Search

Your search keyword '"lcsh:Information theory"' showing total 2,219 results

Search Constraints

Start Over You searched for: Descriptor "lcsh:Information theory" Remove constraint Descriptor: "lcsh:Information theory"
2,219 results on '"lcsh:Information theory"'

Search Results

1. Supporting quadric method for collimated beams

2. Chest X-ray image classification for viral pneumonia and Сovid-19 using neural networks

3. Optical system calibration for 3D measurements in a hydrodynamic tunnel

4. Skin lesion segmentation method for dermoscopic images with convolutional neural networks and semantic segmentation

5. Skin lesion segmentation method for dermoscopic images with convolutional neural networks and semantic segmentation

6. Splitting of resonances in a curved optical fiber-based Fabry-Perot resonator

7. Deep learning-based video stream reconstruction in mass-production diffractive optical systems

8. Optimal affine image normalization approach for optical character recognition

9. Topological charge of a superposition of two Bessel-Gaussian beams

10. Weighted combination of per-frame recognition results for text recognition in a video stream

11. Analysis of information security threats when processing confidential data in mobile systems

12. Topical issues of the problem of assessment of threats of cyber attacks on information resources of significant facilities of critical information infrastructure

13. Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers

14. Reengineering of business processes of a commercial bank in the information space

15. Analysis of the structure of construction and the main tactical and technical characteristics of automated security systems for stationary remote objects of increased security

16. Universal triple encoding for compression and protecting binary data

17. Simulation of the dynamics of network attacks in automated systems of internal affairs bodies in the 'CPN Tools' software environment

18. Features of information security of computer systems

19. Assessing the resilience of critical information infrastructures to information security threats

20. Optical force acting on a particle in the presence of a backward energy flow near the focus of a gradient lens

21. Using a virtual laboratory environment for penetration-testing skills training

22. Ensuring the security of state information systems in conditions of uncertainty

23. Non-contact registration of respiration by analysis of IR-THz human face images

24. Spiral phase plate with multiple singularity centers

25. Analysis vulnerabilities of user authentication process using Active Directory

26. The distributed ledgers ensuring privacy-preserving transactions

27. Increasing the classification efficiency of hyperspectral images due to multi-scale spatial processing

28. Building detection by local region features in SAR images

29. Systematization of security characteristics of educational activities for training specialists in the field of information security

30. Protection of the data integrity in telemetry systems about the state of mobile objects

31. Investigation of information security issues for graph databases suitable for big data processing while detecting money laundering and terrorism financing cases

32. Modeling the input of radiation into plane linear waveguides using diffraction gratings for a new technology for the manufacture of waveguide systems

33. Features of the risk-based approach to ensure cyber security of industrial facilities

34. Developing an online hate classifier for multiple social media platforms

35. Holographic memory updated by contradictory information: influence of low frequency attenuation on response stability

36. Hybrid approach for time series forecasting based on a penalty p-spline and evolutionary optimization

37. Methods of mathematical modeling of fundus laser exposure for therapeutic effect evaluation

38. Approaches to moving object detection and parameter estimation in a video sequence for the transport analysis system

39. Energy flux of a vortex field focused using a secant gradient lens

40. High numerical aperture metalens to generate an energy backflow

41. Nonlinear filtering of image contours defined in a complex-valued code

42. The optimization of automated goods dynamic allocation and warehousing model

43. Optimization of parameters of binary phase axicons for the generation of terahertz vortex surface plasmon polaritons on cylindrical conductors

44. Adapted method for monitoring functional failures in NOR FLASH-memory during tests for resistance to heavy charged particles

45. Measurement of criteria parameters of analog-to-digital converters and monitoring of their changes during the radiation experiment

46. Network attacks main danger indicators formation in Internal Affairs Bodies automated systems

47. The use of microelectronics radiation behavior asphysical uncloned function to find counterfeit

48. The influence of high ionizing dose rate on CMOS IC radiation hardness used in da-ta transmission elements

49. The knowledge graph concept of decision support system in preliminary investigation

50. Evaluating CMOS chip sensitivity parameters to single event upsets under influence of neutrons by the burst generation rate function

Catalog

Books, media, physical & digital resources