Abstract: The classification of conflicts in the context-aware system based on its conceptual boundaries layers and features of its resolving.
Keywords: context-aware systems, conflict, conflict classification, conceptual boundaries layers, conflict resolution.
Abstract: The basic principles of the semantic reasoners were investigated and a comparative analysis was made.
Keywords: reasoner, Structural reasoner, Pellet, Hermit, semantic tableau, hypertableau, forward chaining, backward chaining.
Abstract: Lagrangian method (Discrete Phase Model) made simulation of multiphase flows motion in compressor station fittings (elbows, tees) to program complex ANSYS Fluent R17.0 Academic.
Keywords: elbow, discrete phase, erosion wear, computer modeling, Lagrangian method, tee.
Summary: The article considers the problem of using VirtualBox virtualization environment for automated testing of mixed cryptographic systems..
Key words: information protection, testing in virtual environment, VirtualBox, cryptographic system.
Summary: In this work an overview of existed systems of cluster analysis and data visualization was made. After analysis and projecting was made system with such functionality: uploading, normalizing and analysis of input data; cluster analysis using various types of algorithms; visualization and saving results of cluster analysis.
Key words: cluster analysis, data analysis, big data, cluster, distance measure.
Summary: The work is dedicated to the development of an automated system of big data collection, processing and analyzing.
Key words: hadoop, big data, flume, data processing.
Summary: The article considers problems are used for applications and also software tools used for inspection of code and launched a new security model code.
Key words: information security, protection system against hacking.
Abstract: The modern requirements of the choice of platform for distance learning are analyzed and administrative functions of management training are considered. The methods of designing e-course are described. The approach to the organization of the curriculum, based on a combination of traditional education with on-line education on the example of the discipline "New Information Technologies" for prospective philologists of Zhytomyr Ivan Franko State University. This course will be adapted for blended learning, described the structure of the educational-methodical complex on-line course. The on-line course is fully complied of credit-module and it makes possible to use it in assessing students in all learning activities and organizes independent work. This course enables intermediate and final sections of knowledge.
Keywords: distance learning, information technologies.
Summary. The corresponding sub-system deals with measurable properties that can be orthogonal outputs of filters, or any other potential operators.
If the output signal is continuous it is quantized as if the logic, then this is perceived, and each digital input signal is treated as a dimension. Proposed in this paper, an automatic signal detection system allows the device structure based on mass-produce integrated circuits and microprocessors to develop a model and prototype systems.
Abstract: Genetic Algorithms are a powerful search technique based on the mechanics of natural selection and natural genetics that are used successfully to solve problems in many different disciplines.
In this paper we present genetic algorithms in one of the most important optimization problems in computer science, database query optimization for large join query.
Current query optimization techniques are inadequate to support some of the emerging database application. In this paper, we outline a database query optimization problem and describe the adaptation of genetic algorithm. And comparison between simple SQL queries having five join and same query using genetic approach. And also give basic overview of the Carquinyoli Genetic Optimizer based on Genetic Programming.
Keywords: Genetic Algorithms, Query Optimization.
Summary: Were investigated main features of the functioning of mobile applications for asthmatics.
Key words: asthma, mobile, application, treatment.
Summary: Basic information and properties of zirconia ceramics, its field of application.
Key words: zirconium, ceramics, prosthetics, stomatology.
Summary: The aim of this work is to consider the possibilities Rsync utility as a tool for file synchronization and backup on remote machines.
Key words: synchronization, Rsync, backup, remote access, SSH, Linux, GUI.
Summary: The aim of this research is to create a methodology for developing SaaS-applications, which would combine basic design patterns cloud-native applications and provide an environment for their easy creation and support.
Key words: software-as-a-service, deployment, concurrency, port binding, scalable, cloud platform
Summary: The article considers theoretical and methodological foundations of the technology of object-documentary analysis (T-MODА) as an effective means of optimizing intellectual work. Substantiates the possibility of modifying the technology for the implementation of information document analysis of the subject area. An example of the practical application of the modifying T-FASHION to make the optimal decision.
Key words: technology T-MOD, smart filter, NOPS-format, optimization of the thinking process, information domain analysis, decision making.
Summary: Analyzed and compared with analogue Canvas tag for use in multimedia.
Key words: multimedia, graphics, cross-browser compatibility, HTML5, Canvas, Web-site, Web-application.
Summary. Energy consumption of domestic oil transportation systems to ensure their energy efficient operation in terms of diversification of sources of hydrocarbons was studied.
Keywords: alternative sources of oil, Iranian oil, oil transportation systems, energy efficiency, energy consumption.
Summary: Evolution of the Beijing strategy in Central Asia promulgated by the changes in the Western policies towards China and formation of the Eurasian economic union. The Beijing belt and road initiative as a broader context for such strategy.
Key words: China strategy in Central Asia, belt and road initiative, Western policies towards China, Eurasian economic union.
Summary: Were investigated main features of memory management in iOS applications using Swift.
Key words: class instance, strong reference, weak reference, unowned reference, optional type, initializer.
Summary: The problem of improving the efficiency of the mass advertising mailing was investigated.
Key words: mass advertising mailing, direct marketing, increasing the effectiveness of advertising, Data Mining methodology.