Computer based identification of lines with Romanian chromatic words from poems
The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.
Подобные документы
"Computer-to-Plate" - ???????????? ???? ?? ?????-????? ???????? ?????????, ?? ??????? ???????????? ?????????, ?? ?????????????????? ????????????? ???????????. ????????????? ????????? ???????? ? ??? ????????????. ?????? ?? ?????-????? ???????? ?????????.
???????, добавлен 09.03.2011?????????????? ???????????? ????????????? ?????????? ?? ????????? ????????????? ????’?????. ??????????? ???????? ????????? ?????? ???????? My computer (??? ????’????) ??? ????????? ?????????? ??? ??????? ????????? ?????????? ?????????? ?? ????’?????.
???????????? ??????, добавлен 13.07.2017Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
???????????, добавлен 21.06.2015Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
???? ??????, добавлен 20.10.2016The results of program modeling of biological "molecular current generator" are described. Simulation was done on the base of experimental studying of electrical currents through molecular channel-receptor complex in membrane of natural brain neurons.
??????, добавлен 14.09.2016In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
??????, добавлен 07.12.2016??????? ???????? ?????????????????? ?????????? (??????? ?????????? ??? ????????? ??????????). ??????? ??? ???????? ? ???????? ??????? ??? ??????????. ?????????? ? ????????? ???????? Brain Computer Interface. ?????????????? ???????? BCI ??????????.
???????, добавлен 23.05.2014Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
???? ??????, добавлен 08.03.2014Vector computers, main memory background. Multilevel caches, a typical memory hierarchy. Core memory, semiconductor memory, DRAM. Fast hit times via trace cache. Increasing cache bandwidth by pipelining, non-blocking caches. Merging arrays example.
???????????, добавлен 03.06.2012- 110. NLP "recipes" for text corpora: approaches to computing the probability of a sequence of tokens
Natural Language Processing as a subfield of computer science and artificial intelligence is concerned with interactions between computers and human languages. The purpose of this paper, is to outline the linguistic and NLP methods for textual processing.
??????, добавлен 18.05.2022 Development new field of design - multimedia design. Communication of computer processes. Composition as a fundamental factor in the creation of multimedia products. Realization of the idea of project. Compositional organization of multimedia project.
??????, добавлен 10.05.2018The modern computer technologies. Drawing of clock-pulse generator that from pulse sequence for all programming system. Engineering graphics OrCAD Capture. Projecting and design of principal schemes in electronics, microelectronics and electrotechniques.
?????, добавлен 11.10.2014- 113. Use of Pixlr cloud graphics editor in the course of computer science teacher professional training
The introduction of new cloud technologies in the educational process is a priority for domestic education. The selection of appropriate services that can be used to improve the educational process remains the key issue in solving these problems.
??????, добавлен 23.06.2022 Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, O?net, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
??????, добавлен 25.12.2016One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
??????, добавлен 15.09.2012- 116. Computer-aided software engineering - ???????? Designer/2000 + Developer/2000 ? ????????? ????????
????????? ? ??????? ????????? ??????????? ? ?????????????? ?? ??????????? ?????????. ??????????????, ????????? ???????????? ??? ????? ?????????? ????? ?????????????? ??????. ????????? ???????? ??? ERwin, S-Designor, Computer-aided software engineering.
????????? ??????, добавлен 19.12.2016 Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
??????, добавлен 27.05.2021Universal design principles. Peculiarities of using multi-sensory systems. Applying speech, non-speech, sound, touch, handwriting and gestures in multi-modal systems. Recognition problems in interactive computer systems. Personal orientation of design.
???????????, добавлен 28.12.2013Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.
?????, добавлен 08.03.2014Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
?????, добавлен 08.03.2014A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
??????, добавлен 15.09.2012Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.
??????, добавлен 26.10.2016Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
??????, добавлен 09.09.2021Development of the program, applying the technique of surface voxelization of 3D-models based on graphic processes. Review of existing methods voxelization 3D-scenes view of the art surface voxelization. Analysis and results of performance tests.
????????? ??????, добавлен 11.07.2016Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.
?????, добавлен 08.03.2014
