BIM-technology
Main features of BIM-technology. Getting of the digital copy of the building or a construction. Quick make changes to the project. Automation of issue of specifications and sheets of volumes. Main ways of achieving efficiency of the BIM-technology.
Подобные документы
Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
статья, добавлен 06.05.2018- 27. Digital automatic telephone station SI2000 for building up urban and rural communication networks
Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.
статья, добавлен 27.06.2016 History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.
курсовая работа, добавлен 07.03.2016Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.
книга, добавлен 08.03.2014Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.
статья, добавлен 14.07.2016Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
статья, добавлен 30.04.2018Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024- 34. Microsoft Word
Information about Microsoft Word, the application and purpose of the program. The features and functions of Microsoft Word. Characteristics of the main tools for creating lists, copying and moving sections of text. Text formatting, parameter control.
доклад, добавлен 09.03.2018 - 35. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
статья, добавлен 24.10.2018 The key problems of the use of digital technologies in the financing of social protection mechanisms for military personnel. Special software for automatization of the processes of financing the mechanisms of social protection of military personnel.
статья, добавлен 04.12.2023Extracting meaningful features from speech signals and classifying them into male or female categories. Implementation of gender recognition system using Python programming. Potential of using machine learning techniques for gender recognition of voice.
статья, добавлен 24.02.2024Examine the possibility of employing the Greenstone system to create a digital tourism library for the city of Petra. The stages of building a digital library. students’ opinions about the characteristics of the Greenstone system and its suitability.
статья, добавлен 05.09.2022In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
книга, добавлен 09.04.2013- 40. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 Features of the mechanism that will help to identify lines with Romanian chromatic words on the basis of computer technology. Steps develop a dictionary of poetic meanings of colors. Development of the dictionary linguists and computer scientists.
статья, добавлен 23.02.2016Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.
книга, добавлен 08.03.2014Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
статья, добавлен 19.07.2020Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.
методичка, добавлен 11.10.2014- 45. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.
учебное пособие, добавлен 11.10.2014The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
презентация, добавлен 13.09.2015Functioning system BIOS when enabling the computer. Program CMOS Setup. The main sections of the program BIOS Setup. Advanced BIOS, Chipset Features. Power Management Setup. Adjustment computer system parameter. Determination load device operating system.
реферат, добавлен 02.06.2009Вatch generation of web pages, local interaction. Non-linear structure: blocks of text, links between pages create a mesh or network, users follow their own path through information. Delivery technology: on the computer, on the web, on the move.
презентация, добавлен 28.12.2013Техника общих вычислений на графическом процессоре. Архитектура NVIDIA и AMD ATI Stream Technology. Технология программирования модулей памяти CUDA. Описание алгоритма расчета схем адвекции. Распараллеливание видеоданных с помощью библиотеки OpenMP.
дипломная работа, добавлен 30.11.2016