Scientific Journal of KubSAU

Polythematic online scientific journal
of Kuban State Agrarian University
ISSN 1990-4665
AGRIS logo UlrichsWeb logo DOAJ logo
Search by author's name Search by title
434 kb

MATHEMATICAL MODELLING OF HEAT AND MASS TRANSFER DURING ADSORPTION-CONTACT DRYING OF CERAMIC MATERIALS (MATHEMATICAL MODEL)

abstract 0891305019 issue 89 pp. 257 – 277 29.05.2013 ru 1220
The mathematical model of heat and mass transfer during adsorption-contact drying of ceramic bricks within the framework of the mechanics of multiphase systems is constructed
209 kb

MATHEMATICAL MODELLING OF PROCESS OF WORK OF THE COMBINED SOIL-CULTIVATING UNIT

abstract 0991405092 issue 99 pp. 1315 – 1325 30.05.2014 ru 1531
In the article, we have considered the questions of mathematical modeling of a combined soil-cultivating unit. Theoretical dependences and rational values of parameters and unit operating modes are received
244 kb

MATHEMATICAL MODELLING OF THE COMPRESSION PROCESS OF WOOD

abstract 0751201074 issue 75 pp. 970 – 985 27.01.2012 ru 2006
Rheological model for wood mechanical behaviour, viewed as a medium with dual porosity, is considered. Mathematical modelling of compression process of a wooden sample in a special mould is done at stable temperature conditions with the help of numerical methods. It is shown, in particular, that the durability level of essentially depends on the rheological characteristics of the structural skeleton and the wooden substance, as well as on reallocating of fields of moisture and porosity
293 kb

MATHEMATICAL MODELS AND CALCULATION OF THE HYDRODYNAMIC CHARACTERISTICS OF A BOUNDARY LAYER

abstract 0821208052 issue 82 pp. 704 – 738 31.10.2012 ru 1814
The processes of momentum transfer in laminar and turbulent boundary layers are considered. We have obtained the proprietary models for calculation of shear stresses, turbulent viscosity, friction factors, boundary layer thickness and momentum transfer coefficients in boundary layers under different conditions of motion of media. The examples of the calculation of the above characteristics and their agreement with known experimental data are shown. The obtained equations and the methods of calculation of the boundary layer characteristics can be used for calculations of industrial heat and mass transfer apparatuses of various designs as well as of some other types of equipment
127 kb

MATHEMATICAL MODELS OF SELECTION OF VEHICLES AND THEIR DISTRIBUTION ON TECHNOLOGICAL OPERATIONS

abstract 0771203023 issue 77 pp. 237 – 247 30.03.2012 ru 1512
The article describes the models of selection and distribution of vehicles in the life cycle transport company based on the principle of hierarchical modeling for various manufacturing operations
1146 kb

MATHEMATICAL SIMULATION OF LIQUID DROP MOTION TRAJECTORY FORM THE SURFACE OF VERTICALLY REVOLVING DISK SPRAYER

abstract 0721108028 issue 72 pp. 315 – 326 30.10.2011 ru 2079
In the given article process of mathematical modeling of a mechanical trajectory of a drip of a fluid from a surface of upright gyrated disk sprayer is featured, for chemical protection of young fruit plants
387 kb

MATHEMATICAL SOFTWARE FOR DETECTING CONFIDENTIAL DATA IN ELECTRONIC DOCUMENTS

abstract 1181604081 issue 118 pp. 1267 – 1281 29.04.2016 ru 534
In the article, we develop the software for process of confidential data detection based on the knowledge bases technology. The algorithm of detection of confidential data in the electronic documents transferred outbound of protected information system, due to application of linguistic technologies of the thorough text analysis is presented. The estimation of computing complexity of the developed algorithm is made up. The developed data structures and algorithm are realized in the programming language C++. Results of the experiments, confirmed workability of the developed algorithm are presented. The performed experimental researches of the developed algorithm have shown its practical applicability. The estimation of quality of confidential data detection is made up. The obtained estimations of detection quality have shown, that the developed structures of data and algorithm provide more effective and qualitative solution of problems of the confidential information detection in electronic documents, at due to application of knowledge bases technology where the subject domain of the analyzed information is considered. Distinctive feature of the developed algorithm of confidential data detection is the use of rapid access to hashed concept ontographs simultaneous implementation of knowledge base rules, which allows raising indicators of completeness and accuracy of detection. A scope of application of the developed software is the protection frames of the information intended for revealing of an information transfer containing data of confidential character in electronic documents outbound of protected information system with violation of security policy
134 kb

MATHEMATICAL SYSTEM MODEL FOR DISCOVERY OF HIDDEN CHANNEL

abstract 0601006040 issue 60 pp. 634 – 640 29.06.2010 ru 2093
In the given article, the mathematical system model for discovery of hidden channels in the network of packet data communication automatic systems, designed on the base of the analysis of building principles and inflexions of signals, sent through hidden channels is presented
235 kb

MATHEMATICAL, SOFTWARE AND TECHNICAL SUPPORT FOR DESIGN OF EXTREME ENGINEERING CONTROL SYSTEMS FOR PARAMETERS OF FOREST GREENHOUSES MICROCLIMATE

abstract 0771203025 issue 77 pp. 258 – 268 30.03.2012 ru 1596
This article develops mathematical, software and technical support for design of extreme control systems growing for planting of seedlings in hothouses
197 kb

MEANS AND METHODS OF INFORMATION SECURITY IN THE ECONOMIC SPHERE

abstract 1191605047 issue 119 pp. 653 – 665 31.05.2016 ru 434
People commit nine out of ten acts of sabotage, one way or another associated with information technologies. According to experts at InfoWatch, developer of systems to protect confidential information from insiders, the reason for this profession lies in the psychological characteristics of these employees. To understand the problem let a couple of real-life examples illustrate the typical traits of professionals in the information environment. In addition, if the first teller did not hide his name, the latter decided to remain anonymous. Deep psychological background of the act of sabotage often leads to the fact that a disgruntled employee threatens boss or coworkers, for example, by e-mail. Sometimes he even shares his thoughts with someone from colleagues. In other words, it is not only the attacker, who knows the information about the planned diversion. Analysts estimate, that in 31% of cases, other people have the information about the plans of the saboteur. Of these, 64% are colleagues, 21% are friends, 14% — family members, and another 14% are allies. In addition, we were able to establish that 62% of corporate saboteurs think about their actions in advance. In 47% of cases, they commit preparatory acts (e.g., theft of confidential data backups). 27% — design and test of the future mechanism of the attack (preparing a logic bomb for the corporate network, additional hidden inputs to the system, etc.). Whilst in 37% of cases of the activity of employees, you may notice: 67% of the preparatory action may be visible online, 11% are visible offline, 22% — both at once
ßíäåêñ.Ìåòðèêà