Methods for studying methods of data processing and transmission in computer mathematics

The creating and operating an arbitrary Database in computer mathematics. The conceptual design acts as the construction of an information model of the subject area of the. The definition of the objects of the subject area of the DB, their properties.

Подобные документы

  • In this book offered a collection of the latest contributions to the area of computational intelligence applications to fault diagnosis. The book contains 10 chapters. Each of the chapters focuses on some theoretical aspects of intelligence methodologies.

    книга, добавлен 21.03.2014

  • Characterization major methods of construction principal manifolds. Familiarity with the issues numerical computation. Analysis nonlinear manifold learning from unorganized data points is a challenging unsupervised learning and data visualization.

    автореферат, добавлен 08.02.2013

  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга, добавлен 18.09.2012

  • The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.

    книга, добавлен 08.03.2014

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья, добавлен 27.07.2016

  • Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.

    книга, добавлен 19.03.2014

  • A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.

    реферат, добавлен 09.12.2014

  • Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.

    статья, добавлен 23.02.2016

  • Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.

    статья, добавлен 31.08.2022

  • The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.

    статья, добавлен 26.06.2016

  • Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.

    статья, добавлен 23.02.2016

  • Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.

    книга, добавлен 08.03.2014

  • Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.

    статья, добавлен 20.01.2017

  • Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.

    практическая работа, добавлен 29.11.2014

  • The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.

    презентация, добавлен 24.11.2016

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    статья, добавлен 24.10.2018

  • Methods to analyse people's jobs. Approaches to task analysis. Development of the script processing, review grammar. Description of the procedure subtasks, hierarchical evaluation tasks using temporary operators. Refinement description of the model.

    лекция, добавлен 28.12.2013

  • The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.

    статья, добавлен 29.09.2023

  • The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.

    методичка, добавлен 11.10.2014

  • Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.

    книга, добавлен 15.09.2012

  • Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.

    статья, добавлен 11.03.2019

  • Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.

    статья, добавлен 13.02.2016

  • Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.

    статья, добавлен 16.02.2016

  • Theoretical foundations of the relativistic paradigm in physics and interactive technologies. An example of a community of interactive computing. Programming tool and tools for computer create physical and electronic worlds in everyday activities.

    презентация, добавлен 28.12.2013

  • The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.

    статья, добавлен 28.05.2023

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.