Information technologies in decision support systems

The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

Подобные документы

  • The support was the key to effective implementation of advanced technologies and systemic implementation scale of China’s digital policy. A comparative analysis of the transformational processes of digitalization of China and Ukraine was carried out.

    статья, добавлен 21.08.2022

  • Classification of tools for the implementation of sensing systems. The necessity of application of sensing systems and some of their parameters are described, which are useful for robots with systems of artificial intelligence. Voxel or pixel graphics.

    статья, добавлен 26.04.2021

  • Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.

    презентация, добавлен 18.11.2015

  • Methods for graphic and text image region classification. Construction of the narrative function characterizing areas of the image sub-elements is proposed. This function can be used for training and classification using support vector machines.

    статья, добавлен 23.02.2016

  • Basic Notions of Systems and Signals. State-space Models. Process Modeling for Control Purposes. Input–output Models and Realization Theory. Controllability and Observability of LTI Systems. Stability and The Lyapunov Method. State Feedback Controllers.

    учебное пособие, добавлен 25.11.2013

  • The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.

    презентация, добавлен 10.06.2016

  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    статья, добавлен 13.08.2023

  • In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.

    статья, добавлен 18.08.2018

  • Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.

    статья, добавлен 30.10.2020

  • The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.

    методичка, добавлен 11.10.2014

  • Universal design principles. Peculiarities of using multi-sensory systems. Applying speech, non-speech, sound, touch, handwriting and gestures in multi-modal systems. Recognition problems in interactive computer systems. Personal orientation of design.

    презентация, добавлен 28.12.2013

  • Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.

    курсовая работа, добавлен 13.07.2014

  • The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.

    статья, добавлен 28.02.2016

  • The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.

    статья, добавлен 20.01.2017

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.

    презентация, добавлен 28.12.2013

  • The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.

    статья, добавлен 27.09.2016

  • Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.

    диссертация, добавлен 27.01.2015

  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    статья, добавлен 15.04.2024

  • Method of continuous pumping of fluids and reagents through the analytical module and detector in the respective volume relations with a fixed speed using an electromagnetic pump. The design parameters and optimum operating conditions of the pump.

    статья, добавлен 30.08.2016

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    статья, добавлен 27.05.2021

  • Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.

    статья, добавлен 04.09.2022

  • Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.

    статья, добавлен 25.03.2019

  • Basic directions in the design of the interface. The interaction between human and computer. Introduction to user preferences, as to the operation of the computer system. The principles used to create virtual navigation for the operating system.

    презентация, добавлен 28.12.2013

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья, добавлен 24.03.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.