×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Methodology for optimal management of connections of participants in business events

    In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships within offline events. The seating algorithm is based on solving the NP-complete problem of the maximum clique. Optimization of the resulting solution is implemented based on the permutation crossover algorithm.

    Keywords: In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships withi

  • Determination and ranking of the targets of the offender in an attack on an important state object

    The article deals with the formation of a violator model in an attack on an important state facility. The classification of violators by types is described. The article proposes the simplest model for evaluating the effectiveness of violators' collusion.

    Keywords: ntegrated security, methods, models, security forces, offenders, important state facilities, clashes between security and attack forces, offender models