????? ?????????? ?????????????, ???????????? ? ??????? ?????? ??????????? ?? ??????????

???????? ?????????? ?????????????, ??????????? ?????? ?????? ??????????? ?? ?????????? –Content-Based Image Retrieval. ??????????? ????????? ???????????, ?? ??????? ??????????? ???????? ??????????? ? ???????????? ???????? ?????????? ?????? ?????????.

Подобные документы

  • Modeling attempts of unauthorized extraction of stegano content (halftone test images) for different variants of disintegration of the array of lengths of the series of reference blocks of the original images. Modeling using portrait and landscape.

    ??????, добавлен 25.02.2024

  • Analysis of developing classification task based on structural connectomes. Custom metrics based on random walk logarithms. Performance metric and hyperparameters grid search. Results obtained for this functional connectivity based parcellation scheme.

    ????????? ??????, добавлен 27.08.2016

  • Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.

    ??????, добавлен 28.08.2016

  • ?????????????? ????????? ??? ????????????? ???????? ??????? ? Photoshop ? ??????? ??????? "????????? ? ?????? ???????????" (Content-Aware Healing). ?????????? ???????? ?? ?????????? ? ??????? ??????? "??????? ? ?????? ???????????" (Content-Aware Fill).

    ?????????? ?????, добавлен 30.08.2012

  • Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.

    ???????????, добавлен 19.12.2014

  • The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.

    ??????, добавлен 28.01.2017

  • ?????? ?????????? ????? ???????????? ??????????? ??? ?????????? ???? "Image Poster". ????? ??????? ???????????. ?????????? UML–???????? ??? ???????????? ??????????? ??? ?????????? ????. ????????? ?????????? ?????. ???????? ? ??????????????? ??????????.

    ????????? ??????, добавлен 25.05.2017

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    ?????, добавлен 09.04.2013

  • Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.

    ???? ??????, добавлен 08.03.2014

  • Various aspects of multimedia content encryption. His general performance and the fundamental techniques. The common encryption techniques, including complete, partial and compression-combined encryption, will be investigated, analyzed and evaluated.

    ?????, добавлен 08.03.2014

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    ?????, добавлен 08.03.2014

  • Basic protocols and Internet search them. Search Tools in WWW. Thematic catalogs. Characteristics of automatic indexes. World Wide Web Worm. Review of Russian search engines. Features search through directories and search engines in a pure form.

    ???????, добавлен 30.06.2014

  • A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.

    ??????, добавлен 15.09.2012

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    ???????????, добавлен 28.12.2013

  • The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.

    ??????, добавлен 22.03.2016

  • Development of the program, applying the technique of surface voxelization of 3D-models based on graphic processes. Review of existing methods voxelization 3D-scenes view of the art surface voxelization. Analysis and results of performance tests.

    ????????? ??????, добавлен 11.07.2016

  • Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.

    ?????, добавлен 08.03.2014

  • The NCBI Data Model. Submitting DNA Sequences to the Databases. Genomic Mapping and Mapping Databases. Information Retrieval from Biological Databases. Creation and Analysis of Protein Multiple Sequence Alignments. Sequence Assembly, Finishing Methods.

    ??????? ???????, добавлен 25.11.2013

  • Exploring different ways of assessing the value of hard currency. Calculating the hard currency exchange rate using a stack of technologies already used in the company. Distribution of income for game content. Improved dashboards for game producers.

    ???????? ??????, добавлен 17.07.2020

  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    ?????, добавлен 04.10.2014

  • The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.

    ????????? ??????, добавлен 31.10.2016

  • Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.

    ?????, добавлен 08.03.2014

  • The value of cluster analysis to explain a number of phenomena. Consideration clustering algorithms computational intelligence, particularly based on neural networks and kernel-based learning. Review their application to five's real world problems.

    ??????, добавлен 08.02.2013

  • The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.

    ??????, добавлен 23.06.2016

  • The computer based mechanism which lead to the identification of lines with Romanian chromatic words as the first step in the process of elaboration of a dictionary of poetic meanings of colors. The cooperation of specialists from different fields such.

    ??????, добавлен 23.02.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.