From boole’s logic to boolean applications in computer science

Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

Подобные документы

  • Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.

    ???????????, добавлен 06.02.2017

  • Theoretical foundations of the relativistic paradigm in physics and interactive technologies. An example of a community of interactive computing. Programming tool and tools for computer create physical and electronic worlds in everyday activities.

    ???????????, добавлен 28.12.2013

  • History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.

    ???????? ??????, добавлен 07.03.2016

  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    ??????, добавлен 15.04.2014

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    ?????, добавлен 08.03.2014

  • Types of groupware: computer-mediated communication, meeting and decisions support systems, shared applications, artefacts. Implementation issues. Cooperative work involves: participants, artefacts. Email and bulletin boards. Structured message systems.

    ???????????, добавлен 28.12.2013

  • Development of a method for time series prediction, which dynamically finds weights for the input factors. Validation of the proposed method on a set of real time series, the assessment of its results in comparison with the method used as the base.

    ???????????, добавлен 30.01.2016

  • Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.

    ?????, добавлен 15.09.2012

  • Insights–as–a–Service ??? ?????? ??????????? ?????????????? ?????????? ??? ???????, ?? ??????? ?? ?????? ????? ???????? ???????. ???????? ?????????? ??????? ???????, ? ????? ????? ???????? ??? ??????. ????????? ????? Insights–as–a–Service ???????.

    ??????, добавлен 30.04.2018

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    ?????, добавлен 08.03.2014

  • Introduction to Blind Signal Processing: Problems and Applications. Iterative Algorithms with Non-negativity Constraints. Basic Properties of PCA. Extraction of Principal Components. SOS Blind Identification Based on EVD. Computer Simulation Experiments.

    ?????, добавлен 25.11.2013

  • The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.

    ??????????? ??????, добавлен 04.03.2016

  • The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.

    ??????, добавлен 20.01.2016

  • The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.

    ?????????, добавлен 11.10.2014

  • The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.

    ??????, добавлен 23.02.2016

  • A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.

    ?????, добавлен 08.03.2014

  • An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.

    ?????, добавлен 08.03.2014

  • Theoretical information on personal computers, the structure of Windows XP as the operating system. Examples of projects in C ++ Builder to calculate complex mathematical formulas and solving problems with the branch. Programming in C ++ Builder.

    ?????????, добавлен 11.10.2014

  • Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.

    ??????, добавлен 09.12.2024

  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    ????????? ??????, добавлен 02.09.2016

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    ??????? ???????, добавлен 08.03.2014

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    ??????, добавлен 25.03.2016

  • Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.

    ?????, добавлен 08.03.2014

  • The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.

    ???????????, добавлен 24.11.2016

  • The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.

    ??????????? ??????, добавлен 20.05.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.