The mathematical model of heat and mass transfer during adsorption-contact drying of ceramic bricks within the framework of the mechanics of multiphase systems is constructed
In the article, we have considered the questions of mathematical modeling of a combined soil-cultivating unit. Theoretical dependences and rational values of parameters and unit operating modes are received
Rheological model for wood mechanical behaviour, viewed as a medium with dual porosity, is considered. Mathematical modelling of compression process of a wooden sample in a special mould is done at stable temperature conditions with the help of numerical methods. It is shown, in particular, that the durability level of essentially depends on the rheological characteristics of the structural skeleton and the wooden substance, as well as on reallocating of fields of moisture and porosity
The processes of momentum transfer in laminar and turbulent boundary layers are considered. We have obtained the proprietary models for calculation of shear stresses, turbulent viscosity, friction factors, boundary layer thickness and momentum transfer coefficients in boundary layers under different conditions of motion of media. The examples of the calculation of the above characteristics and their agreement with known experimental data are shown. The obtained equations and the methods of calculation of the boundary layer characteristics can be used for calculations of industrial heat and mass transfer apparatuses of various designs as well as of some other types of equipment
The article describes the models of selection and distribution of vehicles in the life cycle transport company based on the principle of hierarchical modeling for various manufacturing operations
In the given article process of mathematical modeling of a mechanical trajectory of a drip of a fluid from a surface of upright gyrated disk sprayer is featured, for chemical protection of young fruit plants
In the article, we develop the software for process of
confidential data detection based on the knowledge
bases technology. The algorithm of detection of
confidential data in the electronic documents
transferred outbound of protected information system,
due to application of linguistic technologies of the
thorough text analysis is presented. The estimation of
computing complexity of the developed algorithm is
made up. The developed data structures and algorithm
are realized in the programming language C++.
Results of the experiments, confirmed workability of
the developed algorithm are presented. The performed
experimental researches of the developed algorithm
have shown its practical applicability. The estimation
of quality of confidential data detection is made up.
The obtained estimations of detection quality have
shown, that the developed structures of data and
algorithm provide more effective and qualitative
solution of problems of the confidential information
detection in electronic documents, at due to application
of knowledge bases technology where the subject
domain of the analyzed information is considered.
Distinctive feature of the developed algorithm of
confidential data detection is the use of rapid access to
hashed concept ontographs simultaneous
implementation of knowledge base rules, which allows
raising indicators of completeness and accuracy of
detection. A scope of application of the developed
software is the protection frames of the information
intended for revealing of an information transfer
containing data of confidential character in electronic
documents outbound of protected information system
with violation of security policy
In the given article, the mathematical system model for discovery of hidden channels in the network of packet data communication automatic systems, designed on the base of the analysis of building principles and inflexions of signals, sent through hidden channels is presented
This article develops mathematical, software and technical support for design of extreme control systems growing for planting of seedlings in hothouses
People commit nine out of ten acts of sabotage, one
way or another associated with information
technologies. According to experts at InfoWatch,
developer of systems to protect confidential
information from insiders, the reason for this
profession lies in the psychological characteristics of
these employees. To understand the problem let a
couple of real-life examples illustrate the typical traits
of professionals in the information environment. In
addition, if the first teller did not hide his name, the
latter decided to remain anonymous. Deep
psychological background of the act of sabotage often
leads to the fact that a disgruntled employee threatens
boss or coworkers, for example, by e-mail. Sometimes
he even shares his thoughts with someone from
colleagues. In other words, it is not only the attacker,
who knows the information about the planned
diversion. Analysts estimate, that in 31% of cases,
other people have the information about the plans of
the saboteur. Of these, 64% are colleagues, 21% are
friends, 14% — family members, and another 14% are
allies. In addition, we were able to establish that 62%
of corporate saboteurs think about their actions in
advance. In 47% of cases, they commit preparatory
acts (e.g., theft of confidential data backups). 27% —
design and test of the future mechanism of the attack
(preparing a logic bomb for the corporate network,
additional hidden inputs to the system, etc.). Whilst in
37% of cases of the activity of employees, you may
notice: 67% of the preparatory action may be visible
online, 11% are visible offline, 22% — both at once