Kuban State Technological University
Author list of organization
List of articles written by the authors of the organization
-
HYDRODYNAMIC PRESSURE OPTIMIZATION METHOD IN A WELL AT ROUND-TRIP OPERATIONS
DescriptionThe aim of the article is to study the effect of velocity and acceleration of a drill string on hydrodynamic pressure in a well. We obtain the formulas of pressure versus time. We also established the method for optimizing hydrodynamic pressure in a well at round-trip operations
-
Description
In the article, the structurally functional method of the search of the defects in the segment of the computer network is considered. The basis of this method makes: the structurally functional model of a network; the table of malfunctions; the vector of checks with the obvious address of the knot of the network
-
Description
In this article, the high density traffic flow adaptive control method for urban networks is considered. The analytical survey for dynamic traffic models, urban traffic models synthesis, and optimization methods is performed. The genetic algorithm optimization with traffic dynamic meso-model is investigated. As the result of this work, the efficiency indicators of adaptive control are evaluated
-
THE METHOD FOR DATABASE INFORMATIONAL STRUCTURE ANALYSIS IN TIMETABLE SHEDULING AUTOMATIC SYSTEM
DescriptionThe method for database informational structure development in timetable scheduling automatic system of high school is reviewed in this article. The algorithm for informational elements ordering on hierarchy levels is described in this work
-
THE TECHNIQUE OF A SECURITY TOOLS CHOICE FOR A CORPORATE NETWORK
DescriptionAt the present time, due to the high demands on the stability of the networks and information security, the actual problem is the choice in the market of software and hardware products, the protection of information assets from a number of different threats that arise in the corporate network. Despite the fact that the market for hardware and software products offers a lot of information security, it is difficult to leaders and experts to find out how they differ from each other, and what principles should guide their choice. In the article, for solving the problem of the choice of remedies, their purchase and installation on workstations and enterprise network servers, it is proposed to use a comprehensive methodology, based on the methods of the game theory and the analysis of hierarchies
-
METHOD OF POLYMORPHIC VIRUSES DETECTION BASED ON ARTIFICIAL IMMUNE SYSTEM AND GENETIC ALGORITHMS
DescriptionThis article is dedicated to the study of the fundamental properties and components of the immune system such as B lymphocytes, the Tlymphocytes, immune system storage, primary and secondary immune response, immunological training detectors, which will be the basis of the obtained as a result of detection methods of polymorphic viruses using artificial immune systems. Polymorphism of computer viruses is the formation of a malicious program code directly during execution. Thus, it is impossible to create a unique signature corresponding to these polymorphic viruses. A similar classification problem is solved by the immune system of vertebrates, stared again met with the virus, it "remembers" him, and the next time provides effective secondary immune response. These properties of the immune system served as a prerequisite for the use of immune approaches and algorithms for solving the problems of detection of malicious code. The article identified and described their main features, proposed the idea of their implementation and software, system interactions in the immune system revealed such important features, the implementation of which will be effective in solving the problem of detection of malicious code and software. Also, for a more productive system of education is considered a class of genetic, evolutionary algorithms, described by their immediate implementation of site-specific decentralized artificial immune system, built a system of interaction of genetic and immunological algorithms.
-
VEHICLE DETECTION METHOD IN SENSITIVE ZONE OF PASSIVE ACOUSTIC TRANSPORT DETECTOR
DescriptionIn this article, transport detection method in sensitive zone of passive acoustic transport detector is considered. The transport speed estimation by acoustic data principle is described, an analytical survey for moving object detection is performed, and the mathematical model of described transport detector is investigated. As the result of this work, a transport detection criteria using acoustic data is suggested
-
ACOUSTIC SIGNAL BASED TRAFFIC FLOW EVALUATION METHOD USING THE CALCULUS OF FINITE DIFFERENCES
DescriptionIn this article, acoustic signal based traffic flow evaluation method using the calculus of finite differences is considered. The analytical survey for traffic flow evaluations using acoustic signals is performed. The calculus of finite differences application in traffic flow evaluation is investigated. As the result of this work, the considered method of efficiency is evaluated
-
METHODS OF ASSESSING THE COMPETENCE OF EXPERTS
DescriptionThe article is devoted to an actual problem: increasing of reliability of expert estimates, due to attraction in group of the most competent experts for carrying out examination. The analysis of application of expert estimation in the field of operation of corporate and telecommunication networks is provided in the article. The technique of an assessment of competence of experts is offered. When assessing the competence of experts the following factors were considered: specialization of the expert, an experience and experience of its work in the field, scientific qualification, existence of scientific works on a perspective of carrying out examination. For identification of a priority of factors at determination of competence of experts it is offered to use a method of the analysis of hierarchies. The necessary number of experts for carrying out examination of objects is defined on the basis of application of the statistical analysis
-
CALCULATIONS FOR BAND SAWS FOR STRENGTH AND TENSILE FORCE TO ENSURE SUSTAINABLE CUTTING
DescriptionThe article presents a method of engineering calculation of the strength of band saws and belt force to stabilize the cut