Zobrazeno 1 - 10
of 23
pro vyhledávání: '"I. V. Mashkina"'
Autor:
N. I. Aralova, O. M. KLYUCHKO, V. I. MASHKIN, I. V. MASHKINA, P. A. RADZIEJOWSKI, M.P. RADZIEJOWSKА
Publikováno v:
Biotechnologia Acta, Vol 15, Iss 1, Pp 23-42 (2022)
Aim. To analyze modern approaches to mathematical modeling of human respiratory and blood circulatory systems. Methods. Comprehensive review of scientific literature sources extracted from domestic and international resources databases. Results
Externí odkaz:
https://doaj.org/article/3e94f7c5988e4faabd8f0b7964eeddc2
Autor:
N. I. Aralova, O. M. Klyuchko, V. I. Mashkin, I. V. Mashkina, Paweł Radziejowski, Maria Radziejowska
Publikováno v:
Biotechnologia Acta, Vol 14, Iss 4, Pp 38-52 (2021)
The main complications of organism damaged by SARS-CoV-2 virus are various cardiovascular system lesions. As a result, the secondary tissue hypoxia is developed and it is relevant to search the means for hypoxic state alleviation. Mathematical modeli
Externí odkaz:
https://doaj.org/article/bcebd89e58ce46f3bdd0b1256e631ab5
Publikováno v:
Biotechnologia Acta, Vol 13, Iss 6, Pp 5-18 (2020)
The aim of the study was to develop a mathematical model to research hypoxic states in case of simulation of an organism infectious lesions. The model is based on the methods of mathematical modeling and the theory of optimal control of moving object
Externí odkaz:
https://doaj.org/article/ef657134a0c9469bb8a5d0d1e6c13775
Publikováno v:
Biotechnologia Acta, Vol 13, Iss 3, Pp 30-44 (2020)
The aim of the work was to create a complex mathematical model simulating the course of the disease caused by the SARS-CoV-2 virus on the level of interaction between functional systems of organism and pharmacological correction of organism hypoxic
Externí odkaz:
https://doaj.org/article/a1dd632fe3e940f08dc54b3853cff370
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 1, Pp 18-29 (2012)
The paper contains the description of the method of information objects value estimation when analyzing the information security risk using fuzzy logic tools. The value of information, processed within the network segment, is estimated according to t
Externí odkaz:
https://doaj.org/article/928aa22190684bcbb475f32beb0f7f20
Publikováno v:
Безопасность информационных технологий, Vol 18, Iss 2, Pp 37-49 (2011)
The threats matrix construction on the basis of the access matrixes is discussed. Development of threats model on the basis of fuzzy cognitive maps displaying the threats spreading pathways from attack sources to objects is described.
Externí odkaz:
https://doaj.org/article/cba95869a83348a1b5bb404d845ae22e
Autor:
E. P. Belova, I. V. Mashkina
Publikováno v:
Automatic Control and Computer Sciences. 55:924-931
Publikováno v:
Electronics and Control Systems. 2
Publikováno v:
Electronics and Control Systems. 2
Publikováno v:
Electronics and Control Systems. 1