Current Problems In Applied Mathematics And Computer Science And Systems

Download Current Problems In Applied Mathematics And Computer Science And Systems PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Current Problems In Applied Mathematics And Computer Science And Systems book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Current Problems in Applied Mathematics and Computer Science and Systems

This book is based on the best papers accepted for presentation during the International Conference on Actual Problems of Applied Mathematics and Computer Systems (APAMCS-2022), Russia. The book includes research materials on modern mathematical problems, solutions in the field of scientific computing, data analysis and modular computing. The scope of numerical methods in scientific computing presents original research, including mathematical models and software implementations, related to the following topics: numerical methods in scientific computing; solving optimization problems; methods for approximating functions, etc. The studies in data analysis and modular computing include contributions in the field of deep learning, neural networks, mathematical statistics, machine learning methods, residue number system and artificial intelligence. Finally, the book gives insights into the fundamental problems in mathematics education. The book intends for readership specializing in the field of scientific computing, parallel computing, computer technology, machine learning, information security and mathematical education.
Current Problems of Applied Mathematics and Computer Systems

This book is based on the best papers accepted for presentation during the International Conference on Current Problems of Applied Mathematics and Computer Systems (APAMCS-2023). The book includes research materials on mathematical problems and solutions in the field of scientific computing, artificial intelligence, data analysis and modular computing. The scope of numerical methods in scientific computing presents original research, including mathematical models and software implementations, related to the following topics: numerical methods in scientific computing; solving optimization problems; methods for approximating functions, etc. The studies in data analysis and modular computing include contributions in the field of deep learning, neural networks, mathematical statistics, machine learning methods, residue number system and artificial intelligence. In addition, some articles focus on mathematical modeling of nonlinear physical phenomena. Finally, the book gives insights into the fundamental problems in mathematics education. The book intends for readership specializing in the field of scientific computing, parallel computing, computer technology, machine learning, information security and mathematical education
AISMA-2024: International Workshop on Advanced Information Security Management and Applications

This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process. In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.