scholarly journals The parallel approach to issue of operational management optimization problem on transport gateway system

2020 ◽  
Vol 203 ◽  
pp. 05003
Author(s):  
Alexander Egorov ◽  
Natalya Krupenina ◽  
Lyubov Tyndykar

The universal parallelization software shell for joint data processing, implemented in combination with a distributed computing system, is considered. The research purpose – to find the most effective solution for the navigable canal management information system organizing. One optimization option is to increase computer devices computing power by combining them into a single computing cluster. The management optimizing task of a locked shipping channel for execution to adapt in a multi-threaded environment is proposed with constraints on a technologically feasible schedule. In article shows algorithms and gives recommendations for their application in the subtasks formation in parallel processing case, as well as on a separate thread. The proposed approach to building a tree of options allows you to optimally distribute the load between all resources multi-threaded system any structure.

Author(s):  
Jana Weinlichová ◽  
Michael Štencl

For having retrospection for all over the data which are used, analyzed, evaluated and for a future incident predictions are used Management Information Systems and Business Intelligence. In case of not to be able to apply standard methods of data processing there can be with benefit applied an Artificial Intelligence. In this article will be referred to proofed abilities of Neural Networks. The Neural Networks is supported by many software products related to provide effective solution of manager issues. Those products are given as primary support for manager issues solving. We were tried to find reciprocally between products using Neural Networks and between Management Information Systems for finding a real possibility of applying Neural Networks as a direct part of Management Information Systems (MIS). In the article are presented possibilities to apply Neural Networks on different types of tasks in MIS.


2010 ◽  
Vol 20 (05) ◽  
pp. 1533-1539 ◽  
Author(s):  
WALLACE K. S. TANG ◽  
KA-HO NG ◽  
QIANG JIA

In this paper, a modified degree-based strategy is proposed for pinning control of complex networks under constrained control capacity. Limited by the total control strength, the pinning strategy design problem is reconsidered as a constrained optimization problem. To provide a fast and effective solution, a decrease-and-conquer approach has been designed to assign the best control strengths to the pinned highest-degree nodes. Simulation results have demonstrated that the obtained strategy provides an outperformed control effect on various kinds of complex networks, as compared with strategies derived from degree, betweenness or closeness using evenly-distributed control strength.


2020 ◽  
Author(s):  
Sorush Niknamian

Abstract: To solve the shortage problem of the computing power provided by the single machine or the small cluster system in scientific research, we offer a collaborative computing system for users. This system has massive operation ability. It introduced a scalable mixed collaborative computing model. Through the internet and the heterogeneous computing equipment, the system uses the task decomposition model. This system can solve the research and development problem because of the shortage of capacity. To test the model, a subtask decomposition example is used. The results of the example analysis show that the computing work can obtain the shortest computation time when the number of calculation nodes is more than the number of subtasks; Maximum calculation efficiency can be achieved when the number of the calculating nodes closes to the number of subtasks. Through joint collaborative computing, the extensible mixed collaborative computing mode can effectively solve the mass computing problem for the system with heterogeneous hardware and software. This paper provides the reference for the system, which provides large scale computing power through the Internet and the research problem of due to the lack of computing ability.


2020 ◽  
Author(s):  
Sorush Niknamian

To solve the shortage problem of the computing power provided by the single machine or the small cluster system in scientific research, we offer a collaborative computing system for users. This system has massive operation ability. It introduced a scalable mixed collaborative computing model. Through the internet and the heterogeneous computing equipment, the system uses the task decomposition model. This system can solve the research and development problem because of the shortage of capacity. To test the model, a subtask decomposition example is used. The results of the example analysis show that the computing work can obtain the shortest computation time when the number of calculation nodes is more than the number of subtasks; Maximum calculation efficiency can be achieved when the number of the calculating nodes closes to the number of subtasks. Through joint collaborative computing, the extensible mixed collaborative computing mode can effectively solve the mass computing problem for the system with heterogeneous hardware and software. This paper provides the reference for the system, which provides large scale computing power through the Internet and the research problem of due to the lack of computing ability.


2017 ◽  
Vol 18 (3) ◽  
pp. 0-0
Author(s):  
Valeriy Lakhno ◽  
Alexander Petrov ◽  
Inna Nagorna

The information is being discussed and its characteristics in the system of enterprise management. The model of operational management information and cyber security (CS) object forms a rational set of remedies based on morphological approach. Unlike existing solutions, the model prepared on the basis of intelligent decision support, a morphological matrix for each facility’s perimeters of information protection, and can generate a set of options for remedies which take into account the compatibility of software and hardware. The choice of the optimal option set for that perimeter protection of information, implements an objective function that maximizes the ratio of the sum “security information” to the total rate “cost.”


Sign in / Sign up

Export Citation Format

Share Document