Profiling a latent segmentation of Italian social networkers
Three types of Italian social networkers through the analysis of latent class conglomerates are shown in this study, based mainly on the level of use of the tools, as well as different covariates which determine the personal profile of social networkers.
Подобные документы
Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
книга, добавлен 08.03.2014Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.
статья, добавлен 03.07.2023Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.
учебное пособие, добавлен 25.11.2013Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.
статья, добавлен 23.05.2023The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.
статья, добавлен 23.06.2016The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.
статья, добавлен 23.02.2016Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
статья, добавлен 23.02.2016Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
статья, добавлен 15.09.2012Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
статья, добавлен 25.03.2019Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
статья, добавлен 20.03.2024Review of Basic Statistics With SPSS. Data Coding and Exploratory Analysis. Selecting and Interpreting Inferential Statistics. Several Measures of Reliability. Exploratory Factor Analysis and Principal Components Analysis. Multiple Linear Regression.
книга, добавлен 09.04.2013The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
статья, добавлен 22.12.2016Основы процесса создания и внедрения имитационной модели вычислительной сети. Выбор приложений в Profile Definition. Настройка загрузки каналов сервера. Параметры для компьютеров и коммутаторов. Количественный расчет байт, принятых рабочей станцией.
реферат, добавлен 23.12.2013Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
статья, добавлен 08.03.2014A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
статья, добавлен 27.12.2016Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Использование Framework.net как единого каркаса среды разработки приложений. Изучение общеязыковой исполнительной среды CLR. Создание DLL - проекта типа "Class Library". Windows Forms Application как основной вид проектов, строящихся на языке C#.
презентация, добавлен 23.04.2020Geometrical form of normal wear of die's working surface. Measuring system on base of threecoordinate machine-tool with numerical program control. Profile of natural wear of die is described by polynomial of third order with high degree of authenticity.
статья, добавлен 14.09.2016Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
статья, добавлен 15.09.2012- 123. Software evaluation
Procedure Oriented Programming. Return Type of mai. Example with Class. Creating Source File. Compiling and Linking. Representation of subjects of real problems in system design. Developing module, which are tolerant to any changes in the future.
курс лекций, добавлен 29.09.2014 The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.
книга, добавлен 08.03.2014