Natural language processing (NLP) is a subset of artificial intelligence demonstrating how algorithms can interact with individuals in their unique languages. In addition, sentiment analysis in NLP is better in numerous programs, including evaluating sentiment in Telugu. Several unsupervised machine-learning algorithms, such as k-means clustering with cuckoo search, are used to detect Telugu text. However, these techniques struggle to cluster data with variable cluster sizes and densities, slow search speeds, and poor convergence accuracy. This study developed a unique ML-based sentiment analysis system for Telugu text to address the shortcomings. Initially, in the pre-processing stage, the proposed Linear Pursuit Algorithm (LPA) removes words in white spaces, punctuation, and stops. Then, for POS tagging, this research proposed a Conditional Random Field with Lexicon weighting; following that, a Contrived Passive Aggressive with Fuzzy Weighting Classifier (CPSC-FWC) is proposed to classify the sentiments in Telugu text. Consequently, the method we propose produces efficient outcomes in terms of accuracy, precision, recall, and f1-score.
Despite being extensively used in numerous uses, precise and effective human activity identification continues to be an interesting research issue in the area of vision for computers. Currently, a lot of investigation is being done on themes like pedestrian activity recognition and ways to recognize people's movements employing depth data, 3D skeletal data, still picture data, or strategies that utilize spatiotemporal interest points. This study aims to investigate and evaluate DL approaches for detecting human activity in video. The focus has been on multiple structures for detecting human activities that use DL as their primary strategy. Based on the application, including identifying faces, emotion identification, action identification, and anomaly identification, the human occurrence forecasts are divided into four different subcategories. The literature has been carried several research based on these recognitions for predicting human behavior and activity for video surveillance applications. The state of the art of four different applications' DL techniques is contrasted. This paper also presents the application areas, scientific issues, and potential goals in the field of DL-based human behavior and activity recognition/detection.
The article is focused on a single-channel preemptive queuing system. Two stationary Poisson flows of customers are incoming to the system. The first flow has an absolute priority over the second one: a new high-priority customer from the first flow displaces a low-priority one from the service channel and takes its place. The capacity of the system is limited to k customers. There is a probabilistic push-out mechanism in the system: if a new high-priority customer finds that all the places in the queue are occupied, then it has the right to displace one low-priority customer from the queue with probability a . Both types of customers have the same exponentially distributed service times. Customers who failed to enter the system due to the limited size of the queue, as well as those expelled from the queue or service channel when the push-out mechanism is triggered, are not lost immediately, but they are sent to a special part of the system called the orbit and designed to store repeated customers. In orbit, there are two separate unlimited queues, consisting of low-priority and high-priority repeated customers, respectively. If there are no free places in the system, new customers with a probability q are added to the corresponding orbital queue. The waiting time of repeated customers in orbit is distributed according to an exponential law. The parameter of this law may differ for different types of customers. After waiting in orbit, secondary customers try to re-enter the system. The probabilistic characteristics of the described queuing system are calculated by the method of generating functions, previously proposed by the authors for calculating a similar system without repeated customers. This method allows finding the main probabilistic characteristics of distributions for both types of customers. Particular attention is paid to the study of the dependence of the loss probabilities for both types of customers on the parameters of the system, primarily on the push-out probability a , the capacity of the system k , and the probability of repeated circulation (probability of persistence) q . It is shown that the effect of blocking the system and the effect of the linear law of customers’ losses, previously identified in similar problems without repeated customers, remain valid even in the presence of secondary repeated customers. The theoretical results are proved by numerical calculations. The blocking area for the second type of customers was calculated along with the area of linear loss law for both types of customers. We studied the influence of the probability of repeated circulation q on the shape of these areas and on the dependence of the loss probabilities for both types of customers on the push-out probability a .
Modern methods of process planning in conveyor systems with buffers of a certain size between processing devices allow optimizing schedules for single tasks or fixed task packages with a limited number of them and a limited number of devices. The use of mathematical models of the processes of performing single tasks (task packages) used by these methods in optimizing the composition of packages and schedules for their execution in systems with an arbitrary number of packages and devices is impossible. At the same time, mathematical models of the processes of executing task packages in conveyor systems in the presence of buffers of limited sizes between devices are the basis for the development of methods for optimizing their (package) compositions and schedules for the implementation of actions with them on the devices of conveyor systems. In this regard, the article develops mathematical models of multi-stage processes of performing an arbitrary number of task packages in conveyor systems in the presence of intermediate buffers of limited sizes for two and three devices, as well as for an arbitrary number of devices. The use of these models makes it possible to determine the time points of the start of the execution of task packages on the devices of conveyor systems, taking into account the limited size of intermediate buffers, as well as the duration of time intervals for the use of these resources and the efficiency of their use over time. An algorithm has also been developed for mathematical modeling of the processes of executing task packages in conveyor systems in the presence of intermediate buffers of limited size, which calculates the time characteristics of these processes based on a given order of implementation of actions with task packages on the devices of conveyor systems. An application has been developed that implements synthesized mathematical models of the processes of executing task packages in conveyor systems with intermediate buffers of limited sizes and an appropriate method for modeling these processes. Versatile testing of the developed application has shown that the obtained mathematical models and the modeling method adequately describe the course of multi-stage processes of task packages in pipeline systems, set using different values of their (processes) parameters.
Scenario: System reliability monitoring focuses on determining the level at which the system works as expected (under certain conditions and over time) based on requirements. The edge computing environment is heterogeneous and distributed. It may lack central control due to the scope, number, and volume of stakeholders. Objective: To identify and characterize the Real-time System Reliability Monitoring strategies that have considered Artificial Intelligence models for supporting decision-making processes. Methodology: An analysis based on the Systematic Mapping Study was performed on December 14, 2022. The IEEE and Scopus databases were considered in the exploration. Results: 50 articles addressing the subject between 2013 and 2022 with growing interest. The core use of this technology is related to networking and health areas, articulating Body sensor networks or data policies management (collecting, routing, transmission, and workload management) with edge computing. Conclusions: Real-time Reliability Monitoring in edge computing is ongoing and still nascent. It lacks standards but has taken importance and interest in the last two years. Most articles focused on Push-based data collection methods for supporting centralized decision-making strategies. Additionally, to networking and health, it concentrated and deployed on industrial and environmental monitoring. However, there are multiple opportunities and paths to walk to improve it. E.g., data interoperability, federated and collaborative decision-making models, formalization of the experimental design for measurement process, data sovereignty, organizational memory to capitalize previous knowledge (and experiences), calibration and recalibration strategies for data sources.
Wireless Sensor Networks (WSNs) were exposed to several distinct safety issues and attacks regarding gathering and sending data. In this scenario, one of the most prevalent WSN assaults that may target any tier of the protocol stack is the Denial of Service (DoS) attack. The current research suggested various strategies to find the attack in the network. However, it has classification challenges. An effective ensemble deep learning-based intrusion detection system to identify the assault in the WSN network was, therefore, suggested in this research to address this issue. The data pre-processing involves converting qualitative data into numeric data using the One-Hot Encoding technique. Following that, Normalization Process was carried out. Then Manta-Ray Foraging Optimization is suggested to choose the best subset of features. Then Synthetic Minority Oversampling Technique (SMOTE) oversampling creates a new minority sample to balance the processed dataset. Finally, CNN–SVM classifier is proposed to classify the attack kinds. The Accuracy, F-Measure, Precision, and Recall metrics were used to assess the outcomes of 99.75%, 99.21%, 100%, and 99.6%, respectively. Compared to existing approaches, the proposed method has shown to be extremely effective in detecting DoS attacks in WSNs.
The trend of development of smart farms is aimed at their becoming fully autonomous, robotic enterprises. The prospects for the intellectualization of agricultural production and smart farms, in particular, today are associated with the development of technology systems used to detect, recognize complex production situations and search for effective solutions in these situations. The article presents the concept of such a decision support system on smart farms using the method of decision support based on case-based reasoning - CBR system. Its implementation requires a number of non-trivial tasks, which include, first of all, the tasks of formalizing the presentation of situations and creating methods for comparing and retrieving situations from the KB on this basis. In this study, a smart farm is presented as a complex technological object consisting of interrelated components, which are the technological subsystems of a smart farm, the products produced, the objects of the operational environment, as well as the relationships between them. To implement algorithms for situational decision-making based on precedents, a formalized representation of the situation in the form of a multivector is proposed. This allowed us to develop a number of models of the trained similarity function between situations. The conducted experiments have shown the operability of the proposed models, on the basis of which ensemble architecture of a neural network has been developed for comparing situations and selecting them from the knowledge base in decision-making processes. Of practical interest is monitoring the condition of plants by their video and photo images, which allows detecting undesirable plant conditions (diseases), which can serve as a signal to activate the process of searching for solutions in the knowledge base.
The brain is regarded as one of the most effective body-controlling organs. The development of technology has enabled the early and accurate detection of brain tumors, which makes a significant difference in their treatment. The adoption of AI has grown substantially in the arena of neurology. This systematic review compares recent Deep Learning (DL), Machine Learning (ML), and hybrid methods for detecting brain cancers. This article evaluates 36 recent articles on these techniques, considering datasets, methodology, tools used, merits, and limitations. The articles contain comprehensible graphs and tables. The detection of brain tumors relies heavily on ML techniques such as Support Vector Machines (SVM) and Fuzzy C-Means (FCM). Recurrent Convolutional Neural Networks (RCNN), DenseNet, Convolutional Neural Networks (CNN), ResNet, and Deep Neural Networks (DNN) are DL techniques used to detect brain tumors more efficiently. DL and ML techniques are merged to develop hybrid techniques. In addition, a summary of the various image processing steps is provided. The systematic review identifies outstanding issues and future goals for DL and ML-based techniques for detecting brain tumors. Through a systematic review, the most effective method for detecting brain tumors can be identified and utilized for improvement.
Water distribution systems represents critical infrastructures. These architectures are really critical and an irregular behaviour can be reflected in human safety. As a matter of fact, an attacker obtaining the control of such of an architecture is able to perpetrate a plethora of damages, both to the infrastructure but also to people. In this paper, we propose an approach to identify irregular behaviours focused on water distribution systems. The designed approach considers formal verification environment. The logs retrieved from water distribution systems are parsed into a formal model and, by exploiting timed temporal logic, we characterize the behaviour of a water distribution system while an attack is happening. The evaluation, referred to a water distribution system, confirmed the effectiveness of the designed approach in the identification of three different irregular behaviours.
It is difficult or impossible to develop software without included errors. Errors can lead to an abnormal order of machine code execution during data transmission to a program. Program splitting into routines causes possible attacks by using return instructions from these routines. Most of existing security tools need to apply program source codes to protect against such attacks. The proposed defensive method is intended to a comprehensive solution to the problem. Firstly, it makes it difficult for an attacker to gain control over program execution, and secondly, the number of program routines, which can be used during the attack, decreases. Specific security code insertion is used at the beginning and end of the routines to make it complicated to gain control over the program execution. The return address is kept secure during a call of the protected routine, and the protected routine is restored after its execution if it was damaged by the attacker. To reduce the number of suitable routines for attacks, it was suggested to use synonymous substitutions of instructions that contain dangerous values. It should be mentioned that proposed defensive measures do not affect the original application`s algorithm. To confirm the effectiveness of the described defensive method, software implementation and its testing were accomplished. Acknowledging controls were conducted using synthetic tests, performance tests and real programs. Results of testing have demonstrated the reliability of the proposed measures. It ensures the elimination of program routines suitable for attacks and ensures the impossibility of using standard return instructions for conducting attacks. Performance tests have shown a 14 % drop in the operating speed, which approximately matches the level of the nearest analogues. The application of the proposed solution declines the number of possible attack scenarios, and its applicability level is higher in comparison with analogues.
Modern methods for solving problems of planning of task packages execution in multi-stage systems are characterized by the presence of restrictions on their dimension, the impossibility of obtaining guaranteed best results in comparison with fixed packages for different values of the input parameters of tasks. The problem of optimizing the composition of task packages executed in multi-stage systems using the method of branches and borders is solved in the paper. Studies of various ways of forming the order of execution of task packages in multi-stage systems (heuristic rules for ordering task packages in the sequences of their execution on MS devices) have been carried out. The method of ordering packets in the sequence of their execution (a heuristic rule), which minimizes the total time for implementing actions with them on the devices, is defined. The method of ordering the types of tasks, according to which their packages are considered in the procedure of the method of branches and borders, is formulated on the basis of the obtained rule. A mathematical model of the process of implementing actions with packages on the system devices, which provides the calculation of its parameters, has been built. The construction of a method for forming all possible solutions for the composition of task packages for a given number of them has been completed. Decisions on the composition of task packages of different types are interpreted in the procedure of the method of branches and borders in order to build the optimal combination of them. To implement the method of branches and borders, a branching (splitting) procedure is formulated, which assumes the formation of subsets of solutions that include packages of different compositions of tasks of the same type. Expressions for calculating the lower and upper estimates of the values of the optimization criterion for the composition of packages for subsets formed in the branching procedure are constructed. The dropout procedure involves the exclusion of subsets whose lower estimate is not less than the record. To find optimal solutions, a breadth-first search strategy is applied, which provides for the study of all subsets of solutions that include various packages of tasks of the same type obtained as a result of the procedure for splitting subsets of tasks that are not excluded from consideration after the implementation of the dropout procedure. The developed algorithms are implemented programmatically, which allowed to obtain the results of planning the execution of task packages in a multi-stage system, which are on average 30 % better than fixed packages.
Methods of simultaneous localization and mapping (SLAM) are a solution for the navigation problem of service robots. We present a graph SLAM system based on Hidden Markov Models (HMM) where the sensor readings are represented with different symbols using a number of clustering techniques; then, the symbols are fused as a single prediction, to improve the accuracy rate, using a Dual HMM. Our system’s versatility allows to work with different types of sensors or fusion of sensors, and to implement, either active or passive, graph SLAM. A graph-SLAM approach proposed by the International’s Karto Robotics in Cartographer, the nodes represent the pose of the robot and the edges the constraints between them. Nodes are usually defined according to contiguous nodes except when loop closures are detected where constraints for non-contiguous nodes are introduced, which corrects the whole graph. Detecting loop closure is not trivial; in the ROS implementation, scan matching is performed by Sparse Pose Adjustment (SPA). Cartographer uses an occupancy map in order to estimate the position where the map representation is done via Gmapping. The Toyota HSR (Human Support Robot) robot was used to generate the data set in both real and simulated competition environments. In our SLAM representation, we have wheel odometry estimate according to initial position of the robot, a Hokuyo 2D Lidar scan for observations, and a signal control and a world representation is estimated. We tested our system in the kidnapped robot problem by training a representation, improving it online, and, finally, solving the SLAM problem.
Currently, the Internet and social networks as a medium for the distribution of digital network content are becoming one of the most important threats to personal, public and state information security. There is a need to protect the individual, society and the state from inappropriate information. In scientific and methodological terms, the problem of protection from inappropriate information has an extremely small number of solutions. This determines the relevance of the results presented in the article, aimed at developing an intelligent system of analytical processing of digital network content to protect against inappropriate information. The article discusses the conceptual foundations of building such a system, revealing the content of the concept of inappropriate information and representing the overall architecture of the system. Models and algorithms for the functioning of the most characteristic components of the system are given, such as a distributed network scanning component, a multidimensional classification component of network information objects, a component for eliminating incompleteness and inconsistency, and a decision-making component. The article presents the results of the implementation and experimental evaluation of system components, which demonstrated the ability of the system to meet the requirements for the completeness and accuracy of detection and counteraction of unwanted information in conditions of its incompleteness and inconsistency.
The issues of ensuring the stability of delay tracking in synchronization systems of radio engineering systems when receiving phase-shift keyed signals with spectrum expansion based on pseudorandom sequences are considered. When working with moving objects, the delay of the received signal continuously changes, synchronization errors occur, and the quality of signal reception largely depends on the stability of the tracking scheme for the delay, characterized by the probability of tracking failure. Delay tracking is usually considered as the main task of the synchronization system of the considered radio systems with phase-manipulated signals with spectrum expansion based on pseudo-random sequences.
The effect of synchronization errors when tracking the delay of a received phase-shift keyed signal with a spectrum extension based on pseudorandom sequences on the probability of tracking failure is studied. The calculation method is used to obtain families of dependences of the probability of tracking failure on the values of random and systematic components of the delay tracking error, normalized to the capture band of the time discriminator of the delay tracking scheme for various combinations of these parameters. The areas of weak and strong influence of the value of tracking errors over the delay of the received signal on the probability of tracking failure are determined. The nature of impact of random and systematic components of tracking error on the probability of failure of tracking was analyzed and it was found that in the General case is the ambiguity of normalized mean square of tracking error as the optimization criterion while minimizing the likelihood of tracking loss.
Calculations performed for a wide range of changes in the normalized delay tracking errors show that to ensure a given quality of signal reception in a radio system with phase-shift keyed signals with spectrum expansion based on pseudorandom sequences, a joint choice of parameters of the delay tracking system that determine the value of random and systematic components of the tracking error is necessary. The results obtained can be used to analyze the characteristics of synchronization systems that monitor the parameters of received signals with a spectrum extension, and to justify the technical solutions of the synchronization system that provide the required quality of signal reception in information and measurement of radio-electronic systems.
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized.
The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems.
The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper.
A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks.
The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained.
The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated.
The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases.
Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem.
In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed.
Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
Modern methods of protecting information from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.
Systems of interval control of train movement Signaling systems, which are currently in service in Russian railways, use the electric track circuit as the main data channel between signals and locomotives. Code-modulated electric signals transferred through that channel are frequently get corrupted which leads to railway traffic delays.
Decoding of the electric signal received from a track circuit can be represented as an image classification problem, and thus the stability of the data channel could be significantly improved.
However, to build such a classifier based on some machine learning algorithm, one needs a large dataset. In this article, a simulation model to synthesize this dataset is proposed.
The structure of the computer model matches the main stages of the electric code-modulated signal generation in a track circuit: code signal generator, rails, locomotive receiver.
Based on code signal generator schematic and waveform diagrams, a generator algorithm is developed. At this stage, we modeled timings of electric code signals according to the specification as well as their random deviations caused by various factors.
The analysis of substitution circuits of the rail line revealed that it has the properties of a low-pass filter. So, the rail line using the Butterworth digital filter with corresponding parameters is modeled. Additionally, at this stage, random noise during transmission was taken into account.
A similar technique is applied for modeling of a locomotive receiver which has a band-pass filter as the first signal processing block.
Thus, the proposed simulation model consists of a set of algorithms which run in series. By varying the parameters of the model, one can synthesize waveform diagrams of the electric code-modulated signal received by the locomotive equipment from a track circuit working in various modes and conditions.
Personal mobility devises become more and more popular last years. Gyroscooters, two wheeled self-balancing vehicles, wheelchair, bikes, and scooters help people to solve the first and last mile problems in big cities. To help people with navigation and to increase their safety the intelligent rider assistant systems can be utilized that are used the rider personal smartphone to form the context and provide the rider with the recommendations. We understand the context as any information that characterize current situation. So, the context represents the model of current situation. We assume that rider mounts personal smartphone that allows it to track the rider face using the front-facing camera. Modern smartphones allow to track current situation using such sensors as: GPS / GLONASS, accelerometer, gyroscope, magnetometer, microphone, and video cameras. The proposed rider assistant system uses these sensors to capture the context information about the rider and the vehicle and generates context-oriented recommendations. The proposed system is aimed at dangerous situation detection for the rider, we are considering two dangerous situations: drowsiness and distraction. Using the computer vision methods, we determine parameters of the rider face (eyes, nose, mouth, head pith and rotation angles) and based on analysis of this parameters detect the dangerous situations. The paper presents a comprehensive related work analysis in the topic of intelligent driver assistant systems and recommendation generation, an approach to dangerous situation detection and recommendation generation is proposed, and evaluation of the distraction dangerous state determination for personal mobility device riders.
Service robots are intended to help humans in non-industrial environments such as houses or offices. To accomplish their goal, service robots must have several skills such as object recognition and manipulation, face detection and recognition, speech recognition and synthesis, task planning and, one of the most important, navigation in dynamic environments. This paper describes a fully implemented motion-planning system which comprehends from motion and path planning algorithms to spatial representation and behavior-based active navigation. The proposed system is implemented in Justina, a domestic service robot whose design is based on the ViRBot, an architecture to operate virtual and real robots that encompasses serveral layers of abstraction, from low-level control to symbolic planning. We evaluated our proposal both in simulated and real environments and compared it to classical implementations. For the tests, we used maps obtained from real environments (the Biorobotics Laboratory and the Robocup@Home arena) and maps generated from obstacles with random positions and shapes. Several parameters were used for comparison: the total traveled distance, the number of collisions, the number of reached goal points and the average execution speed. Our proposal performed significantly better both in real and simulated tests. Finally, we show our results in the context of the RoboCup@Home competition, where the system was successfully tested.
The paper deals with the processing of hydroacoustic data recorded with help of hydroacoustic research complexes. Particular attention to classic and interferometric sonars is paid. In accordance to the regulatory documentation, the minimum permissible measurement errors for the formation of bottom surface maps for various economic sectors are determined.
As one of the important problems affecting the effectiveness of survey work with sonar complexes, the authors determine the problem of primary data compression, which, as a rule, leads to information loss without the possibility of its recovery. These drawbacks of the methods of primary information compression-recovery and processing of hydroacoustic data used in complexes reduce the overall effectiveness of the complexes usage both with the use of sidescan sonar and with the use of an interferometric side-scan sonar.
In the framework of a numerical experiment, it has been shown that the use of chirp signals as probing pulses makes it possible to effectively apply the complex in the survey sonar mode.
The results of the numerical experiment for estimating the spatial position of the object at the bottom of the sonar images using the phase difference information of the received signals using an interferometric sonar are presented. Based on the results of the experiment, the requirements for recording quality of reflected signals of various types in interferometric side-scan sonar are determined.
A method of resolving the reflected (with partial overlap and overlay) hydroacoustic tones, based on the method of dividing the spectra is proposed by the authors. To improve the efficiency of the chirp signal processing, the authors suggest to improve the accuracy of the detection of the signal detection time due to the phase correction calculated through the slope of the frequency change rate of the chirp signal.
Modern hardware systems of processing the video data stream for color coding apply the principle of constant brightness proposed in the development of the NTSC color coding system. This principle, like its implementation, is not free from drawbacks: loss of information on the clarity of the encoded color images, degradation of clarity in achromatic details and images as the color saturation increases, etc. In addition, the use of video data decoding formats in digital video data processing systems, such As 4:2:2, 4:2:0, 4:1:1, distorts the decoded video image.
An alternative approach for encoding a color video stream is to apply the principle of constant color luminance. The work describes the coding according to the principle of constant color luminance. A comparative analysis of the transformed images is carried out with the help of the two principles given. The advantage of applying the principle of constant color brightness in digital video coding systems is shown. It is shown that using the principle of constant color brightness it is possible to obtain a gain of more than 6 dB.
The implementation of the principle of constant color luminance for real and integer modern hardware platforms is described. A comparative analysis of the realizations of the principles of constant brightness and constant color luminance was carried out, showing the advantage of applying the principle of constant color luminance for some modern processors.
The application of the principle of constant color luminance in digital video encoding systems can help improve the quality of recoverable color coded images.
Currently, crowd computing is gaining popularity. However, the quality of results obtained by means of crowd computing is often unpredictable, and that fact puts limits on the practical applicability of this technology. Therefore, systematization of information about modern methods for quality control in crowd computing is an important task that can pave the way to new research efforts in this area and therefore widen the scope of its applicability. The paper discusses the results of systematic literature review of journal articles from ScienceDirect and IEEE Xplore bibliographic databases, published after 2012. The paper also identifies main directions in crowd computing quality control, corresponding models and assumptions. In particular, it shows that most scientific attention is concentrated around consensus methods and game theoretic methods.
The paper considers an approach to the design of a system for data and security events collecting, storing and processing based on Elastic Stack tools. The tasks of monitoring and incident management are analyzed; architectural solutions for monitoring systems are studied; requirements to such systems are defined; and the architecture of systems for data and security events collecting, storing and processing is suggested. The developed software prototype of such system is described, and the results of experiments are specified.
Among issues which arise when developing software complexes for real-time systems (RTS) one should resolve common multi-task system issues of ensuring logical correctness of the system being created (preserving the integrity of informational resources, eliminating the possibility of mutual task blocking), as well as issues of ensuring dynamic correctness, specific for RTS (feasibility of the application tasks). In the long run, resolving these issues is reduced to checking the correctness of how synchronizing operators which ensure consistent execution of application tasks are scattered in the task bodies. In order to perform such checking statically, models which represent the scattering of synchronizing operators in application tasks are constructed.
In this paper several methods of processing such models are proposed which are based on constructing special multi-partite graphs — graphs of synchronizing operator dependencies. Two varieties of such graphs are resented: a) graphs of bundles, which ensure verification of logical correctness of multi-task applications (correctness of intersections of critical interval pairs); and b) graphs of bundles and critical intervals, which ensure verification of dynamic correctness of RTS applications.
In the article, an algorithm for constructing deformable face models, based on the use of Active Shape Model method, Shepard method of landscape surfaces restoring and set of 3D particular face models, is described. Alternative to the EER, the assessment of accuracy in the task of the person recognition using their face image based on an anchored value of FAR is offered. The results of testing the algorithm are presented. We demonstrate the results of using the obtained models within the framework of recognition algorithm performance on a large base of several thousand images (FERET image database by 2000 year),which contains photographs of people at angles of 0, 45 and 90 degrees relative to the optical axis of the camera. Analysis of the results showed that the use of deformable face models does not reduce the quality of the person recognition by face image even under difficult initial conditions and in some cases leads to improving recognition results.
In the paper we study the problem of control under the magnitude and rate limitations imposed to the control input in application to flight control systems. In the case of the control surfaces magnitude and rate limitations, the self-oscillations of considerable amplitude may occur, which is often reffered to as “the loss of stability in large”. If the aircraft is weathercock stable, then two limit cycles may co-exist: a stable cycle of small magnitude and an unstable one with a large magnitude. If the aircraft is weathercock unstable, then one cycle from a pair of stable limit cycles with small magnitude may arise. In addition, there is also an unstable limit cycle, the presence of which makes it necessary to study the stability of the aircraft with automatic longitudinal control “in large”, i.e. when large disturbances act onto the aircraft and move the aircraft out of the border of unstable limit cycle. Influence of such nonlinearities as “saturation” may cause the so-called “Pilot Involved Oscillations”, which degrades the piloting of the aircraft.
For studying the processes that occur in nonlinear flight control systems (including nonlinear oscillations), a simple computer simulation is an unreliable tool, which can lead to wrong conclusions. To obtain reliable simulation results, analytical validation of the condition of the uniqueness of the limit solution should be fulfilled or special analytical and numerical methods to find the hidden oscillations should be employed.
In the paper, the analytical-numerical procedure and numerical methods for localization and parameter determination of hidden oscillations in nonlinear systems are described, and their applications are demonstrated for an analysis of dynamics for various kinds of flying vehicles, such as yaw control of non-rigid rocket carrier, automatic control of aircraft angle of attack, as well as man-machine aircraft-pilot system, supplied by stability augmentation system.
The paper proceeds research of the security event correlation methods in Security Information and Event Management (SIEM) systems. In this part we consider correlation methods of information security events that can be applied during separate correlation stages described in the previous paper. Classification of the considered correlation methods and analysis of their advantages and disadvantages are provided. The effectiveness of using these methods at different stages of the correlation process is evaluated.
The paper is devoted to the analysis of security event correlation methods in Security Information and Event Management (SIEM) systems. The correlation process is considered to be a multilevel hierarchy of stages. The goal of each stage consists in executing appropriate operations on security data being processed. Based on this analysis we outline each correlation stage and their interaction scheme.
The paper considers the task of making schedules for processing data of various types in the conveyor system in the presence of time restrictions on its operation and under condition of forming sets from the processing results. The paper is dedicated to the first stage of solving the above problem. This stage is associated with the rationale of a multilevel model of making decisions on the composition of data batches; composition of groups of batches being processed within the specified time intervals of the system; scheduling of processing of data batches in groups taking into account the conditions of forming sets of various types from the processing results.
This paper considers the task of implementing proactive control of robotic systems (RS) for rescuing victims. The use of a wide range of sensory elements in the RS allows one to expand the list of monitored parameters and to generate the control action with the use of predictive and proactive capabilities based on the methods and technology of integrated modeling. A complex of models for making decisions about assistance to victims is presented. The efficiency of such decisions is evaluated.
This article focuses on the architecture of a universal mobile operating system. The paper describes the main subsystems of the developed operating system and the structure of the operating system protection. A distinctive feature of the developed operating system is the integration of pseudo-probability transformations into information protection modules.
The paper suggests the mathematical models of data visualization in SIEM-systems. The visualization models formalize three main stages of the visualization process. At the first stage the models are being suggested which fulfill the unification of data on the computer network objects having heterogeneous structures and different sources. At the second stage, on the basis of the suggested models, a multidimensional matrix of relations is generated. At the third stage a uniform approach to the visualization of various security aspects of the computer network on the basis of constructed matrix is proposed.
Summary information on existing integrated circuits (IC) analog master slice array (MSA) and configurable structured array (CSA) crystals of domestic and foreign production-oriented applications in sensor systems, including robots for various purposes, and aircraft are reduced.
The parameters of the new integrated circuits MSA (AGAMC-2.1) and CSA (MH2XA010), as well as the prospects of designing on their basis of radiation-resistant IC for analog signal processing and interfaces of sensors of different physical kind.
In this paper, we propose a formal model of individual and group behavior based on p-adic coordinate system. The model developed allows description and prediction of behavioral reactions of the personnel of critically important objects under conditions of external destructive informational impacts.
In this paper, the problem of improving the technology of formation and functioning of multi-subject intellectualized information systems of industry is considered. As a solution to this problem, we propose an architecture of multi-subject IS information system of an industrial enterprise; an automated method of formation of a semantic domain model based on the principle of "user as an expert."; a method of formation of cognitive user interfaces adapted for different categories of users; and search method , providing automated query expansion and evaluation of the relevance of search results based on a joint of analysis of the formal mental models and semantic models of a domain with the subtractive relationship
The paper describes a method of applying the laws of equilibrium thermodynamics to complex socio-economic systems, in particular, for the development of a methodology of calculation of social dissatisfaction indicators, and also two information systems proposed for calculating this indicator.
In this paper influence of multi-iterative hashing with several modifiers algorithm's parameters on its cryptographic persistence is considered. Relevance of multi-iterative hashing with several modifiers algorithm’s application and need of research of its parameters are justified, the description of algorithm is provided. Cryptographic persistence of hash function to attacks which are not depends on algorithm is caused by its bitness, i.e. actually on the amount of unique hash values that hash function is able to generate. For an estimation of algorithm’s persistence to dictionary attacks and attacks by methods of "brute force" and "birthdays" the algorithm of multi-iterative hashing with several modifiers is considered as independent hash function. Estimation of the algorithm’s persistence for a given number of iterations is offered to produce by calculating the average bitness of equivalently persistent hash function for the algorithm. The description of estimation method of algorithm’s persistence is provided. The experiments are performed using a truncated cryptographically persistent hash function. The results of experiments allow to compare the algorithm’s persistence metrics of under different values of its parameters. Besides, the results of the experiments allow to understand how the values of certain parameters, and combinations of values for these parameters affect for the algorithm’s cryptographic persistence to dictionary attacks and attacks by methods of "brute force" and "birthdays". On the basis of the received results it is possible to draw conclusions about the values of the parameters recommended for practical application of this algorithm. In conclusion, the paper presents the main results of the work. Authors of the article believe that the algorithm can find application in authentication subsystems of information systems, and also in systems where the most important requirement is persistence for a long time.
In this paper we discuss the problem of ice situation in the Arctic and safe navigation monitoring system development for the Northern Sea Route with application of intelligent geoinformation system. Case study illustrates the adjustment of the ship route on the part of the Northern Sea Route in accordance with the ice situation using the developed monitoring system.
The paper proposes a method and a set of patterns for the problem of ontology matching, identified in the previous work of the author. The proposed method integrates the lexical, structural and semantic approaches. The presented patterns for knowledge integration and ontology alignment can significantly facilitate the process of ontology matching due to usage of the schemes based on typical solutions.
The paper presents an approach to hybrid systems control based on smart space technology. The approach proposed bears two primary distinctive features: first, hybrid system control is decentralized and various control functions are implemented in separate services, communicating via ontology-based smart space; second, the services are represented by a hybrid automata formalism allowing to employ a model-driven development for hybrid control systems. The approach is illustrated by practical communication scenario of several physical devices in the context of smart home environment.
A scheme of constructing multi-voice speech synthesizer based on the use of the synergies of integration of the text to speech and voice conversion systems are presented in this article. Such organization of the system allows simultaneous synthesis and modification actions in speech signal, based on an integrated approach to its treatment, significantly reducing the number of errors and artifacts that affect the resulting quality. Applying this approach let to implement a function for multivoice speech synthesizer without significant labor costs for training speech database to add new voices.
The paper comprises a technique of information flow verification for information and telecommunication systems with embedded devices. The goal of the technique is to evaluate the security level of the constructed system and check the compliance between real information flows and the set policies. The conducted verification is based on model checking with the use of SPIN tool. Implementation of such verification is fulfilled at initial design stages and provides earlier detection of contradictions in the used security policy and inconsistencies between the network topology and requirements of the information system.
It is recognized that incorporating context information into recommender systems is one of the most effective ways to increase their quality and predictive abilities. The paper surveys primary methods of enhancing collaborative filtering systems by taking actual context information into account. The focus is mostly on different flavours of contextual prefiltering and matrix factorization approaches which are the most popular and promising.
In retrospect, the issues of monitoring the population of wild reindeer using ground observation and small aircraft. The possibility of using aero-space systems and satellite radio collars to track the animals, determine the size and demographic structure of herds. Presents modern methods geobotanical mapping pastures using multispectral satellite imagery and field work in key areas, and the method zooklimatic monitoring model based on the heat balance of the animal. Shows how the monitoring arrangements, integrated processing and reporting of heterogeneous data based intelligent interface
Two-stage scheme for minimal join graph subsets synthesis that involves the construction of three sets (stereoseparators, their possessions and necessary edges) over given subalphabet set with subsequent construction a set of a certain kind of sinews for each stereoseparator. Systematized algorithms, implementing both stages, are systematized and their complexity is estimated.
In article the way of data processing of biometric measurements, in particular to methods of digital processing of the hand-written text, intended for аuthentification of the user on hand-written handwriting in access monitoring systems is considered. Technical result is increase of reliability of access in all systems demanding use of means of identification of the personality.
One of the approaches to the detection of network anomalies is the analyses of parameters of functioning of a network. Characteristics, calculated on a wavelet coefficients, indeed, are more sensitive to changes in the number, than the characteristics calculated directly in a row, but this requires more calculations, the spectral-time algorithms, of course, subject to optimize for application in real-time systems. In addition, there are different approaches to the implementation of wavelet expansions, each of which has its place on the informative value (the number of qualifying ratios), the authentic values, the computational complexity of the transformations. The article offers a reasonable approach to the implementation of these algorithms for use in real-time anomaly detection systems.
An approach is described for estimate of task response time in real-time systems that are implemented by multi-core processors. The fact is shown, that in systems on multi-core processors the composite blocking of tasks is possible not only with use of priority inheritance protocols, but also with use other known protocols of mutual data access. A method is given for estimate of blocking factor for systems with composite blocking of tasks on multi-core processors.
A description of a speaker identification system by voice is presented. This system was developed for submission to speaker recognition system evaluation at NIST SRE 2012
The paper deals with current status and perspectives of municipal wastes management and monitoring system for Leningrad oblast. Covered some aspects of wastes transport logistics, determination of most suitable places for new landfills allocation constrained by ecological requirements, usage of crowdsourcing data for identification of illegal waste dumps
This paper deals with modal transformation based on attributed graph rewriting. Our contribution investigates f single pushout approach for applying the rewrite rules. The computation of graph attributes is obtained through the use of lambda-terms in a typed lambda calculus with inductive types. In this paper we present solutions to cope with single pushout construction for the graph structure and the computations functions. As the rewrite systen use inductiv types, the expressive power of attribute computations increases and appears to be more efficient than the one based on sigma-algebras. Some examples showing the interest of our computation approach are described in this paper.
A method for estimation of time, requiered for external events processing by distributed program applications is presented. It is shown that feasibility of such applications may depend on variation of task execution time and message delivery time. The influence of this variation shall be taken into account during feasibility checking for task chain, that participate in reaction to concrete separate external events.
The complexity of a sintering process in an iron- and steel-making plant always tends to create a problem in monitoring and supervision system. This paper reviews the approach of implementing of the two level neuronet model. The neural network with normal and faulty event is executed on the data collected from the experiment. The upper level network is used for the detection of faulty machine and lower level networks are executed the identification of the abnormal situations.
The description of main features and problems of mass recognition of archival documents is presented in the beginning of the paper. Key design problems are considered, the examples are shown and different kinds of solutions are advised. After that, the scheme of electronic archive and the scheme of recognition subsystem are shown with the description of their components, functions and business processes.
The paper considers an analysis of a protection mechanism against infrastructure attacks based on the bio-inspired approach ―nervous network system‖. We propose to use a network packet-level simulation to investigate the protection mechanism ―nervous network system‖. The paper presents the structure of the protection mechanism, the algorithms of its functioning, and the results of the experiments. Basing on the experimental data, we analyze the effectiveness of the proposed protection mechanism.
The article reviews those machine translation systems for sign languages that are based on intermediate semantic language (interlingua). The constructing principles of two systems are considered: ZARDOZ (multilingual system for translating spoken language into a number of different sign languages, in particular, Irish, American, Japanese) and Multi-path (system with multiple processing pathways for translating spoken English into American sign language). The architecture of those systems and the requirements stipulated by the peculiarities of sign languages are discussed on conceptual level, without going into mathematical and technical details. The purpose of this article is to contribute to perfect understanding of problems and strategies of formalizing semantics within machine translation systems for sign languages.
One of the main problems of researches in the field of socio-engineering attacks is the development of analysis algorithms (assessment) of information system's users' protection estimated on the basis of computing complexity. According to preliminary estimates the application of probabilistic relational algorithm will essentially reduce computing complexity of a program complex. Use of the specified approach will also allow to increase flexibility in a task of estimation of criticality of the documents available in system and chances of successful realization of attacks, in description of communications’ system and accesses among actual components of a complex «information system – personnel – critical documents», and among specified components and the malefactor. Relational models will probably allow to use effective computational methods, implemented in modern DBSM for fast SQL-links implementation.
This article is devoted to modern computer speech technology in queuing systems for the population. Problems of working out of the effective and convenient speech interface, methods of detection and correction of errors of recognition, model for the comparative analysis of speech dialogue scenarios, mathematical models for calculation of service characteristics of demands and optimization of functioning contact centers with self-service on the basis of speech recognition are considered.
We develop a technique for quantitative estimates of respondents’ behavior that uses respondents’ answers about the time interval since the last episode. The paper provides the block of questions and formalized set of answers to be used in a questionnaire as well as the mathematical approach for data processing and making the estimates. The respondents’ behavior mathematical model under discussion belongs to the class of generalized Gamma-Poisson stochastic process and takes into account the length bias inherent to the data collected from the respondents’ answers about the last episodes of their behavior.
The prototype of the program complex, used for demonstration of basic possibility for estimation the protection of personnel of informative system from socioengineering attack on the base of generalized approach, focused on analyze of trees of attacks, is described. The representation of informative system and its personnel in the specified program complex is based on hierarchy of information models, which consists of information model of the user, information model if the users group, information model of control area, information model of hardware and software complex, informative model of critical information objects (system of documents), information model of informative system itself and links between corresponded objects. The list of technologies, used during the development of this product, the reasons for using this technologies and brief substantiation of some technical solutions is resulted. The example of proceeding of program complex prototype during editing the information about socioengineering attack, as well as during the imitation of socioengineering attack on the recompensation type on the personnel of this system is considered.
In this paper, we describe the method of finite state machine induction using genetic programming with fitness based on testing and model checking. The description of chromosome structure, of genetic algorithm, of cross-over and mutation operations is given. Experimental results for the induction of elevator doors control system are given.
The article discusses the project hardware and software implementation database management system (DBMS) using programmable logic chips (FPGA) as a system on chip (SoC). A possible implementation, and evaluation.
Intelligent system for conference management automation is an interactive system for conferencing in a room equipped with two screens and facilities to project slides and other information on them. The first screen is used to display the speaker’s presentation, and the second screen is used for conference program visualization. The system is based on the Smart-M3 platform developed by the Nokia Research Center. Personal mobile devices (communicators, mobile phones, and personal computers) are used for interaction between users and the system. The appropriate software is installed on these devices. This article introduces the architecture and ontologies of the system's main components.
Procedure of construction and research of dynamical properties of the aggregated composite system for interval control system is presented. Results of Lyapunov’s method development on the objects with parametrical uncertainty class for the purpose of reception of composite model for separate subsystems and their aggregation in system are offered.
Developed description of informative models of the component of complex “in-formative system – personnel”, which is under threat of socioengineering attack is being presented in this paper. Informative model of user, users group, controlling areas, information objects (system of documents), hardware-software maintenance and information system itself are considered. Specified informative models are included into the base for analyzing protection of informative system under the threat of socioengineering attacks. Hierarchy of these models allows to describe scene (context), in which socioengineering attack developes, to touch possible attacks (trees of attacks), and, on the base of gained results, study possible approaches to estimation the degree of protection of complex “information system – personnel” from socioengineering attack.
In this article the urgency of information security estimation problem from unauthorized access in the automation system is shown. The purpose of the article is working out a model for a quantitative estimation of information security from unauthorized access, which provide increasing efficiency management of information security in the organizations. For solution of the information security quantitative estimation task the complex metric is offered — security coefficient of the automation system. On the basis of the given metric the comparative analysis for the standard automation systems of firms is carried out, guidelines on rise of their level of security are resulted.
The machinery of information protections from unauthorized access by access limitation of the corporative information recourses according to the mandate politics of information security have considered. The processes of control and properties analysis of law access matrix according to objects and subjects protection hierarchy have presented. The conditions and procedures of filling and forming of this matrix with execution of basic demarcation access rules have considered.
The structurally functional model of management by behaviour of technical system for regular conditions is offered. Definition is made of concept «an abnormal situation of management of technical systems». The system of classification of the abnormal situations which use allows to detail possible variants of decisions which are necessary for accepting at occurrence and revealing of such situations.
Semantic search system that uses database is described. Prototype of system is implemented, it has database of Russian language semantic classes, crawls and parses resources from Internet and finally searches in crawled information. Search request is full text resource here. Short review of current search methods and methods being researched is made.
The paper describes an approach to intelligent support of trainees in an intelligent distance learning system. The approach relies upon usage of context for assessment of trainees’ skills and upon application of data mining methods to accumulated trainees’ contexts for revealing of common difficulties and provision of personalized support for improvement of trainees’ knowledge skill. The approach has been tested via modeling of student agent, interface agent, accumulating agent, and data mining agent.
The topical problems and the key tasks of technical-organizational complex systems management in crisis situations are formulated. The theory of technical-organizational complex systems management in crisis situations and the methodology of XXI century situational centers development are substantiated.
Metamodeling is very important part of design developing software in the all steps. Testing, in one's turn, is a hard but necessary part in completing of developing.. This article describes analysis of object-oriented metrics, some of them are suggested to include in Together Borland CASE-system to reduce general (end) testing.
We describe the envelop method to dynamic systems control optimization on the admissible border of control.
We describe the envelop method applied to dynamic systems singular control optimization.
We consider an application of CF grammar with regular expressions in right hand side of the rules for representation and processing in computer algebra and proof assistants. The program SynGT has been presented.
Semi-automatic system transforming components of diagrams IDEF0 into class-diagrams in UML-notation is described. Enhancement of efficiency of design when functional design gives place to object-oriented one is discussed. The tuning of system according to concrete rules of transformation is provided for serviceability.
In article the contents of the comprehensive approach to protection of the information is considered at automation of confidential office-work. Paths of neutralizing of the hidden threats and attacks, characteristic for the automated systems of confidential office-work are shown. Architectural features and technological engineering process of the special hardware-software complex of protection of the confidential documents, based on encoding of the information and application of electronic identifiers ruToken are described.
During the recent several decades a lot of research projects have been done in the area of intelligent distance learning systems. Such systems became wide spread in different educational and industrial organizations due to rapid evolution of network engineering and Internet. The physical presence of teacher and students in one class is not required due to usage of such systems. Usually, such systems have distributed architecture. This was a major motivation to make a research to analyze possibility of multiagent technologies usage in intelligent distance learning systems. The paper presents the developed architecture of agent community for such systems and research prototype of the system allowing to model agents’ interaction for user interface control based on several pedagogical strategies.
This paper concerns the problem of airspace traffic management in the airport area with a hijacked airliner presence. A design of a multiagent system for the problem is presented here. Airspace area around of an airport is formalized with the scenarios knowledge base language which inference functions are used to build a path of an airliner. Results of an implemented prototype of the mutliagent system are introduced here.
The development of Intelligent Geographic Information Systems (IGIS) for monitoring systems in the broad sense including urban and regional applications is considered. The paper is focused on the development of the IGIS method based on a Service Oriented Architecture (SOA) concept.
Computational models are considered for real-time software applications with compound tasks. The opportunity of feasibility analysis of such applications is represented.
Algorithms of priorities assignment for real-time systems inclusive simple and complex tasks are discussed. The algorithms provide RAM use efficiency increase.
Methods for functional diagnostics of robots and mechatronic systems on the base of their direct and inverse dynamics models have been suggested. Criteria for correct functioning have been formulated and dynamics models of faults have been presented. Methods for fault-stable programme, stabilizing and invariant control for programmed motion have been described and evaluations of permissible boundaries (tolerances) of possible faults have been obtained. Use of these methods in combination with algorithms for identification with finite time of adaptation provides high quality and correctness for functioning of robots and mechatronic systems in a wide class of possible faults.
Methods for solution of artificial intelligence problems on the base of multi-valued and probabilistic logics have been discussed. Logic and network approach for analogous derivation has been suggested. Method for regularity search, logic-axiomatic and logic-probabilistic methods for learning of terms and pattern recognition in the case of multi-valued logic have been described and generalized.
The problem under consideration is an extension of the set of services of Linux-like OS in a direction of hard real-time tasks support. The case of such problem solution is regarded that consists of including into the OS an additional real-time kernel. An approach is suggested for improving of the OS reactivity and task scheduling efficiency for dual-kernel OS architecture framework.
Three scheduling algorithms are examined, static priority-driven scheduling, time sliced scheduling and deadline-driven sheduling. Their characteristics are compared for scheduling tasks in real time. New, more simple proof is offered to show that deadline-driven scheduling algorithm is capable to utilize all proocessor resource without transient overloads.
The system facilitating development and management by 3D virtual spaces is offered. The new methods allowing accelerating a conclusion the 3D graphics on the screen are considered and also ways of compression of the given system, that is necessary at transfer of the data through an internet.
The purpose of this paper is to investigate in details means of objective data presentation. In the paper the analysis of the objective approach will be carried out. It is discussed ambiguity of the objective approach and its opportunity. The approach provide a mesure that is appropriate strength for data representation.
А pseudo-ternary number system which ensures the image representation of filming conditions independently is introduced. The variations of filming conditions are simulated within the framework of non-linear image transformations, which do not modify the ratios of adjacent intensities 'more', 'equal' or 'less'. The method of thresholding of segmented objects is developed.
A method of logical inference search with preliminary adjustment to a concrete knowledge base is considered. For the adjustment an abstraction and formal- grammar interpretation of deduction problem is used. The method allows to improve the efficiency of logical inference search.
Approach is suggested for setting of the task execution periods in time-triggered real-time systems. Schedule presentation forms and schedule execution procedures are adduced for the systems with binary ranged and binary-decimal ranged task periods.
The development of the Group Expert Technology Tools for various organizational and technical decisions estimations implemented in the St.Petersburg Institute for Informatics and Automation Russian Academy of Sciences (lab of Integrated systems of automation), deals with usage of Internet communication capabilities during cooperative activity of the users. In the article the problems of a place and role of the Group Expert Estimation Technology in general scheme of decision making in conditions of uncertainty, the XML language as opened standard for information exchange between the Internet users, other standards and approaches to organization of the component communications in distributed heterogeneous information environments are esteemed
Introduction : Modern complex technical systems are often critical. Criticality is due to the consequences of disruption of the functioning of such systems, and their failure to fulfill the required list of functions and tasks. The process of control and management of such systems is carried out using communication systems and networks that become critical for them. There is a need to ensure the stable functioning of the complex technical systems themselves, their control and monitoring systems, communication systems and networks. The paper proposes a method for ensuring the functional stability of a communication system, the basis of which is the process of identifying and eliminating conflicts in it due to the difference between the profile of functioning and the profile of the process of functioning of the system. The proposed model of the process of functioning of the communication system allows, based on changes in the intensity of the impact on the system of destabilizing factors, the identification of conflicts and their elimination, to determine the probability of ensuring the functional stability of the system. The purpose of the study: to develop a methodology for ensuring the functional stability of a communication system under the influence of destabilizing factors and the emergence of conflicts, a model of the process of the system's functioning, which makes it possible to determine the probability of the system being in a functionally stable state. Methods of graph theory and matrix theory, the theory of Markov processes. Results: an approach is proposed for assessing the functional stability of a communication system under the influence of destabilizing factors, a technique has been developed to ensure the functional stability of a communication system. Practical significance: the results of the study can be used in the design and construction of complex technical systems, decision support systems, control, communication and management.
Information security risk assessment is a crucial component of industrial management techniques that aids in identifying, quantifying, and evaluating risks in comparison to criteria for risk acceptance and organizationally pertinent objectives. Due to its capacity to combine several parameters to determine an overall risk, the traditional fuzzy-rule-based risk assessment technique has been used in numerous industries. The technique has a drawback because it is used in situations where there are several parameters that need to be evaluated, and each parameter is expressed by a different set of linguistic phrases. In this paper, fuzzy set theory and an artificial neural network (ANN) risk prediction model that can solve the issue at hand are provided. Also developed is an algorithm that may change the risk-related factors and the overall risk level from a fuzzy property to a crisp-valued attribute is developed. The system was trained by using twelve samples representing 70%, 15%, and 15% of the dataset for training, testing, and validation, respectively. In addition, a stepwise regression model has also been designed, and its results are compared with the results of ANN. In terms of overall efficiency, the ANN model (R 2 = 0.99981 , RMSE= 0.00288 , and MSE= 0.00001 ,) performed better, though both models are satisfactory enough. It is concluded that a risk-predicting ANN model can produce accurate results as long as the training data accounts for all conceivable conditions.
A system of nonlinear discrete (finite-difference) of a general form with a bounded delay is considered. Interest in the tasks of qualitative analysis of such systems has increased significantly in recent years. At the same time, the problem of stability with respect to all variables of the zero equilibrium position, which has a great generality, is mainly analyzed in domestic and foreign literature. The main research method is a discrete-functional analogue of the direct Lyapunov method. In this article, it is assumed that the system under consideration admits a “partial” (in some part of the state variables) zero equilibrium position. The problem of stability of a given equilibrium position is posed, and stability is considered not in all, but only in relation to a part of the variables that determine this equilibrium position. Such a problem belongs to the class of problems of partial stability, which are actively studied for systems of various forms of mathematical description. The proposed statement of the problem complements the scope of the indicated studies in relation to the system under consideration. To solve this problem, a discrete version of the Lyapunov– Krasovskii functionals method is used in the space of discrete functions with appropriate specification of the functional requirements. To expand the capabilities of this method, it is proposed to use two types of additional auxiliary (vector, generally speaking) discrete functions in order to: 1) adjustments of the phase space region of the system in which the Lyapunov–Krasovskii functional is constructed; 2) finding the necessary estimates of the functionals and their differences (increment) due to the system under consideration, on the basis of which conclusions about partial stability are made. The expediency of this approach lies in the fact that as a result, the Lyapunov-Krasovskii functional, as well as its difference due to the system under consideration, can be alternating in the domain that is usually considered when analyzing partial stability. Sufficient conditions of partial stability, partial uniform stability, and partial uniform asymptotic stability of the specified type are obtained. The features of the proposed approach are shown on the example of two classes of nonlinear systems of a given structure, for which partial stability is analyzed in parameter space. Attention is drawn to the expediency of using a one-parameter family of functionals.
Recently, different attempts have been made to characterize information security threats, particularly in the industrial sector. Yet, there have been a number of mysterious threats that could jeopardize the safety of food processing industry data, information, and resources. This research paper aims to increase the efficiency of information security risk analysis in food processing industrial information systems, and the participants in this study were experts in executive management, regular staff, technical and asset operators, third-party consultancy companies, and risk management professionals from the food processing sector in Sub-Saharan Africa. A questionnaire and interview with a variety of questions using qualitative and quantitative risk analysis approaches were used to gather the risk identifications, and the fuzzy inference system method was also applied to analyze the risk factor in this paper. The findings revealed that among information security concerns, electronic data in a data theft threat has a high-risk outcome of 75.67%, and human resource management (HRM) in a social engineering threat has a low-risk impact of 26.67%. Thus, the high-probability risk factors need quick action, and the risk components with a high probability call for rapid corrective action. Finally, the root causes of such threats should be identified and controlled before experiencing detrimental effects. It's also important to note that primary interests and worldwide policies must be taken into consideration while examining information security in food processing industrial information systems.
The paper is devoted to improving the accuracy of digital sensors with a time lag. The relevance of the topic is due to the widespread use of sensors of this type, which is largely due to a sharp increase in the requirements for measurement accuracy. The timeliness is associated also with the extensive application of digital technologies for information processing in control systems, communications, monitoring and many others. To eliminate the errors caused by the time delay of digital sensors, it is suggested to use an astatic high-speed corrector. The applicability of this corrector is justified by the properties of discrete-time dynamical systems. In this regard, at first, the conditions are considered under which the discrete systems are physically realizable and have a finite duration of the transient since in this latter case they are the fastest. It is also shown that in order to measure a polynomial signal of limited intensity with zero error in steady-state mode, the astatism order of the sensor must be one value greater than the degree of this signal. Based on the above conditions, the main result of the article is proved – a theorem in which the conditions for the existence of the astatic high-speed corrector are established. When this corrector is switched on at the output of the digital sensor or when its software is being corrected an upgraded sensor is formed, the error of which will be zero in steady-state mode. This is due to the fact that the corrector eliminates the error of the digital sensor caused by its time delay, which is assumed to be multiple of the sampling period. The order of the corrector as a system is determined by the integer solution of the equation obtained in the work, which relates the degree of the measured polynomial signal, the time delay of the digital sensor, the permissible overshoot of the upgraded sensor and the relative order of the desired corrector. This equation is solved for the cases, where the degree of the measured signals is not greater than one, the overshoot is equal to the frequently assigned values, and the time delay does not exceed four sampling periods. The corresponding order of the upgraded sensor is given in tabular form. This makes it possible to find the required corrector without solving the shown equation in many cases. The effectiveness of the suggested approach with respect to improving the accuracy of digital sensors is shown by a numerical example. The zero error value of the upgraded sensor is confirmed both by computer simulation and numerical calculation. The results obtained can be used in the development of high-precision digital sensors of various physical quantities.
An increase in the number of cars is higher than rates of transport infrastructure development, resulting in a reduction of cargo and passenger transportation efficiency in city conditions. Simulation of flow irregularity in time (peak hour) shows the key role of a car motion interval as a factor of overcoming accumulation at average speed reduction in conditions of highly loaded roads. To reduce the effective time of driver reaction, defining the least distance between cars, it is necessary to minimize the influence of human factors. Automation of the process (unmanned control) requires an effective exchange of navigation and route data between traffic participants. A summary of requirements for such an information exchange system defines the priority of the suggested communication and navigation system (CNS) on the base of radio broadcast communication. Its application gives an opportunity to rise simultaneously traffic safety and efficiency. An increase in neighbor driver action predictability leads to traffic safety ensuring. The exchange of data with traffic control centers (TCC) enables the centralization of motion regulation. A distributed network of transceiver stations forms a local positioning system based on trilateration principles. Algorithms of onboard positioning result verification and automatic resolution of communication conflicts ensure high reliability of CNS functioning. Refusal from point-to-point communication principles allows it to operate even in conditions of high car density up to several thousand per square kilometer. In cooperation with advanced technologies of traffic organization (formation of city highway grid and “total green wave” mode), CNS and TCC are capable of rising the average speed in city conditions higher than 45 km/hour. The aggregate economy of expense on last mile transportation because of the suggested innovations is to be at the level of several GDP percent due to a decrease in accidents and congestion even without accounting for social and ecological effects.
The transportation system is one of the most important parts of the country's economy. At the same time, the growth in road traffic has a significant negative impact on the economic performance of the industry. One of the ways to increase the efficiency of using the transportation infrastructure is to manage traffic flows, incl. by controlling traffic signals at signalized intersections. One of the trends in the development of intelligent transportation systems is the creation of vehicular ad hoc networks that allow the exchange of information between vehicles and infrastructure, as well as the development of autonomous vehicles. As a result, it becomes possible to formulate the problem of cooperative control of vehicle trajectories and traffic signals to increase the capacity of intersections and reduce fuel consumption and travel time. This paper presents a method for managing traffic flow at an intersection, which consists of the cooperative control of traffic signals and trajectories of connected/autonomous vehicles. The developed method combines an algorithm for the adaptive control of traffic signals based on a deterministic model for predicting the movement of vehicles and a two-stage algorithm for constructing the trajectory of vehicles. The objective optimization function used to construct the optimal trajectories takes into account fuel consumption, travel time on the road lane, and waiting time at the intersection. Experimental studies of the developed method were carried out in the microscopic traffic simulation package SUMO using three simulation scenarios, including two synthetic scenarios and a scenario in a real urban environment. The results of experimental studies confirm the effectiveness of the developed method in terms of fuel consumption, travel time, and waiting time in comparison with the adaptive traffic signal control algorithm.
Pesticide consumption and environmental pollution in orchards can be greatly decreased by combining variable-rate spray treatments with proportional control systems. Nowadays, farmers can use variable-rate canopy spraying to apply weed killers only where they are required which provides environmental friendly and cost-effective crop protection chemicals. Moreover, restricting the use of pesticides as Plant Protection Products (PPP) while maintaining appropriate canopy deposition is a serious challenge. Additionally, automatic sprayers that adjust their application rates to the size and shape of orchard plantations has indicated a significant potential for reducing the use of pesticides. For the automatic spraying, the existing research used an Artificial Intelligence and Machine Learning. Also, spraying efficiency can be increased by lowering spray losses from ground deposition and off-target drift. Therefore, this study involves a thorough examination of the existing variable-rate spraying techniques in orchards. In addition to providing examples of their predictions and briefly addressing the influences on spraying parameters, it also presents various alternatives to avoiding pesticide overuse and explores their advantages and disadvantages.
The task of processing medical information is currently being solved in our country and abroad by means of heterogeneous medical information systems, mainly at the local and regional levels. The ever-increasing volume and complexity of the accumulated information, along with the need to ensure transparency and continuity in the processing of medical data (in particular, for bronchopulmonary diseases) in various organizations, requires the development of a new approach to integrating their heterogeneous sources. At the same time, an important requirement for solving the problem is the possibility of web-oriented implementation, which will make the corresponding applications available to a wide range of users without high requirements for their hardware and software capabilities. The paper considers an approach to the integration of heterogeneous sources of medical information, which is based on the principles of building microservice web architectures. Each data processing module can be used independently of other program modules, providing a universal entry point and the resulting data set in accordance with the accepted data schema. Sequential execution of processing steps implies the transfer of control to the corresponding program modules in the background according to the Cron principle. The schema declares two types of data schemas - local (from medical information systems) and global (for a single storage system), between which the corresponding display parameters are provided according to the principle of constructing XSLT tables. An important distinguishing feature of the proposed approach is the modernization of the medical information storage system, which consists in creating mirror copies of the main server with periodic replication of the relevant information. At the same time, the interaction between clients and data storage servers is carried out according to the type of content delivery systems with the creation of a connection session between end points based on the principle of the nearest distance between them, calculated using the haversine formula. The computational experiments carried out on test data on bronchopulmonary diseases showed the effectiveness of the proposed approach both for loading data and for obtaining them by individual users and software systems. Overall, the reactivity score of the corresponding web-based applications was improved by 40% on a stable connection.
The article is devoted to the study of one of the current scenarios for the development of population processes in contemporary ecological systems. Biological invasions have become extremely common due to climate change, economic activities to improve ecosystem productivity, and random events. The invader does not always smoothly occupy an ecological niche, as in logistic models. The dynamics of the situations we have chosen after the introduction of an alien species is extremely diverse. In some cases, the phenomenon of an outbreak of abundance is quickly realized up to the beginning of the destruction by the species of its new range. The development of the situation in the process of invasion depends on the superposition of biotic and abiotic factors. The dynamics of the abundance of the invader is affected by the favorable conditions and, to a greater extent, by the possibility of realizing the reproductive potential and the resistance of the biotic environment. Counteraction develops with a delay and manifests itself when the invader reaches a significant number. In the work, a continuous model of the invasive process with a sharp transition to a state of population depression has been developed. The stage of the population crisis ends with the transition to equilibrium, since the resistance in the model scenario depends adaptively and in a threshold way on the number. The problem of computational description of a scenario with active but delayed environmental resistance is practically relevant for situations of developing measures of artificial resistance to an undesirable invader. In the solution of our model, there is a mode of prolonged stable fluctuations after exiting the depression stage.
An approach to the technical diagnostics of complex technical systems based on the results of telemetry information processing by an external monitoring and diagnostics system using hybrid network structures is proposed. The principle of constructing diagnostic complexes of complex technical systems is considered, which ensures the automation of the technical diagnostics process and is based on the use of models in the form of hybrid network structures for processing telemetric information, including multilayer neural networks and discrete Bayesian networks with stochastic learning. A model of changes in the parameters of complex technical systems technical state based on multilayer neural networks has been developed, which makes it possible to form a probabilistic assessment of attributing the current situation of complex technical system functioning to the set of functions considered situations according to individual telemetry parameters, and multilevel hierarchical model of complex technical systems technical diagnostics based on a discrete Bayesian network with stochastic learning, which allows aggregating the information received from neural network models and recognizing the current situation of complex technical system functioning. In the conditions of functioning emergencies of the complex technical system, according to the results of processing telemetric information, faulty functional units are localized and an explanation of the cause of the emergency is formed. The stages of complex technical systems technical diagnostics implementation using the proposed hybrid network structures in the processing of telemetric information are detailed. An example of using the developed approach to solving problems of spacecraft onboard system technical diagnostics is presented. The advantages of the proposed approach to the technical diagnostics of complex technical systems in comparison with the traditional approach based on analysis of telemetry parameters values belonging to the given tolerances are shown.
The study describes a collaborative robot (cobot) as one of the types of intelligent robotics and its distinctive features compared to other types of robots. The paper presents a collaborative robotic system as a single complex system in which actors of different types – cobots and human workers – perform collaborative actions to achieve a common goal. Elements of a collaborative robotic system, as well as processes and entities that directly influence it are represented. The key principles of Human-Robot Collaboration are described. A collaborative robotic system is analyzed both as a multi-agent system and as a mixed team, whose members are heterogeneous actors.
The relevance of the work lies in a weak level of research on issues of formation of mixed teams of people and cobots and distribution of tasks in such teams, taking into account features of these two types of participants and requirements of their safe collaboration. This work focused on a formation of mixed teams of elements of a single complex human-cobot system, the distribution of tasks among the members of such teams, taking into account the need to minimize costs for its participants and the heterogeneity of the team. As part of the study, the problem of forming a mixed heterogeneous team of people and cobots, and distribution of work among its members, as well as the corresponding mathematical description are presented. Specific cases of the problem, including different cost functions of different types of participants, a limited activity of the team’s members, the dependence of the cost function of the participants of one type on the number of participants of another type, as well as an arbitrary number of works assigned to the team’s members are considered.
This paper deals with the problem of bringing the end effector (grip center) of an underwater vehicle anthropomorphic manipulator to a predetermined position in a given time using the terminal state method. A dynamic model with the account of joint drives dynamics is formulated on the basis of obtained kinematic model constructed by using the Denavit-Hartenberg method (DH model). The DH model is used in a terminal nonlinear criterion that displays estimate of the proximity of the effector's orientation and position to the specified values. The dynamic model is adapted for effective application of the author's terminal state method (TSM) so that it forms a system of differential equations for the rotation angles of manipulator links around the longitudinal and transverse axes, having only desired TSM-controls in the right parts. The converted model provides simplifications of controls calculation by eliminating the numerical solution of special differential equations, that is needed in the case of using in TSM nonlinear dynamic models in general form. The found TSM-controls are further used in expressions for control actions on joints electric drives obtained on the basis of electric drives dynamic models. Unknown drives parameters as functions of links rotation angles or other unknown factors, are proposed to be determined experimentally. Such two-step procedure allowed to get drive control in the form of algebraic and transcendental expressions. Finally, by applying the developed software, simulation results of the manipulator end effector moving to the specified positions on the edge of the working area are presented. The resulting error (without accounting measurement error) does not exceed 2 centimeters at the 1.2 meters distance by arm reaching maximum of length ability. The work was performed under the Federal program of developing a robotic device for underwater research in shallow depths (up to 10 meters).
An implementation of methods for protecting unmanned aerial vehicles (UAVs) from spoofing attacks of the global positioning system (GPS) to ensure safe navigation is discussed in this paper. The Global Navigation Satellite System (GNSS) is widely used to locate UAVs and is by far the most popular navigation solution. This is due to the simplicity and relatively low cost of this technology, as well as the accuracy of the transmitted coordinates. However, there are many security threats to GPS navigation. Primarily this is due to the nature of the GPS signal, the signal is transmitted in the clear, so an attacker can block or tamper with it. This study analyzes the existing GPS protection methods. As part of the study, an experimental stand and scenarios of attacks on the UAV GPS system were developed. Data from the UAV flight logbook was collected and an analysis of cyber-physical parameters was carried out to see an effect of the attack on the on-board sensors readings. Based on this, a new method for detecting UAV anomalies was proposed, based on an analysis of changes in UAV internal parameters. This self-diagnosis method allows the UAV to independently assess the presence of changes in its subsystems and identify signs of a cyberattack. To detect an attack, the UAV collects data on changes in cyber-physical parameters over a certain period of time, then updates this data. As a result it is necessary for the UAV to determine the degree of difference between the two time series of the collected data. The greater the degree of difference between the updated data and the previous ones, the more likely the UAV is under attack.
Analysis of the application of smart home technology indicates an insufficient level of controllability of its infrastructure, which leads to excessive consumption of energy and information resources. The problem of managing the digital infrastructure of human living space, is associated with a large number of highly specialized solutions for home automation, which complicate the management process. Smart home is considered as a set of independent cyber-physical devices aimed at achieving its goal. For coordinated work of cyber-physical devices it is proposed to provide their joint work through a single information center. Simulation of device operation modes in a digital environment preserves the resource of physical devices by making a virtual calculation for all possible variants of interaction of devices between themselves and the physical environment. A methodology for controlling the microclimate of a smart home using an ensemble of fuzzy artificial neural networks is developed, with the example of joint use of air conditioning, ventilation and heating. The neural network algorithm allows you to monitor the parameters of the physical environment, predict the modes of cyber-physical devices and generate control signals for each of them, ensuring the joint operation of devices with minimal resource consumption and information traffic. A variant of practical implementation of a smart home climate control system on the example of a multifunctional educational computer class is proposed. Hybrid neural networks of air conditioning, ventilation and heating systems were developed. The testing of the microclimate control system of a multifunctional university classroom using hybrid neural networks was carried out, a programmable logic controller of domestic production was used as a control device. The goal of management based on cooperating cyber-physical devices is to achieve a minimum of power and information traffic when they work together.
The article provides a comprehensive description of information technologies of digital adaptive medicine. The emphasis is on the applicability to the development of specialized automated complexes, software models and systems for studying the adaptive capabilities of a person to environmental conditions. Requirements for information technologies to enhance these capabilities are formulated. The features of information technologies are reflected in relation to the implementation of applied systemic studies of life support, preservation of professional health and prolongation of human longevity.
Six basic concepts of adaptive medicine with an emphasis on the features of the mathematical support for information processing are characterized, priorities for improving information technologies used in these concepts are determined.
The information technologies used in the tasks of ensuring the professional performance of a person with an emphasis on the need to use adequate methods for diagnosing the state of a person at all stages of professional activity and the need to develop technologies for digital twins that adequately simulate the adaptation processes and reactions of the body in real conditions are considered.
The characteristics of information technologies for personalized monitoring of health risks are given, which make it possible to objectify the effects of physical factors of the conditions of activity and to implement individual and collective informing of personnel about environmental hazards.
The urgent need to standardize information processing methods in the development of information technologies for digital adaptive medicine in the interests of ensuring physiological adequacy and mathematical correctness of approaches to obtaining and processing information about a person's state is shown.
It is concluded that the priorities for improving information technologies of digital adaptive medicine are associated with the implementation of the achievements of the fourth industrial revolution, including the concept of sociocyberphysical systems.
The current state with the solution of the problem complex planning of the execution of task packets in multistage system is characterized by the absence of universal methods of forming decisions on the composition of packets, the presence of restrictions on the dimension of the problem and the impossibility of guaranteed obtaining effective solutions for various values of its input parameters, as well the impossibility of registration the condition of the formation of sets from the results. The solution of the task of planning the execution of task packets in multistage systems with the formation of sets of results within the specified deadlines has been realized of authors in article. To solve the planning problem, the generalized function of the system was decomposed into a set of hierarchically interrelated subfunctions. The use of decomposition made it possible to use a hierarchical approach for planning the execution of task packets in multistage systems, which involves defining solutions based on the composition of packets at the top level of the hierarchy and scheduling the execution of packages at the bottom level of the hierarchy. The theory of hierarchical games is used to optimize solutions for the compositions of task packets and schedules for their execution is built, which is a system of criteria at the decision-making levels. Evaluation of the effectiveness of decisions by the composition of packets at the top level of the hierarchy is ensured by the distribution of the results of task execution by packets in accordance with the formed schedule. To evaluate the effectiveness of decisions on the composition of packets, method for ordering the identifiers of the types of sets with registration of the deadlines and a method for distributing the results of the tasks performed by packets has been formulated, which calculates the moments of completion of the formation of sets and delays with their formation relative to the specified deadlines. The studies of planning the process of the executing task packages in multistage systems have been carried out, provided that the sets are formed within specified deadlines. On their basis, conclusions, regarding the dependence of the planning efficiency from the input parameters of the problem, were formulated.
One of the solutions to the problem of spatio-temporal data anisotropy is the use of a multilevel system of digital twins based on the corresponding industry models and the updated archive data base. The application of this approach has successfully proved itself in information systems for monitoring the parameters of the geomagnetic field and its variations, providing spatio-temporal interpolation of geomagnetic data with an accuracy of 0.81 nT in magnetically quiet periods. At the same time, the problem of information interaction between the levels of the system of digital twins remained unresolved, which is greatly aggravated by the constantly growing volume of data and their heterogeneous nature. The paper proposes a solution to the indicated problem by means of a formalized mechanism for packaging space-time information, in which the identification of data sources is performed on the basis of a hierarchical binary tokenization system. In addition, the proposed software implementation of such an approach is considered, a distinctive feature of which is the combination of traditional clientserver and innovative serverless architectures to implement a highly loaded reactive web application for working with analyzed data. The main stages of the implementation of information interaction are highlighted and programmatically formalized - from obtaining initial information from its sources to verifying data, analyzing them, processing and forming the output information flow of the system. The results of the computational experiments carried out on the example of the problem of monitoring the parameters of the Earth's magnetic field and its variations confirmed the effectiveness of the proposed solutions, expressed both in increasing the reactivity of web-based applications and in increasing the computational speed of formation and filling of information storages that aggregate information from distributed heterogeneous sources.
The paper proposes a method for fusioning multi-angle images implementing the algorithm for quasi-optimal clustering of pixels to the original images of the land surface. The original multi-angle images formed by the onboard equipment of multi-positional location systems are docked into a single composite image and, using a high-speed algorithm for quasi-optimal pixel clustering, are reduced to several colors while maintaining characteristic boundaries. A feature of the algorithm of quasi-optimal pixel clustering is the generation of a series of partitions with gradually increasing detail due to a variable number of clusters. This feature allows you to choose an appropriate partition of a pair of docked images from the generated series. The search for reference points of the isolated contours is performed on a pair of images from the selected partition of the docked image. A functional transformation is determined for these points. And after it has been applied to the original images, the degree of correlation of the fused image is estimated. Both the position of the reference points of the contour and the desired functional transformation itself are refined until the evaluation of the fusion quality is acceptable. The type of functional transformation is selected according to the images reduced in color, which later is applied to the original images. This process is repeated for clustered images with greater detail in the event that the assessment of the fusion quality is not acceptable. The purpose of present study is to develop a method that allows synthesizing fused image of the land surface from heteromorphic and heterogeneous images. The paper presents the following features of the fusing method. The first feature is the processing of a single composite image from a pair of docked source images by the pixel clustering algorithm, what makes it possible to isolate the same areas in its different parts in a similar way. The second feature consists in determining the functional transformation by the isolated reference points of the contour on the processed pair of clustered images, which is later applied to the original images to combine them. The paper presents the results on the synthesis of a fused image both from homogeneous (optical) images and from heterogeneous (radar and optical) images. A distinctive feature of the developed method is to improve the quality of synthesis, increase the accuracy and information content of the final fused image of the land surface.
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, the security of application layer protocols is of paramount importance, as these protocols are the basis for interaction between applications and services running on different devices, as well as in cloud infrastructures. With the constant interaction of the systems under study with the real physical infrastructure, the challenge is to determine effective measures to ensure the integrity of the transferred control commands, as disruption of the performed critical processes can affect human life and health. The paper provides an analytical review of the main methods of data integrity assurance in management protocol of cyberphysical systems, as well as an overview of application layer protocols vulnerabilities widely used in cyberphysical systems of different types. Classical methods of data integrity assurance, new methods, in particular, blockchain, as well as the main directions of increasing the efficiency of data integrity protocols in cyberphysical systems are considered. Analysis of application layer vulnerabilities is carried out on the example of the most popular MQTT, CoAP, AMQP, DDS, XMPP specifications and their implementations. It is established that despite the presence of basic security mechanisms in all these protocols, researchers continue to regularly identify vulnerabilities in popular implementations, that often endangers critical infrastructure services. In the course of preparing the review of the existing methods of data integrity assurance for the examined class of systems, the key problems of these methods integration and ways of their solution were defined.
This paper is an analysis and systematization of modern research in the field of cyber-physical system information security. The problematic issues of information security of such systems are considered: «what is being attacked?», «who is attacking?», «why is someone attacking?», «how is someone attacking?» and «how to protect the system?». As an answer to the first question, the paper proposes a definition and classification of cyber-physical systems according to such criteria as complexity, connectivity, criticality and social aspect. As an answer to the second and the third questions, the paper describes a classification of attacker according to such criteria as type of access, method of access, intentions, knowledge and resources. As an answer to the fourth question, the paper contains a classification of attack actions according to such criteria as subject and object, method of influence, prerequisites and consequences. As an answer to the fifth question, the paper proposes a classification of protection methods and security tools according to such criteria as principle of operation, object of protection and task to be solved. The scientific significance of the paper is systematization of a current state of the art in the subject area. The practical value of the paper is providing information about security issues that are specific to cyber-physical systems, which will allow one to develop, manage and use such systems in a more secure way.
The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle.
The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique.
Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.
A phase enlargement of semi-Markov systems that does not require determining stationary distribution of the embedded Markov chain is considered. Phase enlargement is an equivalent replacement of a semi-Markov system with a common phase state space by a system with a discrete state space. Finding the stationary distribution of an embedded Markov chain for a system with a continuous phase state space is one of the most time-consuming and not always solvable stage, since in some cases it leads to a solution of integral equations with kernels containing sum and difference of variables.
For such equations there is only a particular solution and there are no general solutions to date. For this purpose a lemma on a type of a distribution function of the difference of two random variables, provided that the first variable is greater than the subtracted variable, is used.
It is shown that the type of the distribution function of difference of two random variables under the indicated condition depends on one constant, which is determined by a numerical method of solving the equation presented in the lemma.
Based on the lemma, a theorem on the difference of a random variable and a complicated recovery flow is built up. The use of this method is demonstrated by the example of modeling a technical system consisting of two series-connected process cells, provided that both cells cannot fail simultaneously. The distribution functions of the system residence times in enlarged states, as well as in a subset of working and non-working states, are determined. The simulation results are compared by the considered and classical method proposed by V. Korolyuk, showed the complete coincidence of the sought quantities.
Studying the Internet its structure is usually divided into levels: Autonomous Systems Level (AS), Point of Presence Level (PoP), Router Level, etc. The global network can be represented on each of them as a graph based on the initial data obtained from open sources. Consideration of a network within the framework of a separate level facilitates analysis, but does not allow to systematically assess its structural properties when providing the connectivity between several segments of the network related, particularly, to the objects of critical information infrastructure. To overcome this contradiction, a mathematical model of the global network in the form of a metagraph was developed at the interface between AS-level and PoP-level that takes into account the characteristics of each level and allows to find bottlenecks both in the interdomain routing system and in the topology of internal networks of Internet providers.
Based on the proposed model some structural phenomena of the global network are described: stub, multihomed and transit autonomous systems, content providers. Taking into account available data from open sources about Internet structure, a method for constructing a metagraph is proposed. A comparative analysis of tools that automate the process of analyzing a network model is carried out. The practice-oriented problems of finding a cutting subset in a metagraph were set. Certain areas of further research are software implementation of the models using module MGtoolkit in Python and the assessment of structural phenomena of Russian segments of the Internet.
The paper deals with issues related to optimizing the ballistic structure of a satellite system for remote sensing of the Earth. Approaches to the ballistic design of the satellite system, previously developed by specialists from various scientific schools, were focused on maintaining the structural stability of the system by deploying groupings with the same geometry and with the same inclinations, which ensured the same age-old departures of elements from all the orbits. At the same time, there is a whole range of tasks that require the formation of a satellite system in different orbits. To achieve the required level of stability of a new cluster of orbital structures we provide an approach, including: heuristic formation of many target different height orbits; identifying some basic near-circular orbit; selection of possible variants of iterative quasi-synchronous orbits; coordination of the composition of the vector of characteristics of traffic conditions and final calculation of an acceptable option that provides the specified accuracy of the route closure cycle.
Testing of the proposed approach is carried out on the example of determining the parameters of orbits that ensures equality of effective days in a given range of heights. The method of selecting the degree of consideration of various physical factors of the space environment, which ensures the achievement of identical deviations of the forecast trajectory from the reference one, is presented. The characteristics of the mathematical model of quasi-synchronous orbit motion used in forecasting are calculated from the condition of stability at a given time interval. To get the appropriate estimates, we use corrections to the orbit parameters given from the Greenwich coordinate system.
A detailed algorithm is described that provides the possibility of unambiguously determining the characteristics of a stable structure, in the implementation of which the transition from the solution of a normal system of equations to the solution of two triangular systems is performed.
The analysis of the subject area has shown that the proposed approach is new, and the solved scientific problem belongs to the class of inverse problems of space cybernetics.
The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered.
An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services.
A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.
The problem of a priory control of potential degeneration of continuous multichannel dynamic systems is considered in the paper. Degeneracy is a property of a system describing operability of a multichannel dynamic system together with the basic properties of stability, reliability and invariance to the changing conditions. An assessment of potential generation of a system and its configuration together with the interconnections and polynomial exogenous signal is proposed. Degeneration process of a multichannel dynamic systems is a process of the rank reducing of the linear operator of the system. This statement is a basic concept of the degeneration factors approach. Algebraic properties of the matrix of the system’s operator is considered, and the matrix is named as the criterion matrix. Degeneration factor is calculated with the singular values of the criterion matrix. The global degeneration factor is conditional number of the criterion matrix of a system. In contrast to previous solutions it is proposed to form the criterion matrix of a system with the resolvent of its state matrix. Deparameterization of the linear algebraic problem is realized by additive decomposition of the output vector of the system by derivatives of the exogenous signal, and the steady-state mode of the system is considered. The procedure of a priori estimation of degeneration of continuous multichannel dynamic systems is proposed. The ways to achieve the required value of degeneration of the criterion matrix of the system with the modal control methods are discussed. The paper is supported with examples.
A widespread use of multi-user interfaces, due to multimodality of traditional interpersonal communication, a transition to a polymerized presentation of information and systems, has allowed the creation of new approaches to their implementation based on distributed terminal systems. An approach to the synthesis of topological structures of such systems implemented in two stages is proposed in the article. The first stage determines a minimum set of communication nodes and their location based on the requirements for the availability of communication nodes for various categories of users and the globality of a distributed terminal system. The second stage determines options for constructing communication nodes and connections between them, which ensure the performance of audio monitoring functions of users of local information spaces while ensuring continuity of a bridge for different categories of users. A model example of the synthesis of a distributed terminal system for audio monitoring of two categories of users (adults and children) in the local information space (home), voice control subsystems of the "smart home" is presented. As a part of its solution, at each stage of the synthesis, the initial data are determined, a formal formulation of the synthesis problem is carried out, an algorithm for the solution and the results are presented. So the task of the first stage of the synthesis is a linear integer mathematical programming problem, solved in the model example by the simplex method, the solution of the second stage problem is based on the alternative graph formalization and the method of "branches and borders". The obtained results clearly demonstrate the capabilities of the proposed scientific and methodological tools for the synthesis of the topological structure of distributed terminal systems and the prospects of its use in the newly arising tasks of the technical implementation of new infocommunication technologies and services.
Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.
An approach is proposed to assess the quality of stationary Markov models without absorbing states on the basis of a measure of statistical stability: the description is formulated and its properties are determined. It is shown that the estimates of statistical stability of models were raised by different authors, either as a methodological aspect of the model quality, or within the framework of other model properties. When solving practical problems of simulation, for example, based on Markov models, there is a pronounced problem of ensuring the dimension of the required samples. On the basis of the introduced formulations, a constructive approach to solving the problems of sample size optimization and statistical volatility analysis of the Markov model to the emerging anomalies with restrictions on the accuracy of the results is proposed, which ensures the required reliability and the exclusion of non-functional redundancy.
To analyze the type of transitions in the transition matrix, a measure of its divergence (normalized and centered) is introduced. This measure does not have the completeness of the description and is used as an illustrative characteristic of the models of a certain property. The estimation of the divergence of transition matrices can be useful in the study of models with high sensitivity of detection of the studied properties of objects. The key stages of the approach associated with the study of quasi-homogeneous models are formulated.
Quantitative estimates of statistical stability and statistical volatility of the model are proposed on the example of modeling a real technical object with failures, recovery and prevention. The effectiveness of the proposed approaches in solving the problem of statistical stability analysis in the problems of qualimetric analysis of quasi-homogeneous models of complex systems is shown. On the basis of the offered constructive approach the operational tool of decision-making on parametric and functional adjustment of difficult technical objects on long-term and short-term prospects is received.
The design problem of control systems for nonlinear plants with differentiated nonlinearity is considered. The urgency of this problem is caused by the big difficulties of practical design of nonlinear control systems with the help of the majority of known methods. In many cases, even provision by these methods of just stability of equilibrium point of a designing system represents a big challenge. Distinctive feature of the method of nonlinear control systems design considered below is the use of the nonlinear plants models represented in a quasilinear form. This form of the nonlinear differential equations exists, if nonlinearities in their right parts are differentiated across all arguments. The quasilinear model of the controlled plant allows reducing the design problem to the solution of an algebraic equations system, which has the unique solution if the plant is controlled according to the controllability condition provided in the article. This condition is similar to the controllability condition of the Kalman’s criterion. Procedure of the nonlinear control systems design on a basis of the plant’s quasilinear models is very simple. Practically, it is close to the known polynomial method of the linear control systems design. The equations of the nonlinear systems designed with application of the plant’s quasilinear models also can be represented in the quasilinear form.
The basic result of this article is the proof of the theorem and the corollary from it about conditions of the asymptotical stability at whole of the equilibrium point of the nonlinear control systems designed on a basis of the plant’s quasilinear models. For the proof of the theorem and consequence, the properties of simple matrixes and known theorems of stability of the indignant systems of the differential equations are used. A way of the stability research of the equilibrium point of the quasilinear control systems based on the proved theorem is illustrated by numerical examples. Computer simulation of these systems verifies correctness of the hypoyhesis of the proved theorem.
Obtained results allow applying the method of nonlinear systems design on a basis of the quasilinear models for creation of various control systems for plants in power, aviation, space, robotechnical and other industries.
A frequent problem of traffic flow characteristics acquisition is data loss, which leads to uneven time series analysis. An effective approach to uneven data analysis is the spectral analysis, which requires obtaining process with a constant sampling interval, for example, by restoring missing data, which leads to the appearance of dating error. Thus, the main purpose of this study is to develop a method and software for wavelet analysis of traffic flow characteristics without restoring the missing data.
To analyze and interpret non-stationary uneven time series obtained from traffic monitoring systems, we propose the wavelet transformation method with adjustment of the sampling intervals, which results in a time-frequency domain with a constant sampling interval. Wavelet analysis is applied to the macroscopic traffic flow characteristics.
We developed the software for traffic flow wavelet analysis on the "ITSGIS" intelligent transport geo-information framework using the attribute-oriented approach.
Wavelet analysis of traffic flows characteristics using Morlet wavelets was accomplished for data analysis of the city of Aarhus, Denmark. Wavelet spectra and scalograms were constructed and analyzed, general dependencies in the frequency distribution of extremes, and differences in spectral power were revealed.
The developed software is being experimentally tested in solving practical problems of municipalities and road agencies in Russia.
The security of two recently proposed symmetric homomorphic encryption schemes based on residue system is analyzed.
Both schemes have a high computational efficiency since using residue system naturally allows parallelizing computations. So they could be good candidates to protect the data in clouds. But to the best of our knowledge there is a lack of security analysis for these encryption schemes.
It should be noted that the first cryptosystem under our consideration was already considered in literature.
The sketch of adaptive chosen-plaintext attack was proposed and estimation of its success was given.
In this paper the attack is analyzed and it is shown that in some cases it may work incorrectly. Also more general algorithm of known-plaintext attack is presented. Theoretical estimations of probability to recover the key using it and practical estimations of this probability obtained during the experiments are provided.
The security of the second cryptosystem has not been analyzed yet and we fill this gap for known-plaintext attack. The dependency between the number of «plaintext, ciphertext» pairs required to recover the key and parameters of the cryptosystem is analyzed. Also some recommendations for increasing the security level are provided.
The final conclusion of our analysis is that both cryptosystems are vulnerable to known-plaintext attack. And it may be dangerous to encrypt private data using them.
Finally it should be noted that the key element of the proposed attacks is the algorithm of computing the greatest common divisor. So their computational complexity depends polynomially on the size of input data.
Mathematical models of the Earth system and its components represent one of the most powerful and effective instruments applied to explore the Earth system's behaviour in the past and present, and to predict its future state considering external influence. These models are critically reliant on a large number of various observations (in situ and remotely sensed) since the prediction accuracy is determined by, amongst other things, the accuracy of the initial state of the system in question, which, in turn, is defined by observational data provided by many different instrument types. The development of an observing network is very costly, hence the estimation of the effectiveness of existing observation network and the design of a prospective one, is very important. The objectives of this paper are (1) to present the adjoint-based approach that allows us to estimate the impact of various observations on the accuracy of prediction of the Earth system and its components, and (2) to illustrate the application of this approach to two coupled low-order chaotic dynamical systems and to the ACCESS (Australian Community Climate and Earth System Simulator) global model used operationally in the Australian Bureau of Meteorology. The results of numerical experiments show that by using the adjoint-based method it is possible to rank the observations by the degree of their importance and also to estimate the influence of target observations on the quality of predictions.
The article deals with a tracking control system synthesis for a nonlinear plant functioning under bounded external disturbances which are not available for measurement. A proposed solution is a robust modification of the backstepping approach with the similar controller design structure. The main changes are based on plant model transformations that make it possible to use the only one filer in control system and, along with it, an auxiliary loop method usage to disturbances evaluation and compensation. High-gain observers are used for unknown signals measuring together with their derivatives. Tracking errors and observation errors convergence with the adjustable accuracy during the finite transient time is proved. Efficiency of the algorithm is demonstrated using computer modeling in comparison with an analogue.
This work is devoted to the rational choice of formation parameters for the masking noise and structural interference and their combined use for the protection of confidential information against leaks in the stray electromagnetic radiations channel of the displaying units using the DVI standard.
The work describes the simulation features of the influence of the interferences formed by the active jamming system on the quasioptimum receiver which serves as a tool for the interception. The principles of the pulse components formation in the stray electromagnetic radiations from displays based on the DVI standard-based video data transfer and specific pulse components of structural interference are presented. Noted that mode information output to the monitor screen have the broadband and repetitive stray electromagnetic radiations matching on frequency of the frame scan devices video path.
The indicator is set for the estimation of effectiveness of structural interference in the solution of the data protection problem from leakage through the channel of stray electromagnetic radiations – variations of the wrong color recognition probability in the block of graphic information. A detailed description is given for the dependences of the effectiveness indicator of structural interference on a number of frames of an image, accumulated in the technical tool for the interception of stray electromagnetic radiations, as well as for signal/noise to amplitude relation at the input of the technical interception tool.
On the basis of the simulation results we have evaluated the effectiveness of applying structural interference on active noise systems. Identified the feasibility of using structural interference with the protection of confidential information from leaking through the channel stray electromagnetic radiations means of information display the DVI standard. The advantages of decreased total output and power consumption by the active jamming devices are shown in comparison with the masking noise and traditional jamming methods.
The article discusses methodological bases for the organizational and technological control (OTC) of the protection of an information resource (PIR) of electronic document management systems (EDMS) based on software (SW) of information security. The authors developed a conceptual model of control of PIR of EDMS on the basis of conceptual study of the aspects of the formation of OTC PIR EDMS methodology on the basis of the SW of PIR, which has ample opportunities to be used for developing methods of administrative tasks solution. The paper presents a technique for efficiency management of functioning of the information resource protection subsystem (IRPS) in EDMS, assuming optimization of the subsystem controlled parameters that maximize an integral index of efficiency of IRPS functioning and respectively execution of requirements imposed to the subsystem. The algorithm for determining best values of the IRPS controlled parameters and best value of an integral index of efficiency of the subsystem, providing a possibility of creating specific subsystems of IRPS automated management efficiency in EDMS, is given. Results of calculations for a research of an index of temporal non-conflictness of IRPS functioning are analyzed.
The paper presents a solution to the problem of information interaction between embedded computing devices in the implementation of distributed control in the information-measuring and control system (IMCS) of robots with modular architecture. Distributed control is realized by designing each module as a device with its own IMCS containing all the components necessary to perform its functionality, including computing devices. As a consequence of such a functional completion of the modules, the computations needed to control the robot as a single mechatronic system are parallelized. As a result, the requirements to the power of computing devices of modules’ IMCS are significantly reduced, as it is possible to use inexpensive microcontrollers and single-board computers – embedded computing devices.
The network organization of the IMCS structure of the robot is proposed, which allowed the transfer of the reconfigurability property of the network to the structure of the modular robot. Analysis of various network topologies has shown that the topology of the "star" type has several advantages over the topology of the "bus" type for use in heterogeneous modular robots.
It is shown that the use of the Robot Operating System (ROS) for the implementation of information interaction between embedded computing devices is either impossible or significantly hampered. A specification is proposed for the creation of appropriate programming interfaces and a language for inter-module communication, which enable the inclusion of third-party modules in the plug and play mode. The specification is based on the principles of ROS, but allows one to implement software on embedded computing devices. On the basis of Pareto's multi-criteria optimization, recommendations were obtained for selecting the appropriate hardware and software.
The efficiency of the proposed solution was proved in the course of experiments on an installation whose composition is close to the working conditions of the IMCS of a heterogeneous modular robot. The experiments showed that the joint operation of the software and hardware parts meets all the specified requirements and is applicable for the transmission of messages of the executive level with a frequency of up to 100 Hz under any load on the network.
In this paper a comprehensive architecture for emotional and affective process in a virtual agent is presented . By fusing video, audio and text emotion of the users as affective sources to the system, the virtual agent can appraise the mood of clients. To emulate the influence of the human hormones in the virtual agent, the proposed system employs Artificial Endocrine System (AES) in the aspects of moods and biological needs, by controlling the concentration level of the influential hormones. The agent affective processor engages AES, personality and mood modules to manage the internal state. Intelligent virtual agent would interact with clients according to its affective state circumstances.
The proposed system presents a complete platform to capture emotional channels through the network to analyze and process them in an affective engine in order to determine the emotional quality of the response.
The article describes a tool software complex allowing to build, execute and integrate simulation models of the space systems’ onboard equipment functioning. It is based on a reuse technology defined by the international Simulation Model Portability (SMP2) standard. Along with the standard rules for building integrable models, we have designed additional original tools of information-graphical and intellectual modeling. In this way, we provide graphical construction of onboard systems’ architecture models, set the methods of model function and determine the options of command execution by onboard equipment.
This work is part of creation of software for the problem-oriented simulation modeling infrastructure in space industry. This software complex will allow designers not only to build their own onboard systems’ models, but also to unite simulators of the equipment produced by different companies and to make simulation tests for preparation and analysis of technical projects. Our approach provides economic and technological advantages for space industry’s knowledge-intensive production development.
On the basis of research carried out on automated control systems for industrial enterprises (ICS), the work proposes a mathematical model for the authentication of personnel using the technology of generation and processing of a heterogeneous stream containing photographic identification signs of personnel from video surveillance sources in the traffic of video data. A distinctive feature of the model are navigation operators and outputs to signal processing according to aggregate stream video management, allocation of frame-inserts bearing photographic identification signs, segmentation of space images required for authentication of staff in integrated access control system, as well as the use of technologies to restore the video stream. A technique for identifying frames-inserts in heterogeneous video stream has been developed, which is based on the estimation of total differential extreme brightness of frame-folds and an analysis of the histograms of image frames according to the correlation coefficients and polynomials of Chebyshevskii approximation. This technique uses dynamic threshold for authentication of frames and making a decision about their class on the basis of a majority method of data processing. The paper presents the results of simulation of the process of personnel authentication on the basis of the proposed model and methodologies, allowing one to estimate efficiency of visual personnel authentication, meeting the requirements of the reliability of decision making and limiting the transmission capacity of the data network.
The paper presents an analysis of the current state of research into the problems of the control of the asteroid hazard, which has shown the need to create a multilevel system for hitting asteroids. Mathematical models and characteristics of the near-moon system of damage to asteroids are developed and investigated. For a basic system consisting of a single interceptor spacecraft (ISC), estimates of the probabilities of asteroids are given, on the basis of which conclusions are made about the potential effectiveness of this system, and the main directions for further research are indicated. An original dynamic model for planning the application of the near-moon system of hitting asteroids by the ISC group is proposed. Approaches to the solution of problems of modeling and planning the application of this group based on the combined use of the mathematical apparatus of the modern theory of optimal control and operations research are analyzed and substantiated. The analysis also showed that the model-algorithmic support, developed for the present time, can be used not only for the near-moon but also for other levels of the proposed system for protecting the Earth from asteroids.
It is proposed to empower the intelligent system with an ability of the abductive generation of new knowledge based on conclusions by analogy. With such an ability it could be trained on precedents, taking place in different areas, transferring knowledge about the phenomena observed in one subject area to another. It is important that, on the basis of the task to be solved, the establishment of analogies can be carried out by means of finding similar structures, invariant properties and akin actions in the multi-model conceptual and ontological knowledge system. Establishing semantic similarity of the observed specifications and the ones generated by an intelligent system is based on the ability of the Giromat in general case to perform the transition from the approximating concepts that belong to the same problem domain (context), through the approximated ones (more general, abstract), to approximating as well, but belonging to a different problem domain (context).
The article discusses the design of an expert system and a control algorithm of a quasistatic gait of an exoskeleton, which guarantees the stability of the device in the vertical position, on the basis of which mathematical modelling of the object’s motion is carried out. In this work we present an analytical scheme of the device in the form of an eleven-link mechanism, whose links are connected with each other by single-coordinate hinges, which describes the exoskeleton’s motion in two planes: sagittal and frontal. The position of the center of mass, whose coordinates change depending on the position of the legs and body, has been determined. We have developed logical rules that form the expert system and ensure a stable gait of the exoskeleton by placing the center of mass inside the support polygon. Results of numerical modelling of the system step in a specially designed virtual simulator have been obtained.
This paper is devoted to feature selection and evaluation in an automatic text-independent speaker verification task. In order to solve this problem a speaker verification system based on the Gaussian mixture model and the universal background model (GMM-UBM system) was used.
The application sphere and challenges of modern systems of automatic speaker identification were considered. Overview of the modern speaker recognition methods and main speech features used in speaker identification is provided. Features extraction process used in this article was examined. Reviewed speech features were used for speaker verification including mel-cepstral coefficients (MFCC), line spectral pairs (LSP), perceptual linear prediction cepstral coefficients (PLP), short-term energy, formant frequencies, fundamental frequency, voicing probability, zero crossing rate (ZCR), jitter and shimmer.
The experimental evaluation of the GMM-UBM system using different speech features was conducted on a 50 speaker set and a result is presented. Feature selection was done using the genetic algorithm and the greedy adding and deleting algorithm.
Equal error rate (EER) equals 0,579 % when using 256 component Gaussian mixture model and the obtained feature vector. Comparing to standard 14 MFCC vector, 42,1 % of EER improvement was acquired.
In the paper we propose a method for finding the optimal management of a dynamic system, when restrictions are imposed on the management and phrasal variables at intermediate points of the trajectory. It is assumed that the initial and the final positions of a dynamic system are known, and some reference management is unknown, for which the trajectory satisfies the imposed constraints (at this the dynamic system is moved from the initial position to the final position). The formulated task is reduced to the sequence of individual tasks, whose solution methods are known, and the procedure of this reduction does not lead to the loss of solutions. In the paper the proposed method is called the “method of purposeful replacement of optimizable functionality”.
The article presents a dynamic model of the information security system (ISS) functionality from unauthorized access in automated information systems (AIS) created on the basis of Petri net machines. The authors developed a mathematical model for dynamic operating performance ratio assessment in ISS against the unauthorized access in AIS based on the Laplace transform method and a numerical technique of solving simultaneous linear algebraic equations (SLAE) by Givens method. They authors also suggest a calculation technique for dynamic operating performance ratio algorithm in ISS against the unauthorized access in AIS by applying the selected method for solving equations (SLAE) for further development of evaluation programs complex as far as for modeling and assessment of dynamic performance ratio in ISS against the unauthorized access in AIS. Selection and development of the operating performance ratio was based on the analysis of GOST (RF Standard-Setting Authority) 28195-89.
A conventional Smith predictor presents poor stability when controlling systems with time-varying delay. In this paper, an improved adaptive PID-Smith predictor is proposed. It uses a PID controller as the primary controller as well as the estimator for unknown time delay. The goal is to ensure system stability and resistance to modeling errors.
This article discusses two structures of the estimator unit - based on a neural network and on a fuzzy controller. In the first variant, the genetic algorithm is used to find the optimal parameters of the estimator in the autonomous mode. In the second variant, the fuzzy controller of the Takagi – Sugeno type uses a variety of models with different delay time. At each time point the error of output is calculated for all models. The output signal of the estimator is formed by the rule of defuzzification. Simulation results show the effectiveness of the proposed modification of the Smith predictor.
. In article new approach to simulation and design of infocommunication systems, in which hierarchical multi-level routing is provided, is offered. Authors considered elements of a set-theoretic base and system of models of infocommunication system, operating not only traditional model elements – bipolar communication networks, – but also the multiple segments such as circuit, star, ring and tree. With use of provisions of the theory of sets to the basic concepts and procedures of a reference model of open system interconnection authors put in compliance mathematical objects providing the strict formal description of infocommunication system in which multipath multiple address physical and logical connections "point-to-multipoint", "multipoint-to-point", "multipoint-to-multipoint" are implemented. On the example of simulation of property of structural reliability of specific infocommunication system constructibility, visualization and systemacity of the developed approach are shown.
To reduce the complexity of the task of structural synthesis, it is divided into stages, during each of which the researcher, conducts (with the help of decision support systems) the synthesis and analysis of model systems for the given input requirements and restrictions. Structural optimization, in this context, is reduced to finding the extremum of a certain objective function, whose value is controlled by specified design parameters depending on the type of task.
To demonstrate how the simulation model works, the functional synthesis of the structure of information enterprise management system is considered, where the functional elements are the automated business processes, and the structural elements — automation facilities. A test case is made, where typical processes of budgeting, marketing, purchasing and sales, production and human resources are described as the functional elements.
The use of the developed model of functional synthesis is exemplified by the task of choosing software for the design of corporate information systems. On the basis of a series of experiments we have determined the set of possible solutions with the greatest value of the fitness function. It is established that the function value is affected by the number of redundant functions that contain selected structural elements.
Recovery of a dynamic system from its functioning is a problem of current interest in the theory of control systems. As a behavior model of gene network regulatory circuit, a discrete dynamic system has been proposed, where coordinates correspond to the concentration of substances, while special functions, which depend on the system value in the previous moment, account for their increase or decrease. Pseudo-polynomial discrete dynamic system recovery algorithms with additive and multiplicative functions have been obtained earlier. The generalized case of arbitrary threshold functions is considered in this article. Algorithms for significant variables recovery and threshold functions weight regulation, having pseudo-polynomial testing complexity, are given. These algorithms allow one either to recover the system completely, or to lower the threshold function dimension.
Hybrid logical and probabilistic (LP) models and software based on "Top-economics" are presented. Hybrid LP risk models contain joint participation of the following subjects in problem decision: government, legislative authorities, business, scientists, public opinion and objects (tasks), which are the essence of the problem. Provisions of "Top-economics", its features and advantages are set out. The concept of "invalidity" in economics is introduced by analogy with reliability and safety in engineering. New Boolean events-propositions and new LP risk models for economic safety management are given.
The application of Integrated Management Systems (IMS) is now attracting the attention of senior management of a variety of organizations: refineries, instrument-making enterprises, aviation enterprises, defense organizations, etc. However, performing ISM audits as a verification of conformance to different ISO standards with a substantial reduction or limitation of available resources remains a major problem.
At the same time, continuous improvement of management principles and, in particular, transition to risk-based thinking provide a greater interest in the rational use of ISO standards. In this article we suggest a technique of optimization of IMS audit program based on principles of continuous adaptation when collecting data during a single audit micro-cycle. An additional advantage of the proposed technique is the use of numerical metrics of IT-security audit, contributing to continuous improvement of the level of IT security in organizations.
This paper discusses the problems of application and choice of cryptographic standards taking into account user requirements and preferences. User profiles are created by means of the ontology apparatus. On the basis of user profiles and document features an appropriate set of documents is formed, the elements of which are then arranged according to the degree of compliance to user requirements. Various filtration methods, such as collaborative filtering, content analysis and filtering, as well as hybrid methods combining both approaches, are used. Thus, a recommender system for choosing cryptographic standards and algorithms is built. If there are several user selection criteria, it is reasonable to apply an integral index of object’s relevance to user preferences. This index is defined as the weighed sum of the particular indices.
The article considers the issue of automatic completion of ontology with roles and concepts formed by an intelligent system in the provision of new facts. Implementation of specified calculations allows increasing ontology information content during data stream preprocessing.
In the article the option of application of provisions of the theory of sets and the theory of hierarchical systems for the formal description of elements of the open systems realizing interdependent multi-level processes of routing is offered. Infrastructure facilities, in which distribution of the material resources, energy or information with the use of hierarchically nested functions of control of flows and/or routings is realized, can serve as real prototypes of such open systems.
The paper discusses the phenomenon of softwarization — the transformation of everything that can be deprived of its physical embodiment into a software form. The approaches to realization of this process and its application to import substitution of hardware based on the software-defined systems development are considered.
This work is devoted to the determination of the maximum possible number of sensors connected to one of the local servers of the automated system for monitoring the technical condition of man-made structures. The article presents a simulation model with the time-dependent probabilistic deterministic process of receiving requests and hyperdelta requests service process. The use of hyperdelta distribution in the simulation model is substantiated by comparing simulation results with the results obtained using an analytical model. Based on the simulation results, a database management system for a local server is chosen.
The object of research is a mobile robot system (MRTS) for geological exploration on the lunar surface. The aim of the project is to define a technical appearance and performance characteristics of MRTS, equipped with a drilling rig, and to study scenarios of application of MRTS in the course of geological exploration on the lunar surface. The findings could be useful for further development of MRTS for geological exploration on the Moon's surface as well as for works dedicated to other types of on-planet and robotic vehicles designed to run on the surface of the Moon and Mars.
In the paper, an algorithm for calculating the underwater autonomous vehicle position built on the triangulation method and post triangulation correction is proposed. A distinctive feature of the algorithm is that it uses as input multiple sets of distances vehicle-beacon calculated with different values of the speed of sound in water. The research of the developed algorithm has found that the accuracy of the proposed solution is twice higher than the accuracy of the triangulation method.
The article aims to consider the modernization method of information systems based on the analysis of their functional capacity. Estimates of the structural and functional composition of environmental monitoring information systems for the realization and search of the optimal solutions to the problems of restructuring are considered.
This publication discusses the problem concerning the concept of the instantaneous information security (IT-Security) audits directed, including providing protection against “zero-day” threats. It is noted that effective counter-threats "zero-day" refers to the type of proactive defense, which implements a set of active preventive IT-Security controls, but not limited only constant installation of new technical facilities. A key feature of this concept of instantaneous IT-Security audits is to assess how the left limit of the protection level in the process of IT-Security audits performing. Methodological basis of the concept of instantaneous IT-Security audits is ISO 27001 standards series, supplemented by many (expandable) IT-Security metrics to quantify the object protection level. The obtained results can find application in create of models and methods of IT-Security audits performing and continuous object protection under the influence of IT-Security violation threats.
An approach to the ontological description of any subject domain based on application of concepts of three types is offered: "Objects", "Properties" and "Actions". Thus, it is proposed to partially arrange various aspects of representations used for the description of knowledge by approximation property in functional layers, segments and areas. This makes possible to model semantic features of context-dependent knowledge of subject domains, to consider their changes and specifications at generation of decisions. Moreover, this opens the possibilities of predicting intentions and preventing realization of cyber threats to critical information infrastructure.
The article discusses approaches to long-term forecast of quantitative and qualitative indices of the security subsystem of information and telecommunication systems.The possibility of their use for the analysis of protection of systems against unauthorized access is assessed.
The article shows the approach to construction and use of associative-reflex memory of the cybersystem capable to form scenarios of anticipatory behavior at the level of conditioned reflexes.
Is examined the method of the autonomous indirect identification of the conversion factor of pendulum compensating accelerometer, which makes it possible with the high accuracy to determine the coefficient under the conditions for orbital flight indicated by the built-in firmware means of this gauge and to, thus, decrease an error in the determination of increase in the apparent in the velocity with the accomplishment of maneuver by automatic spacecraft
The memory role in modeling of anticipatory behavior is noted. The article depicts the most studied human memory capabilities and features of the occurrence of cognitive and reflexive processes in it. Requirements to memory of the cybersystem capable of synthesizing scenarios of anticipatory behavior in the conflict during an anticipation are formulated.
This issue briefly covers the need of numerical evaluation for Information Security Management Systems (ISMS) effectiveness in accordance with the requirements of two or more different standardization systems, such as ISO / IEC 27001 series of standards and Information Security Providing System STO Gazprom series 4.2 (ISPS). This problem is important to minimize the violation of IT-security risks and ensure the information processes stability in the information systems. This issue describes methodological difficulties in reconciling the requirements of different Standardization systems both ISO / IEC and ISPS that must be considered when assessing the ISMS effectiveness. The formulas have been proposed to solve the problem for calculating the ISMS effectiveness and discussed practical examples (cases), explaining the calculation for specific situations. These results can be used to create models and methods to provide the ISMS audits and monitoring IT-security facilities both ISMS and / or ISPS Gazprom.
The article contains one of the approaches to quantitative maleficent actions secrecy evaluation. The paper shows a method to form a multitude of potentially implemented maleficent actions. The article also explains the term «sign of action» and includes measurement of positive and negative effects when choosing the specific action mechanism.
An approach to the formation of a stable heterogeneous system of the spacecraft is developed . Requirement to provide quasi-synchronous orbits multiplicity is formed . Decomposition of problem of formation of orbits with a given cycle of track circuit is carried out . Method of forming multiple quasi-synchronous orbits of various geometric characteristics of a single cycle of track circuit in the given operating conditions is developed .
Analysis of the existing polymodal interfaces, their main characteristics and applications, as well as the results of common investigations in the field of multimodal interaction and interface design led to make a conclusion about the possibility of building a polymodal infocommunication systems based on multimodal architectures of subscriber’s terminals. To solve the tasks of interpersonal communication through technical means of communication the principles of polymodal systems construction and hierarchical system of their models are suggested in the article.
The appearance of intelligent cybersecurity systems featuring the property of anticipation is proposed. It is substantiated that the system of cyber attacks prevention should be designed in the form of self-learning intellectual self-organizing Gyromats system . It is expected that the application of the sought-for systems in practice would allow to solve problems related to prevention of cyber threats more efficiently.
An approach for building distributed computing networks and the organization of information security using trusted infrastructure is proposed. The lack of a single high-level platform-independent model of computing and information security, as well as the necessary mechanisms that implement the model at the level of its practical implementation raises many uncoordinated private decisions and leads to unnecessary pile of hardware and software organization of information processing of automated systems. Therefore, the evolutionary developing systems operating on different platforms currently require the implementation of trusted solutions in the field of information security.
In article approach to creation of the consistent theory of synthesis of scenarios of anticipatory behavior in the conflict is offered. Proofs of consistency, resolvability and model completeness of the theory of partially ordered giromats with tiered coordination are represented
In article approach to monitoring of integrity of dynamic objects on their metric standards is offered. Creation of a standard is based on sequential conversion of process from a memory dump to the machine gun of transitions on a state graph with calculation of structural, information and operational metrics. It allows to reveal violations of the functional statuses of object in memory of the computing system. The algorithm of monitoring of integrity of dynamic objects of anti-virus means of Dr.Web is provided.
A complex of new models of non-stationary queuing systems with finite source is presented. In contrast to traditional models of queuing theory the proposed models allow to describe the processes of customers servicing in the specified time interval under general assumptions on the time distribution between customer arrival and service. The article presents the principles of such models development, their graphical interpretation and formulae for computation of probabilistic and time characteristics as well as Chapman—Kolmogorov differential equations systems.
For complex industrial facilities providing integrated security is extremely and very important problem for airport facilities (AF). Features AF is a significant set of requirements: aviation security (AS), personnel security, aircraft security and engineering infrastructure. To ensure the functioning of AF for security purposes apply integrated management system (IMS), consisting of the management system set, in accordance with various standards, including international (ISAGO, ISO, ISO/IEC and other). The task seems appropriate to consider a model-based IMS, supplemented both by AS block and comprehensive audits block. In this issue presents the results of calculations according to the presented model IMS with regard to expanded criteria for AF. By a consensus of experts, the requirements of the "base" ISO much lower on the priority of "profile" for AF requirements ISAGO (IATA).
The paper provides a discussion about the development of information system to increase citizens’ mobility. The system is also known as system for infomobility. The following questions are discussed in the paper: the system expediency, main system’s features main principles that is used for system development. Additionally, the comparison of existing services that provide infomobility is presented in the paper.
The article describes the models and methods of design automation processes functioning man-machine systems based on functional-structural theory of man-machine systems and generalized structural method of prof. A.I. Gubinsky. Describes the basic concepts and definitions of the functional-structural theory. An algorithm for generating a series-parallel connection operations with the additional constraints, the algorithm generating alternatives process of man-machine systems based on the coincidence of the objectives of operations, the algorithm generating parametric alternatives based on a template. The basic concepts and definitions necessary for the generation algorithm of process fragments with the mandatory combinations of operations. Proposed the use of combinations of binding matrix operations, in which the nonzero elements of rows are meaningful only possible combinations of standard ways of performing the relevant functional units in alternatives. Introduced the concept of the composition and the concept of incompatibility steam trains, on the basis of which the distribution of functions performed compositions. Describes the integration of optimization models processes functioning man-machine systems with simulation method, as of the functional-structural theory is only applicable for processes without aftereffect and in the absence of dependent operations. Suggested remedy this limitation by integrating design technology processes functioning man-machine systems based on the functional-structural theory with the method of simulation of the process areas that are not fulfilled the above requirements of the functional-structural theory.
The actual problem influence of the developed atmospheric turbulence and multiple light molecular-aerosol scattering at board satellite devices spatial-frequency permission and received from space a videoinformation quality about the environment has been considered. Given consideration has been carried out in a frame of the linear optical system’s theory and optical signals Fourier transformations. Representative data of the structural function vertical dependence of developed atmospheric turbulence and board satellite devices parameters, formed the space environment’s, including the advanced modeling data about spatial-frequency filtration by the molecular-aerosol Earth’s atmosphere in a visual spectral region (λ=400-800nm) have been used. Optical transfer functions of atmospheric “turbulence- molecular-aerosol scattering-board satellite device” complex system have been calculated. It is shown, that in during of remote sensing of the Earth from space the quality of environment’s satellite images and spectral brightness’s, including a spatial frequence permission of a the board optical devices of middle (Δ~10 1 –10 2 )м and low (Δ~10 3 –10 4 )м spatial frequence permission don’t dependent from the atmospheric turbulence. It is important result that the influence of atmospheric turbulence comparison with noncoherent multiple light molecular-aerosol scattering and board satellite device is most significant only for high frequancies and a small scale fragments (Δ<<10)м of space images and appropriate spectral brightness’s.
Risk analysis of information security is now especially hot topic, owing to that that as insurance companies want to have probably more exact characteristics about the probable extent of damage and the necessary sum of insurance, and the company, wishing to insure the information risks, also want to understand, for what and as far as these or those sums are reasonably paid at the conclusion of the contract of insurance. Besides, any of the called parties doesn't want to lose own resources. Thus, it is necessary to learn to receive adequate, but at the same time the complex, aggregated estimates of security of information systems. The comprehensive analysis of security both program and technical component of system, and the personnel of such systems (their socio-technical component) is for this purpose necessary. The purpose of the present article is development and improvement of the task of the main relations considered before option in the "personnel information system-critical documents" complex at socio-engineering attack of the malefactor.
The problem of critical information protection is now one of the most actual in in-formation technologies though it is necessary to recognize that, from the historical point of view, closely related to it problems arose much earlier — probably, at the same time with writing emergence. The standard approach to the solution of these problems consists in development, diversification and complication of applied technical measures of safety. Thus possibilities of technical attacks to systems are minimized. At the same time, each protected information system has the authorized users who work at the lawful bases in it and often have legal access to confidential information. The purpose of this article is creation of an analysis algorithm of resistance of users of information systems from socio-engineering attacks taking into account a profile of vulnerabilities of the user.
In the article the structure of a problematic of the theory of system (system-cybernetic) researches is considered. Results of the corresponding morphological analysis are presented in the form of the morphological tree containing four branches (modeling–the analysis–observation–a choice) and 57 leaves — individual tasks.
The analysis of the structural stability of the spacecraft, consisting of different types of spacecraft. Introduced the concept of time-stable structure of a hybrid system SC. Produced decomposition problem temporarily provide a stable structure into two subproblems, namely, sustaining the relative position of the planes of the orbits of spacecraft and sustainable mutual position of the spacecraft in orbit for a specified time. The criteria of the structural stability of a hybrid system SC.
The information systems (IS) observed a significant amount of critical threats that caused the emergence of new attack vectors, as well as deficiencies in risk management. Respectively, is of particular interest to study the problem of information security competence assessment accompanying the IP level service providers. In this issue proposes the "IT-Security Paradox" wording, which allows to consider the most important (critical) IT-Security threats and propose an approach based on the modern risk-based standards implementation, especially international standards ISO. The proposed concept of assessing the level of IT service providers information security for industrial facilities consists of 2 basic principles and a few extensions that allow to take into account the specific requirements for the IT-security specific functioning of IS and provide an opportunity to assess (qualitatively or quantitatively) as part of routine inspections (audits).
The purpose of this paper is to present a mathematical tool to build a fuzzy model of a nonlinear system using its input-output data. The phase plane of system is divided into sub-regions and a linear model is assigned for each of these regions. This linear model is represented either in state-space form. To determine the pre-selected parameters of the linear system model under study, least-square identification method is used. Then these linear models are arranged in a fuzzy manner to characterize the overall system behavior. The proposed methodology is verified through simulation on a numeric example.
The process of designing, creating and implementing a modern management systems is, at this stage of development of society, the question is not of a technical nature. Obviously, the implementation of the project without serious consideration, accurate calculation and a clear understanding of risks, evaluation of resources (budget, staff, licenses, etc.) is not possible for a modern organization working in more than tough competitive conditions. Moreover, government organizations have all of the above requirements ensure enhanced regime of national security, which is confirmed by the requirements of relevant legislation and the practice of performing the IT projects. In this issue we propose some approaches to implement the process of decision support in the selection of the model for the development of the modern organization in the design phase and evaluate the appropriateness of choice: the composition of management systems on the applicable standards, as appropriate certification functions ensure stable growth, security of business processes, the protection of valuable assets (including intangible) on the basis of statistics certification ISO.
Communication system synthesis task statement under Bayesian criterions with variant loss functions is considered. Significant differences in communication system structure and parameters synthesized under Bayesian criterions with simple loss function and uncertainty function are obtained at sufficiently general conditions.
The issues of energy efficiency of decentralized power complexes with superconducting equipment through the use of protected intellectual dialogue automatic control system that performs the adaptation to the complex modes of operation, external perturbations and conducting biometric access control of operators are considered.
Design approach to the optimal structure of multifunctional wireless tactile measuring means with self-contained power supply based on the search of the shortest paths in the graph, the balance of which is mapped to composite index that takes into account energy consumption, cost and technical compatibility of the functional units is considered. An example of increasing the accuracy of estimates of the measured parameters of objects with the combined wireless measuring tools is provided.
Abandoning traditional principles of separation of transmitted information on services for polymodal presentation of information requires development of a new constructive theory of building polymodal infocommunication systems. One of its cornerstones is the quantitative research of the degree of the achievement of the purpose of such systems and subscriber terminals’ participation share in this result. This paper presents an approach to evaluation of polymodal systems effectiveness on the basis of the prime cost index.
For improving the validaty of the accepted decision during the synthesis of management-data-exchange network, providing the minimization of resource costs of traffic capacity of transmission links of heterogeneous telecommunication systems, should be taken into account feature of traffic from sources of controlling information.The model of process of multiplexing the protocol data units in management channel offered in article take into account the variability of intensity of the flow of the official messages from sources of controlling information. . Use of the modified formula of Engset allows to provide more rational distribution of the channel resource necessary for the organization of transmission of protocol data units.
While a modern management systems creating (include - Integrated Management Systems, IMS), the range of security aspects for core business processes of the organization should be solved. Priority areas of security, especially information security (IS) is increasing due to gain the competitive environment, the emergence of new threats and the considerable complexity of the risk management procedures. IMS is highly relevant to the problem of obtaining security assessment, allowing the short and / or evaluate the prognostic aspects inherent in the organization's risks, to design an effectiveness information security management system (ISMS) and implement efficiency reasonable security measures. In this issue proposed some approaches to creating a models for IMS security assessment in accordance with the requirements both of ISO / IEC 27001:2005 and ISO 22301:2012. Given the relative newness of these standards in the practical application to the research problem in the ISM, the proposed approaches can be useful in the planning of the ISMS, security assessment has created IMS, and, in particular, to solve practical problems – IT-security audits in organizations.
The paper proposes the variant of architecture of sub-search system for analytical monitoring implementation featuring its own database formation and own search index. For accelerating the process of obtaining the documents potentially relevant for user, the external internet search systems are involved on initial stage.
The paper discusses features of construction and operation of automated systems of railway transport. As main distinguishing factors, the great variety and diversity of such systems, their mutual co-relationships and links with public networks, and strong heterogeneity of internal user are highlighted. The architecture of a multi-level intelligent information security system that proposed to protect information in automated systems of railway transport is suggested and discussed. To store data about security in a multilevel intelligent system of protection it is proposed to use a hybrid ontology repository. Formal task statements for intelligent services of data analysis at the top level of the reviewed protection systems are offered. Analysis of these statements showed that development of intelligent services for correlation management, security analysis and attack modeling should be assigned to analysis tasks. Intelligent services for decision support and visual data analysis are among the synthesis tasks.
Multimodality of traditional interpersonal communications points to the purposefulness of using the polymodal dialogue in the process of communicative interaction of infocommunications subscribers. The creation of the polymodal communication systems became possible due to the development of cognitive science and current results in the design area of multimodal interfaces interaction. Application of the existing and expected outcome of signal processing tasks of different modalities in the synthesis of polymodal systems will provide all parties to communicate and their further intellectualization will allow us to approach the infocommunicational interaction of subscribers to the traditional interpersonal communication.
Approach to expand the functionality of associative intelligent systems is considered. Control features an associative interaction of signals in these systems and giving them a second signal system are disclosed. Proposals for the analog implementation of such systems are formulated
The paper presents the application of space and ground monitoring technologies to a vital problem of spring floods. The following are main topics discussed in the paper: the data necessary for flood modeling, flood monitoring technologies and approaches as well as flood forecasting systems. The particular focus is on the application of developed flood monitoring system to the situation of flood forecasting in Daugavpils on a river Daugava. The explored example illustrates synergetic effect of integration space and ground monitoring technologies for solving natural problems by this allowing prediction and evaluation of natural disasters as floods.
The analysis of a role and a place of information processes in the modern world is carried out. It is defined that the information received by means of space and land means essentially influences all spheres of a life of a society and the state. Necessity of working out of the scientifically-methodical device on creation of a uniform information field and the uniform automated control system of diverse means in aerospace sphere by integration of existing systems on the basis of the uniform information approach of formation signs spaces is shown. The approach to formation of a uniform information field in difficult information-operating systems on the basis of complex application of modern methods and the models based on multifactor spaces of signs and synthesized with use of the theory of fractals, wavelet-transformations, synergetic approaches is offered, to the efficiency and quality theory.
The analysis of a current state of researches in the field of an information technology of designing of the automated systems of monitoring is carried out. The approach to creation of the distributed system of the information on the control of a condition of space objects and objects of a land space infrastructure on the basis of a modern information technology of the automated gathering, integration and the complex analysis of all types of information, circulating in a contour as separate management information system (MIS) of technological processes, and management information system of preparation and start-up and management information system of the cosmodrome as a whole, and creations of a multilevel management information system of the cosmodrome with use of modern principles of the organization of the corporative information systems is offered.
In article the algorithm of functional reconfiguration instrumentation motion control system to ensure the effectiveness of the target unmanned spacecraft is considered.
The plan operation correction problem of ground based space monitoring information system is considered in this paper. The generalized algorithm of the positional control construction is proposed and illustrated on the numerical example.
The author made the analysis of modern state of GLONASS, determined problems, the main of which is the support of its qualitative work. In order to gain high accuracy of location for users of this system the conception of development of MG NSS GLONASS on the principle of kvalitologiya is given in this article. The problem is solved with the help of interconsistency automatic information processing for qualitative ephemeris and time-frequency support.
In this paper it was shown the advantage of the method of randomized aggregate indices to evaluate the effectiveness of the publication activity of scientific staff of various organizations. Was considered an example of the application of this approach for to building a hierarchy of aggregate indices of two levels which takes into account opinions of two potential of expert groups.
The paper describes an integrated approach and respective tools which provide methods and means for analysis and verification for representatives of all four major classes of languages used to describe telecom applications: languages of general purpose executable specifications (SDL), languages for high-level descriptions of complex systems behavior patterns and their interconnections (UCM), special purpose language for verification of telecom applications (interpreting MSC, communicating finite state machines, Dynamic-REAL), and industrial imperative languages (C/C++). Verification of specifications is complemented with automated construction of test suites, which ensure the specified test coverage rate of source behavioral specifications and are optimal with respect to specified performance criteria. Tests are run in a specialized automated test-run environment either on system models, or on actual system implementations inserted in respective program shells which provide communication of the system under test with the test environment. The test shell allows for automated analysis of the test-run results along with the test-runs as well.
The paper analyzes the most well known and developed at present data storage systems that are used to build the repository for perspective security information monitoring and management systems (SIEM–systems). Relational DBMSs, XML-databases and stores are analyzed. The relational schema, that integrates analytical modules of SIEM system, is uggested and commented. The classification and characteristics of known tools of implementation and use of XML databases are given. Among triplet stores, the system Virtuoso is chosen. It provides a hybrid approach to implementation of the repository in perspective SIEM systems, which was probated for attack modeling and security analysis.
In the field of information security it is necessary to develop scientific and proved and mathematical methods and the models reflecting specifics of subject domain for ensuring activity of experts, allowing to automate the analysis of information systems user’s security from socio-engineering attacks. The purpose of this paper is consideration of a method of of success probability search of socio-engineering attacking impact on each user in the "personnel - information system - critical documents" complex where users and communications between them are presented as graph. The algorithm assumes search of various acyclic ways between two users.
The analysis of recent publications concerning an approaches to design, implementation and maintenance of the systems for personal data (PD) protection enables to note consistently high interest in this critical problem in the aspect of ensuring information security. Sure, the proposed models based on both International and Russian standards indicate deep-in-side knowledge of all aspects of protection PD, but at the same time present new questions, an effective solution of which has yet to be synthesized and tested in practice. The present article provides some approaches for creating models of PD security assessment in accordance with the requirements of standard GOST R ISO/IEC 27001:2005. Taking into account the relative newness of this standard as applied to the research problem, the proposed approaches can be useful in planning security systems PD, security assessment of designed ITSecurity with PD and, in particular, in solving of practical problems - IT-Security audits in organizations.
The relevance of the problem of information and telecommunication systems protection is stipulated by increasing the complexity of hardware and software, high dynamics of their development, distributed and heterogeneous structure and many other factors. Analogy between evolution and natural selection in nature and information and telecommunication systems, including security systems, is obvious. The paper suggests the conception of adaptive protection of information and telecommunication systems which is based on hybrid mechanisms integrating the paradigms of nervous and neural networks.
The results of research of multipath GPS and GLONASS signal propagation errors while using the standard code-phase filter are provided. An estimate of complex filtering influence on multipath error is performed. The algorithms for detection of interference area with dangerous reflections are designed.
Active attraction of information technologies when conducting modern business puts forward a number of requirements to safety of information resources uses thus. In this regard the majority of experts in information security is engaged in development of various methods of protection of information systems from technical attacks. Recently more and more the staff of departments of information security starts paying attention to problems of secutrity of users of the information systems. About sociotechnical (socio-engineering) attacks tell the majority of authors of conssdered articles, but in one of them there are no data on the solution of problems of the automated assessment of degree of security of the personnel of information systems or problems of an assesment of efficiency of the actions directed on prevention os such attacks. The purpose of this article is the short state-of-the-art rewiew of scientific literature on subject of information security which will allow to list as existing needs for the analysis of security of users of information systems, and the preconditions revealed by the author to development of new approaches of such analysis.
The paper is intended to analyze attack modeling problems in large computer networks with the use of different models, methods and tools. The famous models, as well as methods and tools for attack modelling are examined in detail on the basis of the characteristics of large networks as information security related objects and objects of attack, and directions for further development are provided. The role of information security requirements in attack modeling iterations is shown. Examples of attack modeling problems associated with different types of NOT-factors are presented.
Risk analysis of information security nowadays is an extremely important topic, due to the fact that insurance companies want to have probably more exact characteristics about the probable size of a damage and the necessary sum of insurance, and the company, wishing to insure the information risks, also wants to understand, for what it does pay at the conclusion of the contract of insurance and if these fees are reasonable. Besides, both mentioned above parties don't want to lose their resources. Thus, it is necessary to learn to receive adequate, but at the same time complex, aggregated estimates of security of information systems. The purpose of the present article is consideration of setting of general relations in a complex «the personnel information system – critical documents» at socio-engineering attack of the malefactor, and then illustration of work of principles of a likelihood and relational approach on simplified (for availability and brevity of a statement) example. We’ll use the mixed terminology borrowed from the theory of the relations and the theory of relational DB.
The paper deals with design features of the concept of information security for information and telecommunication systems of State authorities. The distinctive concept provisions describe the object of protection, threats to information security, means of ensuring information security, and management of ensuring information security. As main distinctive concept provisions, the conceptual model of ensuring information security and the conceptual model of the system of ensuring information security are selected. Conceptual model of ensuring information security is presented in functional form, which allows determining the dependence of the performance from the full set of conditions and factors influencing their values. A conceptual model of the system of ensuring information security is presented as oriented graph. It is noted that the challenge of the system of ensuring information security is to implement overlay of each edge of the graph of the relevant packages and means of information security.
Complex corporate information systems are widely distributed in the modern world. Development, support and protection of similar systems require a significant amount of time and resources, besides only highly skilled experts can be engaged in the management of such systems. Information stored in such information systems has enormous value for the owners of systems therefore considerable efforts are spent for creation systems of protection of such systems from various threats to their safety. The purpose of this paper is to combine an indistinct and likelihood approach to an assessment of security of the user in relation to attacking actions of the malefactor, meaning the actions of rather elementary character ("one movement") aimed at "elementary" vulnerabilities of the user which lead directly to some action of the user.
The paper offers a method for respondents' behavior modeling based on data about last episodes adjacent to interview and proposes improved techniques of modeling and processing of initial data uncertainty based on hybrid probabilistic and fuzzy approaches. This paper provides analytical (including asymptotic) analysis of these estimates and numerical behavior rate estimates according to the model. Software supplements enabling to fulfill numerical experiments realizing the proposed processing procedures were worked out.
The generalized dynamic model of the control of corporate information system is considered. The scheme and the generalized algorithm of the positional control construction using the position optimization method are proposed.
The prototype of the program complex, used for demonstration of basic possibility for estimation the protection of personnel of information system from socioengineering attacks on the base of generalized approach, focused on analysis of trees of attacks, is described. The representation of information system and its personnel in the specified program complex is based on hierarchy of information models, which consist of information model of the user, information model of the users group, information model of control area, information model of hardware and software complex, information model of critical information objects (system of documents), information model of information system itself and links between corresponding objects. The list of technologies, used during the development of this product, the reasons for using this technologies and brief substantiation of some technical solutions are worked out. The example of proceeding of program complex prototype during editing the information about socioengineering attack, as well as during the imitation of socioengineering attack on the recompensation type on the personnel of this system is considered.
In this work modern mechanisms defining complexity of management in modern social systems (in the private and state enterprises, hi-tech Programs, structures of the state management-regulation of economic processes) are analyzed. It is shown that the principal difficulty of modern complexity of management consists in management of not completely formalized technologies of activity of social systems of a great number. Modern feature of management in difficult social systems is an essential influence of technologies of the market which aren't regulated by norms and institutes, and also essential influence of natural restrictions of cogitative possibilities of the person to operate-manage. Influence of poorly regulated technologies in the market can be reduced by use of network, organizational, collective, informational and other developed technologies of maintenance of management and by use of methods integrating science. And reduction of influence of mental restrictions demands creation of new cognitive technologies of management which allow to divide functions at the mental level.
In this article we treat a question how to develop a procedure of functional and parametric analysis, which is based on calculation of effectiveness of multifuncional complex operation during decision making; we offer correlations for calculation, mark practicability of adding of support devices to information complexes.
In article authors propose the algorithm of carrying out of the qualitative analysis of safety and reliability of systems, technological processes, and also of probable risk and possible losses, by using of a special method of the analysis which is directed on reduction of probability of failures and accidents, human victims and economic losses. The basic advantages of the given method, its system and components, and causes of failures of components are considered, procedure of construction of the given method is proposed, formulas for calculations are presented
Practical necessity of the graph theory expansion is shown, in particular — for the modeling and technical systems investigation. Eshgraph term is suggested. It expands ―graph‖ term. Thus it expands graph theory. Examples of the eshgraph and geometric eshgraph usage are presented
The design problem of observed stochastic process system component, reflecting dynamic system significant changes, is considered. It is shown that system component formation quality criteria should be defined by requirements of hierarchic higher metasystem. Thus is arise new estimation statement, leading to necessity of calculating schemes construction, essentially different from known statistical process estimation algorithms.
The article suggests a criterion for the optimization of information systems. Demonstrates the possibility of using the entropy index of the processed information in assessing the complexity indicators. An example of evaluation of an information system for processing the speech signal. Demonstrates its effectiveness.
This paper is devoted to developed description of informative model of the user, who may be under the threat of socioengineering attack, and some other models, which is connected to the first one: users group model, model of control area, informative objects (documents) model. Specified informative model are included into the base for analyzing of the protection of users of informative system from socioengineering attack. Informative model of the user allows to consider name and surname of the user, his post in the organization, belongings of user to user group, and vulnerability of the user on socioengineering attacks. informative model of user group allows to consider name of user group, it’s description, allows for different atomic actions which user can perform with informative objects, type of access to information objects and information objects, which this group of users can use. Informative model of control area allows to consider name of control area and it’s description. Information model of information objects includes damage estimation of losses of confidentially, losses of integrity and losses of sufficiency. The example of socioengineering attack is brought. Development of this attack is described through suggested informative models.
Various methods of aggregative indices are widely used in mathematical apparatus of control and monitoring systems aimed at detecting the typical situations and potential dangers (in terminology of JDP-information fusion models). The danger detection (identification, recognition) is not an end in itself at the information fusion process; at its peak this process develops a decision on the detected dangers’ prevention. This paper presents a methodological apparatus intended for a choice of an appropriate version of the detected danger’s prevention strategy and based upon a certain interpretation of the aggregative indices method in analytical planning methods.
Technique for optimization of visual environment for spatial modeling is considered. It was implemented. The use of the technique in intelligent subsystem of visual environment for spatial modeling is proposed.
The class of problems is considered, such that problems decision demands technoorganizational systems functioning results (effects) estimation. Necessity of the decision of a problem of automation of techno-organizational systems and processes of their functioning models construction is shown for subsequent use of the constructed models for estimation of effects. Problem formalization made, the concept of problem solving on the basis of use of graph-theoretic models transformations is offered. The example of problem solving is offered. Further research directions are considered.
For multi-criteria evaluation for basic topological structures and fractal structures of GRID-systems and telecommunication networks of new generation basic quality predicates have been proved and formalized. The results of comparative analysis for fractal and multifractal architectures of distributed GRID-systems by criteria of reliability, cost and bandwidth have been described.
The class of problems in socio-economic systems is considered, such that problems decision demands capability estimation. Challenge of systems capability estimation formulated. It is shown that analytical estimation of capability on the base of systemic concepts application is necessary. System capability property is defined, capability problems solving topicality justified. Concept of capability research problems solving suggested, capability indicators are justified. Few socio-economic systems capability research problem statements are considered.
The problem of creation of methodological and technological support of processes of creation of the structured knowledge of models of functioning(operation) of technical systems and decision rules on handle(control) of their states is considered(examined). The concept of its(her) solution grounded on construction obshchesistemnyh of prototypes of such models and rules for a class «technical systems» is offered.
The article is devoted to the complex approach to modeling, estimating and analysis of the scenarios of degradations and recovering the structured conditions of the disaster tolerance information systems (DTIS). Model-algorithmic supply for the decision of the determination and reconfiguration of the structural conditions DTIS, estimating and analysis of topology of structural conditions using probability and fuzzy-probability approaches have been designed.
This article describes method of external component integration to instrumental system in conditions of limited abilities of source code modification. Basic characteristics of integrated components are described along with features of integration process that need new methods of instrumental system unification. Different methods of information system integration are analysed. Method of integration based on provision of access to internal handlers of host system and usage of dynamical interface principles is described.