Kuban State Technological University
Author list of organization
List of articles written by the authors of the organization
-
Description
This article is devoted to the research of influence of genetic algorithm key parameters of genetic schemes method on efficiency of optimum decisions search in expert systems. The following parameters of genetic algorithm are considered: number of population, length of binary codes, the mechanism of parental pairs selection, the choice of the reproduction scheme
-
YOUTH EXAMINATION AS SPECIAL SOCIAL GROUP IN SOCIAL-HUMANITARIAN SCIENCES
DescriptionIn the article, the approaches to youth study as special social group are analyzed; social, demographic and subject-valuable measure of lamination of breeds are justified; stages of youth age are listed; necessity of development of the state youth policy is considered
-
RESEARCH AND MODERNIZATION OF CRUSHING AND SORTING EQUIPMENT OF SAND AND SAND-GRAVEL MIXTURE
DescriptionThe object of studying was CMD-108 crusher. The aim of this scientific article is studying kinetic and dynamic parameters of crusher operating devices. As a tool of studying there were used methods of mathematic analysis, theoretic mechanics and physics. As a result of theoretic studies there were defined speeds of various points of the crusher operating devices as well as there were obtained the values of dynamic loads on them and given recommendations on optimization of the crusher operating conditions and its designs. There was also determined an optimum zone of the material crushing from the viewpoint of operating life of the hinged joints of movable jaw enabling to reduce to minimum dynamic impact components of the reactions of the supporting joints of the movable jaw which increases their operating life
-
Description
In the article investigation and analysis of various types of flow meter, with the aim of choosing the most reliable gauges for the manufacture of juice are offered. Choosing the flow meter, its integration into the general system of automatic control was also considered. Investigations were carried out in the field of modern measuring techniques for the choice of a measuring complex
-
Description
Results of modeling of deformation of a band saw in a cutting zone are presented in article. Also the experiment by definition of deformation of a saw and loss of her stability has been made
-
THE STUDY OF LEARNING ALGORITHMS OF NEURO-FUZZY SYSTEMS CONTROL OF BIOTECHNOLOGICAL PROCESS
DescriptionThe subject of study of this work was learning algorithm of neuro-fuzzy systems with different membership functions. In the prior works there are no published studies of such studies, making it difficult synthesis of neuro-fuzzy control system with new objects in the application of biotechnology, including technological agribusiness entities. A comparative analysis of learning algorithms of neuro-fuzzy system with different membership functions using the method of error back propagation and а hybrid method. For this we used a training sample that contains data of temperature and concentration of dissolved gas in the culture liquid: oxygen (pO2), carbon dioxide (pCO2) of a biotechnological process. It is shown that the hybrid method carries out training of a neural network for the number of periods is 23 times smaller than the algorithm back-propagation errors. The studies found that the two-sided Gaussian membership function provides the smallest learning error of the network δ equal of 3,28•10–3, compared to the other, giving the largest error of training the neural network δ=0,138. Therefore, the task of running the fermentation process effective is the use a hybrid method of education and two-sided Gaussian membership functions. According to the research, we can conclude that for the adaptation of neuro-fuzzy network ANFIS and fuzzy inference system Sugeno zero order to solve biotechnological process control tasks microbiological production efficiency is to use a hybrid method of education and bilateral Gaussian membership functions
-
USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS
DescriptionThe article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
-
HOW TO USE SOLID WASTE OF OIL AND GAS INDUSTRY IN CERAMIC BRICKS PRODUCTION
DescriptionIn this article the recycling problem of solid waste of oil and gas industry is observed. We have developed the bases of resource saving technology for minimizing exhausted sorbents and catalysts pollution with their using as silica-containing additives in raw mix for production of ceramic bricks of standard quality
-
THE USE OF MODERN MANAGEMENT TECHNOLOGIES BY COMPANIES OF SMALL BUSINESS
DescriptionThe analysis of modern administrative technologies is presented: their use, toolkit, features of application in the course of functioning of the companies of small business. Advantages and specificity of application of the balanced administrative systems in managerial process by the enterprises small business in building, public catering and trade are estimated in details. The use of the offered administrative technologies allows to increase essentially profitability of sales of companies of small business
-
USING GENETIC ALGORITHMS FOR TRAINING NEURAL NETWORKS
DescriptionIn this article we have shown how to find sub-optimal neural networks using genetic algorithms