??????????? ???????? MMSolver

??????????? ???????? MMSolver ???????????? ??? ??????? ???????????? ?????????? ?????????? ????????????? ????????. ?????????????? ?????????? ?????????, ??????? ?? ??????????, ?? ??????????. ???????? ??????? MatrixCalc, Task, Method. ????????? ???????.

Подобные документы

  • The adaptive learning algorithm for "extended neo-fuzzy neuron" is proposed, that has both following and smoothing properties and allows to solve problems of prediction, filtering and smoothing of non-stationary disturbed stochastic and chaotic signals.

    ??????, добавлен 29.07.2016

  • Analysis opportunities for using cloud technologies in higher education in Ukraine. The main task of cloud technologies, strategic and tactical goals of cloud computing at the technical universities. The typical structure of a technical university.

    ??????, добавлен 05.04.2019

  • The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.

    ??????, добавлен 26.08.2020

  • ???????? ????????? ????????????? ??????????? ????????? ???????????: ???????????, ??????, ??????? ? ????. ???????? ????????? HTML 4.0 ? ??? ????????????. ????????????? ???????? method ??? ???????? HTTP-?????? ???????? ??????. ????????? ???????? ???????.

    ???????????? ??????, добавлен 25.05.2016

  • Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.

    ??????, добавлен 15.03.2014

  • This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.

    ??????, добавлен 28.09.2016

  • Development of a basic robotics workstation with the method of training students in accordance with the specific needs of the robot teachers. The robot can also be used to install programs in the ROS environment, you need to install a Kinect add-on.

    ??????, добавлен 26.08.2020

  • Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.

    ??????, добавлен 29.04.2019

  • Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    ?????, добавлен 08.03.2014

  • The use of mobile smart tools - a factor that contributes to the introduction of the remote control method and smooth adjustment of key parameters of the diagnostic process. Components of a software package for determining a person's visual fatigue.

    ??????, добавлен 21.12.2021

  • ?he main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.

    ??????, добавлен 09.10.2018

  • Describe the architecture for building a cloud-based SaaS application platform, the main characteristics of the services. Creating a software template for the device of communication inherited of air transport, the use of algebras of real-time processes.

    ??????, добавлен 25.10.2016

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    ??????, добавлен 14.01.2017

  • Finding Small Solutions to Univariate and Bivariate Polynomial Congruences. The RSA Public Key Cryptosystem. Coppersmith Attack on Short Random Pads. Cryptanalysis via the Defining Equation. The Lattice Factoring Method. Improved Determinant Bounds.

    ???????????, добавлен 08.03.2014

  • In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.

    ??????, добавлен 18.08.2018

  • The detail parallelization a popular global search method, the PSO algorithm using MPJ Express. The parallel PSO algorithm’s robustness and efficiency are demonstrated by using four standard benchmark functions Alpine, Rosenbrock, Rastrigin and Schaffer.

    ??????, добавлен 23.02.2015

  • Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.

    ??????, добавлен 23.02.2016

  • The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

    ??????, добавлен 14.02.2022

  • Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.

    ??????, добавлен 17.12.2022

  • A method for performing a nonlinear form of Principal. Component Analysis is proposed. By the use of integral operator kernel functions one can compute principal components in high dimensional feature spaces, related to input space by some nonlinear map.

    ??????, добавлен 08.02.2013

  • The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.

    ??????, добавлен 28.02.2016

  • The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.

    ??????, добавлен 25.03.2016

  • Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.

    ??????, добавлен 23.05.2023

  • Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.

    ??????, добавлен 28.08.2016

  • Classification method of graphic and text area of the image. The principles and stages of construction of the narrative function characterizing the sizes of objects in the image, can be used for training and classification using support vector machines.

    ??????, добавлен 23.02.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.