In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships within offline events. The seating algorithm is based on solving the NP-complete problem of the maximum clique. Optimization of the resulting solution is implemented based on the permutation crossover algorithm.
Keywords: In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships withi
The article deals with the formation of a violator model in an attack on an important state facility. The classification of violators by types is described. The article proposes the simplest model for evaluating the effectiveness of violators' collusion.
Keywords: ntegrated security, methods, models, security forces, offenders, important state facilities, clashes between security and attack forces, offender models