Vulnerability Assessment of Loaded Thin-Walled Shells Under an External Pulse Action
The vulnerability assessment of thin-walled shells under pulse action is treated as an inverse problem of the bifurcation theory using the phenomenon of growth and saturation of the displacement level during the pre-bifurcation period. Using the computational time series, the authors perform the neural network-based prediction of a thin-walled shell behavior within a time shorter than the progressive collapse duration.
This article discusses questions of price forecast for innovative product. Time series have been used in order to predict price movements. For this propose the price (for 24 months) of innovative product, Samsung Galaxy Nexus I9250, was chosen. Based on this information prices for the product were calculated after six months and a year. Also, using results of this forecast the model for prediction the price of innovative product was developed.
The monograph is devoted to the development of research methodology of threats, vulnerabilities and risks in information security in organizations. Substantiated mathematical apparatus of research: axiomatization of Boolean , which as most adequately describes the processes of mental activity in the construction of expert system model of information security in the organization and eliminates various types of heuristics that are typical of artificial intelligence languages . Methodology contains descriptive ( verbal ) and math ( formalized ) components . The technique developed formalized description of threats, vulnerabilities and risks of information protection systems and synthesis of relations between them allows you to fully analyze and document requirements related to information security in the organization, avoiding the cost of excessive security measures possible in the subjective assessment of the risks to assist in planning and implementation of protection at all stages of the life cycle of information systems, ensure that work in the shortest possible time, provide a justification for the choice of countermeasures to evaluate the effectiveness of countermeasures to compare their various options. The monograph provides examples of using methods for cal factor calculations , ensuring correct the validity of decisions of experts in information security in organizations. For managers and specialists units for the protection of information.
We are proud to present the set of nal accepted papers for the fourth edition of the ITISE 2017 conference "International work-conference on Time Series" held in Granada (Spain) during September, 18-20, 2017. The ITISE 2017 (International work-conference on Time Series) seeks to provide a discussion forum for scientists, engineers, educators and students about the latest ideas and realizations in the foundations, theory, models and applications for interdisciplinary and multidisciplinary research encompassing disciplines of computer science, mathematics, statistics, forecaster, econometric, etc, in the eld of time series analysis and forecasting. The aims of ITISE 2017 is to create a friendly environment that could lead to the establishment or strengthening of scientic collaborations and exchanges among attendees, and therefore, ITISE 2017 solicits high-quality original research papers (including signicant work-in-progress) on any aspect time series analysis and forecasting, in order to motivating the generation, and use of knowledge and new computational techniques and methods on forecasting in a wide range of elds.
The paper analyzes storage peculiarities of satellite Earth remote sensing data time series. We propose methods for their compression based on the discovered peculiarities exploiting different schemes of Huffman coding. One of the proposed methods reaches 6% increase in the compression ratio (93%) in contrast to the deflate method used in Java SE6 (87%), for a time series of aerosol optical thickness derived from MODIS radiometer of TERRA satellite. Further improvement can be achieved by using the entropy coding of floating point numbers.
This proceedings bring together contributions from researchers from academia and industry to report the latest cutting edge research made in the areas of Fuzzy Computing, Neuro Computing and hybrid Neuro-Fuzzy Computing in the paradigm of Soft Computing. The FANCCO 2015 conference explored new application areas, design novel hybrid algorithms for solving different real world application problems. After a rigorous review of the 68 submissions from all over the world, the referees panel selected 27 papers to be presented at the Conference. The accepted papers have a good, balanced mix of theory and applications. The techniques ranged from fuzzy neural networks, decision trees, spiking neural networks, self organizing feature map, support vector regression, adaptive neuro fuzzy inference system, extreme learning machine, fuzzy multi criteria decision making, machine learning, web usage mining, Takagi-Sugeno Inference system, extended Kalman filter, Goedel type logic, fuzzy formal concept analysis, biclustering etc. The applications ranged from social network analysis, twitter sentiment analysis, cross domain sentiment analysis, information security, education sector, e-learning, information management, climate studies, rainfall prediction, brain studies, bioinformatics, structural engineering, sewage water quality, movement of aerial vehicles, etc.
This proceedings publication is a compilation of selected contributions from the “Third International Conference on the Dynamics of Information Systems” which took place at the University of Florida, Gainesville, February 16–18, 2011. The purpose of this conference was to bring together scientists and engineers from industry, government, and academia in order to exchange new discoveries and results in a broad range of topics relevant to the theory and practice of dynamics of information systems. Dynamics of Information Systems: Mathematical Foundation presents state-of-the art research and is intended for graduate students and researchers interested in some of the most recent discoveries in information theory and dynamical systems. Scientists in other disciplines may also benefit from the applications of new developments to their own area of study.
Let G be a semisimple algebraic group whose decomposition into the product of simple components does not contain simple groups of type A, and P⊆G be a parabolic subgroup. Extending the results of Popov , we enumerate all triples (G, P, n) such that (a) there exists an open G-orbit on the multiple flag variety G/P × G/P × . . . × G/P (n factors), (b) the number of G-orbits on the multiple flag variety is finite.
I give the explicit formula for the (set-theoretical) system of Resultants of m+1 homogeneous polynomials in n+1 variables