Results 71 to 80 of about 4,424,276 (196)

Intrusion Detection Method Based on Preprocessing of Highly Correlated and Imbalanced Data

open access: yesApplied Sciences
This paper examines traditional machine learning algorithms, neural networks, and the benefits of utilizing ensemble models. Data preprocessing methods for improving the quality of classification models are considered.
Serhii Semenov   +6 more
doaj   +1 more source

On evaluating parallel computer systems [PDF]

open access: yes
A workshop was held in an attempt to program real problems on the MIT Static Data Flow Machine. Most of the architecture of the machine was specified but some parts were incomplete.
Adams, George B., III   +2 more
core   +1 more source

Special purpose computer provides programmable digital filter for sampled-data control systems [PDF]

open access: yes, 1969
Generalized digital filter is a special purpose computer. The term digital filter is an algorithm which accepts an input sequence of numbers and transforms it into an output number sequence.
Carroll, C. C.
core   +1 more source

Implementation of two-factor user authentication in computer systems

open access: yesVojnotehnički Glasnik
Introduction/purpose: The paper explores the implementation of two-factor authentication (2FA) in computer systems, addressing the increasing need for enhanced security.
Mihailo D. Tomić, Olivera M. Radojević
doaj   +1 more source

Systems analysis of the space shuttle [PDF]

open access: yes
Developments in communications systems, computer systems, and power distribution systems for the space shuttle are described. The use of high speed delta modulation for bit rate compression in the transmission of television signals is discussed ...
Oh, S. J., Schilling, D. L., Thau, F.
core   +1 more source

The Modeling as the Forming System Factor at the Estimation of Security of Information Processes in Computer Systems

open access: yesБезопасность информационных технологий, 2010
The modeling as a technique of categories for formation of system for research of characteristics of security of information processes in computer systems is considered. The structure to corresponding system of indicators of system of models on the basis
A. P. Kurilo   +3 more
doaj  

Human-machine diversity in the use of computerised advisory systems: a case study [PDF]

open access: yes, 2003
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the dependability of such systems.
Alberdi, E.   +2 more
core  

PASSWORD HASHING METHODS AND ALGORITHMS ON THE .NET PLATFORM

open access: yesСучасні інформаційні системи
Web applications, which are widely used to provide services and collect information, have become a major target for attackers, especially with the emergence of government services that process sensitive data.
Volodymyr Fedorchenko   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy