??????? ???????????? ?????? ????????? ????????????????
??????????? ??????????? ???????????? ???????? ??? ????????? ????? ??? ????????????? ??????. ?????????? ?????????????? ???????????? ??????. ??????? ?????? ? ??????? ?????? WinQSB. ????????????? ??????? "Solve the problem" ??? ??????? ????? ??????.
Подобные документы
The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.
???????????? ??????, добавлен 27.08.2016Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
??????, добавлен 30.08.2016The importance of forecasting electricity consumption to improve its efficiency and increase the competitiveness of manufactured products by reducing the share of costs. Development of software to solve this problem, its functions and differences.
??????, добавлен 27.02.2023Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.
??????, добавлен 22.12.2016A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
??????, добавлен 15.09.2012The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
??????, добавлен 15.06.2012A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
??????, добавлен 28.10.2020An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
??????, добавлен 15.09.2012Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
??????, добавлен 15.09.2012The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.
??????, добавлен 27.03.2016????????????? ????????? solve ??? ?????????????? ??????? ????????? ? Mathcad. ??????? ??????????????? ? ????????????? ?????????. ????????? ? ?????????????? ??????? ?????? ???????? ?????????. ??????????? ??????? ????????????? ? ??????? ?????? ??????.
??????????? ??????, добавлен 21.10.2013Overview of software designed to solve engineering problems. Identify the features of Microsoft Office programs, Pascal, AutoCAD, KOMPAS, MATLAB, MATLAB Simulink and MATLAB Plots which are used for graphing, solving equations, functions, matrices.
???????????, добавлен 16.01.2016Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.
??????, добавлен 14.12.2024The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014The adaptive learning algorithm for "extended neo-fuzzy neuron" is proposed, that has both following and smoothing properties and allows to solve problems of prediction, filtering and smoothing of non-stationary disturbed stochastic and chaotic signals.
??????, добавлен 29.07.2016The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.
??????, добавлен 30.10.2016Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
??????, добавлен 22.12.2016The main features and functions of the service Google Docs. Characteristics of the use of this service for teaching computer science to future teachers of mathematics in order to solve information problems. Analysis of the use of the student service.
??????, добавлен 05.04.2019The essence of the national system of electronic information resources as a set of national resources needed to solve the problems of socio-economic development and electronic information resources of the National registry using a single technology.
??????, добавлен 20.01.2017The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.
??????, добавлен 22.02.2023Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.
??????? ???????, добавлен 25.11.2013One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.
?????, добавлен 08.03.2014Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
???????, добавлен 31.10.2012Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
??????, добавлен 09.09.2021The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
?????, добавлен 08.03.2014