Formation of the institute of personal data protection and experience of its implementation in the countries of the EU
The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.
Подобные документы
Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
книга, добавлен 09.04.2013The working with excel. The basic operations in the work: creating, editing, copying, removing different data. Editing the cell by using the formula bar and by double-clicking, using the formatting toolbar. Changing the font size and formatting numbers.
контрольная работа, добавлен 21.11.2010The state research and pioneer computers. Data Processing Industry аnd Market Until. Calculators in French State Research. The Computer Industry: companies’ behaviour, strategies and the component problem. A client for the Semiconductor Industry.
статья, добавлен 18.11.2018Определение основных возможностей языка программирования высокого уровня, предназначенного для программирования в гибридной модели вычислений data-control flow – языка DCF. Анализ языка DCF как расширения языка последовательного программирования Си.
статья, добавлен 28.10.2018Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
статья, добавлен 28.05.2021Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.
статья, добавлен 11.10.2014Технология Token Ring. Доступ путем передачи токена. Форматы кадров и приоритеты. Физический уровень технологии Token Ring, коллизии. Технология FDDI (Fiber Distributed Data Interface). Основные характеристики технологии и ее отказоустойчивость.
реферат, добавлен 17.11.2011Разработка модели бизнес-процессов верхнего уровня для предприятия. Разработка модели бизнес-процесса: A3.3 Заключение договоров с клиентами. Использование информационной модели, реализованной с применением программного продукта Erwin Data Modeler.
курсовая работа, добавлен 07.10.2014The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.
статья, добавлен 20.01.2017The possibility of a revolutionary breakthrough in the field of health care and medicine when using artificial intelligence. The use of complex statistical and mathematical tools and multidimensional data, which increases the probability of errors.
статья, добавлен 19.03.2024The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.
учебное пособие, добавлен 08.02.2013- 113. Разработка моделей для прогнозирования и анализа данных с применением пакета программ STATISTICA
Анализ методов и технологий Data Mining. Применение искусственных нейронных сетей. Освоение среды Data Miner и разработка моделей анализа данных с применением программ STATISTICA. Анализ результатов применения моделей прогнозирования и анализа данных.
дипломная работа, добавлен 14.12.2019 Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
статья, добавлен 08.08.2021Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.
дипломная работа, добавлен 04.12.2019Анализ наиболее успешных IT решений в области мониторинга больших данных (big data) и осуществление выбора IT решения, его обоснование. Рассмотрение и анализ продуктов Microsoft Azure HDInsight, IBM InfoSphere Streams, платформы Amazon Kinesis Streams.
статья, добавлен 17.08.2018This publication explores the benefits of adopting an event-driven architecture in microservices and delves into how events can be effectively used for inter-process communication and data synchronization. By leveraging events as a means of communication.
статья, добавлен 08.12.2024Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
статья, добавлен 11.03.2019Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.
статья, добавлен 28.09.2016Implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The retrospective of development of library information systems and problematic issues related to the transition of library staff to work with them.
статья, добавлен 13.04.2023Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
статья, добавлен 18.09.2020- 124. Decrypted Secrets
The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
книга, добавлен 08.03.2014 The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.
презентация, добавлен 28.12.2013