Navigating the complexity: pseudo-chaotic systems and machine learning scientific research group

Structure and properties of pseudo-chaotic systems. Using machine learning tools for pattern recognition and event prediction. Consideration of ethical issues and assessment of the implications for the synergy of environmental sciences and bioengineering.

Подобные документы

  • Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.

    статья, добавлен 23.02.2016

  • The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.

    учебное пособие, добавлен 15.09.2012

  • Application of biomedical signals for the control purposes is currently growing interest of research society. In this paper application domain of using electroencephalographic signals obtained from an inexpensive Emotiv EPOC headset was described.

    статья, добавлен 23.06.2016

  • The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

    статья, добавлен 14.02.2022

  • More sophisticated laser scanning solutions. Uncontrolled movements as breathing, muscle contraction. Special optical systems and mirrors. The result of the scanning process in case a complete surface model of the person. Acquire texture information.

    статья, добавлен 22.02.2014

  • Преимущества смешанного обучения. Формы, модели и технологии обучения. Эффективность использования информационных технологий. Интернет и образование. Синхронные и асинхронные инструменты коммуникации. Сравнение очной формы обучения и E-learning.

    учебное пособие, добавлен 28.03.2011

  • The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.

    курс лекций, добавлен 08.03.2014

  • The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.

    статья, добавлен 30.07.2016

  • Interaction in agent-oriented systems. Separation of sets of agents into families in accordance with the tasks of the stages of situational management. Development of the model for the integration of behavioral and coordination aspects in agents.

    статья, добавлен 28.09.2016

  • Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.

    книга, добавлен 13.03.2014

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций, добавлен 08.03.2014

  • The principles of construction of the integrated modular avionics aircraft and its functional elements. Methods and means of control of IMA computer systems. Evaluate the reliability of IMA computing structures for different hardware configurations.

    статья, добавлен 13.07.2022

  • The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.

    статья, добавлен 30.01.2016

  • Сущность концепции Blended learning, ее виды. Анализ проекта Visual Math.ru - сервер-платформы написанной на языке программирования JavaScript для просмотра в онлайн режиме лекций с визуальными модулями. Концепция библиотеки Grafar и ее критика.

    курсовая работа, добавлен 27.08.2016

  • Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.

    дипломная работа, добавлен 08.03.2014

  • An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.

    книга, добавлен 08.03.2014

  • The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.

    книга, добавлен 08.03.2014

  • The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.

    учебное пособие, добавлен 11.10.2014

  • Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.

    учебное пособие, добавлен 25.11.2013

  • Стислий аналіз видавничої платформи Open Conference Systems як технічного засобу для організації та проведення електронних конференцій. Здійснено детальний огляд властивостей даної системи й обґрунтовано доцільність і ефективність її використання.

    статья, добавлен 27.12.2016

  • Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.

    книга, добавлен 08.03.2014

  • Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.

    презентация, добавлен 06.02.2019

  • Використання математичних концепцій в системах e-learning. Аналіз методів добору навчальних матеріалів на основі марковських процесів прийняття рішень у просторі основних станів. Сутність інтегральних моделей, які дозволяють враховувати часовий фактор.

    статья, добавлен 25.10.2016

  • Актуальність проблеми повторного використання електронних навчальних ресурсів, можливості їх перенесення з одного віртуального навчального середовища до іншого. Приклади практичного використання стандарту LTI у системі управління навчанням Moodle.

    статья, добавлен 31.01.2018

  • The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.

    статья, добавлен 04.10.2022

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.