Algorithmic software of the fire monitoring system
Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
Подобные документы
With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.
статья, добавлен 19.09.2024- 102. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
презентация, добавлен 21.06.2015Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
дипломная работа, добавлен 13.07.2020Значение open source для коммерческой и образовательной сфер Украины. Изучение Internet как публичного достояния человечества. Распространение программного обеспечения в исходных текстах. Создание Софтпанорамы как неформального общества программистов.
статья, добавлен 17.11.2018A justification of need of development of intellectual service for monitoring of health and level of physical development of students of the Ufa state aviation technical university. The description of the main functions of intellectual service.
статья, добавлен 06.05.2018Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.
статья, добавлен 19.08.2020Characteristics of the SoLIM approach and the specifics of its use through available software platforms. Implementation of digital soil mapping within the SoLIM approach. Theoretical justification and availability of software platforms for SoLIM.
контрольная работа, добавлен 22.03.2021Recommendations on the application of the system of advance passenger information and registration of passenger data (API/PNR). Use as a tool to counter cross-border threats. The role of biometrics in the connection between the document and its owner.
статья, добавлен 20.07.2024The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024The problem of the development of mathematical support to automate the process of diagnostic and recognizing model construction by precedents. The software realizing proposed transformations and indicators characterizing their properties was developed.
статья, добавлен 29.07.2016Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.
статья, добавлен 29.07.2016Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018This paper presents a comprehensive algorithm for creating an automated system to collect, store, analyze and research data from a business. Its main features include synchronization with, and output to, an application installed on a PC or smartphone.
статья, добавлен 26.10.2020Extracting meaningful features from speech signals and classifying them into male or female categories. Implementation of gender recognition system using Python programming. Potential of using machine learning techniques for gender recognition of voice.
статья, добавлен 24.02.2024The determination of the level of security provided by the finalists is largely guesswork, as in the case of any unbroken cryptosystem. Software implementation languages. General security. Software speeds for encryption, decryption, and key setup.
книга, добавлен 08.03.2014Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
курс лекций, добавлен 08.03.2014The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016- 119. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.
реферат, добавлен 24.03.2015Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016