Informatics and mathematical methods in simulation最新文献

筛选
英文 中文
Development of web service for dynamic generating a forecast of budget depending on the user’s story 开发基于用户故事动态生成预算预测的web服务
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.316
K. Pysarenko, T. V. Onishenko, O. Prygozhev
{"title":"Development of web service for dynamic generating a forecast of budget depending on the user’s story","authors":"K. Pysarenko, T. V. Onishenko, O. Prygozhev","doi":"10.15276/imms.v11.no4.316","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.316","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131868396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the effectiveness of the implementation of computational algorithms using the ореnмр standard for parallelizing programs 评估使用ореnмр并行程序标准的计算算法实现的有效性
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.268
O. Zhulkovskyi, I. Zhulkovska, V. Shevchenko
{"title":"Evaluating the effectiveness of the implementation of computational algorithms using the ореnмр standard for parallelizing programs","authors":"O. Zhulkovskyi, I. Zhulkovska, V. Shevchenko","doi":"10.15276/imms.v11.no4.268","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.268","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117292618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of corporate networks from human influence using technical means 利用技术手段保护企业网络不受人为影响
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.358
Y. Tkach, O. Yakovlev, T. Lisitsa
{"title":"Protection of corporate networks from human influence using technical means","authors":"Y. Tkach, O. Yakovlev, T. Lisitsa","doi":"10.15276/imms.v11.no4.358","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.358","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133191412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Person identification in a video stream by machine learning methods 基于机器学习方法的视频流中的人物识别
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.287
I.C. Kunak, I. Shpinareva, V.G. Pienko
{"title":"Person identification in a video stream by machine learning methods","authors":"I.C. Kunak, I. Shpinareva, V.G. Pienko","doi":"10.15276/imms.v11.no4.287","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.287","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video surveillance for security systems: models, methods and proposed solutions 安防系统视频监控:模型、方法和建议的解决方案
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.331
V. Ruvinskaya, V. Devyatkov
{"title":"Video surveillance for security systems: models, methods and proposed solutions","authors":"V. Ruvinskaya, V. Devyatkov","doi":"10.15276/imms.v11.no4.331","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.331","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an information control system for automatization of the activities of retail trade enterprises 开发零售贸易企业活动自动化的信息控制系统
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.253
A.O. Azarenkov, V. Vychuzhanin
{"title":"Development of an information control system for automatization of the activities of retail trade enterprises","authors":"A.O. Azarenkov, V. Vychuzhanin","doi":"10.15276/imms.v11.no4.253","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.253","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of adaptive methods for ensuring the reliability of the transmission of information when using installation-free coding in wireless systems 在无线系统中使用免安装编码时确保信息传输可靠性的自适应方法概述
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.278
S. Zaitsev, V. Vasilenko, S.M. Semendiai
{"title":"Overview of adaptive methods for ensuring the reliability of the transmission of information when using installation-free coding in wireless systems","authors":"S. Zaitsev, V. Vasilenko, S.M. Semendiai","doi":"10.15276/imms.v11.no4.278","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.278","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127134583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Basic principles of providing cybersecurity of organizations in the covid-19 pandemic conditions and quarantine restraints 新冠肺炎疫情条件下组织网络安全保障基本原则及隔离限制
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.296
D. Mekhed, K. Mekhed
{"title":"Basic principles of providing cybersecurity of organizations in the covid-19 pandemic conditions and quarantine restraints","authors":"D. Mekhed, K. Mekhed","doi":"10.15276/imms.v11.no4.296","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.296","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic model of a production assembly line as an absorbing markov chain 作为吸收马尔可夫链的生产线动态模型
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.262
A. N. Tynynyka
{"title":"Dynamic model of a production assembly line as an absorbing markov chain","authors":"A. N. Tynynyka","doi":"10.15276/imms.v11.no4.262","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.262","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115105320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical modeling of the operation of cyber-protected information systems depending on the number of users 基于用户数量的网络保护信息系统运行的数学建模
Informatics and mathematical methods in simulation Pub Date : 2021-10-26 DOI: 10.15276/imms.v11.no4.374
V. Horoshko, V. Kudinov
{"title":"Mathematical modeling of the operation of cyber-protected information systems depending on the number of users","authors":"V. Horoshko, V. Kudinov","doi":"10.15276/imms.v11.no4.374","DOIUrl":"https://doi.org/10.15276/imms.v11.no4.374","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信