This article examines the high transaction costs of finding and verifying partners in modern business communities. It proposes a conceptual approach to networking algorithms based on predictive analytics and digital participant profiling. A three-tier interaction management model is described that enables the transformation of trust from a stochastic social resource into a manageable economic asset. Empirical data is presented confirming a 60–80% reduction in the time spent searching for relevant contacts.
Keywords: graph theory, maximum clique problem, link management
In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships within offline events. The seating algorithm is based on solving the NP-complete problem of the maximum clique. Optimization of the resulting solution is implemented based on the permutation crossover algorithm.
Keywords: In the article, the authors propose a methodology for managing connections in a community based on the developed heuristic algorithm for optimal seating of participants in a multi-round networking event to maximize the likelihood of new partnerships withi
The article deals with the formation of a violator model in an attack on an important state facility. The classification of violators by types is described. The article proposes the simplest model for evaluating the effectiveness of violators' collusion.
Keywords: ntegrated security, methods, models, security forces, offenders, important state facilities, clashes between security and attack forces, offender models