This article offers a risk assessment of bronchial asthma development in children with atopic dermatitis by applying
fuzzy-set theory to accumulated statistical data. It is shown that with a view to executing the said task one should
exercise a complex approach involving factors such as “IgE level”, “existence of obstructions” and “burdened bronchial
asthma heredity of immediate relatives”. The obtained results will assist in making adequate and well-informed medical
decisions as well as facilitate the decrease of the risk of developing bronchial asthma in children with atopic dermatitis.
The paper deals with a problem of insufficient productivity of existing computer means for large image processing, which do not meet modern requirements posed by resource-intensive computing tasks of laser beam profiling. The research concentrated on one of the profiling problems, namely, real-time processing of spot images of the laser beam profile. Development of a theory of parallel-hierarchic transformation allowed to produce models for high-performance parallel-hierarchical processes, as well as algorithms and software for their implementation based on the GPU-oriented architecture using GPGPU technologies. The analyzed performance of suggested computerized tools for processing and classification of laser beam profile images allows to perform real-time processing of dynamic images of various sizes.
The given work is devoted to research of perception content features by computerized training system students on cluster analysis base. As a result of experiment was revealed that content giving in the offered computerized training systems is more effective in comparison with the traditional approach. The proof is the increase of good student’s cluster.
It is shown that there are not enough productive methods that can help project managers to create and choose the effective strategies of organizing software development process. By using designed algorithm and mathematical model it's possible to find associative rules that are informative and can help project managers with forming effective process of creating software.
KEYWORDS: Safety, Information security, Computer security, Control systems, Telecommunications, Surface plasmons, Data processing, Data communications, Data modeling, Systems modeling
The article deals with research of designing data safety components for corporations by means of mathematical simulations and modern information technologies. Simulation of threats ranks has been done which is based on definite values of data components. The rules of safety policy for corporative information systems have been presented. The ways of realization of safety policy rules have been proposed on the basis of taken conditions and appropriate class of valuable data protection.
KEYWORDS: Information technology, Picosecond phenomena, Statistical analysis, Data modeling, Databases, Instrument modeling, Data storage, Data processing, Intelligence systems, Data mining
The article contains information technology of clustering problem situations in computing and office equipment, which is based on an information model of clustering and modified clustering methods FOREL and K-MEANS such situations.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.