An introduction to knowledge computing
To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
Подобные документы
Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
??????, добавлен 06.05.2018Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.
????????? ???????????, добавлен 08.03.2014This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.
?????, добавлен 25.11.2013Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.
??????, добавлен 14.01.2017?????????? ???-?????? (High Performance Computing). ??????????? ??????? ??????????? ???????????????? ?????? ? ????? ????? ??????, ???????? ???????????????? ?????. ??????????? ????????????? ??????? ?????????? ??????. ???????? ???????? ??????????.
??????, добавлен 14.09.2016Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.
??????, добавлен 09.01.2024The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.
??????, добавлен 24.02.2024Stages of treatment of phonology, morphology and syntax. The semantic structure of the disambiguation of ambiguous words in context. The distribution of vector representations in modern computer linguistics to simulate the semantic relationships of words.
???????????? ??????, добавлен 27.08.2016Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
??????, добавлен 19.07.2020- 111. Simple relational database text format for developing, describing and exchanging over a network
The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.
??????, добавлен 06.07.2023 The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.
??????, добавлен 28.02.2016Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
?????, добавлен 08.03.2014Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.
???????, добавлен 31.10.2012??????????? ??????????? ? ????????? ???????????????? ???????? ?????????? ??????????????? ????????????. ??????? ??-???????, ????? ???????? ? ?????????? ITIL. ?????? ?????????????? ????????? ITSM Reference Model. ??????????? ?????????????? ????????????.
???? ??????, добавлен 28.08.2016- 116. ?????? ISO/OSI
????????????? ?????? ?????????????? ???????? ?????? (Open Systems Interconnection Reference Model). ??????? ??????? ?????? ISO, ?????????????? ???????? ?????? ????? ???????? ????????????. ??????? ????????????? ? ?????????? ???????. ???????????? ???????.
???????????, добавлен 25.10.2013 ??????? ?????????? ???????? ?? ??????????. ??????????? ???????? ??? ????????? ?????? ????????. ???????? ?????????????? ?????????. ?????????? ????????? ??????????? ????????. ??????????????, ??????????? ?????????? Model. ?????? exe ????????? ??? MS-Dos.
???????????, добавлен 20.11.2022- 118. Newsgames
Cutthroat capitalism, its main tasks and functions related to videogames. Missi strike in September 12th triggers the conversion of new terrorists. Types of current event games. The splash screen from The Arcade Wire. The concept of infographics.
?????, добавлен 17.04.2013 Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
??????, добавлен 14.01.2017???????????? ?? ???????????????? ????????????????? ???????? InSync Model 8040. ????? ???????????????? ????????? ? ???????????? ????????, ????????? ???????????????? ? ????????? ?????????. ??????????? AV-???????? ?? ?????? ???????-????? ?? ?????? Ritter.
???????????, добавлен 12.01.2015????????????? ????????????? ????????????????. ?????????? ??????? ?????????????? ?????? ???????, ????????? ????????? ???? Arduino Uno ? Raspberry Model B+. ??????? ????????????? ????????????? ???????? ?????. ?????? ???????? ????????, ?????????? ?????????.
????????? ??????, добавлен 07.12.2019A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
?????, добавлен 08.03.2014??????? ???????? ? ????????????? ??????????? ?????????: ????????? ??????????, ?????? ???????, ??????? ??????, ?????????? ??????. ?????????? Model-view-controller, ????????????? ????? "??????-?????????????-?????????" ? ?????? ??????? ??????????????.
??????, добавлен 23.02.2016?????????? ? ???????? ????????? ? ??????????????? ????????. ????????? ??????? ?????? ? ??????? Model Predictive Control Toolbox ????????? Matlab. ?????????? ????????? MPC-?????????? ??? ??????? ??????????. ?????? ?????????????? ??????? ?????????????????.
???????????? ??????, добавлен 19.12.2018Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
?????, добавлен 08.03.2014