The Genesis of Bioinformatics
Bioinformatics Versus Other Disciplines. Further Developments: from Linear Information to Multidimensional Structure Organization. Probability-Generating Functions and Characteristic Functions. Transition Probability Matrix and State Transition Graph.
Подобные документы
- 101. Internet security
The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
контрольная работа, добавлен 07.08.2017 A method for performing a nonlinear form of Principal. Component Analysis is proposed. By the use of integral operator kernel functions one can compute principal components in high dimensional feature spaces, related to input space by some nonlinear map.
статья, добавлен 08.02.2013The essence of the national system of electronic information resources as a set of national resources needed to solve the problems of socio-economic development and electronic information resources of the National registry using a single technology.
статья, добавлен 20.01.2017The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.
статья, добавлен 26.06.2016The results of program modeling of biological "molecular current generator" are described. Simulation was done on the base of experimental studying of electrical currents through molecular channel-receptor complex in membrane of natural brain neurons.
статья, добавлен 14.09.2016Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.
презентация, добавлен 28.12.2013- 107. CISSP Certification
Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014 Short for Optical Character Recognition or Optical Character Reader is the process of taking an image of letters or typed text/ Main features of text recognition. Matrix matching and feature extraction. Matrix matching is the simpler and more common.
презентация, добавлен 06.06.2016Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.
статья, добавлен 23.02.2016Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.
книга, добавлен 08.03.2014An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.
статья, добавлен 12.01.2023A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014- 115. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
статья, добавлен 24.10.2018 Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
статья, добавлен 26.06.2018Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.
статья, добавлен 27.09.2016Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.
статья, добавлен 27.01.2019In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
книга, добавлен 09.04.2013How data visualization can help in genomic sequence analysis. The fragment of genetic text of a bacterial genome and analyzing its structure. The information in the genome encoded by non-overlapping triplets. Finding out the real gene positions.
статья, добавлен 08.02.2013- 124. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
курс лекций, добавлен 08.03.2014 The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024