Отрывок: For the data in Table 4, the entropy potential of each type of intruder was evaluated using an IVM. The results are presented in Figure 1. In Table 5, the characteristics of the damage caused by typical violators of the CWO on the same six-point scale were formed in such a way that the entropy assessment of the potentials of preparation (danger) of vio...
Название : Definition of basic violators for critically important objects us- ing the information probability method and cluster analysis
Авторы/Редакторы : Kostin, V.N.
Borovsky, A.S.
Дата публикации : 2020
Библиографическое описание : Kostin V.N. Definition of basic violators for critically important objects using the information probability method and cluster analysis / V.N. Kostin, A.S. Borovsky // Информационные технологии и нанотехнологии (ИТНТ-2020). Сборник трудов по материалам VI Международной конференции и молодежной школы (г. Самара, 26-29 мая): в 4 т. / Самар. нац.-исслед. ун-т им. С. П. Королева (Самар. ун-т), Ин-т систем. обраб. изобр. РАН-фил. ФНИЦ "Кристаллография и фотоника" РАН; [под ред. В. А. Фурсова]. – Самара: Изд-во Самар. ун-та, 2020. – Том 4. Науки о данных. – 2020. – С. 943-947.
Аннотация : Describes one of the approaches to the analysis of the ratios of the critical character- istics of the ski of important sites and typical violators with the use of information and proba- bilistic method. Objects and typical offenders are described by a set of General non- homogeneous characteristics. Information-probabilistic method was provided one-rodnost en- tropy potential characteristics of the training of offenders and the characteristics of the afteref- fect of the actions of the offenders on the criterion of Pearson's Chi-squared and on this basis, characteristics of offenders, and critical facilities are kept in a common information field in a single six-point scales of measurement. Using the overall field of information and probabilistic method and the method of cluster analysis, obtained for each category of objects of the base type of the intruder. The results obtained can be used to determine the requirements for the physical protection of critical facilities.
URI (Унифицированный идентификатор ресурса) : http://repo.ssau.ru/handle/Informacionnye-tehnologii-i-nanotehnologii/Definition-of-basic-violators-for-critically-important-objects-us-ing-the-information-probability-method-and-cluster-analysis-85087
Другие идентификаторы : Dspace\SGAU\20200805\85087
Располагается в коллекциях: Информационные технологии и нанотехнологии

Файлы этого ресурса:
Файл Описание Размер Формат  
ИТНТ-2020_том 4-943-947.pdf175.48 kBAdobe PDFПросмотреть/Открыть



Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.