Navigating the complexity: pseudo-chaotic systems and machine learning scientific research group
Structure and properties of pseudo-chaotic systems. Using machine learning tools for pattern recognition and event prediction. Consideration of ethical issues and assessment of the implications for the synergy of environmental sciences and bioengineering.
Подобные документы
Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
??????, добавлен 16.06.2024A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.
???????, добавлен 20.08.2010Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
??????, добавлен 26.06.2018The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
??????, добавлен 23.06.2016Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.
??????, добавлен 26.06.2016???????? ????????? ????????????? ?????, ??????? ???????? ??????????? ???????? ? ???? ? ????????????? ? ?????? Sym Power Systems ?? ??????? ????????????? ????? ????????. ??????????? ?? ????????????? ? ?????????? ? ????????????? ?? ? ??????????? ????.
???????????? ??????, добавлен 16.06.2009Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
??????, добавлен 23.02.2016Application of biomedical signals for the control purposes is currently growing interest of research society. In this paper application domain of using electroencephalographic signals obtained from an inexpensive Emotiv EPOC headset was described.
??????, добавлен 23.06.2016The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
??????? ???????, добавлен 15.09.2012The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
??????, добавлен 14.02.2022More sophisticated laser scanning solutions. Uncontrolled movements as breathing, muscle contraction. Special optical systems and mirrors. The result of the scanning process in case a complete surface model of the person. Acquire texture information.
??????, добавлен 22.02.2014???????????? ?????????? ????????. ?????, ?????? ? ?????????? ????????. ????????????? ????????????? ?????????????? ??????????. ???????? ? ???????????. ?????????? ? ??????????? ??????????? ????????????. ????????? ????? ????? ???????? ? E-learning.
??????? ???????, добавлен 28.03.2011The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
??????, добавлен 30.07.2016Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.
??????, добавлен 28.09.2016Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
?????, добавлен 13.03.2014Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
???? ??????, добавлен 08.03.2014The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.
??????, добавлен 13.07.2022The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
??????, добавлен 30.01.2016The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
?????, добавлен 08.03.2014Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.
????????? ??????, добавлен 08.03.2014An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
?????, добавлен 08.03.2014???????? ????????? Blended learning, ?? ????. ?????? ??????? Visual Math.ru - ??????-????????? ?????????? ?? ????? ???????????????? JavaScript ??? ????????? ? ?????? ?????? ?????? ? ??????????? ????????. ????????? ?????????? Grafar ? ?? ???????.
???????? ??????, добавлен 27.08.2016