In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this in...
In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this inverse problem, the function spaces must be defined and represented. By studying and solving the direct problem for the heat equation in composite materials, it is possible to determine the function spaces and solve the inverse initial value problem. Scientific methods used: the separation of variables method used to solve the direct problem for the heat equation. It found that method separation of variables does not completely lead to the solution of the inverse initial value problem, since this method leads to a divergent series of solutions and rather massive errors. The heat conduction problem can be formulated as Fredholm integral first kind equations. The discretization algorithm applied to reformulated the problem as linear operator problem as matrix and vectors form. Then, Tikhonov's regularization inversion method has been used to find an approximation solution. Finally, as shown in the numerical example the regularized approximate solutions obtained.
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of th...
详细信息
ISBN:
(纸本)9781728140704
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of the requirements, determines the number and percentage of missing indicators for determining the metrics of complexity and quality of software, displays which indicators are missing for each metric, and also forms the real ontology of the domain "Software engineering" (part "Quality and complexity of software. Metric analysis"). During an experiment, which is conducted with the help of the realized IA, the semantic analysis of requirements for the Internet of Things (IoT)-system was performed. Such analysis provides an increase of the volume and ensures of the sufficiency of metric information in the software requirements, which, in turn, provides an improvement in the quality of the software of IoT-system.
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing...
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing challenges is that once an application has been developed, for example for a virtual museum or a virtual tour, it usually remains fixed to an embedded in the application model. Adding new functionalities or interaction paradigms needs additional development and new deployment. In this paper, we propose a framework, which achieves the decoupling of an experience from the used models and interaction paradigms through scene and input templates and configuration files. This allows an easy way for generation of a variety of experiences even by people with no or limited programming skills.
An overview of existing urban software mobile applications of the transport and economic direction is given. A model of a functional rationalizer of consumer behavior is being built. The software model of the function...
详细信息
According to the Greek mythology, Typhon was a gigantic monster with one hundred dragon heads, bigger than all mountains. His open hands were extending from East to West, his head could reach the sky and flames were c...
详细信息
The paper presents a new technique for the botnets' detection in the corporate area networks. It is based on the usage of the algorithms of the artificial immune systems. Proposed approach is able to distinguish b...
详细信息
A new technique for the DDoS botnet detection based on the botnets network features analysis is proposed. It uses the semi-supervised fuzzy c-means clustering. The proposed approach includes the learning and the detec...
详细信息
We introduce the Piquasso quantum programming framework, a full-stack open-source software platform for the simulation and programming of photonic quantum computers. Piquasso can be programmed via a high-level Python ...
详细信息
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site “Beech forests of the Carpathians and ancient beech forests of Germany” usin...
详细信息
ISBN:
(数字)9781728167602
ISBN:
(纸本)9781728167619
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site “Beech forests of the Carpathians and ancient beech forests of Germany” using actual data and information from Gorgany Nature Reserve in Ivano-Frankivsk, Ukraine. The features of the structure and functions of background monitoring of the protected natural resources, forests and wildlife of Gorgany Nature Reserve is based on modern methods of collecting and processing of digital data, implementation of the principles of Internet of Things and cloud technologies, combined with GPS-systems, sensor networks with the use of optical and fiber-optic telecommunication channels. The information technology of the background monitoring system is based on figurative cluster models of monitoring objects according to theoretical principles of statistical, correlatory, spectral, cluster, logic-statistical and entropy analysis.
In recent years, deep neural network (DNN) has been frequently used for classification. In this study, iris flowers having 3 different types are classified by using DNN which are utilized the width and length of petal...
详细信息
暂无评论