Linked e-resources

Details

Preface; Organization; Conference Chairs; Conference Vice-Chair; International Program Committee; Organizing Committee Chair; Local Organizing Committee; Sponsoring Institutions; Contents; Part ICognitive Technologies on the Basisof Sensor and Neural Networks; 1 The Data Transfer Development in MANET Networks on the Base of Chinese Remainder Theorem; Abstract; 1 Introduction; 2 Mathematical Model of MANET Network; 3 The Method of Error Detection; 3.1 The Error Detection Method Based on the Chinese Remainder Theorem.

3.2 Modification of the Error Detection Method on the Basis of the Approximate Method4 The Effective Neural Network SSS Implementation; 4.1 Finite Ring Neural Network; 4.2 Modeling; 5 Conclusion; Acknowledgment; References; 2 Using of a Convolutional Neural Network with Changing Receptive Fields in the Tasks of Image Recognition; Abstract; 1 Introduction; 2 Mathematical Modeling of CNN with Extended Training Set; 3 Experimental Research of CNN Generalization Capability with Changing Receptive Fields; References.

3 Application CUDA for Optimization ANN in Forecasting Electricity on Industrial EnterpriseAbstract; 1 Introduction; 2 Description of the Neural Network Model; 2.1 Artificial Neural Network Model; 2.2 CUDA; 2.3 Learning Algorithm of Neural Network; 2.4 Modification of a Model; 3 Implementation of ANN in the Programming Language {\varvec C}\!{+\!+} ; 4 Experiments and Results; 4.1 Formalization of the Problem; 4.2 Experiments; 5 Conclusion; References; Part IIProbabilistic models, Algebraic BayesianNetworks and Information Protection.

4 Models and Algorithms for the Information System's Users' Protection Level Probabilistic EstimationAbstract; 1 Introduction; 2 Models' Description; 2.1 Model of the User of Information System and the Model of User's Vulnerabilities Profile; 2.2 Model of Malefactor; 2.3 Model of Hosts of Informational Systems and Computer Network; 2.4 Model of Critical Documents; 3 Conclusion; References; 5 An Adaptive Algorithm for the Steganographic Embedding Information into the Discrete Fourier Transform Phase Spectrum; Abstract; 1 Introduction; 2 The Suggested Algorithm of Data Embedding.

2.1 Review of the Methods to Build in the Information into Digital Images Utilizing Discrete Fourier Transform2.2 Investigation of the Discrete Fourier Transform Steganographic Properties; 2.3 The Suggested Algorithm of Embedding Data into Digital Images; 2.4 Experiments; 3 Conclusion; Acknowledgments; References; 6 Decremental and Incremental Reshaping of Algebraic Bayesian Networks Global Structures; Abstract; 1 Introduction; 2 Background; 2.1 Problem Statement; 2.2 Definitions and Notations; 3 Decremental Algorithm for Removing the Vertex; 3.1 Algorithm Description.

Browse Subjects

Show more subjects...

Statistics

from
to
Export