Download PDF by Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav: Proceedings of the First International Scientific Conference

By Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav Snášel

ISBN-10: 3319338153

ISBN-13: 9783319338156

This quantity of Advances in clever platforms and Computing includes papers awarded frequently song of IITI 2016, the 1st foreign convention on clever info applied sciences for held in could 16-21 in Sochi, Russia. The convention used to be together co-organized via Rostov kingdom shipping college (Russia) and VŠB – Technical collage of Ostrava (Czech Republic) with the participation of Russian organization for man made Intelligence (RAAI) and Russian organization for Fuzzy platforms and smooth Computing (RAFSSC). the amount is dedicated to useful types and business purposes with regards to clever details platforms. The convention has been a gathering element for researchers and practitioners to permit the implementation of complicated details applied sciences into quite a few industries. however, a few theoretical talks touching on the-state-of-the-art in clever platforms and tender computing are incorporated within the court cases in addition.

Show description

Read or Download Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI’16), Volume 2 PDF

Best international_1 books

Get Swarm Intelligence Based Optimization: First International PDF

This ebook constitutes the completely refereed post-conference complaints of the first overseas convention on Swarm Intelligence dependent Optimization, ICSIBO 2014, held in Mulhouse, France, in might 2014. The 20 complete papers provided have been rigorously reviewed and chosen from forty eight submissions. issues of curiosity awarded and mentioned within the convention specializes in the theoretical development of swarm intelligence metaheuristics and their functions in parts akin to: theoretical advances of swarm intelligence metaheuristics, combinatorial, discrete, binary, limited, multi-objective, multi-modal, dynamic, noisy, and large-scale optimization, man made immune structures, particle swarms, ant colony, bacterial foraging, synthetic bees, fireflies set of rules, hybridization of algorithms, parallel/distributed computing, laptop studying, information mining, info clustering, determination making and multi-agent structures according to swarm intelligence ideas, edition and functions of swarm intelligence rules to genuine global difficulties in a variety of domain names.

New PDF release: Advances in Visual Computing: 12th International Symposium,

The 2 quantity set LNCS 10072 and LNCS 10073 constitutes the refereed complaints of the twelfth overseas Symposium on visible Computing, ISVC 2016, held in Las Vegas, NV, united states in December 2016. The 102 revised complete papers and 34 poster papers awarded during this booklet have been rigorously reviewed and chosen from 220 submissions.

Extra info for Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI’16), Volume 2

Sample text

Rep. Ser. Nat. Tech. Sci. 5 (2006) Part II Probabilistic models, Algebraic Bayesian Networks and Information Protection Models and Algorithms for the Information System’s Users’ Protection Level Probabilistic Estimation Artur Azarov, Maxim Abramov, Alexander Tulupyev and Tatiana Tulupyeva Abstract Questions of information security for today’s business, somehow using information technologies are among the most important. Probabilistic relational model complex “information system—critical documents—the staff—the attacker” are being concidered, as well as an algorithm for estimating the probability of users of information systems security by social engineering attacks.

3. When two radius-vectors turn by the same angle, longer vector is more stable. Therefore when the same information volume is built in into two different pixel blocks more stable is the block with bigger sum of amplitude spectrum elements. These elements correspond to elements of the phase spectrum used. Still up to now we have not managed to find the strong dependence of building in reliability on the image statistical characteristics. We can speak only about empiric conclusions true in many cases.

Vik Þ That means that the probability of the malefactor’s social engineering attack action success depends on the variety of the parameters such as malefactor’s resources, types of social engineering attack actions and the opportunities to use these social engineering attack actions, and the degrees of user’s vulnerabilities. The basic idea is that one malefactor’s social engineering attack action effects only one, particular user’s vulnerability. In this way, the probability of the malefactor’s social engineering attack action success may be represented as follows Psuc ¼ Atji ðDÞVji ðDÞ Atjmax ðDÞVjmax ðDÞ ð1Þ At the same time, if one malefactor’s social engineering attack action effects several user’s vulnerabilities, the probability of social engineering attack action success may be represented as follows: Psuc ¼ 1 À v Y j¼1 AtðDÞVji ðDÞ 1À Atjmax ðDÞVjmax ðDÞ !

Download PDF sample

Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI’16), Volume 2 by Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav Snášel


by George
4.4

Rated 4.04 of 5 – based on 42 votes