eONPUIR

xmlui.ArtifactBrowser.ConfigurableBrowse.title.metadata.type

xmlui.ArtifactBrowser.ConfigurableBrowse.title.metadata.type

Отсортировать по: Порядку: Результаты:

  • Quoc Tuan Le; Куок Туан Лє; Куок Туан Ле; Antoshchuk, Svеtlana; Антощук, Світлана Григорівна; Антощук, Светлана Григорьевна; Thi Khanh Tien Nguyen; Тхі Кхань Тієн Нгуєн; Тхи Кхань Тиен Нгуен; The Vinh Tran; Тхе Вінь Чан; Тхе Винь Чан; Nhan Cach Dang; Нхан Кач Данг (Odessa National Polytechnic University, 2020-09-22)
    Attending classes by students is associated with the assimilation of educational material by students and the ability to plan and organize activities. However, at present in educational institutions, as a rule, student ...
  • Olekh, Heorhii; Олех, Георгій С.; Олех, Георгий С.; Prokopovich, Ihor; Прокопович, Ігор Валентинович; Прокопович, Игорь Вfktynbyjdbx; Olekh, Tetiana; Олех, Тетяна Мефодіївна; Олех, Татьяна М.ефодиевна; Kolesnikova, Kateryna; Колеснікова, Катерина Вікторівна; Колесникова, Екатерина Викторовна (Odessa National Polytechnic University, 2020-09-18)
    The development of software and the creation on its basis of models that reflect the main features of project management systems is an important task of project management. Despite the significant differences between the ...
  • Dobrynin, Ye.; Добринін, Євген Вікторович; Добрынин, Евгений Викторович; Boltenkov, Viktor; Болтьонков, Віктор Олексійович; Болтенков, Виктор Алексеевич; Maksymov, Maksym; Максимов, Максим Віталійович; Максимов, Максим Витальевич (Odessa National Polytechnic University, 2020-09-23)
    An information technology for the automated assessment of the has been developed wear level has been developed. Information technology is based on the analysis of acoustic fields accompanying a shot. The acoustic field ...
  • Surkov, Sergii; Сурков, Сергій С.; Сурков, Сергей С. (Odessa National Polytechnic University, 2020-09-21)
    An essential part of web security is keeping the payload intact from changes. The data during transmission could be changed, where the encryption is not used, or the data gets decrypted in the middle of the transmission. ...