?????? ISO/OSI
????????????? ?????? ?????????????? ???????? ?????? (Open Systems Interconnection Reference Model). ??????? ??????? ?????? ISO, ?????????????? ???????? ?????? ????? ???????? ????????????. ??????? ????????????? ? ?????????? ???????. ???????????? ???????.
Подобные документы
An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.
??????, добавлен 30.04.2018Using the analysis of eye movement and gaze direction in online testing systems of students' knowledge. Analysis of creating the same conditions for computer testing for all students and improving the level of knowledge obtained by the test results.
??????, добавлен 12.05.2024Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
??????, добавлен 26.01.2018Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
????????? ??????, добавлен 10.12.2019This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
??????, добавлен 18.09.2024Synthesis SIS model with a uniform two-dimensional spatial distribution of individuals who are in the evolution of such discrete time Markov. The simple square lattice. Computer simulations of a stochastic model for the non-immune disease spread.
??????, добавлен 14.01.2017Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
??????, добавлен 03.02.2019???????????? ?????, ??????????? ????????? "Epam Systems". ?????? ? ????? ???????? ???????????? ??????? ???????????? ????????????? ?? ??????? ?????? ? ?????? ?????? ? ?????????? Microsoft. ?????????? Find&Replace dialog ??? ????????? MS Office Word.
???????, добавлен 17.12.2014Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.
??????? ???????, добавлен 11.10.2014Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
??????, добавлен 16.06.2024A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
??????, добавлен 10.05.2018Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
??????, добавлен 06.05.2018FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.
???????, добавлен 20.08.2010Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
??????, добавлен 26.06.2018Suggestion information model of environment of computer-aided design, consisting of a ?ontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
??????, добавлен 22.12.2016Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.
??????, добавлен 26.06.2016???????? ????????? ????????????? ?????, ??????? ???????? ??????????? ???????? ? ???? ? ????????????? ? ?????? Sym Power Systems ?? ??????? ????????????? ????? ????????. ??????????? ?? ????????????? ? ?????????? ? ????????????? ?? ? ??????????? ????.
???????????? ??????, добавлен 16.06.2009Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
???????? ??????, добавлен 25.06.2017Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
??????, добавлен 23.02.2016The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
??????? ???????, добавлен 15.09.2012- 73. ICARE model
Using the ICARE Format for Structuring Online Courses. Instructional design is a system of procedures for developing education and training programs in a consistent and reliable fashion. Model concentrates on the connection between content, context.
???????, добавлен 06.02.2014 - 74. Cognitive models
Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.
??????, добавлен 28.12.2013 The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
??????, добавлен 14.02.2022