An introduction to knowledge engineering
Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
Подобные документы
Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.
презентация, добавлен 28.12.2013A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.
реферат, добавлен 20.08.2010Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
статья, добавлен 26.06.2018Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.
статья, добавлен 26.06.2016Изучение принципов моделирования цепей, которые содержат индуктивные элементы и цепи с самоиндукцией в пакете Sym Power Systems на примере искусственных линий задержки. Определение их характеристик и параметров и представление их в графическом виде.
лабораторная работа, добавлен 16.06.2009Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
статья, добавлен 23.02.2016The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
учебное пособие, добавлен 15.09.2012The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
статья, добавлен 24.03.2016Introduction to Blind Signal Processing: Problems and Applications. Iterative Algorithms with Non-negativity Constraints. Basic Properties of PCA. Extraction of Principal Components. SOS Blind Identification Based on EVD. Computer Simulation Experiments.
книга, добавлен 25.11.2013The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
дипломная работа, добавлен 13.07.2020The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
курс лекций, добавлен 08.03.2014Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
презентация, добавлен 28.12.2013The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
статья, добавлен 30.07.2016The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
статья, добавлен 06.05.2018Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
статья, добавлен 13.08.2023Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
курс лекций, добавлен 08.03.2014The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
статья, добавлен 13.07.2022The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
статья, добавлен 15.09.2012- 75. Navigating the complexity: pseudo-chaotic systems and machine learning scientific research group
Structure and properties of pseudo-chaotic systems. Using machine learning tools for pattern recognition and event prediction. Consideration of ethical issues and assessment of the implications for the synergy of environmental sciences and bioengineering.
статья, добавлен 19.03.2024