Search

Your search keyword '"Information theory"' showing total 5,922 results

Search Constraints

Start Over You searched for: Descriptor "Information theory" Remove constraint Descriptor: "Information theory" Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals
5,922 results on '"Information theory"'

Search Results

1. Assigning credit where it is due: an information content score to capture the clinical value of multiplexed assays of variant effect

2. Access control model in ICS

3. Some aspects of IC radiation hardness evaluation to the effects of high-energy ions

4. Improving non-compliant information security behavior using algorithms

5. On the possibility of improving the procedures for quantifying information protection of critical information infrastructure objects from threats of unauthorized access

6. Recommendations for creating a trust infrastructure in the interests of the digital ruble system

7. Stochastic methods of information security

8. Methodology for assessing the accuracy of determining the spatial characteristics of local navigation systems

9. Ensuring the security of objects in the information sphere

10. EDITOR-IN-CHIEF'S COLUMN

11. TECHNOLOGICAL SAFETY

12. Application of machine learning methods for preventive identification of deviant groups of adolescents

16. The Design Technique for Power Management Unit of the Tag IC for Radio Frequency Identification of Critical Infrastructure Objects

17. The methodology of analysis and assessment of the level of security of the software used at the objects of informatization of internal affairs bodies

18. Neural network device for recognizing speech commands based on hardware accelerators of the NEUROMATRIX family

19. A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system

21. ENSURING SAFETY WHILE ENHANCING PERFORMANCE: ENCOURAGING REINFORCEMENT LEARNING BY ADDRESSING CONSTRAINTS AND UNCERTAINTY

22. Substantiation of the indicator for assessing the manageability of information security in automated control systems of critical applications from the effects of malicious software

23. Algorithm obtaining invariants

24. Problems of floating vulnerabilities in ensuring mobile application security

25. The methodology of functional modeling as a tool for formalizing the process of intercepting computer information through spurious electromagnetic radiation and interference

26. Configurable ring oscillator with controlled interconnections

27. Development of recommendations for reducing the energy of the signal emitted by the LVDS interface

28. Quantifying polarization in online political discourse

29. Onshore versus offshore capacity factor and reliability for wind energy production in Germany: 2010–2022

30. Node search space reduction for optimal placement of pressure sensors in water distribution networks for leakage detection

31. Decoding the Atmosphere: Optimising Probabilistic Forecasts with Information Gain

32. Some new results involving residual Renyi's information measure for k-record values

33. Fulfilling data access obligations: How could (and should) platforms facilitate data donation studies?

34. The Emergence of Edgar Morin’s Complex Thinking

35. Dynamic predictability and activity-location contexts in human mobility

36. Privacy Paradox in Industry 4.0: A review of library information services and data protection

37. Emerging South African smart cities: Data security and privacy risks and challenges

38. Economic empowerment of women domestic workers: Role of digital financial services

39. Exploring the influences of virtual brand community members’ interaction on brand loyalty

40. Infrastructure as a service adoption model for South African universities using thematic analysis

41. A model on workarounds and information security integrity

42. Factors influencing data quality in routine health information systems in Maridi county, South Sudan

43. IoT appropriation for crop management and productivity enhancement in South Africa

44. Examining the applicability of the Protection of Personal Information Act in AI-driven environments

45. Entropy‐based sampling for efficient training of deep learning on CNC machining dataset

46. General-purpose AI regulation and the European Union AI Act

47. Unleashing the power of the 4IR in organisational value chains: A conceptual analysis

48. The current state of agile methodology utilisation in a South African insurance company

49. An investigation of healthcare professionals’ intention to use Smart Card Technology

50. Determining the digital divide among people with disabilities in KwaZulu-Natal

Catalog

Books, media, physical & digital resources