Browsing by Author Urbanovich, P. P.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
А Б В Г Д Е Ж З И Й К Л М Н О П Р С Т У Ф Х Ц Ч Ш Щ Ъ Ы Ь Э Ю Я
or enter first few letters:  
Showing results 1 to 48 of 48
Issue DateTitleAuthor(s)
2011A comprehensive assessment of product quality in the relation to anthropogenic impacts on the environmenBrakovich, A. I.; Kolesnikov, V. L.; Urbanovich, P. P.
2017A formal description of a multi-key steganographic systemsUrbanovich, P. P.; Shutko, N. P.; Zapala, August
2017A method of syntactic text steganography based on modification of the document-container aproshShutko, N. P.; Urbanovich, P. P.; Zhukovski, P. V.
2010Bazy danych: teoria i praktykaUrbanovich, P. P.; Płonkowski, Marcin; Urbanowicz, Dmitry
2016Bezpieczenstwo w cyberprzestrzeni a prawo karneUrbanovich, P. P.; Smarzewski, М.
2015Channel Adapted Decoding Algorithms for Correction Modular Errors and Erasures in Communication SystemUrbanovich, P. P.; Patsei, N. P.; Romanenko, D. M.; Shiman, D. V.; Bulova, Y.
2013Data mining for industrial facilitiesKolesnikov, V. L.; Urbanovich, P. P.; Brakovich, A. I.
2001Dydaktyczne programy komputerowe przeznaczone do wizualnej analizy relacyjnych baz danychPylak, Pavel; Urbanovich, P. P.
2003Failure consequences imitation modelling in the equipment of data protection and datastorage systemsUrbanovich, P. P.; Halaburda, A. L.; Romanenko, D. M.; Makas, S. B.
2009Information model of knowledge representation in computer automated learning systemsUrbanovich, P. P.; Kabak, A. V.; Moroz, L. S.
2001Information sсrambler/Desсrambler based on combination of data compression and error-correction codesPatsei, N. V.; Urbanovich, P. P.
2020Internet of things: concepts, risks, securityFilipek, Ł.; Urbanovich, P. P.
2007License Protection of a Component of Web-Applications on .Net FrameworkMakas, S. B.; Urbanovich, P. P.
2012Mathematical foundations of complex desirability function for evalution of the product quality in the relationship with antropogenic impacts on the enviromentBrakovich, Andrei; Kolesnikov, Vitaliy; Urbanovich, P. P.
2009Mathematical model of control points placing for monitoring polluting substances emissions in the atmosphere on the basis of the NP-full coloring graph task decisionBrakovich, A. I.; Urbanovich, P. P.
2018A method of syntactic text steganography based on modification of the document-container aproshShutko, Nadzeya; Urbanovich, P. P.; Zukowski, Pawel
2019Methods, software and hardware tools for cryptocurrency technologiesRąb, P.; Urbanovich, P. P.
2018A model of multi-key steganographic systemUrbanovich, P. P.; Shutko, N. P.; Zapała, A. M.
2016Modeling and software implementation of fibrous waste disposal processesKolesnikov, Vitaliy; Urbanovich, P. P.; Brakovich, Andrei
2015Modeling and Software Implementation of Fibrous Waste Disposal ProcessesKolesnikov, V. L.; Urbanovich, P. P.; Brakovich, D. M.
2007Modeling and the Processes Analysis in Engineering EcologyBrakovich, A. I.; Kolesnikov, V. L.; Romantsevich, A. V.; Urbanovich, P. P.; Zharsky, I. M.
2011Multithreshold majority decoding of LDP-codesUrbanovich, P. P.; Romanenko, D. M.; Shiman, D. V.
2012Multithreshold majority decoding of LDPC-codesUrbanovich, P. P.; Romanenko, D.; Shiman, D.; Vitkova, M.
2004Ochrona informacji w sieciach komputerowychUrbanovich, P. P.
2000On the Design of Error Detection and Correction Cryptography SchemesPatsei, N. V.; Urbanovich, P. P.
2019Security of applications for computer gamesCiesielka, P.; Urbanovich, P. P.
2019Server security of the multiplayer game «PROJECT I.G.I. 2: COVERT STRIKE»Błaszczak, M.; Urbanovich, P. P.
2009Software for modeling the neural-cryptographic systemUrbanovich, P. P.; Lisitsa, E. L.
2011Split-complex numbers in neural cryptographyPłonkowski, M.; Urbanovich, P. P.
2021Steganographic method based on hidden messages embedding into Bezier curves of SVG imagesBlinova, E. A.; Urbanovich, P. P.; Блинова, Е. А.; Урбанович, П. П.
2009Text steganography application for protection and transfer of the informationUrbanovich, P. P.; Chourikov, K. V.; Rima, A. V.; Urbanovich, N. P.
2010Text steganography application for protection and transfer of the informationUrbanovich, P. P.; Chourikov, Konstantin; Rimorev, Andrey; Urbanovich, Nadzeya
2014The algorithm for determining of the errors multiplicity by multithreshold decoding of iterative codesUrbanovich, P. P.; Vitkova, Marina; Romanenko, Dmitri
2013The algorithm for determining the errors multiplicity by multithreshold decoding of iterative codesUrbanovich, P. P.; Vitkova, V. M.; Romanenko, D. M.
2011The appearance of conflict by using the chaos function to calculate the hash codeUrbanovich, P. P.; Plonkowski, M.; Churikau, K.
2012The appearance of conflict when using the chaos function for calculating the hash codeUrbanovich, P. P.; Plonkowski, Marcin; Churikov, Konstantsin
2015The concept of dynamic modeling and optimization of fibrous waste disposal processesKolesnikov, V. L.; Urbanovich, P. P.; Brakovich, A. I.
2016The use of pitch in Large-Vocabulary Continuous Speech Recognition SystemPłonkowski, Marcin; Urbanovich, P. P.
2015The Use of Pitch in Large-Vocabulary Continuous Speech Recognition SystemUrbanovich, P. P.; Płonkowski, M.
2016Theoretical Model of a Multi-Key Steganography SystemUrbanovich, P. P.; Shutko, Nadzeya
2014Tuning a CMU Sphinx-III Speech Recognition System for Polish LanguagePłonkowski, Marcin; Urbanovich, P. P.
2013Tuning a CMU Sphinx-III Speech Recognition System for Polish LanguagePłonkowski, Marcin; Urbanovich, P. P.
2021Users data protection on the basis of a web application for status monitoring of computer servicesWilk, Jа.; Urbanovich, P. P.
2018Using Full Covariance Matrix for CMU Sphinx-III Speech Recognition SystemPłonkowski, Marcin; Urbanovich, P. P.
2017Using Full Covariance Matrix for CMU Sphinx-III Speech Recognition SystemPłonkowski, M.; Urbanovich, P. P.
2011W-cyclic method interleaving of the data for communication systemsGorbunova, Yu.; Urbanovich, P. P.
2012W-cyclic method of interleaving of the data for communication systemsGorgunova,Yulia; Urbanovich, P. P.
2016Zastosowanie sztucznych sieci neuronowych do uwzgledniania kluczy kryptograficznychUrbanovich, P. P.; Kozera, R.; Dolecki, M.