Profiling a latent segmentation of Italian social networkers
Three types of Italian social networkers through the analysis of latent class conglomerates are shown in this study, based mainly on the level of use of the tools, as well as different covariates which determine the personal profile of social networkers.
Подобные документы
Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
??????, добавлен 09.08.2022The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.
??????, добавлен 22.09.2022Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
??????, добавлен 27.10.2020The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.
????????? ??????, добавлен 31.10.2016The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.
??????, добавлен 04.09.2022Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
?????, добавлен 08.03.2014Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.
??????, добавлен 03.07.2023Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
??????, добавлен 29.09.2016Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
??????? ???????, добавлен 25.11.2013Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.
??????, добавлен 23.05.2023The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.
??????, добавлен 23.06.2016The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.
??????, добавлен 23.02.2016Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
??????, добавлен 23.02.2016Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
??????, добавлен 15.09.2012Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
??????, добавлен 25.03.2019Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
??????, добавлен 20.03.2024Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
?????, добавлен 09.04.2013The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
??????, добавлен 22.12.2016?????? ???????? ???????? ? ????????? ???????????? ?????? ?????????????? ????. ????? ?????????? ? Profile Definition. ????????? ???????? ??????? ???????. ????????? ??? ??????????? ? ????????????. ?????????????? ?????? ????, ???????? ??????? ????????.
???????, добавлен 23.12.2013Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
??????, добавлен 08.03.2014A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
??????, добавлен 15.04.2014Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
??????? ???????, добавлен 15.09.2012Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
??????, добавлен 27.12.2016????????????? Framework.net ??? ??????? ??????? ????? ?????????? ??????????. ???????? ???????????? ?????????????? ????? CLR. ???????? DLL - ??????? ???? "Class Library". Windows Forms Application ??? ???????? ??? ????????, ?????????? ?? ????? C#.
???????????, добавлен 23.04.2020Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
??????, добавлен 14.01.2017
