Neural Networks applications in valuation of banner ad creative efficiency
The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
Подобные документы
The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016Основные компоненты творчества как продукта человеческой деятельности по созданию различных работ. Методы работы искусственного интеллекта в современном творчестве. Соавторство художника и нейросети. Принципы работы Neural style transfer. Проект DeepMind.
реферат, добавлен 02.08.2024The problem of reliability of air navigation system operator. The definition of the operator's reliability by the means of the chosen model. The choice of a system in accordance with the requirements of recovery operator efficiency after failure.
статья, добавлен 22.12.2016Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.
дипломная работа, добавлен 28.08.2016- 55. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks
Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.
статья, добавлен 03.12.2020 Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.
материалы конференции, добавлен 08.03.2014- 57. BIM-technology
Main features of BIM-technology. Getting of the digital copy of the building or a construction. Quick make changes to the project. Automation of issue of specifications and sheets of volumes. Main ways of achieving efficiency of the BIM-technology.
реферат, добавлен 21.10.2016 International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014Power BI is a business intelligence service created by Microsoft. It is a response to needs of users. Using a simple interface, it provides interactive visualisations and business intelligence opportunities, allowing you to create reports and dashboards.
статья, добавлен 16.06.2024Stages of treatment of phonology, morphology and syntax. The semantic structure of the disambiguation of ambiguous words in context. The distribution of vector representations in modern computer linguistics to simulate the semantic relationships of words.
магистерская работа, добавлен 27.08.2016Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
книга, добавлен 08.03.2014Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.
книга, добавлен 08.03.2014The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.
книга, добавлен 08.03.2014The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
контрольная работа, добавлен 20.05.2016Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
реферат, добавлен 24.12.2013The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.
учебное пособие, добавлен 25.11.2013A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
статья, добавлен 28.10.2020- 69. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks
Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.
статья, добавлен 27.05.2021 Вatch generation of web pages, local interaction. Non-linear structure: blocks of text, links between pages create a mesh or network, users follow their own path through information. Delivery technology: on the computer, on the web, on the move.
презентация, добавлен 28.12.2013Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
книга, добавлен 08.03.2014In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016Данные о производительности сети, определение интервалов времени хранения. Принцип неопределенности Гейзенберга для SNMP-опроса (Simple Network Management Protocol). Стратегии установки пороговых значений. Просмотр данных и предоставление их потребителю.
лекция, добавлен 17.04.2015Study methods and strategies for optimizing the performance of RESTful microservices. Implementation of caching mechanisms, load balancing solutions and use of asynchronous processing to improve the efficiency, scalability of microservices architecture.
статья, добавлен 12.12.2024- 75. A learning platform for developers of fault-tolerant systems based on the signal-parametric approach
Features a training platform for developers of fault-tolerant engineering systems. Application of the theory of diagnosing а state of the system and flexible recovery of her health. Support adaptive learning process using Bayesian probabilistic networks.
статья, добавлен 13.01.2017