 «Modeling of Artificial Intelligence» – international scientific Journal.

E-ISSN 2413-7200

Publication frequency – issued once a year.
Issued from 2014.     # 1 September 20, 2018

Articles and Statements

1. Eric Grigoryan
Investigation of the Regularities in the Formation of Solutions n-Queens Problem

Modeling of Artificial Intelligence, 2018, 5(1): 3-21.
DOI: 10.13187/mai.2018.1.3 Abstract:
The n-Queens problem is considered. A description of the regularities in a sequential list of all solutions, both complete and short, is given. Determined that: 1. The fraction of total solutions in the general list of all solutions decreases, with increasing value of n. 2. Complete solutions are distributed in a sequential list of all solutions in such a way that the most likely solutions are complete solutions located in the list close to each other. 3. There is a symmetry in the order of the location of the complete solutions in the general list of all solutions. If the solution is complete in the i-th position from the beginning of the list, then the symmetric solution from the end of the list, located in the position n-i + 1, is also complete (rule of symmetry of solutions). 4. Any pair of solutions, both short and full, arranged symmetrically in the list of all solutions, are complementary – the Queen position indices sum of the corresponding rows is a constant and is equal to n + 1 (the rule of complementarity of solutions). This suggests that only the first half of the list of all complete solutions is "unique", any complete solution from the second half of the list can be obtained on the basis of the complementarity rule. The consequence of this rule is the fact that for any value of n, the number of complete solutions will always be an even number. For an arbitrary matrix of a solution of size n x n, it is established that: 5. The probability of completion to a full solution an arbitrary composition of k queens, gradually decreases with increasing value of k to a certain minimum, and then increases, with a further increase in the value of k. 6. There is some minimum value of the size of the composition k0, such that any composition whose size is less than or equal to k0 can always be completed to a complete solution. As the value of n increases, the value of k0 also increases. 7. The activity of row cells in solution matrix is symmetric with respect to the horizontal axis passing through the middle of this matrix. This means that the cells activity in the i-th row always coincides with the cells activity in the row n- i + 1. By activity is meant the frequency with which the cell index occurs in the corresponding row of the list of complete solutions. Similarly, the activity of the cells of the columns of the solution matrix is symmetrical about the vertical axis dividing the matrix into two equal parts 8. For any n, in the sequential search for all solutions, the first complete solution appears only after some sequence of short solutions. The size of the initial sequence of short solutions increases with increasing n. The length of the list of short solutions until the first complete solution for even values of n appears is much larger than for the nearest odd values. 9. The row in the solution matrix, on which difficulties begin to move forward, and the first short solution is formed, divides the matrix according to the rule of the golden section. For small values of n, such a conclusion is approximate, but with an increase in the value of n, the accuracy of such an output asymptotically increases to the level of the standard rule.

URL: http://ejournal11.com/journals_n/1537458681.pdf

2. Hagop Kechejian, Victor K. Ohanyan, Vardan G. Bardakhchyan
Gas Storage Valuation based on Spot Prices

Modeling of Artificial Intelligence, 2018, 5(1): 22-28.
DOI: 10.13187/mai.2018.1.22 Abstract:
In the paper we present an algorithmic approach for gas storage valuation. The gas price term structure is described by Andersen’s commodity model in Carmona-Ludkovski framework. We first derive Hamilton-Jacobi-Bellman equation for this case, and then switch to algorithmic approach to find the optimal solution under Bellman condition.

URL: http://ejournal11.com/journals_n/1537458779.pdf

3. Sardarkhоdja K. Kurganov
Evolutionary Operator for Calculating the Frequency of Occurrences of Alleles of STR Loci of the Following Generations, Taking into Account Mutations

Modeling of Artificial Intelligence, 2018, 5(1): 29-37.
DOI: 10.13187/mai.2018.1.29 Abstract:
In this paper, the limiting behavior of trajectories of the evolution operator for STR loci (D8S1179, D21S11, D7S820, CSF1PO, D3S1358, TH01, D13S317, D16S539, D2S1338, D19S433, vWA, TPOX, D5S818, D18S51 and FGA) alleles without calculating the occurrence of mutations for the population.

URL: http://ejournal11.com/journals_n/1537458977.pdf

4. Simon Zh. Simavoryan, Arsen R. Simonyan, Elena I. Ulitina, Irina L. Makarova, Elina A. Pilosyan, Rafael A. Simonyan
Construction of Intelligent Systems of Physical Protection of Information

Modeling of Artificial Intelligence, 2018, 5(1): 38-53.
DOI: 10.13187/mai.2018.1.38 Abstract:
One of the most important tasks of intelligent information security systems (IISS) automated data processing systems (ADPS) is the task of building intelligent systems of physical protection of information (ISPP). At present, the task of building ISPP is urgent, requiring systematic and regular decisions on an ongoing basis. At present, there are a lot of mathematical models and practical approaches to solving the problem of the effective functioning of physical protection systems. One interesting approach to this problem are: 1) an integrated approach to develop a mathematical model of the operation of physical protection systems (Ignat'ev, 2012; Godyreva i dr., 2007); 2) multiagent system (MAS) and technology (MAS-technology) (Shreider, Borovskii, 2017; Smirnov i dr., 2018; Gorodetskii i dr., 2017; Tarasov, 2010; Zubareva i dr., 2016). However, analysis of the regulatory basis of physical security, conducted by (Filippov, 2017) shows that the methodology for categorizing, analyzing threats and vulnerabilities differ vagueness of the conceptual apparatus and the lack of a unified terminological approach. In addition, the stresses that the analysis of threats often do not consider the connection between vulnerability and offending patterns. Not compiled a database of current security threats and vulnerabilities. However, it should be noted that the system of physical protection of critical infrastructure is largely dependent on the quality of the selection means of physical protection, and in (Yannikov i dr., 2017) proposed, developed with the help of MS SQL Server Express database "means the physical protection of critical infrastructure." Practice shows that the design methodology ISFZ built by different developers on different methodological foundations, which is dictated by different departments ADPS. Accordingly, in this paper formulated the task of building intelligent systems of physical protection of information on the basis of system-conceptual approach (Simavoryan i dr., 2013; Gerasimenko, Malyuk, 1997) worked out some aspects of its system solutions.

URL: http://ejournal11.com/journals_n/1537459119.pdf

5.
full number
URL: http://ejournal11.com/journals_n/1585170583.pdf