26 resultados para Anomalous Sub-Diffusion Equation, Fractional Derivative, Methods of Separating Variables, Non-homogeneous Problem

em Bulgarian Digital Mathematics Library at IMI-BAS


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mathematical Subject Classification 2010: 35R11, 42A38, 26A33, 33E12.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 26A33 (primary), 35S15 (secondary)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 26A33 (primary), 35S15

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mathematics Subject Classification 2010: 35M10, 35R11, 26A33, 33C05, 33E12, 33C20.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

MSC 2010: 26A33, 33E12, 34K29, 34L15, 35K57, 35R30

Relevância:

100.00% 100.00%

Publicador:

Resumo:

MSC 2010: 35R11, 42A38, 26A33, 33E12

Relevância:

100.00% 100.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 26A33, 33C60, 44A15, 35K55

Relevância:

100.00% 100.00%

Publicador:

Resumo:

2000 Math. Subject Classification: 26A33; 33E12, 33E30, 44A15, 45J05

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mathematics Subject Classification: 26A33, 34A37.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects’ groups, exposed to selected attacks’ groups. With the help of methods for multi-criteria evaluation are chosen the methods’ groups with the lowest risk with respect to the information security. Recommendations for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The methods of the application of the Combined didactic interactive programme system on electrical engineering disciplines has been worked out and the possibility of its application for providing a complex of different kinds of studies: lectures, tutorials, laboratory studies and also for organizing students’ independent work has been verified. The given methods provide the organization of the reproductive (recognition and reproduction) and productive heuristic educational-cognitive students’ activity in conditions of gradualness and completeness of education with the closed directed automatic control.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article describes the approach, which allows to develop information systems without taking into consideration details of physical storage of the relational model and type database management system. Described in terms of graph model, this approach allows to construct several algorithms, for example, for verification application domain. This theory was introduced into operation testing as a part of CASE-system METAS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.