The scient issue of cyber security of autonomous systems and robotics
Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
Подобные документы
Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.
учебное пособие, добавлен 11.10.2014Robots and controllers: interfaces, operating system. Binary, analog, position sensor. Kinematics, driving program. Balancing robots: simulation, double inverted pendulum. Micro mouse contest. Maze exploration algorithms. Real-time image processing.
учебное пособие, добавлен 25.11.2013FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.
реферат, добавлен 20.08.2010Изучение принципов моделирования цепей, которые содержат индуктивные элементы и цепи с самоиндукцией в пакете Sym Power Systems на примере искусственных линий задержки. Определение их характеристик и параметров и представление их в графическом виде.
лабораторная работа, добавлен 16.06.2009The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
учебное пособие, добавлен 15.09.2012Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.
статья, добавлен 25.03.2019Analysis of existing methods and means of remote work with breadboard Arduino. The advantages of the Tinkercad Internet service in comparison with other tools of remote work. The service capability for microprocessor systems design has been considered.
статья, добавлен 23.07.2023Digital technologies in the field of personnel selection - the use of automated systems, various web resources and information systems for the digitalization of personnel selection processes. ATS (Applicant Tracking System) - applicant tracking system.
статья, добавлен 21.03.2024Implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The retrospective of development of library information systems and problematic issues related to the transition of library staff to work with them.
статья, добавлен 13.04.2023The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024Types of groupware: computer-mediated communication, meeting and decisions support systems, shared applications, artefacts. Implementation issues. Cooperative work involves: participants, artefacts. Email and bulletin boards. Structured message systems.
презентация, добавлен 28.12.2013Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
презентация, добавлен 28.12.2013Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
статья, добавлен 28.09.2016A mechanical or virtual artificial agentis which guided by a computer program or circuitry. A breed of robots that are designed to increase the utilization by modularizing their architecture. The functionality and effectiveness of a modular robot.
презентация, добавлен 05.12.2015The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
статья, добавлен 13.07.2022Стислий аналіз видавничої платформи Open Conference Systems як технічного засобу для організації та проведення електронних конференцій. Здійснено детальний огляд властивостей даної системи й обґрунтовано доцільність і ефективність її використання.
статья, добавлен 27.12.2016- 67. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing а state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
статья, добавлен 13.01.2017 The most common cyber threats in the educational environment. Analysis of the peculiarities of cyberattacks on educational institutions in times of war. Justification of the important factor in securing the educational space from cyber threats.
статья, добавлен 04.12.2023A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.
статья, добавлен 15.02.2021A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - а semantic cyber-physical system approach.
статья, добавлен 23.02.2016Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
статья, добавлен 12.08.2016- 72. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
книга, добавлен 13.03.2014Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
книга, добавлен 09.04.2013