Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 94301

Страница 32 из 9431

Cryptautomata: definition, cryptanalysis, example for encryption. The operation (functioning) of any network Nk in the discrete time is described by the canonical

Monitoring and analysis of illegal activity of participants of online social networks in the context of the solution of the problem of safety of the personality and the stateThe article puts forward a method of analysis of activity and identification of participants

Analysis of Non-preemptive Scheduling for 5G Network Model Within Slicing Framework for mobile networks operators allowing significant changes in their range of services and daily operations

Modeling the utilization of a multi-tenant band in 3GPP LTE system with Licensed Shared Access network operator). At any point of time, the frequency bands can be utilized by only a single party

Particular properties of operation of stationary lead-acid batteries at power distribution facilities of operation of stationary lead-acid rechargeable batteries at power plants as a source of power

Spectrum and AI-based analysis for a flight environment and virtual obstacles avoidance using potential field method for path control- ter for a known flight environment. Two methods are used to analyze the flight environment images

A combined method for variational inequalities with monotone operatorsA relaxation iterative method is suggested for variational inequalities whose basic operator

Methodology for studying the influence of face rotation angle on the face detection accuracy gradients and the method based on convolutional neural networks were selected. The angles of head tilt

Convolutional Neural Network Based Deep Neural Network Model for Electrocardiogram Records Classification database. The proposed method involves the utilization of a 16-layer deep one-dimensional convolutional

The effect of the neural activity on topological properties of growing neural networks growth network not depending on network’s activity. By using the random graphs theory methods

Страница 32 из 9431