• Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.

    статья (1,7 M)
  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья (475,1 K)
  • In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.

    статья (648,0 K)
  • Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.

    дипломная работа (812,1 K)
  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие (1,1 M)
  • Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.

    книга (12,9 M)
  • To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

    статья (1,6 M)
  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга (1,3 M)
  • An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.

    книга (4,2 M)
  • There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.

    статья (808,6 K)
  • Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.

    статья (547,8 K)
  • Application of cloud kitchen technologies and online delivery based on relevant network services in the work. Advantages of cloud kitchens compared to traditional restaurants, which include reducing the cost of the product by eliminating some services.

    статья (2,2 M)
  • Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.

    дипломная работа (735,2 K)
  • The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.

    статья (23,8 K)
  • The possibility of a revolutionary breakthrough in the field of health care and medicine when using artificial intelligence. The use of complex statistical and mathematical tools and multidimensional data, which increases the probability of errors.

    статья (20,6 K)
  • The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.

    статья (627,6 K)
  • Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.

    статья (506,7 K)
  • Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.

    статья (23,9 K)
  • The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.

    статья (656,4 K)
  • A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.

    статья (85,6 K)
  • The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.

    статья (83,5 K)
  • The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.

    магистерская работа (2,8 M)
  • Особенности архитектуры платформы Google Android, ее место среди других платформ. История версий операционной системы для смартфонов. Статистика распространения версий Android. Характеристика встроенных приложений. Уровни архитектуры Google Android.

    реферат (775,3 K)
  • Исследование рынка и особенности архитектуры Android приложений. Рассмотрение сервиса для организации и поиска событий. Характеристика инструментов разработки мобильного приложения. Описание особенностей архитектуры и основных компонентов Android.

    курсовая работа (1,9 M)
  • Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.

    дипломная работа (784,8 K)
  • Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.

    доклад (16,6 K)
  • Установка и настройка Web-сервера Apache для использования его на локальной машине под операционной системой Windows (2000 и XP). Запуск фоновых приложений при старте системы. Настройка конфигурационных файлов. Создание собственных виртуальных хостов.

    лабораторная работа (63,6 K)
  • Исследование истории основания американской корпорации Apple, производителя персональных и планшетных компьютеров, программного обеспечения. Описания первых программируемых микрокомпьютеров, компьютеров серии Macintosh, современной продукции корпорации.

    презентация (1,8 M)
  • The peculiarity of improving the organization of information on plus trees, accounting, examination and use as breeding objects. The use of free software (Python, JavaScript) and the use of the PostgreSQL relational database with the PostGIS module.

    статья (2,0 M)
  • The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.

    статья (2,2 M)