Exploring the capacity of AI technologies to combat corruption
The exploration of the possibilities of digital technologies with elements of artificial intelligence as a promising tool for combating corruption-related criminal offenses. Strategy to address corruption-related criminal activities under of martial law.
Подобные документы
Exploring the world of covert communication. Hiding the goods with steganography. The hidden realm of steganography. Products that implement steganography. Sending stego files across a network. Ways by developing your secure communications strategy.
книга, добавлен 08.03.2014Natural Language Processing as a subfield of computer science and artificial intelligence is concerned with interactions between computers and human languages. The purpose of this paper, is to outline the linguistic and NLP methods for textual processing.
статья, добавлен 18.05.2022Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016Различные типы Network Address Translation, которые могут использоваться при передаче потоковых данных. Сложность обеспечения передачи потоковых данных через преобразование сетевых адресов. Применение стандартизованных технологий в сокращенном варианте.
статья, добавлен 29.04.2017The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.
дипломная работа, добавлен 30.08.2016UNIX Memory Management. Sharing of memory segments or regions. Allocating memory in pages. Address space management. Initial Access to Pages. Hardware Translation Tables. Hardware Requirements. Mappings between backing store and address regions.
презентация, добавлен 03.06.2012- 83. Trusted digital repositories in context: definitions, diagnoses, and directions for better practice
The purpose of the article is to consider the concept of a trusted digital repository (TDR) - not only in a broad context, but also in fundamental terms, in evaluating the efforts of professionals to set up processes and technical infrastructure.
статья, добавлен 29.09.2023 Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018Петафлопс раздора, проблема. Главные издержки доктрины. Росатом и создание суперкомпьютера. Основные причины, по которым суперЭВМ не вписывается в экономику российской оборонной системы. Роль компании Huawei technologies в разработке суперкомпьютера.
реферат, добавлен 14.09.2012A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
курс лекций, добавлен 08.03.2014Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.
статья, добавлен 04.09.2024The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
презентация, добавлен 28.12.2013The history and development of computational technologies from physical switches to the microprocessor. Principles batch processing of computer data. Browse famous innovators in the field of interactive paradigm shifts and their main achievements.
презентация, добавлен 28.12.2013The place of neural network modeling of language units as an innovative tool for modern research. The value of linguistic units, the genesis of which can be traced thanks to the interaction of an artificial neural network with an array of text data.
статья, добавлен 04.09.2024Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
презентация, добавлен 16.02.2015A method for performing a nonlinear form of Principal. Component Analysis is proposed. By the use of integral operator kernel functions one can compute principal components in high dimensional feature spaces, related to input space by some nonlinear map.
статья, добавлен 08.02.2013Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
статья, добавлен 15.09.2020Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
статья, добавлен 30.08.2022- 97. Анализ программного обеспечения для имитационного моделирования социальных и экономических систем
Сравнение с российским программным обеспечением для имитационного моделирования AnyLogic компании XJ Technologies наиболее популярных на российском рынке специализированных иностранных программных продуктов для оценки и выбора средства моделирования.
статья, добавлен 15.02.2020 Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014Особливості традиційних систем підтримки прийняття рішень та інтегрованих з Business Intelligence, їх основні можливості. Порядок використання білінг-панелі веб-хостингу для вибору доменного імені та обраного тарифного плану на прикладі UAhosting.
контрольная работа, добавлен 21.01.2016Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.
книга, добавлен 08.03.2014