• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 30 548
Sort:
by name
by year
Book chapter
Sobolevski A., Khanin K., Khmelev D. V. In bk.: Idempotent mathematics and mathematical physics. Providence: American Mathematical Society, 2005. P. 161-179.

We construct an example of blow-up in a ”ow of min-plus linear operators arising as solution operators for a Hamilton…Jacobi equation @S/@t+|∇S| / + U(x, t) = 0, where > 1 and the potential U(x, t) is uniformly bounded together with its gradient. The construction is based on the fact that, for a suitable potential de“ned on a time interval of length T, the absolute value of velocity for a Lagrangian minimizer can be as large as O􀀀(log T)2−2/ . We also show that this growth estimate cannot be surpassed. Implications of this example for existence of global generalized solutions to randomly forced Hamilton…Jacobi or Burgers equations are discussed.

Added: Apr 29, 2013
Book chapter
Gordin V. A. In bk.: Research activities in atmospheric and oceanic modelling. Iss. 48. Geneva: World Meteorological Organization, 2018. Ch. 1. P. 1.15-1.16.
Added: Jul 13, 2018
Book chapter
Nikitina M., Zolotukhina L. In bk.: The Fourth International Conference “Game Theory and Management”. Iss. 4. St. Petersburg: 2010.

A multivariate generalization of the classical collective risk model is considered. In this model  in which each component is dependent on the others.The exact solutions and asymptotic approximations to the probability of ruin were obtained.

Added: Nov 9, 2014
Book chapter
Krouk E., Ovchinnikov A., Vostokova E. In bk.: 2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2016. P. 75-78.

In this paper the modification of McEliece public-key cryptosystem is considered, which uses the codes based on Plotkin construction as the private key, instead of Goppa codes traditionally considered for this purpose. Proposed modification allows strengthening of McEliece cryptosystem by attacks complication based on the secret code structure.

Added: Oct 19, 2018
Book chapter
Krouk E., Ovchinnikov A. In bk.: 2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2016. P. 71-74.

In this paper an attack on McEliece cryptosystem is considered. In this system the private and public keys are generator matrices of equivalent codes, i.e. they differ by fixed (secret) permutation. At the same time it is known that for every code there are the group of permutations preserving the code. Such code's structure may be used for analysis of McEliece cryptosystem.

Added: Oct 19, 2018
Book chapter
Irina Karpova. In bk.: Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. Springer, 2017. P. 78-84.

One of the actively developing approaches of group robotics systems creation is the use of social behavior models. Aggressive behavior is one of the underlying mechanisms forming social behavior. In this paper, the application of aggressive behavior concepts is considered by analogy with animal aggressive behavior that can be used for solving tasks of group robotics. As a role model, an ant – a true social insect – is proposed. It was shown that in aggressive behavior of ants, the numerical factor and imitative behavior play an important role. Agent’s aggressive behavior model depending on accumulated aggression and the number of other nearby agents is proposed. The results of computer experiments for territory defense tasks are presented. The results show that aggression is a stabilizing factor for an approximately equal number of agents in different groups. By an increase in group size, aggression becomes a way of capturing foreign territory.

Added: Dec 6, 2017
Book chapter
Lepskiy A. In bk.: Proceedings of the 8th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-13). Amsterdam; Beijing; P.: Atlantis Press, 2013. P. 355-362.

The conflict measure and index of decreasing of igno-rance in frame of Dempster-Shafer theory are intro-duced. Those functionals are analyzed on the bodies of evidences of special type. It is shown that the great correlation between the bodies of evidence is a sufficient condition of decreasing of ignorance after the applying of combining rule. The relationships between the measure of conflict and the index of decreasing of ignorance in the case of different types of evidences and the application of different combining rules were investigated.

Added: Sep 22, 2013
Book chapter
Gostev I. M. In bk.: EPJ Web of Conferences. Mathematical Modeling and Computational Physics (MMCP 2015). Vol. 108. Les Ulis: EDP Sciences, 2016.

Diffculties concerning the choice of the invariants of the projective transformation groups used for the identification of the shapes of planar objects are illustrated and solutions allowing the derivation of robust identification criteria are discussed.

Added: May 12, 2016
Book chapter
Petrova E. In bk.: 1917: Russia in Revolution. History, Culture and Memory. 2019. P. 360-372.

The chapter is focuses on the research in rural Russia. The empirical materials were studied in the historical context. The chapter helps to understand the consequences of the Russion Revolution 1917.

Added: Sep 18, 2018
Book chapter
Pozhidaev E.D., Smirnov D.D., Pozhidaeva N.V. In bk.: Innovative Information Technologies: Materials of the International scientific–practical conference. Part 2. Prt. 2. M.: HSE, 2014. P. 557-558.

Our approach to the problem of charge carrier transport in homogeneous polymers assumes carrier hopping on a densely packed manifold of transport (hopping) centers retaining the short-range order of the respective single crystal. The central idea, which distinguishes it from the Bassler’s disorder theory, is that the energy scatter concerns only a small fraction of hopping centers, which begin to act as traps. The majority of isoenergetic centers build up a transfer band with microscopic mobility µ0 equal to that in the respective single crystal. The origin of the energy scatter (and traps themselves) is ascribed to the elementary voids of the fluctuation free volume forming an association with the normal hopping centers.

Added: Sep 7, 2014
Book chapter
Neznanov A., Parinov A. In bk.: Proceedings of the International Workshop "What can FCA do for Artificial Intelligence?" (FCA4AI at ECAI 2014). Vol. 1257. Prague: CEUR Workshop Proceedings, 2014. P. 59-66.
There is a big gap between variety of applications of Formal Concept  Analysis (FCA) methods and general-purpose software implementations. We  discuss history of FCA-based software tools, which is relatively short, main  problems in advancing of such tools, and development ideas. We present Formal  Concept Analysis Research Toolbox (FCART) as an integrated environment for  knowledge and data engineers with a set of research tools based on Formal  Concept Analysis. FCART helps us to illustrate methodological and  technological problems of FCA approach to data analysis and knowledge  extraction.
Added: Oct 14, 2014
Book chapter
Irina Utkina, Mikhail Batsyn, Ekaterina Batsyna. In bk.: Discrete Optimization and Operations Research/9th International Conference, DOOR 2016, Vladivostok, Russia, September 19-23, 2016, Proceedings. Springer, 2016. P. 244-255.

We consider a fractional 0-1 programming problem arising in manufacturing. The problem consists in clustering of machines together with parts processed on these machines into manufacturing cells so that intra-cell processing of parts is maximized and inter-cell movement is minimized. This problem is called Cell Formation Problem (CFP) and it is an NP-hard optimization problem with Boolean variables and constraints and with a fractional objective function. Because of its high computational complexity there are a lot of heuristics developed for it. In this paper we suggest a branch and bound algorithm which provides exact solutions for the CFP with a variable number of cells and grouping efficacy objective function. This algorithm finds optimal solutions for 21 of the 35 popular benchmark instances from literature and for the remaining 14 instances it finds good solutions close to the best known.

Added: Oct 3, 2018
Book chapter
Irina Utkina, Mikhail Batsyn. In bk.: Models, Algorithms and Technologies for Network Analysis, Springer Proceedings in Mathematics & Statistics. Vol. 156. Switzerland: Springer, 2016. P. 115-124.

The cell formation problem (CFP) is an NP-hard optimization problem considered for cell manufacturing systems. Because of its high computational complexity several heuristics have been developed for solving this problem. In this paper we present a branch and bound algorithm which provides exact solutions of the CFP. This algorithm finds optimal solutions for 13 problems of the 35 popular benchmark instances from the literature.

Added: Oct 23, 2018
Book chapter
Stukach O., Romanyuk A. N., Ivanov Y. Y. In bk.: 2017 International Siberian Conference on Control and Communications (SIBCON). IEEE, 2017. Ch. 1. P. 1-6.
Added: Jan 8, 2019
Book chapter
Volosyuk O. V. In bk.: Испания и Россия: дипломатия и диалог культур. Три столетия отношений. España y Rusia: diplomacia y diálogo de culturas. Tres siglos de relaciones.. M.: Издательство "Индрик", 2018. P. 505-513.

The chapter discusses the establishment of diplomatic relations between Spain and Russia and evaluates the role of Peter I in this process. Special attention is paid to the development of trade relations between the two countries. The text used new archival documents.

Added: Dec 23, 2018
Book chapter
Kondrashova E. V. In bk.: 3rd International Multidisciplinary Scientific Conference on Social Sciences and Arts. Vol. 3. Bk. 1. Sofia: STEF92 Technology Ltd., 2016. P. 53-59.

Students’ grade system is a complex multifactorial process, which usually ends with a numerical estimate. The studying mindset and motivation of the student, which are inextricably interconnected, depend on the objectivity of the estimate. The major problems related to the understanding of estimate as an absolute value or a relative one, which uses comparison, are analysed. Solution methods allowing to combine positive sides of each of the approaches of evaluation are offered. These methods allow to combine both absolute and relative estimate. The following proposed approaches are taken into consideration: a modular system of training, preference of cumulative assessment, the choice of the monitoring procedure form etc. Basic parameters influencing the creation of a «fair» grade system, as well as results of the students survey regarding the factors influencing a grade system are given.

Added: Aug 30, 2016
Book chapter
Gasparyan D. In bk.: Rationality in Action: Intentions, Interpretations and Interactions. St. Petersburg: Aletheya, 2015.

In this article I am offering some critical comments on two of the most important programs of modern social and political philosophy: transcendental pragmatics and communication theory. These considerations will cover two main problems: justification of rational prerequisites of activities, that would be common and universal for all of humanity and universal, and transparent communication, that is common for all representatives of intersubjective commonality. The first problem is the difficulty of removing the fundamental contradiction between "ones" and "someone else's", and the second is the difficulty of simulation of communication unity, that despite its universality, may serve as different packages of values.

Added: Nov 2, 2015
Book chapter
Polterovich V. M., Tonis A. In bk.: XI международная научная конференция по проблемам развития экономики и общества: В 3 кн. Кн. 1.. Bk. 1. M.: Higher School of Economics Publishing House, 2011. P. 504-516.

Each developing country tries to catch up with the developed world. Unfortunately, only few economies were able to reach this purpose during last sixty years. Well-known Gershenkonђs argument - «advantage of backwardness» - does not work properly in most cases [Gershenkon, 1962]. Though imitations of technologies and governance methods are much cheaper than innovations, the imitation process is also costly and requires sophisticated approaches of choosing and harmonizing different kinds of economic policies.

Added: Aug 12, 2013
Book chapter
Chernyak E. L., Чугунова О. Н., Аскарова Ю. А. et al. In bk.: CDUD – 2010: International Workshop on Concept Discovery in Unstructured Data. M.: Higher School of Economics Publishing House, 2011. P. 20-31.
A method for computationally visualizing and interpreting a text or corpus of texts in a
taxonomy of the field is described. The method involves such stages as matching taxonomy
topics and text(s) by using annotated suffix trees (ASTs), combining multiple information such
as text abstracts, key-words and taxonomy cross-references, building clusters of taxonomy topics
and their profiles, and lifting the profiles to higher ranks of the taxonomy hierarchy.
Added: Dec 27, 2012
Book chapter
Kuzminov Y. I. In bk.: Paying the Professoriate: A Global Comparison of Compensation and Contracts. L.: Routledge, 2012. P. 331-341.
Added: Jan 11, 2013
Book chapter
Froumin I., Kardanova E., Enchikova E. S. et al. In bk.: INTED 2013 Proceedings. 7th International Technology, Education and Development Conference. Valencia, Spain. 4-5 March, 2013. Valencia: IATED, 2013. P. 447-465.

The presentation considers the problem of the academic heterogeneity among universities freshmen. This problem is widely discussed in circumstances of demographic decline when higher education becomes widespread. As a result differentiation of universities based on the quality of students' freshmen arises: some universities admit predominately high-scored students, while the others have a large variation in students’ preparation level. Universities have to work with non-uniform contingent of students. In Russia the Unified State Exam (USE) is used to admit students to the universities. There are two obligatory exams (Mathematics and Russian language) and different optional exams which students can choose depending on their future direction of study. Scores for USE are the only basis for students’ admission to universities. The points of interest are simultaneously the quality of admission and its heterogeneity. Heterogeneity implies differences in the student’s USE scores in one university. The data base includes USE scores of all students enrolled in all universities in 2011-2012 in the context of different majors. The procedure of academic heterogeneity investigation has been developed with the 5-points scale of heterogeneity levels. There are two types of issues in this research. The first one includes the analysis of academic heterogeneity indicators over years and the classification of universities based on their heterogeneity. The second issue concerns intra-university level and includes the following points: • Identification of factors that influence academic heterogeneity of enrolled students • Analysis of heterogeneity in the context of different majors • Analysis of the dynamics of academic heterogeneity over the years • The university contribution to the dynamics of heterogeneity during the period of education. • Recommendations for dealing with heterogeneous contingent of students. For assessing student’s heterogeneity traditional statistical methods were applied as well as mathematical modeling based on Item Response Theory (IRT). The use of IRT methods allows us to place all the data on the unique metric scale, construct classification of universities on the quality of admission and assess heterogeneity. Despite the differences in the systems of state exams and the academic selectivity in various countries the methods developed can be used to assess the heterogeneity of university freshmen in each country.

Added: Mar 28, 2013