Results 41 to 50 of about 61 (58)
Some of the next articles are maybe not open access.
2019
ÐиÑÑеÑÑаÑÐ¸Ñ ÑодеÑÐ¶Ð¸Ñ ÑезÑлÑÑаÑÑ Ð°Ð½Ð°Ð»Ð¸Ð·Ð° ÑеÑевÑÑ Ð°Ñак, обобÑеннÑÑ Ð¾ÑÐµÐ½ÐºÑ Ð¼ÐµÑодов конÑÑолиÑÑемого маÑинного обÑÑениÑ, иÑполÑзÑемÑÑ Ð´Ð»Ñ ÑеÑÐµÐ½Ð¸Ñ Ð·Ð°Ð´Ð°Ñ ÐºÐ»Ð°ÑÑиÑикаÑии, а Ñакже иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ð°ÑÐ ...
openaire +1 more source
ÐиÑÑеÑÑаÑÐ¸Ñ ÑодеÑÐ¶Ð¸Ñ ÑезÑлÑÑаÑÑ Ð°Ð½Ð°Ð»Ð¸Ð·Ð° ÑеÑевÑÑ Ð°Ñак, обобÑеннÑÑ Ð¾ÑÐµÐ½ÐºÑ Ð¼ÐµÑодов конÑÑолиÑÑемого маÑинного обÑÑениÑ, иÑполÑзÑемÑÑ Ð´Ð»Ñ ÑеÑÐµÐ½Ð¸Ñ Ð·Ð°Ð´Ð°Ñ ÐºÐ»Ð°ÑÑиÑикаÑии, а Ñакже иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ð°ÑÐ ...
openaire +1 more source
2020
This work is devoted to the design and implementation of a method for detecting virtual users on the social network VKontakte based on static and behavioral characteristics, as well as on the basis of information about the user's social graph. The first chapter explores the relevance of this type of application in this area.
openaire +1 more source
This work is devoted to the design and implementation of a method for detecting virtual users on the social network VKontakte based on static and behavioral characteristics, as well as on the basis of information about the user's social graph. The first chapter explores the relevance of this type of application in this area.
openaire +1 more source
2023
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐÐ¾Ð´Ñ Ð¾Ð´ к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑионнÑÑ ÐºÐ°Ð¼Ð¿Ð°Ð½Ð¸Ð¹ в ÑÑедÑÑÐ²Ð°Ñ ÐнÑеÑнеÑ-коммÑникаÑии». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ ÑазÑабоÑка Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð° к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑÐ ...
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐÐ¾Ð´Ñ Ð¾Ð´ к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑионнÑÑ ÐºÐ°Ð¼Ð¿Ð°Ð½Ð¸Ð¹ в ÑÑедÑÑÐ²Ð°Ñ ÐнÑеÑнеÑ-коммÑникаÑии». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ ÑазÑабоÑка Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð° к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¸Ð½ÑоÑмаÑÐ ...
openaire +1 more source
2019
Рданной ÑабоÑе ÑазÑабоÑано авÑомаÑизиÑованное пÑиложение Ð´Ð»Ñ ÑаÑÑиÑÑовки ÑезÑлÑÑаÑов диагноÑÑики по обнаÑÑÐ¶ÐµÐ½Ð¸Ñ ÑепловÑÑ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹ ÑÑÑбопÑоводов. ÐпÑÐµÐ´ÐµÐ»ÐµÐ½Ñ ÑÐ¸Ð¿Ñ ÑемпеÑаÑÑÑнÑÑ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹, оп
openaire +1 more source
Рданной ÑабоÑе ÑазÑабоÑано авÑомаÑизиÑованное пÑиложение Ð´Ð»Ñ ÑаÑÑиÑÑовки ÑезÑлÑÑаÑов диагноÑÑики по обнаÑÑÐ¶ÐµÐ½Ð¸Ñ ÑепловÑÑ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹ ÑÑÑбопÑоводов. ÐпÑÐµÐ´ÐµÐ»ÐµÐ½Ñ ÑÐ¸Ð¿Ñ ÑемпеÑаÑÑÑнÑÑ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹, оп
openaire +1 more source
2021
ÐÐ°Ð½Ð½Ð°Ñ Ð´Ð¸Ð¿Ð»Ð¾Ð¼Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð¾Ð² к авÑомаÑизаÑии пÑоÑеÑÑа ÑоÑмиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð²ÑбоÑки ÑиÑинговÑÑ ÑайÑов и ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¼ÐµÑодов обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° базе алгоÑиÑмов маÑинного обÑÑениÑ
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ Ð´Ð¸Ð¿Ð»Ð¾Ð¼Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð¾Ð² к авÑомаÑизаÑии пÑоÑеÑÑа ÑоÑмиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð²ÑбоÑки ÑиÑинговÑÑ ÑайÑов и ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¼ÐµÑодов обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° базе алгоÑиÑмов маÑинного обÑÑениÑ
openaire +1 more source
2023
ÐÑедмеÑом ÑазÑабоÑки ÑвлÑлÑÑ ÑÑенд пÑовеÑки плаÑÑ ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑеобÑазоваÑÐµÐ»Ñ Ð¿Ð¾ÑÑоÑнного напÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¸ Ñоздание визÑализаÑионной пÑогÑÐ°Ð¼Ð¼Ñ Ð² пÑогÑамме LabView.
openaire +1 more source
ÐÑедмеÑом ÑазÑабоÑки ÑвлÑлÑÑ ÑÑенд пÑовеÑки плаÑÑ ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑеобÑазоваÑÐµÐ»Ñ Ð¿Ð¾ÑÑоÑнного напÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¸ Ñоздание визÑализаÑионной пÑогÑÐ°Ð¼Ð¼Ñ Ð² пÑогÑамме LabView.
openaire +1 more source
2021
Рданной ÑабоÑе ÑаÑÑмоÑÑÐµÐ½Ñ ÑовÑеменнÑе комбиниÑованнÑе ÑÑанÑÑоÑмаÑоÑÑ Ñока и напÑÑÐ¶ÐµÐ½Ð¸Ñ 110 кÐ. Ðоказана ÑелеÑообÑазноÑÑÑ Ð² иÑполÑзовании комбиниÑованнÑÑ ÑÑанÑÑоÑмаÑоÑов Ñока и напÑÑÐ¶ÐµÐ½Ð¸Ñ Ñ
openaire +1 more source
Рданной ÑабоÑе ÑаÑÑмоÑÑÐµÐ½Ñ ÑовÑеменнÑе комбиниÑованнÑе ÑÑанÑÑоÑмаÑоÑÑ Ñока и напÑÑÐ¶ÐµÐ½Ð¸Ñ 110 кÐ. Ðоказана ÑелеÑообÑазноÑÑÑ Ð² иÑполÑзовании комбиниÑованнÑÑ ÑÑанÑÑоÑмаÑоÑов Ñока и напÑÑÐ¶ÐµÐ½Ð¸Ñ Ñ
openaire +1 more source
2020
The subject of the graduate qualification work is: âModernization of the genetic algorithm for generating network attack detection rulesâ. This work is devoted to the studying of the possibility of using the genetic algorithm in intrusion detection systems to detect network attacks. Tasks that were solved during the study: 1.
openaire +1 more source
The subject of the graduate qualification work is: âModernization of the genetic algorithm for generating network attack detection rulesâ. This work is devoted to the studying of the possibility of using the genetic algorithm in intrusion detection systems to detect network attacks. Tasks that were solved during the study: 1.
openaire +1 more source
2020
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑного пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð¸ дÑÑгого поÑÑоÑоннего ÑÑнкÑионала в ÑÑÑановоÑнÑÑ ÑÐ°Ð¹Ð»Ð°Ñ . ÐадаÑи, коÑоÑÑе ÑеÑалиÑÑ Ð² Ñ Ð¾Ð´Ðµ иÑÑледованиÑ: 1. ÐзÑÑение Ñ
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑного пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð¸ дÑÑгого поÑÑоÑоннего ÑÑнкÑионала в ÑÑÑановоÑнÑÑ ÑÐ°Ð¹Ð»Ð°Ñ . ÐадаÑи, коÑоÑÑе ÑеÑалиÑÑ Ð² Ñ Ð¾Ð´Ðµ иÑÑледованиÑ: 1. ÐзÑÑение Ñ
openaire +1 more source
2019
This paper considers the determination of the dependence of the overhead lines cost on the conductor cross-section area. At begin we get the basic information of the overhead line supports from books. Further we select a needed data from model support projects. After this we analyze this data and we transform this data. From support parameter tables we
openaire +1 more source
This paper considers the determination of the dependence of the overhead lines cost on the conductor cross-section area. At begin we get the basic information of the overhead line supports from books. Further we select a needed data from model support projects. After this we analyze this data and we transform this data. From support parameter tables we
openaire +1 more source

