期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Mutual Influence of the Atmosphere and the Ocean under Wave Processes
1
作者 Vladimir G. Kirtskhalia Konstantin R. Ninidze 《Journal of Modern Physics》 2021年第9期1346-1365,共20页
The article solves the problem of surface gravitational waves using the theory of tangential discontinuity between media: air-water. Using the improved equation of mass continuity and taking into account the atmospher... The article solves the problem of surface gravitational waves using the theory of tangential discontinuity between media: air-water. Using the improved equation of mass continuity and taking into account the atmosphere inhomogeneity in the gravitational field of the Earth, it is shown that during wave processes, these two media mutually influence each other, which explains the reason for the formation of a stormy condition over the ocean and the drop in atmospheric pressure before the storm. The mechanism of the formation of the “killer wave” has been established and thus the “greatest mystery of nature” has been solved. The scale of wind and tsunami wavelengths has been established. 展开更多
关键词 ATMOSPHERE OCEAN Gravitational Waves Waves of Wind Tsunami Waves Killer Wave
下载PDF
Development of the Software Application with Graphical User Interface for One Model Cyber Security
2
作者 Ramaz R. Shamugia 《International Journal of Communications, Network and System Sciences》 2019年第12期199-208,共10页
The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems... The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA). In the subsystems of eliminations of vulnerabilities and queues of unauthorized access considered as multichannel queueing systems with corresponding servers and queues, at random times there come requests to fix threats detected by the system. It is supposed that flows of requests demanding to eliminate threats coming to the mentioned subsystems of queueing systems are described with the Poisson distribution of probabilities, but processes of their elimination obey exponential law. For the system described above, there has been developed software realization of graphical interface which allows easily to change input parameters and observe graphical reflection of changes of the output indicators of the system. 展开更多
关键词 CYBER SECURITY DATA SECURITY CYBER Threats Cyber-Vulnerability Modelling of Cyber-Threats CYBER Space DATA PROTECTION QUEUEING Systems
下载PDF
Inelastic Properties of YBaCuO Superconductor Ceramics
3
作者 Ekaterine Sanaia Ia Kurashvili +1 位作者 Margarita Darchiashvili George Darsavelidze 《材料科学与工程(中英文A版)》 2011年第1X期102-105,共4页
关键词 YBACUO 超导陶瓷 非弹性 性质 剪切模量 转化过程 加热过程 弛豫过程
下载PDF
Development of an Analytical Model of the Process of Cybersecurity Protection of Distributed Information Systems of Critical Infrastructure
4
作者 Ramaz R. Shamugia 《International Journal of Communications, Network and System Sciences》 2020年第10期161-169,共9页
This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence,... This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence, in the discussed ISCI, of both the intelligent tools of detection, analysis and identification of threats and vulnerabilities and means for restauration and elimination of their consequences. The development of the model also takes into consideration probabilistic nature of flow of events happening in ISCI and transferring the system between different states of cybersecurity. Among such probabilistic events we mean any operational perturbations (that can cause extreme situations) happening in ISCI under the influence of cyber-threats, as well as events concerning restoration and elimination of consequences of such cyber-threats. In this work, as methods of modelling, there have been used methods of system-oriented analysis based on theory of probability, theory of reliability and theory of queues. These methods enabled to describe analytically dependence of effectiveness indices of ISCI operation on abovementioned probabilistic processes. 展开更多
关键词 CYBERSPACE Critical Infrastructure Multichannel Queuing System CYBERSECURITY Cybersecurity Protection System
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部