The purpose of the presented work is carrying out the system analysis of statistical data on results of application of the modified binary algorithm of bats at the solution of dynamic problems of discrete optimization for detection of features of its application and specification of rules of control. In article justification of broad application of algorithms of agent-based metaheuristics in the solution of optimizing tasks is executed. At the level of mathematical statement one of actual tasks which decision is demanded currently is shown. The shown task is interpreted on a concrete example in terms of graph theory. For its decision the binary algorithm of bats which allowed to solve successfully specified problem is reasonably chosen and modified. The last is confirmed by the presented results of three series of experiments. Authors made the detailed analysis of the specified results which materials is the main part of work. In the conclusion of article the list of concrete recommendations for increase of efficiency of binary algorithm of bats for the solution of dynamic problems of discrete optimization in general is created.
Keywords: system analysis, discrete optimization, graph theory, dynamic problems of discrete optimization, agent-based metaheuristics, bat-inspired algorithm
The purpose and objectives of this work is to develop methods of iterative methods for solving systems of linear equations. Achieving the goals and objectives achieved by the development of an iterative method using the apparatus q-differentiation. With the software package Matlab Computational experiments, which resulted in the performance of the proposed method is confirmed.
Keywords: system of linear equations, the objective function, the gradient method, iterative method, modeling, algorithm, function extremum, q-derivative, relative error, norm of the vector, the conditionality of the problem
The paper describes the problems of information security of internet services when subjected to a distributed network attack. Describes the multi-agent model of attack. A system software simulated attack to study its properties in real time. The analysis of simulation results. An approach to maintain server stability under high load. Described hike proposed to implement on the basis of mechanisms of method "flood-gate".
Keywords: simulation, multagentnye systems, network threats, DDoS-attack, JADE, the stability of network services