Exploring the capacity of AI technologies to combat corruption
The exploration of the possibilities of digital technologies with elements of artificial intelligence as a promising tool for combating corruption-related criminal offenses. Strategy to address corruption-related criminal activities under of martial law.
Подобные документы
Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
???? ??????, добавлен 20.10.2016With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.
??????, добавлен 19.09.2024A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.
??????, добавлен 20.07.2018The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
??????, добавлен 25.11.2023Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.
???????????, добавлен 06.02.2019The challenges of supply chain, which can be solved using Internet of Things technologies. The use of IoT devices makes it possible to reduce costs caused by processes which involve a high amount of involved actors in transportation and tracking of goods.
????????? ??????, добавлен 27.08.2016The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
??????, добавлен 22.02.2023An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.
??????, добавлен 12.01.2023Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
????????? ??????, добавлен 10.12.2019The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.
??????, добавлен 04.09.2022The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
??????, добавлен 25.06.2024Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
??????, добавлен 08.08.2021Exploring different ways of assessing the value of hard currency. Calculating the hard currency exchange rate using a stack of technologies already used in the company. Distribution of income for game content. Improved dashboards for game producers.
???????? ??????, добавлен 17.07.2020The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.
??????, добавлен 30.07.2018Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
??????, добавлен 14.01.2017Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.
??????, добавлен 19.08.2020In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
?????, добавлен 09.04.2013- 68. Strategies of information and innovation activity development at enterprise in digital conditions
The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.
??????, добавлен 08.04.2022 Presents the main transformational processes of scientific understanding of the role of "artificial" and "natural" intellect. The natural intellect is presented as a social phenomenon that arose from the interaction of individual cerebral structures.
??????, добавлен 17.11.2023In this book offered a collection of the latest contributions to the area of computational intelligence applications to fault diagnosis. The book contains 10 chapters. Each of the chapters focuses on some theoretical aspects of intelligence methodologies.
?????, добавлен 21.03.2014Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
??????, добавлен 28.08.2016- 72. Newsgames
Cutthroat capitalism, its main tasks and functions related to videogames. Missi strike in September 12th triggers the conversion of new terrorists. Types of current event games. The splash screen from The Arcade Wire. The concept of infographics.
?????, добавлен 17.04.2013 A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.
??????, добавлен 15.09.2012The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).
???????? ??????, добавлен 30.08.2016- 75. ????????????????? digital-???????? ??????? ????????????? ? ????????? ????? ??? "???????? ??????"
????????????? ???????? digital-???????? ??????? ????????? ?? ???????? ??????? "???????????" ?????????? ????? ??? "???????? ??????". ?????????? ????????????? ?????????????? ??????????? ? ??????????? ????????????? ???????? ? digital-???????? ???????.
??????, добавлен 09.10.2020
