?????????? ?????????????? ?????????
?????????? ??????? Dialog based, ???????????? ????????? ? ?????????? ??? ????????. ????? ?????????, ????????? ??????? ???????. ???????? ????????? ? ??????? ?????????? ????????? ? ?????????????? ????????? progress ? slider. ?????? ???????? ? ????.
Подобные документы
The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
??????, добавлен 22.12.2016- 27. Study of two 3D face representation algorithms using range image and curvature-based representations
The analysis of algorithms for image representation to recognition of 3D face scans with the presence of facial expressions. The input point cloud based on curvature analysis and range image representation to achieve a representation of the face features.
??????, добавлен 23.06.2016 Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
??????, добавлен 15.09.2012Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.
?????, добавлен 08.03.2014Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.
??????, добавлен 02.10.2024The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
??????, добавлен 23.06.2016New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.
????????? ???????????, добавлен 08.03.2014A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
?????, добавлен 08.03.2014Robots as mechanical assistants of a person who are able to perform operations based on the program, embedded in them, and respond to the environment. Acquaintance with the transhumanist significance of robotics. Analysis of the scope of robots.
???????????, добавлен 03.04.2018Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
??????, добавлен 09.09.2021Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
???????? ??????, добавлен 25.06.2017Assessing the acceptability of the developed IDE. C-SOLVIS is a web-based application designed to facilitate the teaching and learning of C programming in higher education institutions. An iterative prototyping process followed by program creation.
??????, добавлен 16.08.2023A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
??????, добавлен 15.09.2012Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.
?????, добавлен 08.03.2014Studies show that despite the existence of a large number of monitoring methods used in the evaluation of the technical condition of generators on a real-time basis in modern times, they create certain limits in the evaluation of some parts or parameters.
??????, добавлен 08.12.2024?????? ?????????? ????????? ???-???????? ?????? ???? "??????????? ?????????". ????????????? ???? ?? ?? ?????????: DOM-based, ???????? ? ?????????. ?????? ?????????????? ????? ?????? ? ???????????????????? ??????? ?????????????? ? ???-????? ??? ??????????.
??????, добавлен 12.01.2018The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
??????, добавлен 15.09.2012Rotational Rebound Attacks on Reduced Skein. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Constant-Size Commitments to Polynomials and Applications.
???? ??????, добавлен 08.03.2014A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
?????, добавлен 08.03.2014To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
??????, добавлен 29.01.2016Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
?????, добавлен 08.03.2014Describe the architecture for building a cloud-based SaaS application platform, the main characteristics of the services. Creating a software template for the device of communication inherited of air transport, the use of algebras of real-time processes.
??????, добавлен 25.10.2016A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
???? ??????, добавлен 08.03.2014Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023Assessing the acceptability of the developed Integrated Development Environment (ICP). C-SOLVIS as a web-based application designed to facilitate the process of teaching and learning the basics of programming in higher education institutions in Malaysia.
??????, добавлен 11.07.2023
