×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Algorithmic networking management methodology to reduce transaction costs

    This article examines the high transaction costs of finding and verifying partners in modern business communities. It proposes a conceptual approach to networking algorithms based on predictive analytics and digital participant profiling. A three-tier interaction management model is described that enables the transformation of trust from a stochastic social resource into a manageable economic asset. Empirical data is presented confirming a 60–80% reduction in the time spent searching for relevant contacts.

    Keywords: graph theory, maximum clique problem, link management

  • Methodology for optimal management of connections of participants in business events

    In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships within offline events. The seating algorithm is based on solving the NP-complete problem of the maximum clique. Optimization of the resulting solution is implemented based on the permutation crossover algorithm.

    Keywords: In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships withi

  • Determination and ranking of the targets of the offender in an attack on an important state object

    The article deals with the formation of a violator model in an attack on an important state facility. The classification of violators by types is described. The article proposes the simplest model for evaluating the effectiveness of violators' collusion.

    Keywords: ntegrated security, methods, models, security forces, offenders, important state facilities, clashes between security and attack forces, offender models