The aim of the research consists in development of offers and recommendations about further improvement of criminal-legal and criminological measures of fight against crimes in the sphere of information technologies and safety.
The object of the research work is the system of the public relations regulating criminal-legal, criminological and organizational measures for counteraction to crimes in the sphere of information technologies and safety.
The scientific novelty of the research consists of the following:
the expediency of establishment of administrative responsibility for violation of personal privacy at compliance with the law about protection of private life, ensuring protection of the rights of citizens and also completion of legal gaps is proved;
need of establishment of responsibility for infringement of personal privacy in article 1411 Criminal Code of the Republic of Uzbekistan when ensuring criminal legal protection of personal privacy and inevitability of responsibility is proved;
for ensuring the principles of justice and humanity in the criminal legislation the expediency of awarding punishment in the form of restriction of freedom on the persons who have committed crimes in the sphere of information technologies is proved;
high degree of public danger of some crimes (illegal activities for attraction of money and (or) other property (article 1881 of CK), production, storage, distribution or demonstration of the materials containing threat of public safety and to public order (article 2441 of CK)) committed with use of networks of telecommunications and the Internet is explained;
establishment of responsibility for bringing to suicide and inducement to suicide with use of networks of telecommunications and the Internet is proved;
need of introduction of responsibility of the blogger for placement of public negative information of a certain look for the Internet is proved;
inadmissibility of use of personal data of the participants at implementation of electronic commerce for who aren't provided by the contract, need of nondisclosure of the specified data are proved;
establishment of the ban on distribution among children of the information justifying illegal behavior and promoting commission of offense, calling for promotion of the destructive ideas in society and also responsibility for the specified acts is offered;
expediency of application of a method of «confidential dialogue» concerning the persons who have committed information crimes, need of implementation of inquiry, the investigation and preventive measures proceeding from their psychological state are specified;
need of recognition of the actions exerting negative impact to life, health and morality of the personality, made with use of means of information technologies as socially dangerous act is offered.
Implementation of research results. The results of the study are used:
the proposal on establishment of administrative responsibility for violation of personal privacy has found the reflection in article 461 of the Code of the Republic of Uzbekistan about the administrative liability entered by the Law of the Republic of Uzbekistan of September 23, 2016 No. ZRU-411 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from September 28, 2016, No. 06/1-05/1148-vkh). This change provides compliance with the law about personal privacy, protection of the rights of citizens and also completion of a legal gap in the legislation;
the proposal on establishment of criminal liability for violation of personal privacy has found the reflection in article 1411 of the Criminal code of the Republic of Uzbekistan entered by the Law of the Republic of Uzbekistan of September 23, 2016 No. ZRU-411 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from September 28, 2016, No. 06/1-05/1148-vkh). Establishment of criminal liability for commission of the act breaking personal privacy provides criminal legal protection of private life of the person and inevitability of responsibility;
offers on expediency of awarding punishments in the form of restriction of freedom concerning the persons who have committed crimes in the sphere of information technologies, have found the reflection in articles 2781-2786 Criminal Code of the Republic of Uzbekistan according to the Law of the Republic of Uzbekistan from August 10, 2015 No. ZRU-389 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 06/1-05). This offer serves purpose of alternative punishment for crimes in the sphere of information technologies;
high degree of public danger of commission of some types of crimes with use of networks of telecommunications and the Internet has found reflection in article 1881, the «g» point of third part of article 2441 Criminal Code of the Republic of Uzbekistan according to the Law of the Republic of Uzbekistan of April 25, 2016 No. ZRU-405 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 06/1-05). According to this offer criminal liability for use of information technologies in criminal intents has been established;
responsibility for bringing to suicide, the inducement to suicide made with use of networks of telecommunications and the Internet have been established in article 103 and 1031 Criminal Code of the Republic of Uzbekistan according to the Law of the Republic of Uzbekistan of June 13, 2017 No. ZRU-436 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 06/1-05). This offer has served establishment of criminal liability for the information attacks encroaching on human life;
regulations on responsibility of the blogger for dissemination of public negative information of some look on the Internet are introduced in articles 3 and 121 of the Law of the Republic of Uzbekistan from December 11, 2003 No. 560-II «About informatization» (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer serves prevention of various crimes committed with use of the Internet;
offers on inadmissibility of use of personal data of the participants at implementation of electronic commerce for who aren't provided by the contract need of nondisclosure of the specified data have found the reflection in article 18 of the Law of the Republic of Uzbekistan of May 22, 2018 No. ZRU-385 «About electronic commerce» (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer became a basis for the ban illegal use of personal data from participants of electronic commerce;
offers on establishment of the ban on distribution among children of the information justifying illegal behavior and promoting commission of offense, calling for promotion of the destructive ideas in society and also responsibility for the specified acts are introduced in article 16 of the Law of the Republic of Uzbekistan of September 8, 2017 No. ZRU-444 «About protection of children from information doing harm to their health» (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer has served recognition of dissemination of information among children of information doing harm to their health as illegal behavior;
offers on improvement of criminal liability for crimes in the sphere of information technologies and safety have been used by preparation of analytical notes within the Concept of improvement of the criminal and criminal procedure legislation approved by the resolution of the President of the Republic of Uzbekistan of May 14, 2018 No. PP-3723 (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer serves a proving of inevitability of responsibility for crimes in the sphere of information technologies and information security;
offers on expediency of application of a method of «confidential dialogue» concerning the persons who have committed information crimes, need of implementation of inquiry, the investigation and preventive measures proceeding from their psychological state have been introduced in activity of the relevant structural divisions of the Ministry of Internal Affairs of the Republic of Uzbekistan (the act of the Ministry of Internal Affairs of the Republic of Uzbekistan from July 2, 2018 No. 33/1985). This offer has served increase in efficiency of prevention of crimes in the sphere of information technologies and information security;
offers on need of definition of external influence, level of competence and practical skills of employees, motives of offense when studying the reasons of crimes in the sphere of information technologies and information security and also conducting monitoring of social networks have been introduced in activity of the relevant structural divisions of the Ministry of Internal Affairs of the Republic of Uzbekistan (the act of the Ministry of Internal Affairs of the Republic of Uzbekistan from July 2, 2018 No. 33/1985). This offer has served definition of the reasons and early warning of crimes in the sphere of information technologies and information security;
offers that the information security is object of criminal legal protection taking into account its direct connection with the state interests have found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03-07-02/124). This offer has served protection of information security as object of criminal legal protection;
offers on need of implementation of complex measures from law enforcement agencies for ensuring information security at information security have found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03-07-02/124). This offer has provided orientation of activity of law enforcement agencies on information security;
offer that threats of information security exert essential harm to the interests of the personality, society and state information have found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03- 07-02/124). This offer has allowed to estimate high degree of public danger of information threats as a factor of commission of information crimes;
the rule about protection of the personality against illegal information influence taking into account that impact on consciousness of the personality with use of means of information technologies exerts negative impact on life, health and morality of the personality, has found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03-07-02/124). This offer has served recognition of the specified actions as socially dangerous act.
Structure and volume of the dissertation. The thesis consists of an introduction, four chapters, a conclusion, a list of used literature and applications. The volume of the thesis is 260 pages.
Topicality and demand of the theme of dissertation. In world practice of informatization, systems of electronic document interchange (EDIS) arc considered and introduced last years not only as systems for automation of manage processes but also as high-grade platforms for creation of uniform information field, so borders of their use, certainly, expands and scientists of the world raises interest to them. In researches of leading scientists of infocommunication technologies the demand of problems of authentic gathering, transfer, analysis, coding of information during formation of office-work documents is allocated for getting of effective technologies raising mobility and productivity of EDIS.
Complex measures undertaken by the Government of Republic of Uzbekistan on development of systems of region-territorial automated management and to creation of uniform information field arc directed on wide introduction of information systems, EDIS, databases (DB) on the basis of modern information-communication technologies. In this connection, working out of new methods to intelligent processing of information resources used for improvement of data transfer quality, allowing effectively to find out and correct errors in structure of electronic document interchange with least material and time expenses, differs a special urgency and, at the same time, remains the unresolved theoretical and applied problem having important economic value.
Requirements to information resources and streams of data transmission as the important factor of efficiency and quality of EDIS functioning arc expressed in providing of stability, integrity, safety and authenticity of the information. One of important among factors is the criterion of authenticity of the information, caused by distortion of transferred messages in infocommunication networks because of failures and refusals of means, any handicaps in communication channels, errors of operators, scanning and recognition systems.
Hence, construction of effective systems to control of information authenticity during transfer and processing represents special scientific interest as priority technology of data processing, characteristic for conditions of automated management and electronic document interchange at the enterprises and organizations.
For existing methods, despite of providing the high level of information transfer authenticity, some unsolved questions is typical, and as basic of them it is possible to allocate the following: at development technologies of electronic documents interchange in structure of modern data transfer packages the significant volume of resource is spent for headings, at the same time the most part of information in headings remains constant from package to package during stream of transfer of the whole frame (redundancy of the information arising at it and mechanisms to provide reliability of deliveries consisting, basically, in sending the appropriate message and repeated transfer of packages, - result to additional time and material expenses while errors detection and elimination); code and hardware methods of information transfer control arc focused, mainly, on elimination the transposition mistakes in managing fields of packages; however, at data transfer there arc also distortions in information fields, which frequently reveal as multiple text mistakes.
In this relation, the decision of tasks for providing of information transfer authenticity is reasonable to consider in two aspects.
Solutions of the first type tasks should taken into account errors of the man-operator, scanning and other devices intended for input of the information. These kinds of mistakes make greatest volume of distortions in text and arise at Applied and Representation levels of OSI model (Open System Interconnection reference model).
Solutions of second type tasks, devoted to control of the information reliability, take into consideration the probability of distortions which occur at stages of Transport, Network, Physical and Line of model OSI.
Demand of the dissertation is characterized by the fact that introduction of a wide range of IP-enabled technologies in electronic document interchange is connected to requiring close attention tasks of detection and correction of errors during preparation and processing of documents.
This research work is focused on providing realization of laws of the Republic of Uzbekistan «On informatization», «On electronic digital signature», «On electronic document», «On electronic commerce», «On electronic payments», Decree of the Cabinet of Ministers of the Republic of Uzbekistan № 126 on 05.04.2011 «About measures on installation and use of a single secured e-mail and system of electronic document interchange in the executive office of cabinet of ministers, bodies of government and economic governance, local government».
Following that, the solution of listed tasks requires carrying out the special researches and development connected to creation of methods and algorithms, capable to control the information authenticity in structure of data transfer packages at the expense of use the enclosed redundancy, and able to function in transport environment, eliminating existing lacks. This fact causes necessity of allocation of a special class algorithms for providing of information authenticity on the basis of new type of PR-rcdundancy (property redundancy), defined by depending on properties of processed object.
Purpose of research is development ol constructive methods, models, algorithms and systems of information authenticity control during transfer and processing of the data on the basis of mechanisms used PR-rcdundancy of various nature, and software and algorithmic realization of results for developing technologies of electronic document interchange.
Scientific novelty of disscrtational research consists in the following:
concept, methodology and software and algorithmic bases to construction methods, models and algorithms for the information authenticity control in systems of electronic document interchange arc developed, classes of objects characterized by PR-rcdundancy, applied to provide accuracy, integrity, efficiency, compression, availability of information resources in EDIS arc allocated;
methods and algorithms arc offered for control of information reliability at the expense of use the artificial redundancy on the basis of linear, modular, plane summing mechanisms and definition of belonging to the coded subsets;
methods and software complexes arc developed for control of information reliability at the expense of use the natural redundancy on the basis of algorithms in which procedures of statistical, arithmetic, parsing coding, n-gram structured description, statistical pattern recognition and hashing of text elements arc realized;
for control and correction of spelling mistakes in texts on Uzbek language methods and algorithms arc offered on the basis of models of multilevel morphological analysis and n-grams Grammatik description;
on the basis of enclosed logic criteria, database and knowledgebase in structure of the built-in expert systems methods and algorithms arc developed for the control of information authenticity at the expense of use the structural-technological PR-rcdundancy;
methods arc offered to synthesis algorithms of text information reliability control in interactive system of errors detection and correction for developing technologies of electronic document interchange.
Conclusion
1. Developed in the dissertation constructive methods, models, software and algorithms complexes to control of information authenticity by principles of using of PR-rcdundancy on the basis of concepts of system analysis, control and information processing allow to increase efficiency and productivity of EDIS.
2. The estimation of current state of the theory and practice of code, hardware and program methods of control of authenticity information transfer had shown insufficiency of existing types of redundancy for providing qualitative functioning of EDIS. Principles of use of PR-rcdundancy at electronic documents for working out applied methods, software and algorithmic complexes to providing of information transfer authenticity have allowed to design toolkit of development of existing technologies.
3. Methods of: linear, plane and modular summation; codings by rules of Haffman, Lempcl-Ziv-Velch, Barrousc-Willcr, arithmetic coding, statistical recognition, logic control form methodical bases of use of PR-rcdundancy for expansion possibilities of algorithms and software complexes to providing of the information authenticity during drawing up, transfer and processing of electronic documents texts.
4. Efficiency of developed algorithms is shown and solutions arc got for tasks of control the information authenticity on the basis of criterion of mistakes undctccting probabilities. It is established, that they find up to 92 % of all kinds of mistakes, capable to correct single, double and adjacent transpositional mistakes, in comparison with existing methods reduce labour content and cost of control in 2-3 times if probability of mistakes is accepted as P«4-10-3, and also raise the information authenticity up to three orders.
5. To solving tasks of control and correction of spelling mistakes in Uzbek texts methods, algorithms and systems arc developed included morphological and n-gram structured models. The developed technique of getting frequency characteristics of n-gram on the basis of distortions probability parameters statistics arc applied during systematization hash-codes for parsing coding.
6. Interpolation and extrapolation methods of construction the logic and arithmetic function of statistical recognition arc used for working out algorithms to control of text elements images authenticity. Methods arc developed to control authenticity of alarm characteristics of text elements images in ncuronctworking system to information processing which includes parts of automatic recognition and control of images signals. Methods and algorithms arc realized in the structure system to control of information authenticity for eases when information in EDIS is represented as metatext on the basis of belonging attributes and classification of metatext on fuzzy semantic hypcrnct.
7. Methods and algorithms of the control of the information authenticity, based on methods of dictionary, statistical and hash-codings provide effective applying of the hardware-software environment of parallel computations NVIDIA with use of standard libraries of numerical analysis, optimized data exchange between CPU and GPU for optimization.
8. It is determined that at realization of the system to control of spelling on the basis of developed ways of description and identification of the software shell, treelike representation of n-gramm grammar and architecture of framework Sfinks-4 focused on various language models used PR-rcdundancy, the number of undetected errors and cost of realization considerably decreases, and labour content in comparison with the spelling control system on the basis of morphological analysis decreases twice.
9. Developed simulating algorithms, complexes of software and systems to control of information authenticity on the basis of using PR-rcdundancy have found practical application in systems of: automated organization of educational environment in high schools; adapted data transfer, processing and analysis in infocommunication networks; EDIS of enterprises.
10. The developed software complexes to control the information authenticity in structure of EDIS and computer system of adapted transfer, handling and data analysis arc implemented in real working conditions in the Samarkand branch «UzTelecom» of the State committee or communication, for informatization and telecommunication technologies of the Republic of Uzbekistan and in Joint Venture «Tasty-Fuit». Appropriate certificates confirm cost of economical efficiency of dissertation results.
Subject of the inquiry: the problem of a computerization of teaching the Bases of informatics and computer engineering techniques (BICET) in the system of secondary education.
Aim of the inquiry: to create effective means of pedagogical programmes (PPM) on BICET, aimed at computerization of teaching and to work out the methods of using it.
Methods of inquiry: studying and analysing the literature on the topic of the investigation; observing the teaching process; talks with teachers and schoolchildren; generalizing school teacher’s experience; internet forum; pedagogical experiment.
Novelty and theoretical importance of research: the concept of computer education of secondary education was worked out; the structure of process of computerizing teaching was analysed; the principles of computer education were worked out and means of computer education of teaching were systematized the ways of modelling the teacher’s and schoolchildem’s activities in the PPM, the process of accomplishing all types of exercises with the help of computer; the mechanism of working out the PPM of the BICET.
Practical value: PPM worked out by us were effectively used in BICET; the concept, principles and means of computer education of teaching may be used while computerization of other subjects, improving teachers’ training, compiling textbooks and educational supplies of computerization; the ideas in the thesis may serve as a theoretical basis to computerize all stages of education.
Degree of embed and economical effectivity: 80 works of the author concerning the theme of the dissertation were published, including monograph, textbooks and teaching supplies; the content of the investigation was discussed at a number of conferences.
Sphere of usage: while computerization of all stages of education; while compiling syllabi, textbooks and teaching supplies.
This textbook presents the formation of the digital economy, its technological foundations, the formation of the digital economy in the world and in Uzbekistan, the processes of using digital technologies in higher education and statistics. In addition, national and international cyber security, electronic government, digital democracy, transition from electronic government to digital state in conditions of digital transformation, prospects of digital state in Uzbekistan and risks that may arise in digital transformation processes are described. It is recommended as a textbook for undergraduate students of higher educational institutions in our republic. It is also intended for specialists, professors, teachers, researchers, graduate students and readers interested in the field of digital economy in economic sectors.
Computer vision as a scientific discipline refers to the theories and technologies for creating artificial systems that receive information from an image. Despite the fact that this discipline is quite young, its results have penetrated almost all areas of life. Computer vision is closely related to other practical fields like image processing, the input of which is two-dimensional images obtained from a camera or artificially created. This form of image transformation is aimed at noise suppression, filtering, color correction and image analysis, which allows you to directly obtain specific information from the processed image. This information may include searching for objects, keypoints, segments, and annexes;
Axiography is an objective method of examining the trajectory of the articular pathway, which allows us to assess the nature of the function in normal and functional disorders of the temporomandibular joint.To carry out the method of axiography, an Arcus digma axiograph (KaVo, Germany) was used, which was connected to a personal computer. Arcus digma (KaVo, Germany) is an electronic system for recording movements of the lower jaw, which allows for three-dimensional ultrasonic recording of movements of the lower jaw and registering angles to adjust the articulator to an individual function. An ultrasonic transmitter and a receiver mounted on a measuring arc were connected to the main device of the device. Data was saved directly during measurements on a connected computer, and the selection of workspaces and workflow management were carried out through the main device or using a pedal. The holder of the paraocclusive plug, which was fixed using Structur 2 SC (VOCO) to the vestibular surface of the teeth of the lower jaw, was connected to the transmitter. The selection of the required measuring program was carried out from the touch screen of the basic device. If necessary, all the measurements carried out could be reproduced in dynamic mode many times. All movements were performed while maintaining contact between the teeth of the upper and lower jaw. In this study, we used the proposed method of combined use of the Littmann electronic stethoscope and the Arcus digma axiograph (Fig.5) (innovation proposal No. 1600 dated 11.02.2016, authors: Geletin P.N., Morozov V.G., Mishutin E.A., Ginali N.V., Karelina A.N.). the combined application of axiography and auscultation of the temporomandibular joint is as follows:
8. The diagnosis was made based on the analysis of axigrams (deviation of the trajectories of opening and closing the mouth from the norm in the sections of the axiogram corresponding to the initial, middle and final phase of opening and closing the mouth and computer analysis of phonogram recordings according to the main characteristics of sound (sound strength and frequency) and the phase of opening and closing the mouth, in which sound phenomena occur.
The article discusses the experience of foreign countries in the use of digital technologies in combating corruption. It was determined that in a number of foreign countries, along with already approved technologies (e-government, information and crowdsourcing platforms), modern information technologies are being actively introduced, such as: technologies for processing large amounts of data (Big Data), distributed ledger (DLT), blockchain, data mining (Data Mining), intellectual analysis in the field of anti-corruption in public procurement, analytical tools for auditors (Forensic Tools), electronic verification systems for declarations of income, expenses, assets and interests of civil servants, electronic anti-corruption technologies in the implementation of the electoral process, etc. ...
It has been determined that the benefits of digitalization can only be realized with the appropriate infrastructures, regulations, financial resources and personnel trained in ICT.
It has been substantiated that the processes of digitalization of law enforcement activities contribute to an increase in the effectiveness of the anti-corruption policy, ensure its effectiveness, objectivity, reduce the cost of maintaining law and order, and minimize the influence of the human factor in this area.
It is noted that technologies based on neural networks and decentralized, synchronized databases will fundamentally change the nature of public administration and can significantly reduce the risks of corruption offenses in the future
As with many other fields where the involvement of intelligent systems with the help of Artificial Intelligence is prevalent, transportation system cannot be ignored when it comes to incorporating AI and automation in order to improve the current transportation system by using new advanced technologies. There have been a lot of new tech nologies have been implemented in transportation systems especially in public transportation, making it convenient to use for commuters and other users. Having said that, de spite the fact that new technologies have been used to tackle some of the existing issues,there are some problems that are still persisting. For instance, traffc jams can be seen even in developed cities around the world, making specialists think deeply and push the boundaries of technology to come up with innovative solutions to cure existing hurdles in transportation. In terms of easing the heavy traffc flow, intelligent traffc lights powered with AI have their own role to play and huge progress can be seen in this area of research.Some of the technologies that are used in smart traffc lights are induction loops, microwave radar, and video detection. What has been done in this work is quite different from previous technologies and methods and proposes a new methodology to be used in traffic lights and with help of this method, traffc jams can be reduced significantly. Precisely, an algorithm based on a convolutional neural network is used to detect vehicles, and depending on the traffc density determined by live video footage, traffc lights make a smart decision about which road should be opened more while other another road should be closed for less time. From the environmental and economic perspective, this technology with the proposed methodology reduces greatly gasoline use by cars, thus reducing carbon dioxide emissions and saving the time passengers waste when stuck in traffc jams.
The common form of interference is random additive noise, which is statistically independent of the video signal. The additive noise model is used when the signal at the output of the imaging system or at some intermediate conversion stage can be considered as the sum of the useful signal and some random signal (noise). The additive noise model describes well the action of film grain, fluctuation noise in radio systems, quantization noise in analog-to-digital converters, etc. [10, p.23-24 ].
Today, artificial intelligence is becoming more and more popular in almost every aspect of our daily lives. Artificial intelligence is usually concerned withthe creation of computer systems with the capabilities of the human mind: understanding, learning, discussing, solving problems, translating, and so on. During the study of artificial intelligence, human-intelligent programming, technologies and tools for designing intelligent systems, databases, knowledge bases, database management systems, speech interfaces, computer linguistics, computer graphics, computer networks and web programming , information security in computer systems
The study investigated the effect of problem-based learning method on students’ academic achievement in computer hardware maintenance in universities in Enugu state, Nigeria. The study adopted quasi-experimental research design. Pre-test, post-test of both treatment and control groups were analysed using Analysis of Covariance (ANCOVA). Findings from the study revealed that, there was a statistically significant difference in the academic achievement of students taught computer hardware maintenance with problem-based learning method and those taught with conventional method. Further analyses revealed that the male students had higher mean score than their female counterparts when taught with PBL method; however, there was no statistical significant difference in the mean achievement scores of students taught computer hardware maintenance with problem-based learning method and those taught with conventional method. It was therefore recommended among others that problem-based learning method should not be limited to teaching computer hardware maintenance, but should be extended to other computer education courses as well as other disciplines in other universities.
This paper deals with the problem of determining the convex shape of the curb trajectory in order to ensure the stability of the curb, enhance the safety of overburden stripping and open pit mining. The method of cubic splines is used to determine the trajectory of the side. For application of this method the length of the pit base (or ledge) is divided into arbitrary n parts and in each partial segment the corresponding cubic spline function is constructed, being combined, each curve into a common curve, gives a common curve corresponding to the profile of the trajectory of the pit face.
The article analyses special features of using innovative technologies in teaching process. At present, advanced innovative technologies are one of the main essential components of the educational activity of any educational institution. Innovation is a new one, designed to ensure gradual development, improvement of the system, its transition to a qualitatively new level of development.
At present, it is usual to divide innovative technologies into technological and methodological parts this classification is based on the specificity and place of application of innovations. Technological innovations in the field of education (training) are the use of modern information environment, software and computer technologies that affect the learning process, allowing you to build new schemes of interactive modes and individual approaches in the "teacher-student" relationship. Methodological innovations are innovations in the field of methods of training and education, teaching and learning, and the organization of the educational process. In modern times, this is the most common type of innovation, covering almost the entire education system.
This article provides analytical information on the use of 3D technologies in the education system, the introduction of digital technologies and the possible results to improve the quality of teaching through an individual approach to students using 3D resources.
Article is devoted to the definition of civil legal regime of computer viruses. The article studied the characteristics of a computer virus from other objects of civil rights and a detailed analysis of the following aspects: 1) an intangible object of civil turnover; 2) the transaction, the content of which does not comply with the legislation, as well as perfect for a purpose known to the opposing principles of public order or morality; 3) the source of increased danger; 4) force majeure; 5) occurrence basis of tort liability; 6) the ratio of the legal regime of computer viruses and computer programs.