Search for visual objects by request in the form of a cluster representation for the structural image description
V Gorokhovatskyi, I Tvoroshenko… - Advances in Electrical …, 2023 - advances.vsb.cz
The key task of computer vision is the recognition of visual objects in the analysed image.
This paper proposes a method of searching for objects in an image, based on the …
This paper proposes a method of searching for objects in an image, based on the …
Machine learning and decision support system on credit scoring
G Teles, JJPC Rodrigues, K Saleem, S Kozlov… - Neural Computing and …, 2020 - Springer
Among the numerous alternatives used in the world of risk balance, it highlights the
provision of guarantees in the formalization of credit agreements. The objective of this paper …
provision of guarantees in the formalization of credit agreements. The objective of this paper …
Code-based public-key cryptosystems for the post-quantum period
A Kuznetsov, I Svatovskij, N Kiyan… - 2017 4th International …, 2017 - ieeexplore.ieee.org
Code-Based Public-Key Cryptosystems were been considered in this work. In addition, the
current state, the existing contradictions and prospects of practical use for the post-quantum …
current state, the existing contradictions and prospects of practical use for the post-quantum …
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …
and decrypted using a symmetric key. The process of creating, distributing, storing …
Algorithms of data processing in the residual classes system
A Yanko, S Koshman… - 2017 4th International …, 2017 - ieeexplore.ieee.org
The coding of remainders number which submitted the appropriate modules of residual
classes system (RCS), made with data from complete system of the smallest non-negative …
classes system (RCS), made with data from complete system of the smallest non-negative …
[PDF][PDF] Method of Data Control in the Residue Classes.
V Krasnobayev, A Kuznetsov, A Kononchenko… - CMIS, 2019 - ceur-ws.org
Methods of data control in the residue classes are considered in the article. The main
advantage of non-positional notation in the residue classes lays in the possibility of an …
advantage of non-positional notation in the residue classes lays in the possibility of an …
[PDF][PDF] Methods for Comparing Numbers in Non-Positional Notation of Residual Classes.
V Krasnobayev, A Kuznetsov, M Zub, K Kuznetsova - CMIS, 2019 - ceur-ws.org
Methods for optimizing computations in computer systems and components that are based
on the use of arithmetic transformations in the system of residual classes are considered …
on the use of arithmetic transformations in the system of residual classes are considered …
Adaptive learning for single-output complex systems via data augmentation and data type identification
L Chang, H Liu, L Zhang, X Xu, J Jiang - Applied Soft Computing, 2023 - Elsevier
An adaptive learning approach is proposed for single-output complex systems (SOCS) with
two features: data augmentation (A) and data type identification (T). Data augmentation is …
two features: data augmentation (A) and data type identification (T). Data augmentation is …
Calculation of expense for local computer networks
Different concepts of local computer network technological scheme and its economic
justification with some appropriate calculations have been shown in this article. In our article …
justification with some appropriate calculations have been shown in this article. In our article …
Intelligent management of the enterprise personnel security system
The analysis of the categorical apparatus in the field of enterprise personnel security was
carried out, which allowed to statistically substantiate the urgency and necessity of …
carried out, which allowed to statistically substantiate the urgency and necessity of …