Navigating the complexity: pseudo-chaotic systems and machine learning scientific research group
Structure and properties of pseudo-chaotic systems. Using machine learning tools for pattern recognition and event prediction. Consideration of ethical issues and assessment of the implications for the synergy of environmental sciences and bioengineering.
Подобные документы
Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
статья, добавлен 23.02.2016The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
учебное пособие, добавлен 15.09.2012Application of biomedical signals for the control purposes is currently growing interest of research society. In this paper application domain of using electroencephalographic signals obtained from an inexpensive Emotiv EPOC headset was described.
статья, добавлен 23.06.2016The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
статья, добавлен 14.02.2022More sophisticated laser scanning solutions. Uncontrolled movements as breathing, muscle contraction. Special optical systems and mirrors. The result of the scanning process in case a complete surface model of the person. Acquire texture information.
статья, добавлен 22.02.2014Преимущества смешанного обучения. Формы, модели и технологии обучения. Эффективность использования информационных технологий. Интернет и образование. Синхронные и асинхронные инструменты коммуникации. Сравнение очной формы обучения и E-learning.
учебное пособие, добавлен 28.03.2011The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
курс лекций, добавлен 08.03.2014The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
статья, добавлен 30.07.2016Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
статья, добавлен 28.09.2016Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
книга, добавлен 13.03.2014Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
курс лекций, добавлен 08.03.2014The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
статья, добавлен 13.07.2022The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016Сущность концепции Blended learning, ее виды. Анализ проекта Visual Math.ru - сервер-платформы написанной на языке программирования JavaScript для просмотра в онлайн режиме лекций с визуальными модулями. Концепция библиотеки Grafar и ее критика.
курсовая работа, добавлен 27.08.2016Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.
дипломная работа, добавлен 08.03.2014An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
книга, добавлен 08.03.2014The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
учебное пособие, добавлен 11.10.2014Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.
учебное пособие, добавлен 25.11.2013Стислий аналіз видавничої платформи Open Conference Systems як технічного засобу для організації та проведення електронних конференцій. Здійснено детальний огляд властивостей даної системи й обґрунтовано доцільність і ефективність її використання.
статья, добавлен 27.12.2016Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.
книга, добавлен 08.03.2014Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.
презентация, добавлен 06.02.2019Використання математичних концепцій в системах e-learning. Аналіз методів добору навчальних матеріалів на основі марковських процесів прийняття рішень у просторі основних станів. Сутність інтегральних моделей, які дозволяють враховувати часовий фактор.
статья, добавлен 25.10.2016Актуальність проблеми повторного використання електронних навчальних ресурсів, можливості їх перенесення з одного віртуального навчального середовища до іншого. Приклади практичного використання стандарту LTI у системі управління навчанням Moodle.
статья, добавлен 31.01.2018The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
статья, добавлен 04.10.2022