The fourth industrial revolution glossarium: over 1500 of the hottest terms you will use to create the future. Alexander Chesalov

The fourth industrial revolution glossarium: over 1500 of the hottest terms you will use to create the future - Alexander Chesalov


Скачать книгу
attack – a targeted impact of software and (or) software and hardware on critical information infrastructure objects, telecommunication networks used to organize the interaction of such objects, in order to disrupt and (or) stop their functioning and (or) create a threat to the security processed by such object’s information.

      Computer engineering is technologies for digital modeling and design of objects and production processes throughout the life cycle.

      Computer incident is a fact of violation and (or) cessation of the operation of a critical information infrastructure object, a telecommunication network used to organize the interaction of such objects, and (or) a violation of the security of information processed by such an object, including as a result of a computer attack.

      Computer Network is a collection of interconnected endpoints in a many-to-many arrangement253.

      Computer programming is the process of performing a particular computation (or more generally, accomplishing a specific computing result), usually by designing and building an executable computer program. Programming involves tasks such as analysis, generating algorithms, profiling algorithms’ accuracy and resource consumption, and the implementation of algorithms (usually in a chosen programming language, commonly referred to as coding). The source code of a program is written in one or more languages that are intelligible to programmers, rather than machine code, which is directly executed by the central processing unit. The purpose of programming is to find a sequence of instructions that will automate the performance of a task (which can be as complex as an operating system) on a computer, often for solving a given problem. Proficient programming thus usually requires expertise in several different subjects, including knowledge of the application domain, specialized algorithms, and formal logic. Tasks accompanying and related to programming include testing, debugging, source code maintenance, implementation of build systems, and management of derived artifacts, such as the machine code of computer programs. These might be considered part of the programming process, but often the term software development is used for this larger process with the term programming, implementation, or coding reserved for the actual writing of code. Software engineering combines engineering techniques with software development practices254.

      Computer science is the theory, experimentation, and engineering that form the basis for the design and use of computers. She involves the study of algorithms that process, store, and communicate digital information. A computer scientist specializes in the theory of computation and the design of computational systems. Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, and information theory) to practical disciplines (including the design and implementation of hardware and software). Computer science is generally considered an area of academic research and distinct from computer programming.

      Computer simulation is the process of mathematical modelling, performed on a computer, which is designed to predict the behavior of, or the outcome of, a real-world or physical system. The reliability of some mathematical models can be determined by comparing their results to the real-world outcomes they aim to predict. Computer simulations have become a useful tool for the mathematical modeling of many natural systems in physics (computational physics), astrophysics, climatology, chemistry, biology and manufacturing, as well as human systems in economics, psychology, social science, health care and engineering255.

      Computer vision (CV) is scientific discipline, field of technology and the direction of artificial intelligence (AI), which deals with computer processing, recognition, analysis and classification of dynamic images of reality. It is widely used in video surveillance systems, in robotics and in modern industry to improve product quality and production efficiency, comply with legal requirements, etc. In computer vision, the following areas are distinguished: face recognition (face recognition), image recognition (image recognition), augmented reality (augmented reality (AR) and optical character recognition (OCR). Synonyms – artificial vision, machine vision.

      Computer vision processing (CVP) is the processing of images (signals) in a computer vision system, in computer vision systems – about algorithms (computer vision processing algorithms), processors (computer vision processing unit, CVPU), convolutional neural networks (convolutional neural network), which are used for image processing and implementation of visual functions in robotics, real-time systems, smart video surveillance systems, etc.

      Computer-Assisted Telephone Interviewing (CATI) /Personal Interviewing (CAPI) is a method of coding information from telephone or personal interviews directly into a computer during the interview. CATI/CAPI software usually has built-in consistency checks, will not allow wild codes to be entered, and automatically prompts the interviewer for correct skip pattern questions256.

      Computerized Maintenance Management System (CMMS) Software is CMMS software, which can be either cloud-based or on-premise, is designed to enhance the efficiency and effectiveness of maintenance activities, such as planning, scheduling, and monitoring of work orders and maintenance needs. A CMMS can also serve as a centralized location for industrial data257.

      Computerized physician order entry (CPOE) also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts258.

      Computing modules are plug-in specialized computers designed to solve narrowly focused tasks, such as accelerating the work of artificial neural networks algorithms, computer vision, voice recognition, machine learning and other artificial intelligence methods, built on the basis of a neural processor – a specialized class of microprocessors and coprocessors (processor, memory, data transfer).

      Computing system — a software and hardware complex or several interconnected complexes that form a single infrastructure designed to solve problems and process data (including computing).

      Computing units are blocks that work like a filter that transforms packets according to certain rules. The instruction set of the calculator can be limited, which guarantees a simple internal structure and a sufficiently high speed of operation.

      Condition Monitoring (CM) – the process of monitoring various conditions associated with machine health, including vibration and temperature. Condition monitoring lets maintenance teams quickly identify when conditions exceed set thresholds for normal operation and resolve issues before failure occurs259.

      Confidentiality ensuring that information is accessible only to those authorized to have access260.

      Confidentiality of information is a mandatory requirement for a person who has access to certain information not to transfer such information to third parties without the consent of its owner.

      Confirmation Bias is the tendency to search for, interpret, favor, and recall information in a way that confirms one’s own beliefs or hypotheses while giving disproportionately less attention to information that contradicts it261.

      Conformant digital certificate (for the My Health Record system)


Скачать книгу

<p>253</p>

Computer Network – Text: electronic. – https://www.freewave.com URL: https://www.freewave.com/freewaves-industrial-internet-of-things-iiot-glossary/ (date of request: 25.02.2023)

<p>254</p>

Computer programming – Text: electronic. – https://en.wikipedia.org (date of request: 07.07.2022) URL: https://en.wikipedia.org/wiki/Computer_programming

<p>255</p>

Computer simulation. – Text: electronic. – https://en.wikipedia.org URL: https://en.wikipedia.org/wiki/Computer_simulation (date of request: 07.07.2022)

<p>256</p>

Computer-Assisted Telephone Interviewing (CATI) – Text: electronic. – www.umich.edu (date of request: 07.07.2022) URL: https://www.icpsr.umich.edu/web/ICPSR/cms/2042#C

<p>257</p>

Computerized Maintenance Management System (CMMS) Software – Text: electronic. – https://blog.pruftechnik.com URL: https://blog.pruftechnik.com/industry-4-0-iiot-glossary-of-terms (date of request: 25.02.2023)

<p>258</p>

Computerized physician order entry (cpoe) – Text: electronic. – https://www.techtarget.com URL: https://www.techtarget.com/searchhealthit/definitions (date of request: 10.11.2022)

<p>259</p>

Condition Monitoring (CM) – Text: electronic. – https://blog.pruftechnik.com URL: https://blog.pruftechnik.com/industry-4-0-iiot-glossary-of-terms/ (date of request: 25.02.2023)

<p>260</p>

Confidentiality – Text: electronic. – https://digitalhealtheurope.eu URL: https://digitalhealtheurope.eu/glossary/confidentiality (date of request: 10.11.2022)

<p>261</p>

https://te-st.ruhttps://te-st.ru/2019/11/29/why-is-artificial-intelligence-biased/