Advanced Information and Knowledge Processing
In this book offered a collection of the latest contributions to the area of computational intelligence applications to fault diagnosis. The book contains 10 chapters. Each of the chapters focuses on some theoretical aspects of intelligence methodologies.
Подобные документы
??????? ??????? ? ????????????? ???????????? ??????????? ???????? Asus. ??????????? ????????? Asus ?? ????????????? ???????? ???????????. ??????????? ?????????????? ?????????? Asus ZenFone, ????????? Transformer Book Duet ? ????????? ROG Swift PG278Q.
???????, добавлен 07.12.2014The purpose of this article is to review adaptive random testing is an improved version of random testing, that adapts the test case generation process based on the feedback from the previous test cases. Adaptive random testing aims to increase the fault.
??????, добавлен 13.12.2024Proposing of the risk management models for IT projects based on Markov chains. Analysis of tools of the buffer management concept, principles of agile methodologies, and knowledge management to address the issues connected with use of Morkovian model.
??????, добавлен 30.07.2017Theoretical aspects of the "Manuskryptorium" that enables easy access to informational resources, including written archival documents. Highlight and analyzed some issues on technical capabilities of users as well as aspects of a single electronic.
??????, добавлен 27.07.2016Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.
?????, добавлен 15.09.2012Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
??????, добавлен 25.03.2016A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
?????, добавлен 08.03.2014The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.
?????, добавлен 08.03.2014Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
??????, добавлен 19.07.2020????????????? ????????? Arduino ? ???????? ???????????, ???????????? ????????? ?????????????? ???????? ? ??????????. ?????????? ?????????? ?? ????? ???????????????? Processing, ????????????? ??????, ?????????? ? ????????, ???????????? ? ????????? Arduino.
??????, добавлен 31.03.2019?????????????? ??????????????? ?????? ??????? ??? ???????????? ??????????? ??????? ??????? ??? ???????? ???? ????????????. ???????? ?? ????????????. ??????? ????????? Business Intelligence. ????????? Cognos. ????????? ????????, ?? ??????? ?? ?? ??????.
???????, добавлен 22.07.2017??? ?????????? ?????????????????????, ??????????? ??????? ??????????????? ?????? ??????-?????????, ???? ???? — ?????????????? ?????? ????????? ?????, ??????????? ????? ???? ?? ???????? ???????? ????????????, ????????? ????????? ?????? ????????? ???.
???????, добавлен 18.12.2021Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.
?????, добавлен 08.03.2014Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.
??????, добавлен 29.10.2020Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.
??????, добавлен 14.12.2024?????????????? ? ?????????? ???????????? ?????????? ? ??????? WebTutor ?? ?????? ??????????? ????????? ?????? Business Intelligence ??? ?????????????? ?????????????? ???????????? ???????? ??????-?????????????. ??????? ????????? ???????????????? ????????.
????????? ??????, добавлен 30.08.2016- 92. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing ? state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
??????, добавлен 13.01.2017 ????????? ???????? Microsoft SQL Server ? Oracle. ????????? ??????. ????????? Business Intelligence Development Studio. ????? Windows ? ???????????????? ?????????. ????????????? ???????? ?????????? ????????? ???????? ?????. ???????? ?????? ???? ??????.
????????? ??????, добавлен 13.10.2013Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.
??????, добавлен 22.03.2023????? ??????????? ???????, ?????? ?????????????? ??????, ????????????? ?????????, ??????????????? ????????? ??????. ????????? ? ????????????????? ??????????? ? ???????????? ???????????. ??????????? ??? ?????????? ?? ?????? ???????? ??? ??????? ??????????.
??????, добавлен 12.05.2016A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.
??????, добавлен 20.07.2018A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
?????, добавлен 08.03.2014???????? ???????? "????????" ??????????, ?? ???????? ? "????????" ????????????? ??????-???????. ????????? ????????????? ??????????? ??????????????? ????? ? ????? ??????????? ? ????? ???????? "????????" ????????????? ??? ?????????? ?????????? ????????.
??????, добавлен 11.12.2018?????????????? ????????? ??????? ?? ???? ?????????, ?????? ??????????? ? ????????? ? ?????????? ????? (IoT), ??????????? Big Data (??????? ??????), ????????????? ??????????? (Artificial intelligence, AI) ? ??????? ???????????? ???????? ????????????.
??????, добавлен 04.11.2018Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
?????, добавлен 08.03.2014
