Zobrazeno 1 - 10
of 593
pro vyhledávání: '"Labunets IF"'
National Security Letters (NSLs) are similar to administrative subpoenas and can be issued directly by elements of the executive branch without requiring prior approval from a court or grand jury. Importantly, NSLs authorize the imposition of nondisc
Externí odkaz:
http://arxiv.org/abs/2403.02768
Distributed ledger technologies have gained significant attention and adoption in recent years. Despite various security features distributed ledger technology provides, they are vulnerable to different and new malicious attacks, such as selfish mini
Externí odkaz:
http://arxiv.org/abs/2401.12358
Content scanning systems employ perceptual hashing algorithms to scan user content for illegal material, such as child pornography or terrorist recruitment flyers. Perceptual hashing algorithms help determine whether two images are visually similar w
Externí odkaz:
http://arxiv.org/abs/2212.04107
Publikováno v:
Научный диалог, Vol 13, Iss 3, Pp 9-30 (2024)
This article addresses the issue of linguosemiotic interpretation of proper names functioning in a literary text. The research aims to identify the linguosemiotic specificity of onyms through which the fantastic world of the work in the urban fantasy
Externí odkaz:
https://doaj.org/article/3482ee20bd0b4fde861b5e9a040ea778
Autor:
Amjad, Maaz, Zhila, Alisa, Sidorov, Grigori, Labunets, Andrey, Butta, Sabur, Amjad, Hamza Imam, Vitman, Oxana, Gelbukh, Alexander
With the growth of social media platform influence, the effect of their misuse becomes more and more impactful. The importance of automatic detection of threatening and abusive language can not be overestimated. However, most of the existing studies
Externí odkaz:
http://arxiv.org/abs/2207.06710
Autor:
Ovdenko, Valeriia M., Komarenko, Dmytro O., Ronkovych, Andriy V., Labunets, Artem R., Multian, Volodymyr V., Gayvoronsky, Volodymyr Ya
Publikováno v:
In Optical Materials November 2024 157 Part 2
Publikováno v:
Цифровые модели и решения, Vol 2, Iss 3, Pp 5-22 (2023)
The article shows how ordinary complex-valued Fourier transforms are extended to Cliffordean-valued many-parameter Fourier transforms (MPFCTs). Each MPFCT depends on finite set of independent parameters (angles), which could be changed independently
Externí odkaz:
https://doaj.org/article/db3c0f3224b34d1283ba5458e84e3454
Autor:
Insua, David Rios, Vieira, Aitor Couce, Rubio, Jose Antonio, Pieters, Wolter, Labunets, Katsiaryna, Rasines, Daniel Garcia
Cyber threats affect all kinds of organisations. Risk analysis is an essential methodology for cybersecurity as it allows organisations to deal with the cyber threats potentially affecting them, prioritise the defence of their assets and decide what
Externí odkaz:
http://arxiv.org/abs/1903.07727
Publikováno v:
Вопросы ономастики, Vol 19, Iss 3, Pp 9-39 (2022)
The paper is the first approach to study the etymology of the lower reaches of the river Tavda (northeast of the Nizhnetavdinsky and Yarkovsky districts of the Tyumen region) which bears the imprint of an early encounter of the Russian language with
Externí odkaz:
https://doaj.org/article/527c18192735416eaf7cfa1eb95aee40
Publikováno v:
Цифровые модели и решения, Vol 2, Iss 2 (2023)
A unified mathematical form of reversible nonlinear transformations based on a nonlinear tensor product is presented in the form of fast algorithms. The main goal of this article is to show that almost all Fourier transforms (FFTs) can be both genera
Externí odkaz:
https://doaj.org/article/d3d825f32f33460089ba3e07eeab387c