236 research outputs found

    Asymptotic analysis of MMPP/M/1 retrial queueing system with unreliable server

    Get PDF
    In this paper, we study a single-server retrial queueing system with arrival Markov Modulated Poisson Process and an exponential law of the service time on an unreliable server. If the server is idle, an arrival customer occupies it for the servicing. When the server is busy, a customer goes into the orbit and waits a random time distributed exponentially. It is assumed that the server is unreliable, so it may fail. The server’s repairing and working times are exponentially distributed. The method of asymptotic analysis is proposed to find the stationary distribution of the number of customers in the orbit. It is shown that the asymptotic probability distribution under the condition of a long delay has the Gaussian form with obtained parameters

    Stem-technologies: mathematics and informatics

    Full text link
    Algorithms solutions of tasks in the field of the theory of numbers within implementation of the STEM project are proposed and realized. Calculations in a package of computer algebra on an open code in the environment of Linux DebianПредложены и реализованы алгоритмы решения задач в области теории чисел в рамках реализации проекта STEM. Вычисления в пакете компьютерной алгебры на открытом коде в среде Linux Debia

    Experimental (computing) theory of numbers

    Full text link
    Carrying out numerical experiments with Euler's function. Specification of the theorem of Mertens. Calculations in a package of computer algebra on an open code in the environment of Linux DebianПроведение численных экспериментов с функцией Эйлера. Уточнение теоремы Мертенса. Вычисления в пакете компьютерной алгебры на открытом коде в среде Linux Debia

    Digitalisation of state companies

    Get PDF
    The article analyzes the legal acts that regulate public relations regarding the digital transformation of tate corporations and companies with state participation. The economic and managerial directions of reform of the highest priority are established. The article describes the goals of the digital transformation of a state-owned company, including: creating a target business model, a system of goals and key performance indicators of digital transformation, and determining a digital transformation strategy. Special attention is paid to the development and implementation of initiatives for the implementation of digital infrastructure; the development of digital solutions providers; organizational activities within the framework of digital transformation; measures for programmed import substitution; and measures to ensure information security within the framework of digital transformation. Considering independent directions the digital transformation of state-owned companies can take, one such is the improvement of the “quality” of the staff and the formation of a culture of digital transformation. The article highlights such areas of work as: the creation of a model of digital competencies and the staffing of digital transformation within a state company; an assessment of the need for employees with special competence; teaching digital skills; the development of employees’ digital competencies within a state company; digital workforce management; and planning and holding an event to develop digital culture and the information security culture of a state company. In conclusion, it is determined that the proposed areas of the digitalization of state-owned companies are universal. It is suggested that these recommendations be used in relation to other organizations (primarily private)

    Plagiarism and “self-plagiarism” in scientific works in the age of digital technologies

    Get PDF
    As well as streamlining academic research activities, contemporary technologies provide opportunities to infringe on the intellectual property of others through plagiarism. However, plagiarism has yet to be adequately dealt with in national legislations, which either do not contain any provision in this connection or fail to adequately define the relevant terms. Moreover, there continues to be much discussion as to what plagiarism is, as well as how and in what cases it should be punishable. The situation is further complicated by the various approaches to plagiarism and the lack of consensus on whether so-called “self-plagiarism” should be treated separately from the intentional infringement of other people’s intellectual property or be deemed as a form of plagiarism. With the aim of clarifying these questions, the authors of the present paper compare different approaches taken to the problem of plagiarism and consider some contemporary approaches to plagiarism detection
    corecore