Programming of Numerical Methods (курсова робота)

Major: Cybersecurity
Code of subject: 6.125.01.E.109
Credits: 2.00
Department: Information Technology Security
Lecturer: professor Leonid V. Moroz
Semester: 4 семестр
Mode of study: денна
Learning outcomes: KN 3. Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. KN 4 Analyze, argue, make decisions in solving complex specialized problems and practical problems in the characteristics of professional activity, which are a complex and incomplete definition of conditions, be responsible for the decisions made. KN 10. Use modern software and hardware and assess the effectiveness of the quality of decision-making. KN 25. Knowledge of mathematical methods of optimization using the best performance characteristics of tools and systems. KN 1.1. Perform analysis and decomposition of information and telecommunication systems. KN 1.2. Analyze the relationship between information processes on remote computing systems. KN 1.4. Apply protection theory and methods to ensure information security in information and telecommunication systems.
Required prior and related subjects: Mathematical analysis. Linear algebra. Differential equations. Algorithmic languages and programming. Programming technologies.
Summary of the subject: Basic principles of construction of computer numerical methods. Basic mathematical models. Calculation errors. Problems of linear algebra. Elements of the theory of vectors and matrices. Nonlinear equations and systems. Systems of ordinary differential equations. Numerical methods for integrating functions of one variable. Differential equations in partial derivatives. Approximation of functions. Implementation of basic numerical methods in Maple and Matlab systems.
Assessment methods and criteria: • oral examination, test papers (30%). • final control - test (written, oral form) (70%).
Recommended books: 1. Турчак Л.И. Основычисленныхметодов. — М.: Наука, 2009г. 2. Джон Г. Мэтьюз, Куртис Д. ФинкЧисельнные методы. Использование Matlab. Издательский дом «Вильямс» Москва – Санкт-Петербург – Киев, 2001г. 3.. Фельдман Л. П., Петренко А. І., Дмитрієва О. А. Чисельні методи в інформатиці. — К.: Вид. група BHV, 2006. — 480 с.. 4. Л.М. Буката, Л.В. Глазунова ЧИСЕЛЬНІ МЕТОДИ ТА МОДЕЛЮВАННЯ НА ЕОМ. Одеса 2013. 5. ПРОГРАМУВАННЯ ЧИСЛОВИХ МЕТОДІВ МОВОЮ PYTHON. Підручник За редакцієючл.-кор. НАН України А. В. Анісімова. KНУ 2015. 6. Гаврилюк І.П., Макаров В.Л. Методи обчислень: Підручник: У 2 частинах. - К.: Вища школа, 2005р.

Programming of Numerical Methods

Major: Cybersecurity
Code of subject: 6.125.01.E.107
Credits: 4.00
Department: Information Technology Security
Lecturer: professor Leonid V. Moroz
Semester: 4 семестр
Mode of study: денна
Learning outcomes: KN 2. To organize own professional activity, to choose optimum methods and ways of the decision of difficult specialized problems and practical problems in professional activity, to estimate their efficiency. KN 4. Analyze, argue, make decisions in solving complex specialized problems and practical problems in professional activities, which are characterized by complexity and incomplete definition of conditions, be responsible for the decisions made. KN 12. Understand the values ??of civil (free democratic) society and the need for its sustainable development, the rule of law, human and civil rights and freedoms in Ukraine. KN 13. Knowledge of modern achievements of innovative technologies in the field of information technologies, cybersecurity and management. KN 20. Knowledge of basic approaches to the organization of standard complexes and means of information protection in information and communication systems. KN 21. Knowledge of new domestic and international standards of information security. KN 23. Knowledge of technologies of creation of protection systems of computer systems and networks for development and definition of the general principles of construction of protection systems, tasks and initial data which need to be considered at designing of protection systems. KN 1.4. Apply theories and methods of protection to ensure the security of information in information and telecommunications systems. KN 1.6. Solve problems of protection of information processed in information and telecommunication systems using modern methods and means of cryptographic protection of information. KN 3. Use the results of independent search, analysis and synthesis of information from various sources to effectively solve specialized problems of professional activity. KN 4. Analyze, argue, make decisions in solving complex specialized problems and practical problems in professional activities, which are characterized by complexity and incomplete definition of conditions, be responsible for the decisions made. KN 10. Use modern software and hardware and evaluate the effectiveness of the quality of decisions. KN 25. Knowledge of mathematical methods of optimization in order to obtain the best performance of tools and systems. KN 1.1. Perform analysis and decomposition of information and telecommunication systems. KN 1.2. Analyze the relationships between information processes on remote computing systems. KN 1.4. Apply theories and methods of protection to ensure the security of information in information and telecommunications systems.
Required prior and related subjects: Mathematical analysis. Linear algebra. Differential equations. Algorithmic languages and programming. Programming technologies.
Summary of the subject: Basic principles of construction of computer numerical methods. Basic mathematical models. Calculation errors. Problems of linear algebra. Elements of the theory of vectors and matrices. Nonlinear equations and systems. Systems of ordinary differential equations. Numerical methods for integrating functions of one variable. Differential equations in partial derivatives. Approximation of functions. Implementation of basic numerical methods in Maple and Matlab systems.
Assessment methods and criteria: • oral examination, test papers (30%). • final control - test (written, oral form) (70%).
Recommended books: 1. Турчак Л.И. Основычисленныхметодов. — М.: Наука, 2009г. 2. Джон Г. Мэтьюз, Куртис Д. ФинкЧисельнные методы. Использование Matlab. Издательский дом «Вильямс» Москва – Санкт-Петербург – Киев, 2001г. 3.. Фельдман Л. П., Петренко А. І., Дмитрієва О. А. Чисельні методи в інформатиці. — К.: Вид. група BHV, 2006. — 480 с.. 4. Л.М. Буката, Л.В. Глазунова ЧИСЕЛЬНІ МЕТОДИ ТА МОДЕЛЮВАННЯ НА ЕОМ. Одеса 2013. 5. ПРОГРАМУВАННЯ ЧИСЛОВИХ МЕТОДІВ МОВОЮ PYTHON. Підручник За редакцієючл.-кор. НАН України А. В. Анісімова. KНУ 2015. 6. Гаврилюк І.П., Макаров В.Л. Методи обчислень: Підручник: У 2 частинах. - К.: Вища школа, 2005р.