Results 111 to 120 of about 48,716 (136)
Some of the next articles are maybe not open access.

Водозаборное сооружение деривационной ГЭС на реке Чон-Кемин Кыргыстан

2022
Theme of the final qualification work: "Water intake structure of a diversion hydroelectric power station on the Chon-Kemin River, Kyrgyzstan". The need to consider this topic of the graduation project is due to the lack of electricity in the Chui region of the Kemin district of the Republic of Kyrgyzstan.
openaire   +1 more source

Классификация эмоций на лице человека в видеопотоке и обнаружение аномалий

2023
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire   +1 more source

Обнаружение уязвимостей к XSS-атакам в ÑƒÑÐ»Ð¾Ð²Ð¸ÑÑ Ñ„Ð¸Ð»ÑŒÑ‚Ñ€Ð°Ñ†Ð¸Ð¸ межсетевым экраном

2023
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire   +1 more source

Обнаружение аварий в ÑÐ¸ÑÑ‚ÐµÐ¼Ð°Ñ Ð¾Ð¿ÐµÑ€Ð°Ñ‚Ð¸Ð²Ð½Ð¾Ð³Ð¾ питания постоянным током

2021
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire   +1 more source

Обнаружение веб-атак в Ð¾Ð±Ð»Ð°Ñ‡Ð½Ñ‹Ñ ÑÐµÑ€Ð²Ð¸ÑÐ°Ñ

The aim of the work is to improve the quality of web attack detection in cloud services. The subject of the study is the choice of an optimal machine learning algorithm for detecting web attacks with an attack detection accuracy higher than that of existing attack detection systems (SOA). Tasks to be solved during the research: 1.
openaire   +1 more source

Обнаружение Ð²Ñ‹ÑÐ¾ÐºÐ¾Ð²Ð¾Ð»ÑŒÑ‚Ð½Ñ‹Ñ Ð¿Ñ€Ð¾Ð²Ð¾Ð´Ð¾Ð² локатором на летательном аппарате

2021
Данная работа посвящена предоставлению метода установки локатора на самолет для определения местоположения высоковольтных линий для быстрого и точного определения местоположения высоковоР...
openaire   +1 more source

Обнаружение вторжений в WSN-ÑÐµÑ‚ÑÑ Ð½Ð° основе биоинспирированного Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð°

2022
Данная работа посвящена исследованию сетевых вторжений в WSN-сетях и разработке метода их обнаружения на основе биоинспирированного подхода.
openaire   +1 more source

Обнаружение аномалий сетевого трафика с использованием lLSTM-GAN

2019
В настоящей выпускной квалификационной работе специалиста приведены результаты исследования применимости нейросетевой архитектуры LSTM-GAN для решения задачи обнаружения аномалий сетевого тра
openaire   +1 more source

Обнаружение ÑÐµÑ‚ÐµÐ²Ñ‹Ñ Ð°Ñ‚Ð°Ðº при помощи муравьиного алгоритма

2018
In the given work the essence of the approach to network attack detection using classification algorithm based on ant colony algorithm is stated. A compar-ative analysis of existing algorithms is performed and the most suitable algorithm is chosen. A testing is undertaken and detection accuracy values are obtained us-ing chosen datasets. An analysis of
openaire   +1 more source

Обнаружение FDI-атак в Ð¸Ð½Ñ‚ÐµÐ»Ð»ÐµÐºÑ‚ÑƒÐ°Ð»ÑŒÐ½Ñ‹Ñ ÑÐµÑ‚ÑÑ ÑÐ½ÐµÑ€Ð³Ð¾ÑÐ½Ð°Ð±Ð¶ÐµÐ½Ð¸Ñ Smart Grid

2018
В данной работе изложен подход для обнаружения FDI-атак на интеллектуальные энергосети с использованием пространственно-временных корреляций.
openaire   +1 more source

Home - About - Disclaimer - Privacy