Advanced Information and Knowledge Processing

In this book offered a collection of the latest contributions to the area of computational intelligence applications to fault diagnosis. The book contains 10 chapters. Each of the chapters focuses on some theoretical aspects of intelligence methodologies.

Подобные документы

  • Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.

    ??????, добавлен 16.02.2016

  • Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.

    ???????????, добавлен 27.01.2015

  • Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.

    ??????, добавлен 09.12.2024

  • Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.

    ???????, добавлен 04.04.2016

  • Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.

    ????????? ??????, добавлен 08.03.2014

  • Essentially create and manufacture complex and unique prototypes with increased speed and versatility using 3D modeling. Using machine learning and generative design to improve the accuracy of 3D models, leading to increased manufacturing efficiency.

    ??????, добавлен 20.07.2024

  • To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

    ??????, добавлен 29.01.2016

  • Creation of an automated system for collecting information for the incoherent scattering radar. Characteristics of the composition of parameters that affect the control effect. Requirements for the parameters of the transmitting and receiving equipment.

    ??????, добавлен 30.10.2016

  • The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.

    ??????, добавлен 28.09.2016

  • Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

    ??????, добавлен 17.12.2022

  • Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.

    ???????????, добавлен 19.02.2014

  • With the rapid development of modern information technologies, their integration into all areas of education is accelerating, the penetration of innovations into the education space. Information technology as an integral part of modern education.

    ??????, добавлен 19.09.2024

  • ???????? ?????? Knowledge Net, ??????????????? ??? ???????????? ??????????, ????????????? ? ????????????? ?????? ? ?????? ??????? ??????????????? ???????????? ????????????????? ???????????, ? ?????? ????????? ????????? 4.0. ?????????????? ???????? ??????.

    ??????, добавлен 29.08.2021

  • The improving the network traffic analysis systems, including deep analysis systems, taking into account existing threats and vulnerabilities of network equipment and software of computer networks based on methods and algorithms of machine learning.

    ??????, добавлен 12.12.2024

  • ?????? ????????????? ???????????? ???????? ?? ????? ???????. ?????????????? ?????????????-????????????? ?????? ????????? ?????????????? ?????????? ?????????? ???????????. ?????????? ????????????? ????????? ????????? ??????? ????????????? ?????????.

    ????????? ??????, добавлен 19.08.2020

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    ??????, добавлен 14.01.2017

  • Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.

    ??????, добавлен 16.08.2023

  • Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

    ???????, добавлен 26.12.2014

  • ?????????????? ????? ???????????????? Visual Basic for Applications ? ??????????? ?????????????? ???????????? Excel. ???????? ??????????? ???? ?????????? ??????????? ????????????, ???????? ????????? ?????????? ? ??????????? ?????????? ?????????.

    ??????, добавлен 11.10.2016

  • The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.

    ???????????, добавлен 10.06.2016

  • Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.

    ?????, добавлен 08.03.2014

  • The role of linguistic means as backbone elements of any information and library system, a consolidated information resource of institutions of social memory. Criteria for the selection of linguistic tools for the development of their descriptions.

    ??????, добавлен 12.07.2021

  • The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.

    ?????, добавлен 08.03.2014

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    ??????, добавлен 27.07.2016

  • ???????????? ????????? ???????? ? Visual Basic for Applications. ??????????? ???????, ???????? ? ????????????? ?????????? ??????? ? ?????????. ??????????? ??????? ???????????? ??????????. ??????? ?????? ??????????? ? ?????????????? ?????????? ? Excel.

    ???????????? ??????, добавлен 24.05.2015

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.