Search

Your search keyword '"lcsh:Information theory"' showing total 2,219 results

Search Constraints

Start Over You searched for: Descriptor "lcsh:Information theory" Remove constraint Descriptor: "lcsh:Information theory"
2,219 results on '"lcsh:Information theory"'

Search Results

151. Development of EPC-Models of threats to information security of the automated process control system

152. Investigation of the influence of amplitude spiral zone plate parameters on produced energy backflow

153. The two reflector design problem for forming a flat wavefront from a point source as an optimal mass transfer problem

154. Investigation of optical glass characteristics under the influence of space factors

155. MIDV-500: a dataset for identity document analysis and recognition on mobile devices in video stream

156. A method for feature matching in images using descriptor structures

157. Determination of microrelief of the sample by singular beams superposition

158. Situation awareness modeling for emergency management on offshore platforms

159. Sectorial perturbation of vortex beams: Shannon entropy, orbital angular momentum and topological charge

160. Scene distortion detection algorithm using multitemporal remote sensing images

161. U-Net-bin: hacking the document image binarization contest

162. Limiting capabilities of self-mixing interferometry upon sawtooth modulation of a semiconductor laser wavelength

163. Imaging systems based on generalized lenses

164. Requirements for multispectral remote sensing data used for the detection of arable land colonization by tree and shrubbery vegetation

165. Analysis of characteristics of paraxial vector Gaussian beams affecting the formation of microstructures in an azopolymer

166. Convolutional technique for enhancing security in wireless sensor networks against malicious nodes

167. Structure-functional analysis and synthesis of deep convolutional neural networks

168. Design, fabrication and investigation of a silicon subwavelength terahertz axicon

169. Formation of the reverse flow of energy in a sharp focus

170. To the problem of assessing and ensuring the correctness of business processes

171. Features of advanced training of specialists in ensuring safety of significant objects of critical information infrastructure

172. Possibilities and limitations of focused laser technique application for SEE sensitivity parameters estimation

173. Information security systematics of software supply chains

174. Cold multi-currency wallet on the platform MKT

175. Investigation of graph databases suitable for work with big data while detecting money laundering and terrorism financing cases

176. Development of an imitation model of information protection system from unauthorized access using the cpn tools software

177. The concept of decision support system in preliminary investigation

178. Face anti-spoofing with joint spoofing medium detection and eye blinking analysis

179. Design features of block algorithms of FDTD-method implemented on a GPU using MATLAB

180. Search for designs of nonpolarizing interference systems

181. Calculation of the power of the field, peneting into the external environment of the weaknessing guide of a single-mode fiber

182. CIoT-Net: a scalable cognitive IoT based smart city network architecture

183. Peculiarities of data processing for optical measurements of disperse parameters of bimodal media

184. Shaping and processing the vortex spectra of singular beams with anomalous orbital angular momentum

185. Adaptive ANN-based method of constructing an interpolation formula for doubling the image size

186. Research paper classification systems based on TF-IDF and LDA schemes

187. Sharp focus of a circularly polarized optical vortex at the output of a metalens illuminated by linearly polarized light

188. Investigation of the topological charge stability for multi-ringed Laguerre–Gauss vortex beams to random distortions

189. Detection and classification of social media-based extremist affiliations using sentiment analysis techniques

190. A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks

191. Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty

192. Comparison of binary feature points descriptors of images under distortion conditions

193. A comparative analysis of software identifying approaches

194. On the use of a multi-raster input of one-dimensional signals in two-dimensional optical correlators

195. The accuracy dependency investigation of simultaneous localization and mapping on the errors from mobile device sensors

196. GPU acceleration of edge detection algorithm based on local variance and integral image: application to air bubbles boundaries extraction

197. Study of the classification efficiency of difficult-to-distinguish vegetation types using hyperspectral data

198. Counterfeit electronic components identifying methods in terms of industrial cyber security

199. Improvements of programing methods for finding reference lines on X-ray images

200. Technology of enhancing image detalization with nonlinear correction of highly gradient fragments

Catalog

Books, media, physical & digital resources