The set of program models for ecological monitoring technical system based on principles of biophysics
The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
Подобные документы
Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018Development of an algorithm for identifying potential clients of factoring services based on information from databases of Russian banks. Its implementation in the VBA programming language. Recommendations for improving the efficiency of sales staff.
дипломная работа, добавлен 01.12.2019Анализ недостатков информационной среды и предложения по ее модернизации. Принципы построения единого информационного пространства (ЕИП) компании. Анализ использования мобильных приложений в сфере массового обслуживания. Разработка элементов ЕИП компании.
курсовая работа, добавлен 16.05.2017Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.
статья, добавлен 14.01.2017Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
статья, добавлен 27.05.2021One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.
книга, добавлен 08.03.2014Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
диссертация, добавлен 27.01.2015The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.
статья, добавлен 28.02.2016Features and functions widget bits. Link to the base program. The structure of the appearance, inclusion of the words: verbs, adjectives, nouns. Software tools for application development, identifying a user. A inactive variants of dynamic interaction.
лекция, добавлен 28.12.2013The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016Application of sorting to organize large data arrays. Data sorting algorithms. Study of the algorithm for parallel hyperfast sorting of data arrays in the C# programming language. Development of flow graph and program code. Using the test program.
статья, добавлен 08.06.2024- 112. Task models
Methods to analyse people's jobs. Approaches to task analysis. Development of the script processing, review grammar. Description of the procedure subtasks, hierarchical evaluation tasks using temporary operators. Refinement description of the model.
лекция, добавлен 28.12.2013 A concentrator intended for collect and processing signals of the origin of fire from different sensors is developed. Information from the sensors is transmitted through the system of main and remote concentrators to the fire extinguishing system.
статья, добавлен 21.06.2016Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.
дипломная работа, добавлен 22.07.2016Характеристика имитационной модели NIDPS (Network-based Intrusion Detection and Prevention System) для обнаружения и предотвращения вторжений в телекоммуникационных системах и сетях. Пакет Wireshark для реализации процедур захвата и фильтрации трафика.
статья, добавлен 23.02.2016Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.
статья, добавлен 23.02.2016Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.
статья, добавлен 02.10.2024- 119. Cognitive models
Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.
лекция, добавлен 28.12.2013 Theoretical aspects of the "Manuskryptorium" that enables easy access to informational resources, including written archival documents. Highlight and analyzed some issues on technical capabilities of users as well as aspects of a single electronic.
статья, добавлен 27.07.2016Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.
лекция, добавлен 23.05.2016- 124. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing а state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
статья, добавлен 13.01.2017 - 125. Парадигма керування потоками даних та їх графічне представлення в System Oriented Architectures
Особливості методу архітектурної побудови System Oriented Architectures з застосуванням парадигми керування потоками даних. Графічне зображення потоку даних та їх обробки в SOA архітектурі, що дозволяє компіляцію складових частин в програмний код.
статья, добавлен 22.03.2016