Results 111 to 120 of about 48,716 (136)
Some of the next articles are maybe not open access.
2022
Theme of the final qualification work: "Water intake structure of a diversion hydroelectric power station on the Chon-Kemin River, Kyrgyzstan". The need to consider this topic of the graduation project is due to the lack of electricity in the Chui region of the Kemin district of the Republic of Kyrgyzstan.
openaire +1 more source
Theme of the final qualification work: "Water intake structure of a diversion hydroelectric power station on the Chon-Kemin River, Kyrgyzstan". The need to consider this topic of the graduation project is due to the lack of electricity in the Chui region of the Kemin district of the Republic of Kyrgyzstan.
openaire +1 more source
2023
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
2023
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
2021
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire +1 more source
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire +1 more source
ÐбнаÑÑжение веб-аÑак в облаÑнÑÑ ÑеÑвиÑаÑ
The aim of the work is to improve the quality of web attack detection in cloud services. The subject of the study is the choice of an optimal machine learning algorithm for detecting web attacks with an attack detection accuracy higher than that of existing attack detection systems (SOA). Tasks to be solved during the research: 1.openaire +1 more source
2021
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼ÐµÑода ÑÑÑановки локаÑоÑа на ÑÐ°Ð¼Ð¾Ð»ÐµÑ Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковолÑÑнÑÑ Ð»Ð¸Ð½Ð¸Ð¹ Ð´Ð»Ñ Ð±ÑÑÑÑого и ÑоÑного опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковоР...
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼ÐµÑода ÑÑÑановки локаÑоÑа на ÑÐ°Ð¼Ð¾Ð»ÐµÑ Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковолÑÑнÑÑ Ð»Ð¸Ð½Ð¸Ð¹ Ð´Ð»Ñ Ð±ÑÑÑÑого и ÑоÑного опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковоР...
openaire +1 more source
2022
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑеÑевÑÑ Ð²ÑоÑжений в WSN-ÑеÑÑÑ Ð¸ ÑазÑабоÑке меÑода Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° оÑнове биоинÑпиÑиÑованного Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð°.
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑеÑевÑÑ Ð²ÑоÑжений в WSN-ÑеÑÑÑ Ð¸ ÑазÑабоÑке меÑода Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° оÑнове биоинÑпиÑиÑованного Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð°.
openaire +1 more source
2019
РнаÑÑоÑÑей вÑпÑÑкной квалиÑикаÑионной ÑабоÑе ÑпеÑиалиÑÑа пÑÐ¸Ð²ÐµÐ´ÐµÐ½Ñ ÑезÑлÑÑаÑÑ Ð¸ÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑименимоÑÑи нейÑоÑеÑевой аÑÑ Ð¸ÑекÑÑÑÑ LSTM-GAN Ð´Ð»Ñ ÑеÑÐµÐ½Ð¸Ñ Ð·Ð°Ð´Ð°Ñи обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹ ÑеÑевого ÑÑа
openaire +1 more source
РнаÑÑоÑÑей вÑпÑÑкной квалиÑикаÑионной ÑабоÑе ÑпеÑиалиÑÑа пÑÐ¸Ð²ÐµÐ´ÐµÐ½Ñ ÑезÑлÑÑаÑÑ Ð¸ÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑименимоÑÑи нейÑоÑеÑевой аÑÑ Ð¸ÑекÑÑÑÑ LSTM-GAN Ð´Ð»Ñ ÑеÑÐµÐ½Ð¸Ñ Ð·Ð°Ð´Ð°Ñи обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹ ÑеÑевого ÑÑа
openaire +1 more source
2018
In the given work the essence of the approach to network attack detection using classification algorithm based on ant colony algorithm is stated. A compar-ative analysis of existing algorithms is performed and the most suitable algorithm is chosen. A testing is undertaken and detection accuracy values are obtained us-ing chosen datasets. An analysis of
openaire +1 more source
In the given work the essence of the approach to network attack detection using classification algorithm based on ant colony algorithm is stated. A compar-ative analysis of existing algorithms is performed and the most suitable algorithm is chosen. A testing is undertaken and detection accuracy values are obtained us-ing chosen datasets. An analysis of
openaire +1 more source
2018
Рданной ÑабоÑе изложен Ð¿Ð¾Ð´Ñ Ð¾Ð´ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ FDI-аÑак на инÑеллекÑÑалÑнÑе ÑнеÑгоÑеÑи Ñ Ð¸ÑполÑзованием пÑоÑÑÑанÑÑвенно-вÑеменнÑÑ ÐºÐ¾ÑÑелÑÑий.
openaire +1 more source
Рданной ÑабоÑе изложен Ð¿Ð¾Ð´Ñ Ð¾Ð´ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ FDI-аÑак на инÑеллекÑÑалÑнÑе ÑнеÑгоÑеÑи Ñ Ð¸ÑполÑзованием пÑоÑÑÑанÑÑвенно-вÑеменнÑÑ ÐºÐ¾ÑÑелÑÑий.
openaire +1 more source

