the paper presents a Markov model of the basic scheme of interaction between project participants. A Markov chain has been identified to describe a specific project, based on the determination of a set of transition p...
the paper presents a Markov model of the basic scheme of interaction between project participants. A Markov chain has been identified to describe a specific project, based on the determination of a set of transition probabilities unique for each project. this allows you to customize the Markov chain to reflect the properties of a particular project. Using the developed Markov model, the sensitivity of the system to a change in one of the main parameters, the level of competence of the project manager and the project team as a whole, was assessed. the mathematical description of the project model by Markov chains allows modeling the quantitative parameters of projects, namely, changes in the probabilities of system states depending on the number of project steps.
this paper presents certain results obtained in the domain of applying Membrane computing models in the modeling and designing of Multi-Agent systems for decision making. the presented results highlight the method of ...
详细信息
ISBN:
(纸本)9781665426053
this paper presents certain results obtained in the domain of applying Membrane computing models in the modeling and designing of Multi-Agent systems for decision making. the presented results highlight the method of presenting the topology of Multi-Agent systems and the mode of its formal description in order to allow their automatic implementation in Software products or Hardware architectures. the JSON format, which allows the structuring of code according to the topology of Membrane computing model, is used for the formal description of Membrane computing models. the functioning model of living cells is at the basis of Membrane computing. A cell is associated with a computing system that contains input/output ports, the knowledge base consisting of the set of data and Methods of processing them, and a processor.
the use of features of the internal circuitry of integrated circuits (ICs), when designing pulse shapers based on transistor-transistor logic (TTL) ICs, provides the maximum steepness of the generated pulse edges with...
the use of features of the internal circuitry of integrated circuits (ICs), when designing pulse shapers based on transistor-transistor logic (TTL) ICs, provides the maximum steepness of the generated pulse edges with a simple circuit. At the same time, unlike other circuits, the duration of the generated pulses has almost no effect on the duration of the generated pulse edges. the duration of boththe leading and trailing edges of the generated pulses is close to the minimum possible triggering time, i.e., the triggering time of one logic element. For integrated circuits of the TTL the conventional edge duration does not exceed 20 nanoseconds.
If not detected and treated in time, melanoma is one of the most dangerous skin cancers. this article analyzes two models of neural networks, adapted for the classification of skin lesions in melanoma and nonmelanoma:...
详细信息
ISBN:
(纸本)9781665426053
If not detected and treated in time, melanoma is one of the most dangerous skin cancers. this article analyzes two models of neural networks, adapted for the classification of skin lesions in melanoma and nonmelanoma: InceptionV3 and MobileNetV2. Transfer learning methods and the HAM10000 database were used for learning. Finally, from the analysis of statistical and time performance, recommendations were made for computer or mobile applications.
Identifying new and modified attacks is an important task to ensure the normal operation of computer networks connected to the Internet. Using honeypots and honeynets is one of the effective ways to get information ab...
详细信息
ISBN:
(纸本)9781665426053
Identifying new and modified attacks is an important task to ensure the normal operation of computer networks connected to the Internet. Using honeypots and honeynets is one of the effective ways to get information about attackers and their actions as soon as possible. the paper proposes a method of the determination of attack patterns based on information collected by honeypots. To detect patterns, agglomerative clustering of time series of intruders' activity preprocessed by a convolutional encoder is used, the obtained clustering rand index is 82-84%.
Mine detection is an ongoing and growing problem that affects many people around the world due to the enormous danger that mines pose to humans. Mine detection occurs using various methods that use active sensors, inc...
Mine detection is an ongoing and growing problem that affects many people around the world due to the enormous danger that mines pose to humans. Mine detection occurs using various methods that use active sensors, including ultra-wideband (UWB) radar. Although active landmine sensors are often used for performance reasons, they can cause unintended landmine detonations because they operate on transmitted and reflected electromagnetic signals. Another way to detect mines without detonating mechanisms is the use of passive detectors. In this article, an optimal neural network structure with Adam's optimization algorithm is developed for effective mine classification based on magnetic field sensor data. this approach made it possible to increase the accuracy of mine detection to 99.23 percent.
A new method of constructing high-precision resistor voltage dividers without the use of any standard equipment is considered. the use of the method for creating an input transducer for signal conditioning withthe tr...
A new method of constructing high-precision resistor voltage dividers without the use of any standard equipment is considered. the use of the method for creating an input transducer for signal conditioning withthe transfer coefficients of 0,1; 1; 10 for dataacquisition blocks is described. For the metrological service of this transducer for signal conditioning the dataacquisition block itself is sufficient. It is proven, the multiplicative error of this transducer for signal conditioning will not exceed double random error of the dataacquisition unit.
this study has been prepared to set light on the performance difficulties encountered in large datasets on graph databases and to increase performance in Create, Read, Update, Delete (CRUD) operations with Approximate...
详细信息
ISBN:
(纸本)9781665426053
this study has been prepared to set light on the performance difficulties encountered in large datasets on graph databases and to increase performance in Create, Read, Update, Delete (CRUD) operations with Approximate Membership Functions (AMF). For this purpose, modified Bloom filter has been proposed with scalable structure. Neo4j commercial graph database was used in experimental studies as a graph data model. In the experimental studies, it has been observed that the proposed method for all CRUD operations produces better results than the BTREE indexing method. the proposed modified Bloom filter method can be used for performance optimization in such databases.
In this paper the problems of transmission and storage protection of biometric data in means of remote monitoring of human state are investigated. the technologies of biometric data transmission and storage protection...
详细信息
ISBN:
(纸本)9781665426053
In this paper the problems of transmission and storage protection of biometric data in means of remote monitoring of human state are investigated. the technologies of biometric data transmission and storage protection in remote human state monitoring means are selected. Based on the conducted researches the principles of construction, algorithms of work are developed and means of remote monitoring of a condition of the person with protection of transfer of biometric data are implemented.
the paper proposes approach to use new tools for malware detection in corporate networks, which are distributed systems with partial centralization. To make decision about malware presence, the components which includ...
the paper proposes approach to use new tools for malware detection in corporate networks, which are distributed systems with partial centralization. To make decision about malware presence, the components which includes specified decision-making for the system's center are defined as a decentralized subsystem. To determine the states of the system components, characteristic indicators are proposed, and generalized analytical expressions for their calculation are developed. Such calculations make it possible to assess the state of the components in the system in order to determine its further steps. As a result, the system is the basis for usage of different malware detection methods in combination withthe system components as an integral sensor. To test the system, a worm-virus detection method was implemented and experiments were conducted. the results of experimental studies approved the efficiency of the proposed solution.
暂无评论