Informatics and mathematical methods in simulation最新文献

筛选
英文 中文
Increasing the robustness of the steganographic method with code control of the additional information embedding against noise attacks 通过对附加信息嵌入的码控来提高隐写方法的鲁棒性,抵抗噪声攻击
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.56
D. O. Hulid, A. Sokolov
{"title":"Increasing the robustness of the steganographic method with code control of the additional information embedding against noise attacks","authors":"D. O. Hulid, A. Sokolov","doi":"10.15276/imms.v13.no1-2.56","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.56","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"617 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a software application for working with cyber security standards 为网络安全标准开发软件应用程序
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.112
O. Lanovska, O. Lebedeva
{"title":"Development of a software application for working with cyber security standards","authors":"O. Lanovska, O. Lebedeva","doi":"10.15276/imms.v13.no1-2.112","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.112","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"544 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123918194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of methods for solving operational problems of transport logistics 运输物流作业问题解决方法的比较分析
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.34
D. R. Horpenko, B. O. Boltenkov
{"title":"Comparative analysis of methods for solving operational problems of transport logistics","authors":"D. R. Horpenko, B. O. Boltenkov","doi":"10.15276/imms.v13.no1-2.34","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.34","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the application of clustering algorithms based on combined weight in manet class radio networks. 基于组合权值的聚类算法在马奈类无线网络中的应用分析。
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.104
K. V. Lukina, S. Klimovych
{"title":"Analysis of the application of clustering algorithms based on combined weight in manet class radio networks.","authors":"K. V. Lukina, S. Klimovych","doi":"10.15276/imms.v13.no1-2.104","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.104","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization methods and information technologies in active experiment 主动实验中的优化方法与信息技术
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.63
N. M. Yershova, L. Y. Kryvenkova
{"title":"Optimization methods and information technologies in active experiment","authors":"N. M. Yershova, L. Y. Kryvenkova","doi":"10.15276/imms.v13.no1-2.63","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.63","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security analysis systems of software and technical support of enterprise computers and sites 网络安全分析系统软件及企业计算机和站点的技术支持
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.75
V. V. Zadorov, D. O. Furman, O. Stopakevych, A. Stopakevych
{"title":"Cyber security analysis systems of software and technical support of enterprise computers and sites","authors":"V. V. Zadorov, D. O. Furman, O. Stopakevych, A. Stopakevych","doi":"10.15276/imms.v13.no1-2.75","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.75","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of properties of information intrusions 信息入侵性质评估
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.144
V. Khoroshko, V. Kozyura, Y. Khokhlachova, N. S. Vishnevska
{"title":"Assessment of properties of information intrusions","authors":"V. Khoroshko, V. Kozyura, Y. Khokhlachova, N. S. Vishnevska","doi":"10.15276/imms.v13.no1-2.144","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.144","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"183 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intellectualization of search for the causes of failure of components of a complex technical system 查找复杂技术系统部件故障原因的智能化
Informatics and mathematical methods in simulation Pub Date : 2023-04-23 DOI: 10.15276/imms.v13.no1-2.16
V. Vychuzhanin
{"title":"Intellectualization of search for the causes of failure of components of a complex technical system","authors":"V. Vychuzhanin","doi":"10.15276/imms.v13.no1-2.16","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.16","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
McELIECE CRYPTOSYSTEM BASED ON QUATERNARY HAMMING CODES 基于四元汉明码的McELIECE密码系统
Informatics and mathematical methods in simulation Pub Date : 2022-10-28 DOI: 10.15276/imms.v12.no4.280
D. A. Isakov, A. Sokolov
{"title":"McELIECE CRYPTOSYSTEM BASED ON QUATERNARY HAMMING CODES","authors":"D. A. Isakov, A. Sokolov","doi":"10.15276/imms.v12.no4.280","DOIUrl":"https://doi.org/10.15276/imms.v12.no4.280","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an application for data encryption with format preservation 具有格式保存的数据加密应用程序的开发
Informatics and mathematical methods in simulation Pub Date : 2022-10-28 DOI: 10.15276/imms.v12.no4.306
T. Horbatiuk, O. Lebedieva
{"title":"Development of an application for data encryption with format preservation","authors":"T. Horbatiuk, O. Lebedieva","doi":"10.15276/imms.v12.no4.306","DOIUrl":"https://doi.org/10.15276/imms.v12.no4.306","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信