ENSURING THE FORMATION OF CONTROL ACTIONS FOR COMPUTER NODE CONTROL ON THE BASIS OF STOCHASTIC APPROXIMATION PROJECTION ALGORITHMS

{"title":"ENSURING THE FORMATION OF CONTROL ACTIONS FOR COMPUTER NODE CONTROL ON THE BASIS OF STOCHASTIC APPROXIMATION PROJECTION ALGORITHMS","authors":"","doi":"10.18469/ikt.2022.20.2.07","DOIUrl":null,"url":null,"abstract":"In practice, critical tasks require prompt management decisions using computer systems. Computer systems provide a flexible response to a variety of possible changes in the external environment, including, subject to an increase in the scope of information required for processing. Dynamic changes in the external environment necessitate rapid changes in industrial enterprises. These internal changes should be developed in concert with external ones, and, in most cases, they can be significant and abrupt. The active use of computer systems creates a lot of risks associated with cyber attacks. These risks are related to business processes based on the use of automated computer systems. The significance of the problem of managing computer nodes is actually obvious, since the implementation of the planned modifications of the computer infrastructure in practice allows to perform a variety of previously unattainable, fundamentally new steps in order to ensure the development of the infrastructure itself. Practical measures for computer infrastructure operation demonstrate that the constant provision of information and communication complexes and systems requires, first of all, a continuous analysis of the existing infrastructure and its subsequent adjustment. Therefore, within the framework of this publication, the provision of development measures offor computer node control based on projection algorithms of stochastic approximation is considered. The operation of computer nodes, taking into account their management using recurrent stochastic optimization algorithms, makes it possible to implement changes in the existing relationships in the computerized infrastructure field, which will provide development opportunity for organizations based on such infrastructures.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Infokommunikacionnye tehnologii","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18469/ikt.2022.20.2.07","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In practice, critical tasks require prompt management decisions using computer systems. Computer systems provide a flexible response to a variety of possible changes in the external environment, including, subject to an increase in the scope of information required for processing. Dynamic changes in the external environment necessitate rapid changes in industrial enterprises. These internal changes should be developed in concert with external ones, and, in most cases, they can be significant and abrupt. The active use of computer systems creates a lot of risks associated with cyber attacks. These risks are related to business processes based on the use of automated computer systems. The significance of the problem of managing computer nodes is actually obvious, since the implementation of the planned modifications of the computer infrastructure in practice allows to perform a variety of previously unattainable, fundamentally new steps in order to ensure the development of the infrastructure itself. Practical measures for computer infrastructure operation demonstrate that the constant provision of information and communication complexes and systems requires, first of all, a continuous analysis of the existing infrastructure and its subsequent adjustment. Therefore, within the framework of this publication, the provision of development measures offor computer node control based on projection algorithms of stochastic approximation is considered. The operation of computer nodes, taking into account their management using recurrent stochastic optimization algorithms, makes it possible to implement changes in the existing relationships in the computerized infrastructure field, which will provide development opportunity for organizations based on such infrastructures.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于随机逼近投影算法的计算机节点控制控制动作的形成保证
在实践中,关键任务需要使用计算机系统及时做出管理决策。计算机系统对外部环境的各种可能变化提供灵活的反应,包括根据需要处理的信息范围的增加。外部环境的动态变化要求工业企业进行快速变革。这些内部变化应该与外部变化一起发展,并且在大多数情况下,它们可能是显著的和突然的。积极使用计算机系统会产生许多与网络攻击相关的风险。这些风险与基于使用自动化计算机系统的业务流程有关。管理计算机节点问题的重要性实际上是显而易见的,因为在实践中实施对计算机基础设施的计划修改,可以执行各种以前无法实现的、根本的新步骤,以确保基础设施本身的发展。计算机基础设施运行的实际措施表明,不断提供信息和通信综合体和系统首先需要对现有基础设施进行持续分析及其后续调整。因此,在本文的框架内,考虑了基于随机逼近的投影算法的计算机节点控制的发展措施。计算机节点的操作,考虑到使用循环随机优化算法对其进行管理,使计算机基础设施领域中现有关系的变化成为可能,这将为基于这种基础设施的组织提供发展机会。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DISTRIBUTED ARTIFICIAL INTELLIGENCE MODELS IN PERSPECTIVE COMMUNICATION NETWORKS SOFTWARE GENERATORS IN THE GPSS WORLD ENVIRONMENT FOR DISTRIBUTIONS-PROBABILITY MIXTURES WITH QUALITYASSESSMENT RESULTS ANTENNAS FOR INSTALLATION ON UNMANNED AERIAL VEHICLES DETERMINATION OF THE THRESHOLD SOLUTION FOR A CHANNEL WITH RAY-LEIG FADING WHEN PROBING THE COGNITIVE RADIO ENERGY DETECTOR SPECTRUM QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1