Analysis of braille translation software
Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
Подобные документы
The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
статья, добавлен 04.10.2022A concept of a decision support system (DSS) for modeling and forecasting of economic and financial processes is proposed as well as its software implementation. The main functions of the DSS are in modeling of nonstationary nonlinear time series.
статья, добавлен 29.07.2016Disclosure as a mechanism to identify lines with Romanian chromatic words on the basis of computer technologies as a stage in the development of a dictionary of poetic meanings of colors. The collaboration of computer science specialists and linguists.
статья, добавлен 23.02.2016- 104. Use of Pixlr cloud graphics editor in the course of computer science teacher professional training
The introduction of new cloud technologies in the educational process is a priority for domestic education. The selection of appropriate services that can be used to improve the educational process remains the key issue in solving these problems.
статья, добавлен 23.06.2022 There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.
статья, добавлен 17.02.2021Значение термина CASE (Computer Aided Software Engineering), история появления CASE-технологий и CASE-средств. Современные CASE-средства: особенности и применение. Классификация CASE-технологий по типам и категориям, их структура и среда функционирования.
курсовая работа, добавлен 10.12.2014Functioning system BIOS when enabling the computer. Program CMOS Setup. The main sections of the program BIOS Setup. Advanced BIOS, Chipset Features. Power Management Setup. Adjustment computer system parameter. Determination load device operating system.
реферат, добавлен 02.06.2009The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.
статья, добавлен 11.07.2022Development of a basic robotics workstation with the method of training students in accordance with the specific needs of the robot teachers. The robot can also be used to install programs in the ROS environment, you need to install a Kinect add-on.
статья, добавлен 26.08.2020Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016Analysis opportunities for using cloud technologies in higher education in Ukraine. The main task of cloud technologies, strategic and tactical goals of cloud computing at the technical universities. The typical structure of a technical university.
статья, добавлен 05.04.2019The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
контрольная работа, добавлен 20.05.2016Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
статья, добавлен 12.05.2024The purpose of the scientific work is to identify the features of the use of cloud computing in higher educational institutions for colleges and universities. The risks and benefits of cloud architecture are considered. Analysis main activities.
статья, добавлен 06.04.2022The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
статья, добавлен 23.06.2016Theory and tools communication. Effect of employees at computer system. The importance of accurate pronunciation and eye contact. Gestures and body language programs. Back channels and turn-taking. Multiplexing – several topics in one utterance.
лекция, добавлен 28.12.2013A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
статья, добавлен 15.09.2012Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.
методичка, добавлен 10.08.2011Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
статья, добавлен 15.09.2012An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014The article deals with the notion of concept and cognitive conceptual components in the Internet users' names. The basis conceptual spheres and concrete concepts created by the Internet users in the process of communication have been identified.
статья, добавлен 09.05.2020In the world of sports, modern information technologies are increasingly used to improve the results and training of athletes. Swimming is no exception, and new technologies are revolutionizing this sport. Virtual reality (VR) and virtual simulators.
статья, добавлен 21.03.2024The key problems of the use of digital technologies in the financing of social protection mechanisms for military personnel. Special software for automatization of the processes of financing the mechanisms of social protection of military personnel.
статья, добавлен 04.12.2023Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017