен 29.07.2017Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
книга, добавлен 08.03.2014Problems of creation and application of the original mechanism of cataloging of digital information resources ISO 15836: 2003. Initiation of multiple metadata Dublin core, which is used for system-wide description of electronic information resources.
статья, добавлен 05.03.2023Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
книга, добавлен 08.03.2014The creating and operating an arbitrary Database in computer mathematics. The conceptual design acts as the construction of an information model of the subject area of the. The definition of the objects of the subject area of the DB, their properties.
статья, добавлен 17.02.2021Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
презентация, добавлен 21.06.2015The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
статья, добавлен 22.12.2016The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020- 71. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
статья, добавлен 08.08.2021Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.
статья, добавлен 19.08.2020In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.
статья, добавлен 21.03.2024Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
статья, добавлен 30.08.2016