Vulnerability Assessment of Loaded Thin-Walled Shells Under an External Pulse Action
The vulnerability assessment of thin-walled shells under pulse action is treated as an inverse problem of the bifurcation theory using the phenomenon of growth and saturation of the displacement level during the pre-bifurcation period. Using the computational time series, the authors perform the neural network-based prediction of a thin-walled shell behavior within a time shorter than the progressive collapse duration.
This article discusses questions of price forecast for innovative product. Time series have been used in order to predict price movements. For this propose the price (for 24 months) of innovative product, Samsung Galaxy Nexus I9250, was chosen. Based on this information prices for the product were calculated after six months and a year. Also, using results of this forecast the model for prediction the price of innovative product was developed.
The monograph is devoted to the development of research methodology of threats, vulnerabilities and risks in information security in organizations. Substantiated mathematical apparatus of research: axiomatization of Boolean , which as most adequately describes the processes of mental activity in the construction of expert system model of information security in the organization and eliminates various types of heuristics that are typical of artificial intelligence languages . Methodology contains descriptive ( verbal ) and math ( formalized ) components . The technique developed formalized description of threats, vulnerabilities and risks of information protection systems and synthesis of relations between them allows you to fully analyze and document requirements related to information security in the organization, avoiding the cost of excessive security measures possible in the subjective assessment of the risks to assist in planning and implementation of protection at all stages of the life cycle of information systems, ensure that work in the shortest possible time, provide a justification for the choice of countermeasures to evaluate the effectiveness of countermeasures to compare their various options. The monograph provides examples of using methods for cal factor calculations , ensuring correct the validity of decisions of experts in information security in organizations. For managers and specialists units for the protection of information.
The Conference is traditionally focused on the actual problems in the field of Soft Computing and Measurement. Twenty third SCM Conferences, which took place in remote format in Zoom conference room of ETU “LETI”, during the previous years revealed great interest of both Russian and international researchers in this topic. Organizing and hosting the 2020 XXIII International Conference on Soft Computing and Measurements (SCM) in Russia is of great value for exchange of research ideas and practical results in this field, for discovering new problems and development trends, for development of new effective information systems targeted on solving complex practical problems. During the SCM-2020 Conference sessions, it is expected and planned to discuss a wide range of issues: uncertainty in measurements and computations, probabilistic methods of information processing, modeling of systems, control of complex objects under uncertainty, neural computing networks, genetic algorithms and their applications, methods and tools for development of expert and decision-making support systems, intellectual measuring systems, new approaches in measurement – fuzzy and soft measurement.
The paper analyzes storage peculiarities of satellite Earth remote sensing data time series. We propose methods for their compression based on the discovered peculiarities exploiting different schemes of Huffman coding. One of the proposed methods reaches 6% increase in the compression ratio (93%) in contrast to the deflate method used in Java SE6 (87%), for a time series of aerosol optical thickness derived from MODIS radiometer of TERRA satellite. Further improvement can be achieved by using the entropy coding of floating point numbers.
This proceedings bring together contributions from researchers from academia and industry to report the latest cutting edge research made in the areas of Fuzzy Computing, Neuro Computing and hybrid Neuro-Fuzzy Computing in the paradigm of Soft Computing. The FANCCO 2015 conference explored new application areas, design novel hybrid algorithms for solving different real world application problems. After a rigorous review of the 68 submissions from all over the world, the referees panel selected 27 papers to be presented at the Conference. The accepted papers have a good, balanced mix of theory and applications. The techniques ranged from fuzzy neural networks, decision trees, spiking neural networks, self organizing feature map, support vector regression, adaptive neuro fuzzy inference system, extreme learning machine, fuzzy multi criteria decision making, machine learning, web usage mining, Takagi-Sugeno Inference system, extended Kalman filter, Goedel type logic, fuzzy formal concept analysis, biclustering etc. The applications ranged from social network analysis, twitter sentiment analysis, cross domain sentiment analysis, information security, education sector, e-learning, information management, climate studies, rainfall prediction, brain studies, bioinformatics, structural engineering, sewage water quality, movement of aerial vehicles, etc.
We consider certain spaces of functions on the circle, which naturally appear in harmonic analysis, and superposition operators on these spaces. We study the following question: which functions have the property that each their superposition with a homeomorphism of the circle belongs to a given space? We also study the multidimensional case.
We consider the spaces of functions on the m-dimensional torus, whose Fourier transform is p -summable. We obtain estimates for the norms of the exponential functions deformed by a C1 -smooth phase. The results generalize to the multidimensional case the one-dimensional results obtained by the author earlier in “Quantitative estimates in the Beurling—Helson theorem”, Sbornik: Mathematics, 201:12 (2010), 1811 – 1836.
We consider the spaces of function on the circle whose Fourier transform is p-summable. We obtain estimates for the norms of exponential functions deformed by a C1 -smooth phase.
Let G be a semisimple algebraic group whose decomposition into the product of simple components does not contain simple groups of type A, and P⊆G be a parabolic subgroup. Extending the results of Popov , we enumerate all triples (G, P, n) such that (a) there exists an open G-orbit on the multiple flag variety G/P × G/P × . . . × G/P (n factors), (b) the number of G-orbits on the multiple flag variety is finite.
I give the explicit formula for the (set-theoretical) system of Resultants of m+1 homogeneous polynomials in n+1 variables