Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 81938

Страница 11 из 8194

Tunguska сoals, Siberian sills and the Permian-Triassic extinction the sediment-derived CO2 from the thermogenic cracking of coal by intrusive heating. Although the coal-intrusion

Video object detection program design under two different client-server organizationsThe article presents video object detection program design under two different client

Modeling of non-equilibrium mass-exchange processes in geo-systems, formation of a structure and filtration characteristics of the Bazhenov Shale, appearance of intrusive

Efficiency of Intellectual System of Secure Access in a Phased Application of Means of Protection Considering the Intersection of the Sets of Threat Detection of information and intersection of the sets of threat detection and elimination. For system of secure access

An Approach to Detecting the Spread of False Information on the Internet Using Data Science Algorithms on the Internet is enormous; secondly, the detection system requires news plots that are obviously true; thirdly

A Simple Model of Active Queue Management System According to the RED Algorithm with Random Early Detection (RED) algorithm is constructed. The behaviour of main system parameters

Geochemistry and U-Pb geochronology of 1590 and 1550 Ma mafic dyke swarms of western Laurentia: Mantle plume magmatism shared with Australia previous UPb baddeleyite ages of ca. 1590 Ma for these intrusions. The third is a UPb baddeleyite age

Using Neural Networks to Detect Anomalies in X-Ray Images Obtained with Full-Body ScannersIn this paper, we solve the problem of detecting anomalies in X-ray images obtained by full

Low-complexity iterative MIMO detection based on turbo-MMSE algorithmNext generation Multiple Input Multiple Output (MIMO) communication systems should meet strict

Time-frequency analysis and autoencoder approach for network traffic anomaly detectionDetection of anomalies in network traffic is critical to mitigating cyber threats. This study

Страница 11 из 8194