The NP-problem of discrete optimization of consumption of non-renewable resources is considered in the article. It is offered to use transitions of NP-system conditions on the complete graph with number of vertexes, equal to quantity of discrete resources, for the problem decision. The purpose of such system is construction of a chain of the predetermined length and the minimum weight on the complete graph. The length of a chain defines quantity of the consumed resources. The problem factor is factorial growth of number of variants of chains on graph at linear growth of quantity of resources. The main idea consists in a finding of statistical regularities of ranks of transitions of NP-system at construction of chains with the minimum weight on graphs of the small size. Use of ranks allows to abstract from concrete weights of transitions, which are variables for each problem of optimization, and to find the patrimonial feature of all optimum decisions. It is offered to use the found regularities to solve the problems of the big dimension. As a result of researches, it has been defined that probabilities of ranks of transitions are described by geometric distribution. In the article, the algorithm of definition of parameter of geometrical distribution for a rank of each transition depending on the initial and consumed quantity of resources is presented. Realization of a method of generating of suboptimum chains is based on use of generators of the pseudo-random numbers setting values of each rank of transition of NP-system according to geometrical distribution of probabilities. It is offered two variants of generators of ranks of chains to use. Computer experiment has shown useful effect of an offered method at the decision of problems of small and average dimension
The article describes the method of calculating the estimation trajectory of a nonlinear moving object using bearings-only information. The method has the properties of continuity, robustness, and improves the accuracy detection of the parameters motion in comparison with existing methods
This article is dedicated to the study of the
fundamental properties and components of the
immune system such as B lymphocytes, the Tlymphocytes,
immune system storage, primary and
secondary immune response, immunological
training detectors, which will be the basis of the
obtained as a result of detection methods of
polymorphic viruses using artificial immune
systems. Polymorphism of computer viruses is the
formation of a malicious program code directly
during execution. Thus, it is impossible to create a
unique signature corresponding to these
polymorphic viruses. A similar classification
problem is solved by the immune system of
vertebrates, stared again met with the virus, it
"remembers" him, and the next time provides
effective secondary immune response. These
properties of the immune system served as a
prerequisite for the use of immune approaches and
algorithms for solving the problems of detection of
malicious code. The article identified and described
their main features, proposed the idea of their
implementation and software, system interactions in
the immune system revealed such important
features, the implementation of which will be
effective in solving the problem of detection of
malicious code and software. Also, for a more
productive system of education is considered a
class of genetic, evolutionary algorithms, described
by their immediate implementation of site-specific
decentralized artificial immune system, built a
system of interaction of genetic and immunological
algorithms.
In the article, the structurally functional method of the search of the defects in the segment of the computer network is considered. The basis of this method makes: the structurally functional model of a network; the table of malfunctions; the vector of checks with the obvious address of the knot of the network
In the article, the method procedure, allowing to define the amplitude of a switching overstrain is described when switching by the solenoid starter of the asynchronous electric motor
In this article, we consider approaches to the transfer
of knowledge to students and an objective
semiautomatic assessment of knowledge. The
characteristic features of the application and the
possibility of using cognitive training methodologies
and complex systems for testing skills and the
theoretical base of trainees are analyzed. The
problems of development of this direction and
possible ways of their solution are described. The
basic concepts are introduced and the existing
methods of calculating the average score for
checking the student's knowledge are considered,
and a new approach to solving this problem is
proposed. Based on the conducted researches it is
offered to use the complex system of testing of end
users, which includes testing, monitoring, collecting,
analyzing and displaying the results of
students/groups/ course. The main requirements for
the creation of such a complex and the rules to be
followed are formulated for a more objective
assessment of knowledge. A model of an integrated
modular system for objective semi-automatic testing
of knowledge through testing is described
In this article, on a small and evident numerical example, methodological aspects of a process engineering of detection of knowledge from the trial-and-error data explicitly are considered, representation of knowledge and its usage for problem solving of forecasting, decision making and data domain examination in system-cognitive analysis (SC-analysis) and its programmatic toolkit - intellectual "Eidos" system are shown
In this article, we have examined the methodology of
acoustic measuring with the purpose to create safety
conditions for the activity of agricultural machines
operators, in foremost harvesters and tractors. We
should underline that such studies are based on the
state standards that are aimed at improving the level of
comfort of the activity of the operators of tractors and
harvesters and maintaining their working capacities.
Therefore, there is a need for a thorough analysis of
the current regulatory legislation (standards that are
applied) in combination with analysis of mathematical
support of measuring devices (sound level meter).
Besides, there is a need for creating strict sequence of
actions of the sound level meter operator (algorithm)
in combination with the method of conveying
information that is adapted to the experiment. At the
enterprises, organizations and establishments control
of the noise level at working places is checked no less
than once a year. The State Standard 12.4.095-80
provides the basis for measuring, position of the
control point in the booth, the frame and
characteristics of measuring, mode of activity of
engines and parts of harvesters, the amount of
measurement samples (3 precise measurements),
estimation of measurements and their correction,
equipment, methods of measuring the results,
temporary characteristics of measuring by the sound
level meter in “slow” mode and frequency correction
The technique relates to the area of distribution of key
information in cryptographic communication systems.
The purpose of the work was to solve the problem of
increasing the speed of distribution of key information
for special bodies of federal bodies of critical facilities
in the conditions of network-centric management and
creating alternative options for the distribution of key
information when key documents are compromised to
special equipment. By applying the methodology, a
solution to this problem is achieved by applying a key
distribution method based on asymmetric
cryptography using symmetric polynomials
The article describes the methodology of decision-making for optimization of wood harvesting plans. The methodology has been realized as a corresponding component of the Computer Information System developed for forestry logistics