Results 101 to 110 of about 288 (121)
Some of the next articles are maybe not open access.
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение и клаÑÑиÑикаÑÐ¸Ñ ÑеÑевÑÑ
аÑак Ñ Ð¸ÑполÑзованием BiLSTM нейÑоннÑÑ
ÑеÑей. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ Ð½ÐµÐ¹ÑоннÑе ÑеÑи BiLSTM Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ñак на ÑÑÑÑойÑÑва ÐнÑ
openaire +1 more source
openaire +1 more source
2019
This paper presents an approach to detecting network anomalies using autoen-coders. It provides an overview of the features of classical artificial neural networks and deep learning neural networks. The analysis of autoencoder architecture has been made and models of autoencoder have been built.
openaire +1 more source
This paper presents an approach to detecting network anomalies using autoen-coders. It provides an overview of the features of classical artificial neural networks and deep learning neural networks. The analysis of autoencoder architecture has been made and models of autoencoder have been built.
openaire +1 more source
2018
Рданной ÑабоÑе пÑоведено иÑÑледование ÑазновидноÑÑей ÑекÑÑÑенÑнÑÑ Ð½ÐµÐ¹ÑоннÑÑ ÑеÑей, опиÑÐ°Ð½Ñ Ð¸Ñ Ð½ÐµÐ´Ð¾ÑÑаÑки и доÑÑоинÑÑва, а Ñакже облаÑÑи пÑименениÑ.
openaire +1 more source
Рданной ÑабоÑе пÑоведено иÑÑледование ÑазновидноÑÑей ÑекÑÑÑенÑнÑÑ Ð½ÐµÐ¹ÑоннÑÑ ÑеÑей, опиÑÐ°Ð½Ñ Ð¸Ñ Ð½ÐµÐ´Ð¾ÑÑаÑки и доÑÑоинÑÑва, а Ñакже облаÑÑи пÑименениÑ.
openaire +1 more source
2019
The object of the study is the design of an online clothing store. The purpose of the final qualifying work is to develop a unique, responsive and selling design online clothing store using the design thinking methodology. Research has been carried out in the field of the design under development.
openaire +1 more source
The object of the study is the design of an online clothing store. The purpose of the final qualifying work is to develop a unique, responsive and selling design online clothing store using the design thinking methodology. Research has been carried out in the field of the design under development.
openaire +1 more source
2010
Ð ÑбоÑнике пÑедÑÑавлено кÑаÑкое ÑодеÑжание дипломнÑÑ Ð¿ÑоекÑов и магиÑÑеÑÑÐºÐ¸Ñ Ð´Ð¸ÑÑеÑÑаÑий вÑпÑÑкников 2007-2010 годов каÑедÑÑ Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÑÑÑÐ¸Ñ ÑÑ Ð¸ÑÑоÑников ÑнеÑгии и гидÑоÑнеÑгеÑики по напÑавлениÑ
openaire +1 more source
Ð ÑбоÑнике пÑедÑÑавлено кÑаÑкое ÑодеÑжание дипломнÑÑ Ð¿ÑоекÑов и магиÑÑеÑÑÐºÐ¸Ñ Ð´Ð¸ÑÑеÑÑаÑий вÑпÑÑкников 2007-2010 годов каÑедÑÑ Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÑÑÑÐ¸Ñ ÑÑ Ð¸ÑÑоÑников ÑнеÑгии и гидÑоÑнеÑгеÑики по напÑавлениÑ
openaire +1 more source
2018
Рданной ÑабоÑе пÑедлагаеÑÑÑ ÑаÑпÑеделÑÐ½Ð½Ð°Ñ Ð°ÑÑ Ð¸ÑекÑÑÑа ÑиÑÑÐµÐ¼Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑоÑжений на базе довеÑиÑелÑнÑÑ Ð¾ÑноÑений Ð´Ð»Ñ ÑамооÑганизÑÑÑÐ¸Ñ ÑÑ ÑеÑей на пÑимеÑе VANET.
openaire +1 more source
Рданной ÑабоÑе пÑедлагаеÑÑÑ ÑаÑпÑеделÑÐ½Ð½Ð°Ñ Ð°ÑÑ Ð¸ÑекÑÑÑа ÑиÑÑÐµÐ¼Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑоÑжений на базе довеÑиÑелÑнÑÑ Ð¾ÑноÑений Ð´Ð»Ñ ÑамооÑганизÑÑÑÐ¸Ñ ÑÑ ÑеÑей на пÑимеÑе VANET.
openaire +1 more source
Тeмa вÑпÑÑкнoй квaлиÑикaÑиoннoй ÑaбoÑÑ: «OбнaÑÑжeниe нeÑaнкÑиoниÑoвaннÑÑ
измeнeний лoкaлÑнoй вÑÑиÑлиÑeлÑнoй ÑeÑи». ЦeлÑÑ Ð´aннoй вÑпÑÑкнoй квaлиÑикaÑиoннoй ÑaбoÑÑ ÑвлÑeÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение неÑанкÑиониÑованнÑÑ
иР...
openaire +1 more source
openaire +1 more source
2019
ÐбнаÑÑжение аномалÑной акÑивноÑÑи ÑвлÑеÑÑÑ Ñложной пÑоблемой в видеонаблÑдении в ÑелÑÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи и заÑиÑÑ ÑиÑÑемÑ. ÐÑ Ð¿ÑедÑÑавлÑем новÑй Ð¿Ð¾Ð´Ñ Ð¾Ð´ к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ñной акÑивноÑÑи пÑи вР...
openaire +1 more source
ÐбнаÑÑжение аномалÑной акÑивноÑÑи ÑвлÑеÑÑÑ Ñложной пÑоблемой в видеонаблÑдении в ÑелÑÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи и заÑиÑÑ ÑиÑÑемÑ. ÐÑ Ð¿ÑедÑÑавлÑем новÑй Ð¿Ð¾Ð´Ñ Ð¾Ð´ к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ñной акÑивноÑÑи пÑи вР...
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение оÑибок конÑигÑÑаÑии межÑеÑевÑÑ
ÑкÑанов меÑодом пÑовеÑки модели. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑеÑÑÑ ÐºÐ¾ÑÑекÑноÑÑÑ ÐºÐ¾Ð½ÑигÑÑаÑии межÑеÑевого ÑкÑана и ее ÑооÑвеÑÑ
openaire +1 more source
openaire +1 more source
The purpose of the study is to identify attempts to implement phishing attacks based on the analysis of text messages distributed over the network via e-mail. The research set the following goals: 1. Systematize phishing attacks based on their implementation features. 2.
openaire +1 more source
openaire +1 more source

