The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article substantiates the relevance of the conducted research and determined the scope of application of the developed algorithm. Private problem of identification of tubular products and slabs at Vyksa Steel Works is considered. The article shows analysis of modern developments in the field of localization and identification markings of industrial products. It shows the description of the localization...
Issues of building power consumption forecasting techniques is paid a lot of attention because of it depend many indicators of the effectiveness of a single electricity retail company and, ultimately, the tariff for customers on the market price formed on the day-ahead market (DAM). The aim of the research is the spectral analysis of retrospective data of “Omsk Energy Retail Company” at various intervals...
The research deals with the problem of the automatic construction of irredundant sets of referential constraints on the database scheme. These restrictions adjust the business rules taking into consideration particularities of the enterprise. This information is stored in a structure of relational database and is used by a database management system. Inclusion dependencies are the theoretical base...
This article presents a new method of image analysis with steganographic inserts based on hierarchy analysis method. Images with applied algorithm of replacing the least significant bit (LSB) are investigated. Detection is performed by dividing the image into layers and making an analysis of zero-layer of adjacent bits for every bit. First-layer and second-layer are analyzed too. Hierarchies analysis...
The location problem of interconnected facilities on the parallel lines with forbidden gaps is considered. Location in forbidden gaps is not allowed. The located facilities are connected among themselves and with gaps. The rectangular metric is used. It is need to minimize the total cost of connections between facilities and between facilities and gaps. The problem is an adequate model of many practical...
Discrete optimization models and methods, in particular, the apparatus of integer programming, are often used for solving and analysis of many decision-making problems in computers design, productions planning and management, information technologies, engineering. In this paper we investigate some cutting plane algorithms for solving the set packing problem, which has a lot of applications in the...
The article deals with factoring cryptanalysis that can be used in attack on popular encryption and digital signing algorithm RSA. Factoring reduces to SAT problem, and one's solution is unique and corresponds to multiplier's bit. A method of simple iteration is applied to SAT, also three polynomial heuristics are applied with the goal to improve convergence. Also it describes alternative method of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.