Issue Date | Title | Author(s) |
2011 | A comprehensive assessment of product quality in the relation to anthropogenic impacts on the environmen | Brakovich, A. I.; Kolesnikov, V. L.; Urbanovich, P. P. |
2017 | A formal description of a multi-key steganographic systems | Urbanovich, P. P.; Shutko, N. P.; Zapala, August |
2017 | A method of syntactic text steganography based on modification of the document-container aprosh | Shutko, N. P.; Urbanovich, P. P.; Zhukovski, P. V. |
2010 | Bazy danych: teoria i praktyka | Urbanovich, P. P.; Płonkowski, Marcin; Urbanowicz, Dmitry |
2016 | Bezpieczenstwo w cyberprzestrzeni a prawo karne | Urbanovich, P. P.; Smarzewski, М. |
2015 | Channel Adapted Decoding Algorithms for Correction Modular Errors and Erasures in Communication System | Urbanovich, P. P.; Patsei, N. P.; Romanenko, D. M.; Shiman, D. V.; Bulova, Y. |
2013 | Data mining for industrial facilities | Kolesnikov, V. L.; Urbanovich, P. P.; Brakovich, A. I. |
2001 | Dydaktyczne programy komputerowe przeznaczone do wizualnej analizy relacyjnych baz danych | Pylak, Pavel; Urbanovich, P. P. |
2003 | Failure consequences imitation modelling in the equipment of data protection and datastorage systems | Urbanovich, P. P.; Halaburda, A. L.; Romanenko, D. M.; Makas, S. B. |
2009 | Information model of knowledge representation in computer automated learning systems | Urbanovich, P. P.; Kabak, A. V.; Moroz, L. S. |
2001 | Information sсrambler/Desсrambler based on combination of data compression and error-correction codes | Patsei, N. V.; Urbanovich, P. P. |
2020 | Internet of things: concepts, risks, security | Filipek, Ł.; Urbanovich, P. P. |
2007 | License Protection of a Component of Web-Applications on .Net Framework | Makas, S. B.; Urbanovich, P. P. |
2012 | Mathematical foundations of complex desirability function for evalution of the product quality in the relationship with antropogenic impacts on the enviroment | Brakovich, Andrei; Kolesnikov, Vitaliy; Urbanovich, P. P. |
2009 | Mathematical model of control points placing for monitoring polluting substances emissions in the atmosphere on the basis of the NP-full coloring graph task decision | Brakovich, A. I.; Urbanovich, P. P. |
2018 | A method of syntactic text steganography based on modification of the document-container aprosh | Shutko, Nadzeya; Urbanovich, P. P.; Zukowski, Pawel |
2019 | Methods, software and hardware tools for cryptocurrency technologies | Rąb, P.; Urbanovich, P. P. |
2018 | A model of multi-key steganographic system | Urbanovich, P. P.; Shutko, N. P.; Zapała, A. M. |
2016 | Modeling and software implementation of fibrous waste disposal processes | Kolesnikov, Vitaliy; Urbanovich, P. P.; Brakovich, Andrei |
2015 | Modeling and Software Implementation of Fibrous Waste Disposal Processes | Kolesnikov, V. L.; Urbanovich, P. P.; Brakovich, D. M. |
2007 | Modeling and the Processes Analysis in Engineering Ecology | Brakovich, A. I.; Kolesnikov, V. L.; Romantsevich, A. V.; Urbanovich, P. P.; Zharsky, I. M. |
2011 | Multithreshold majority decoding of LDP-codes | Urbanovich, P. P.; Romanenko, D. M.; Shiman, D. V. |
2012 | Multithreshold majority decoding of LDPC-codes | Urbanovich, P. P.; Romanenko, D.; Shiman, D.; Vitkova, M. |
2004 | Ochrona informacji w sieciach komputerowych | Urbanovich, P. P. |
2000 | On the Design of Error Detection and Correction Cryptography Schemes | Patsei, N. V.; Urbanovich, P. P. |
2019 | Security of applications for computer games | Ciesielka, P.; Urbanovich, P. P. |
2019 | Server security of the multiplayer game «PROJECT I.G.I. 2: COVERT STRIKE» | Błaszczak, M.; Urbanovich, P. P. |
2009 | Software for modeling the neural-cryptographic system | Urbanovich, P. P.; Lisitsa, E. L. |
2011 | Split-complex numbers in neural cryptography | Płonkowski, M.; Urbanovich, P. P. |
2021 | Steganographic method based on hidden messages embedding into Bezier curves of SVG images | Blinova, E. A.; Urbanovich, P. P.; Блинова, Е. А.; Урбанович, П. П. |
2009 | Text steganography application for protection and transfer of the information | Urbanovich, P. P.; Chourikov, K. V.; Rima, A. V.; Urbanovich, N. P. |
2010 | Text steganography application for protection and transfer of the information | Urbanovich, P. P.; Chourikov, Konstantin; Rimorev, Andrey; Urbanovich, Nadzeya |
2014 | The algorithm for determining of the errors multiplicity by multithreshold decoding of iterative codes | Urbanovich, P. P.; Vitkova, Marina; Romanenko, Dmitri |
2013 | The algorithm for determining the errors multiplicity by multithreshold decoding of iterative codes | Urbanovich, P. P.; Vitkova, V. M.; Romanenko, D. M. |
2011 | The appearance of conflict by using the chaos function to calculate the hash code | Urbanovich, P. P.; Plonkowski, M.; Churikau, K. |
2012 | The appearance of conflict when using the chaos function for calculating the hash code | Urbanovich, P. P.; Plonkowski, Marcin; Churikov, Konstantsin |
2015 | The concept of dynamic modeling and optimization of fibrous waste disposal processes | Kolesnikov, V. L.; Urbanovich, P. P.; Brakovich, A. I. |
2016 | The use of pitch in Large-Vocabulary Continuous Speech Recognition System | Płonkowski, Marcin; Urbanovich, P. P. |
2015 | The Use of Pitch in Large-Vocabulary Continuous Speech Recognition System | Urbanovich, P. P.; Płonkowski, M. |
2016 | Theoretical Model of a Multi-Key Steganography System | Urbanovich, P. P.; Shutko, Nadzeya |
2014 | Tuning a CMU Sphinx-III Speech Recognition System for Polish Language | Płonkowski, Marcin; Urbanovich, P. P. |
2013 | Tuning a CMU Sphinx-III Speech Recognition System for Polish Language | Płonkowski, Marcin; Urbanovich, P. P. |
2021 | Users data protection on the basis of a web application for status monitoring of computer services | Wilk, Jа.; Urbanovich, P. P. |
2018 | Using Full Covariance Matrix for CMU Sphinx-III Speech Recognition System | Płonkowski, Marcin; Urbanovich, P. P. |
2017 | Using Full Covariance Matrix for CMU Sphinx-III Speech Recognition System | Płonkowski, M.; Urbanovich, P. P. |
2011 | W-cyclic method interleaving of the data for communication systems | Gorbunova, Yu.; Urbanovich, P. P. |
2012 | W-cyclic method of interleaving of the data for communication systems | Gorgunova,Yulia; Urbanovich, P. P. |
2016 | Zastosowanie sztucznych sieci neuronowych do uwzgledniania kluczy kryptograficznych | Urbanovich, P. P.; Kozera, R.; Dolecki, M. |