???? ????????
????????????? ????? ????????? ??????. ??????? ????? ????????????? ? ????? ????????. ????????????? ????????????? ??????? (??????? ???????? ? ??????????) ??? ????????????? ???????? ???????? ? ?????? ST Neural Networks. ??????? ????????? ??? ??????????.
Подобные документы
- 26. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks
Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.
??????, добавлен 03.12.2020 ?????? ??????????????? ????????? ????? ??? ???? ?? ???????????? ?????, ?????????? ???????? ? ??????? ????????? ?????. ??????????? ?????? ? ??????? Neural Network Wizard (???????? ?????? ????????? ????). ??????? ????????????? ???? ?? ???? ????????? ????.
???????????? ??????, добавлен 20.02.2012Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.
?????????, добавлен 10.08.2011- 29. Digital automatic telephone station SI2000 for building up urban and rural communication networks
Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.
??????, добавлен 27.06.2016 Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
?????, добавлен 08.03.2014Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.
???????, добавлен 26.12.2014- 32. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks
Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.
??????, добавлен 27.05.2021 A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
??????, добавлен 15.09.2012- 34. ????????? ????
???????? ????????? ????????? ?????. ???????? ??????? ?? ????? ? ???????????? ??? ???????. ?????? ?????????, ??????????? ? ????? ????????. ?????????? ???????????????? ?????? ????????? Neural Network Wizard, ????????? ?? ?????? ????????? ???? ????????.
???????, добавлен 13.04.2014 ???????? ?????????? ?????????? ??? ???????? ???????????? ???????????? ?? ???????? ????????? ?????. ?????? ?????? ?????????????? ?????????? ? ??????????? ??????????. ??????????? ????????? ? ?????????. ???????? ?????? Neural style transfer. ?????? DeepMind.
???????, добавлен 02.08.2024Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
??????, добавлен 07.04.2021The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.
??????, добавлен 18.09.2018Stages of treatment of phonology, morphology and syntax. The semantic structure of the disambiguation of ambiguous words in context. The distribution of vector representations in modern computer linguistics to simulate the semantic relationships of words.
???????????? ??????, добавлен 27.08.2016The minimal model network comprising 2 QIF neurons that reciprocally excite each other and form a kind of neural oscillator, simulating the persistent activity of cortical delay selective neurons in a WM task. The effect of random perturbations.
????????? ??????, добавлен 13.09.2017Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.
?????, добавлен 08.03.2014?????? ???????????? ??????? Neural-Network-Driven Fuzzy Reasoning (NNDFR) ? ???????????? ????????? ?? ???????????. ?????????? ???????????? ?????? ??? ?????????? ????????? ??????? NNDFR. ?????????? ??????? ??? ??????? ????? ?????????????? ???????????????.
????????? ??????, добавлен 30.08.2016Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
?????, добавлен 08.03.2014???????????? ? ??????? ???????????????? ???? ?????? ??? ????????????? ?????, ? ?????????????? ?????? ???????? ArcGIS 10.1. ???????????? ??????? ???????? ???????????????? ???? "Triangular Irregular Networks". ????? ???????????? ???????? ?????? ?????.
??????, добавлен 17.03.2014- 44. Express Mali
The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.
????????? ??????, добавлен 30.06.2015 Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
??????, добавлен 09.09.2021The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
??????????? ??????, добавлен 20.05.2016Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
???????, добавлен 24.12.2013An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
?????, добавлен 08.03.2014Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
??????, добавлен 29.11.2016?omputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.
?????????, добавлен 11.10.2014