Machine learning and digital signal processing methods are used in various industries, including in the analysis and classification of seismic signals from surface sources. The developed wave type analysis algorithm makes it possible to automatically identify and, accordingly, separate incoming seismic waves based on their characteristics. To distinguish the types of waves, a seismic measuring complex is used that determines the characteristics of the boundary waves of surface sources using special molecular electronic sensors of angular and linear oscillations. The results of the algorithm for processing data obtained by the method of seismic observations using spectral analysis based on the Morlet wavelet are presented. The paper also describes an algorithm for classifying signal sources, determining the distance and azimuth to the point of excitation of surface waves, considers the use of statistical characteristics and MFCC (Mel-frequency cepstral coefficients) parameters, as well as their joint application. At the same time, the following were used as statistical characteristics of the signal: variance, kurtosis coefficient, entropy and average value, and gradient boosting was chosen as a machine learning method; a machine learning method based on gradient boosting using statistical and MFCC parameters was used as a method for determining the distance to the signal source. The training was conducted on test data based on the selected special parameters of signals from sources of seismic excitation of surface waves. From a practical point of view, new methods of seismic observations and analysis of boundary waves make it possible to solve the problem of ensuring a dense arrangement of sensors in hard-to-reach places, eliminate the lack of knowledge in algorithms for processing data from seismic sensors of angular movements, classify and systematize sources, improve prediction accuracy, implement algorithms for locating and tracking sources. The aim of the work was to create algorithms for processing seismic data for classifying signal sources, determining the distance and azimuth to the point of excitation of surface waves.
The task of automating and reducing the complexity of the process of developing virtual training complexes is considered. The analysis of the subject area showed the need to move from a monolithic to a service-oriented version of the architecture. It is found that the use of a monolithic architecture in the implementation of virtual training complexes limits the possibility of modernizing the system, increases its software complexity, and makes it difficult to implement an interface for managing and monitoring the training process. The general concept of the microservice architecture of virtual training complexes is presented, and definitions of the main and secondary components are given. The scientific novelty of the research lies in the transition from the classical monolithic architecture in the subject area of the HTC to the microservice architecture; eliminating the shortcomings of this approach by implementing a single protocol for the exchange of information between modules; separation of network interaction procedures into software libraries to unify and improve the reliability of the system. The use of isolated, loosely coupled microservices allows developers to use the best technologies, platforms and frameworks for their implementation; separate the graphical interface of the simulator instructor from the visualization and virtual reality system; provide the ability to flexibly replace the main components (visualization, interface, interaction with virtual reality) without changing the architecture and affecting other modules. The decomposition of the structural model of the microservice architecture is carried out, and the specifics of the functioning of the main components are presented. The implementation of microservices networking libraries and a JSON-based data exchange protocol is considered. The practical significance of the proposed architecture lies in the possibility of parallelization and reducing the complexity of the development and modernization of training complexes. The features of the functioning of the systems implemented in the proposed microservice architecture are analyzed.
It is difficult or impossible to develop software without included errors. Errors can lead to an abnormal order of machine code execution during data transmission to a program. Program splitting into routines causes possible attacks by using return instructions from these routines. Most of existing security tools need to apply program source codes to protect against such attacks. The proposed defensive method is intended to a comprehensive solution to the problem. Firstly, it makes it difficult for an attacker to gain control over program execution, and secondly, the number of program routines, which can be used during the attack, decreases. Specific security code insertion is used at the beginning and end of the routines to make it complicated to gain control over the program execution. The return address is kept secure during a call of the protected routine, and the protected routine is restored after its execution if it was damaged by the attacker. To reduce the number of suitable routines for attacks, it was suggested to use synonymous substitutions of instructions that contain dangerous values. It should be mentioned that proposed defensive measures do not affect the original application`s algorithm. To confirm the effectiveness of the described defensive method, software implementation and its testing were accomplished. Acknowledging controls were conducted using synthetic tests, performance tests and real programs. Results of testing have demonstrated the reliability of the proposed measures. It ensures the elimination of program routines suitable for attacks and ensures the impossibility of using standard return instructions for conducting attacks. Performance tests have shown a 14 % drop in the operating speed, which approximately matches the level of the nearest analogues. The application of the proposed solution declines the number of possible attack scenarios, and its applicability level is higher in comparison with analogues.
The current state with the solution of the problem complex planning of the execution of task packets in multistage system is characterized by the absence of universal methods of forming decisions on the composition of packets, the presence of restrictions on the dimension of the problem and the impossibility of guaranteed obtaining effective solutions for various values of its input parameters, as well the impossibility of registration the condition of the formation of sets from the results. The solution of the task of planning the execution of task packets in multistage systems with the formation of sets of results within the specified deadlines has been realized of authors in article. To solve the planning problem, the generalized function of the system was decomposed into a set of hierarchically interrelated subfunctions. The use of decomposition made it possible to use a hierarchical approach for planning the execution of task packets in multistage systems, which involves defining solutions based on the composition of packets at the top level of the hierarchy and scheduling the execution of packages at the bottom level of the hierarchy. The theory of hierarchical games is used to optimize solutions for the compositions of task packets and schedules for their execution is built, which is a system of criteria at the decision-making levels. Evaluation of the effectiveness of decisions by the composition of packets at the top level of the hierarchy is ensured by the distribution of the results of task execution by packets in accordance with the formed schedule. To evaluate the effectiveness of decisions on the composition of packets, method for ordering the identifiers of the types of sets with registration of the deadlines and a method for distributing the results of the tasks performed by packets has been formulated, which calculates the moments of completion of the formation of sets and delays with their formation relative to the specified deadlines. The studies of planning the process of the executing task packages in multistage systems have been carried out, provided that the sets are formed within specified deadlines. On their basis, conclusions, regarding the dependence of the planning efficiency from the input parameters of the problem, were formulated.
The paper proposes a method for fusioning multi-angle images implementing the algorithm for quasi-optimal clustering of pixels to the original images of the land surface. The original multi-angle images formed by the onboard equipment of multi-positional location systems are docked into a single composite image and, using a high-speed algorithm for quasi-optimal pixel clustering, are reduced to several colors while maintaining characteristic boundaries. A feature of the algorithm of quasi-optimal pixel clustering is the generation of a series of partitions with gradually increasing detail due to a variable number of clusters. This feature allows you to choose an appropriate partition of a pair of docked images from the generated series. The search for reference points of the isolated contours is performed on a pair of images from the selected partition of the docked image. A functional transformation is determined for these points. And after it has been applied to the original images, the degree of correlation of the fused image is estimated. Both the position of the reference points of the contour and the desired functional transformation itself are refined until the evaluation of the fusion quality is acceptable. The type of functional transformation is selected according to the images reduced in color, which later is applied to the original images. This process is repeated for clustered images with greater detail in the event that the assessment of the fusion quality is not acceptable. The purpose of present study is to develop a method that allows synthesizing fused image of the land surface from heteromorphic and heterogeneous images. The paper presents the following features of the fusing method. The first feature is the processing of a single composite image from a pair of docked source images by the pixel clustering algorithm, what makes it possible to isolate the same areas in its different parts in a similar way. The second feature consists in determining the functional transformation by the isolated reference points of the contour on the processed pair of clustered images, which is later applied to the original images to combine them. The paper presents the results on the synthesis of a fused image both from homogeneous (optical) images and from heterogeneous (radar and optical) images. A distinctive feature of the developed method is to improve the quality of synthesis, increase the accuracy and information content of the final fused image of the land surface.
The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle.
The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique.
Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.
The paper presents algorithms for objective evaluation of speech quality are considered, based on the measurement of dynamic and static characteristics of speech signals at the source codec output. The functional scheme of carrying out of experimental researches is proved. The results of the analysis of the correlation of objective and subjective evaluation of speech quality are given. Modifications of the objective quality assessment are proposed on the basis of the correlation of the excitation of the MESC spectrum and modification of the exponent on the basis of the calculation of the sensation function of the spectral dynamics of MFOSD. The algorithm of regression curve formation is proposed, which allows to perform the transformation of objective evaluation to the scale of subjective evaluation of speech quality.
Based on the use of the most accurate modifications of the speech quality assessment indicators for reconstructed speech signals, a complex algorithm for objective hardware evaluation of the speech quality is proposed when the broadband and low-frequency stationary and nonstationary acoustic waves are applied to the microphone. It is shown that the use of a complex algorithm makes it possible to obtain an objective evaluation of the quality of speech according to GOST R 50840-95 with an average error of no more than 0.35 points for signal-to-noise ratios of 30 dB to -10 dB.
The article presents a methodology for substantiation of requirements for the technical vision system of a robotic complex. A technical vision system of the robotic complex is viewed as a combination of two subsystems: measurement and recognition. To implement the methodology we developed methods for calculating partial optimality criteria for substantiation of the technical requirements and evaluation of search area of the optimal values of measuring instruments characteristics of the technical vision system of a robotic complex; a recursive procedure for choosing the optimal values of measuring instruments characteristics of the technical vision system; a scheme of trade-off for evaluating the optimal technical requirements for advanced measurement instruments of the technical vision system in different technical and economical conceptions.
The search for optimal solution is done according to partial optimality criteria: recognition efficiency, the cost and risks of creating measuring instruments. For creating the recursive procedure based on formulated assumptions and assertions, a criterion, which provides the search of Pareto-optimal solutions, was synthesized. The developed methodology takes into account the existing (more suitable) technical and economical conceptions of creating a robotic complex while choosing trade-offs.
To assess the efficiency of functioning of the onboard control complex of spacecraft Earth remote sensing, it is proposed to use models of open queuing networks. For queuing networks, nodes are given by multi-channel non-Markov queuing systems. The proposed model allows one to take into account the costs for compressing and broadcasting the graphics in the calculation of the distribution of the residence time of the application in a network model.
The article describes the program complex that gives an opportunity to simulate scenarios of development of small innovative enterprises. A distinctive feature of the proposed solution is the possibility of defining points for making decisions on structural transformations and the use of "inverse" forecasting for defining initial conditions.
Development of the data-communication equipment with high demands imposed is necessary for solving the problems of unmanned robots group control at various levels. In this paper, methods and algorithms for noise-immunity communication channel implementation are described. It is substantiated that communication equipments for these channels have to be special-purpose and have to use effective signal-code constructions that can adapt to changing environments. Features and options for multiple unmanned ground vehicles (UGV) control communications are described, the advantages and disadvantages of time division multiple access and frequency division multiple access are considered.
The paper discusses a task of sources consumption management in the process of deploying information support systems for complicated technical complexes (CTC). Application of CTC as well as the process of appropriate information support are usually limited by the exact prescribed terms, so any delay is not allowable. The delay may be eliminated more often only by involving additional information sources at later stages. The developed algorithm is based on Bellman principle of optimality that allows one to define not the final correction schedule, but to operate a flexible program of control actions, depending on the concrete result at every stage, duration of which exceeds a defined norm. This program can be used in the appropriate decision support systems and can be included in the simulation models of CTC deploying and applying. The paper describes a detailed algorithm for optimal correction, corresponding to the normal distribution of stages durations.
In the article we consider the problem of vulnerabilities detection in machine code. In this paper, disadvantages of current solutions in case of possibility to detect vulnerabilities in view of threats to confidential information that is processed in vulnerable software are highlighted. To solve this problem, we propose original model of vulnerabilities detection in program trace, its algorithmic support and software implementation. The model provides formal criteria to distinct bug from vulnerability taking into account distribution of protected information in the memory of software under test. We use tainted data analysis technique to highlight such memory regions. In addition, we conduct experimental evaluation of developed system efficiency which demonstrates that our solution allows detecting 5 types of Windows software vulnerabilities more and 4 types Linux software vulnerabilities more than existing analogs.
The article describes the basics of creating operational river flood forecasting systems, based on the integrated use of modern information technologies and integrated proactive modeling. Their practical implementation is also shown. The distinctive features of the proposed interdisciplinary approach are: a) the widespread use of heterogeneous data from a network of gauging stations and Earth remote sensing satellites; b) implementation of forecasting systems based on service-oriented architecture; c) creation of an intelligent interface for selecting the type and parameter setting of hydrological models; d) ensuring convenient and accessible presentation of the forecast results using web-services. Practical testing of the developed software prototype has confirmed the possibility of automatic high-precision operational (from several hours to several days) forecasting of floodingzones and depths of river valleys.
Several topical physicochemical issues in the area of high-molecular compounds and biophysics requires real-time registration of the spatial distribution of low-molecular ions. A device utilizing conductometric method based on high-frequency electrode pairs switching in traveling wave mode is proposed for the spatial distribution of low-molecular ion study. Technical features, advantages and applications of the device is described. Results of device testing are presented.
The paper introduces a situational conceptual model designed to investigate complicated spatial systems, Industry-Natural Complexes (INCs) in particular, that provides automation of every modelling stage with possibilities to equally treat information from calculating modules, which simulate parts of an INC, and from integrated GIS and expert system. This approach is featured with wide usage of expert knowledge, employment of the GIS not for object mapping only, but for task setting, spatial-dependent calculations and modelling results' displaying as well.
For complex industrial facilities providing integrated security is extremely and very important problem for airport facilities (AF). Features AF is a significant set of requirements: aviation security (AS), personnel security, aircraft security and engineering infrastructure. To ensure the functioning of AF for security purposes apply integrated management system (IMS), consisting of the management system set, in accordance with various standards, including international (ISAGO, ISO, ISO/IEC and other). The task seems appropriate to consider a model-based IMS, supplemented both by AS block and comprehensive audits block. In this issue presents the results of calculations according to the presented model IMS with regard to expanded criteria for AF. By a consensus of experts, the requirements of the "base" ISO much lower on the priority of "profile" for AF requirements ISAGO (IATA).
A complex of new models of non-stationary queuing systems with finite source is presented. In contrast to traditional models of queuing theory the proposed models allow to describe the processes of customers servicing in the specified time interval under general assumptions on the time distribution between customer arrival and service. The article presents the principles of such models development, their graphical interpretation and formulae for computation of probabilistic and time characteristics as well as Chapman—Kolmogorov differential equations systems.
The paper encompasses a design conception for combined embedded device security to be applied within the development process of protection mechanisms for systems and services of complex security on rail transport. A model and technique proposed are intended for configuring embedded device security components developed taking into consideration expert knowledge in the embedded security field. The goal of the configuration process is to find a security configuration that meets all necessary security requirements and constraints of the device platform, satisfies set resource consumption criteria and does not contain known types of security component inconsistencies.
Leading manufacturers of computer systems and technologies realize the importance of adaptive control and self-organization in information infrastructure of the XXI century. New adaptive technologies were already called “natural” and “organic” (Organic IT). Analysis of modern evolution tendencies for information system and technologies are discussed in the paper. Conception and methods of integrated modeling of self-organization computing technologies in critical applications are presented.
Particularly urgent formulation and solution of various classes of scheduling problems of structural dynamics of complex objects (CO). This article is based on a generalized settheoretic formulation of the problem of planning the structural-functional reconfiguration of the CO is considered a complex model of planning and management of the processing and transfer of material and / or information resources to restructure, and a model of parametric synthesis image of the CO, providing the robustness of its reconfiguration plans under the optimistic and pessimistic scenarios for the structural dynamics of the CO.
TV programs quality metrics control in digital TV broadcasting systems is considered. Methods of picture quality control are adduced and it’s automation complexities are described. The development of video data preprocessing software is proposed as an approach to overcome the problem
The article is devoted to development of a complex speaker model for using at the text-independent speaker identification. The complex speaker model is based on gaussian mixture method. The model is formed by preliminary segmented speech signal, where each segment matches to certain broad phonetic class. Method of speaker models structuring is proposed. Speaker models are structured as a tree, which allows to identify speaker without running a full search on the set of models. Researches have shown the division of the acoustic space of speaker's voice on the set of classes that represent some phonetic events, increases the efficiency of voice identification and the proposed structuring method of models accelerates the search operation.
The paper describe key points in algebraic bayesian network knowledge pattern implementation on C++ programming language. Knowledge pattern implemented as class that handle and store estimation for knowledge pattern elements. It also provide a couple of methods for processing knowledge pattern such as consistency update and a posteriori inference.
The authors suggest a new methodological approach for optimal selection of embedded Global Navigation Satellite Systems (GNSS) receiver for airborne navigation equipment (ANE). The analysis and synthesis of various methods of expert evaluation of qualitative and quantitative characteristics of GNSS receivers are held out. It is shown that the use of different methods ultimately leads to identical results in terms of selecting the best alternative for a given set, despite the use of fundamentally different mathematical tools.
Complex corporate information systems are widely distributed in the modern world. Development, support and protection of similar systems require a significant amount of time and resources, besides only highly skilled experts can be engaged in the management of such systems. Information stored in such information systems has enormous value for the owners of systems therefore considerable efforts are spent for creation systems of protection of such systems from various threats to their safety. The purpose of this paper is to combine an indistinct and likelihood approach to an assessment of security of the user in relation to attacking actions of the malefactor, meaning the actions of rather elementary character ("one movement") aimed at "elementary" vulnerabilities of the user which lead directly to some action of the user.
One of the main problems of researches in the field of socio-engineering attacks is the development of analysis algorithms (assessment) of information system's users' protection estimated on the basis of computing complexity. According to preliminary estimates the application of probabilistic relational algorithm will essentially reduce computing complexity of a program complex. Use of the specified approach will also allow to increase flexibility in a task of estimation of criticality of the documents available in system and chances of successful realization of attacks, in description of communications’ system and accesses among actual components of a complex «information system – personnel – critical documents», and among specified components and the malefactor. Relational models will probably allow to use effective computational methods, implemented in modern DBSM for fast SQL-links implementation.
The prototype of the program complex, used for demonstration of basic possibility for estimation the protection of personnel of informative system from socioengineering attack on the base of generalized approach, focused on analyze of trees of attacks, is described. The representation of informative system and its personnel in the specified program complex is based on hierarchy of information models, which consists of information model of the user, information model if the users group, information model of control area, information model of hardware and software complex, informative model of critical information objects (system of documents), information model of informative system itself and links between corresponded objects. The list of technologies, used during the development of this product, the reasons for using this technologies and brief substantiation of some technical solutions is resulted. The example of proceeding of program complex prototype during editing the information about socioengineering attack, as well as during the imitation of socioengineering attack on the recompensation type on the personnel of this system is considered.
Developed description of informative models of the component of complex “in-formative system – personnel”, which is under threat of socioengineering attack is being presented in this paper. Informative model of user, users group, controlling areas, information objects (system of documents), hardware-software maintenance and information system itself are considered. Specified informative models are included into the base for analyzing protection of informative system under the threat of socioengineering attacks. Hierarchy of these models allows to describe scene (context), in which socioengineering attack developes, to touch possible attacks (trees of attacks), and, on the base of gained results, study possible approaches to estimation the degree of protection of complex “information system – personnel” from socioengineering attack.
In this article the urgency of information security estimation problem from unauthorized access in the automation system is shown. The purpose of the article is working out a model for a quantitative estimation of information security from unauthorized access, which provide increasing efficiency management of information security in the organizations. For solution of the information security quantitative estimation task the complex metric is offered — security coefficient of the automation system. On the basis of the given metric the comparative analysis for the standard automation systems of firms is carried out, guidelines on rise of their level of security are resulted.
A multiple-model description of interaction between a ground-based control complex GCC and orbital system (OrS) of navigation spacecrafts (NS) is presented. A dynamic interpretation of operations and control processes is implemented. The proposed approach lets use fundamental scientific results of the modern control theory for new applied problems. In particular, a scheduling problem for GCC ground-based technical facilities was reduced to a boundary problem with the help of the local section method. Scheduling problems of the considered class are usually solved via methods of discrete programming, but when the dimensionality is high, the optimal solution is not provided and heuristic algorithms are needed. This paper introduces an original approach, based on models and methods of optimal control theory, to scheduling problems of high dimensionality.
Advantages of compound dynamic systems presentation in the form of an interacting subsystem models complex are discussed. A holonic complex structure and expanded situationevent formalism of hybrid processes specification are proposed. The formalism enables to specify model processes taking into consideration an interaction of the processes between each other and with the environment. It is shown that the formalism proposed enables to simulate system structure changes. Some problems of the model complex realization are considered. A model complex realized in terms of the formalism proposed is produced as an illustrative example. The complex enables to simulate automatic coordination of processes, which occur in two systems of automatic positioning a roll on a plane.
Hardware-software complex «RiskDetektor» (ISA of Russian Academy of Sciences) is described in the article. This Complex realizes in a mode of dialogue the computer—the user the basic procedures of maintenance of the transport safety, defined by directive documents. The ideology of a complex has been developed and published earlier and assumes that the control system of risks of infringement of transport safety is constructed on a basis of categori-zation of transport objects by an estimation of a possible damage at realization threats of terror-ist influence.
Algebraic Bayesian Networks (ABN) is a probabilistic-logic model for knowledge patterns bases with uncertainty. A knowledge pattern mathematical model is a conjuncts ideal with their estimates of probability. The estimates can be scalar as well as interval. An ABN consists of a set of knowledge patterns; this set is referred to as the primary structure of the ABN. The set of links among knowledge patterns is referred to as the secondary structure of the ABN; this structure is represented with a join graph (or with its subtypes — join tree or join chain). The paper offers data structures that can represent knowledge patterns as well as the primary and secondary structures of ABNs in RDBMSs or java code as well as an implementation of probabilistic-logic inference in ABNs.
The article deals with a probability of instrumental approach to a psychosomatic status estimation in the article. This approach is bases on joint (combined) processing polytypic biometric data which is results of pulse measurements, vibroimage registration and psychological testing. The article is concern with minimum program-instrumental complex solution. Also, in article a polytypic biometric data bases design is presented.
Methods of calculation of quantity indicators of reliability of the special software at a stage of its designing and development are offered. For modelling computing process and calculation of quantity indicators of its reliability it is offered to use the mathematical device semi-Markov processes. Modelling is made in computer mathematical system MathCAD.
A priori inference is a key feature in intellectual decision support systems based on imperfect probabilistic knowledge. The paper describes a set of local a priori inference algorithms in algebraic Bayesian networks.
The article is devoted to APC (Advanced Process Control) applications in processes automated control. Developed program complex “Matrix” is offered to elaborate forecasting models and, in turn, to optimize multiple process control according to the chosen criterion of efficiency and available restrictions.
The problems of creating and using of fault-tolerant computer systems is considered. The article presents different solutions of problem of structure dynamic control for the fault-tolerant computer systems functioning in high availability and load balancing modes.
We consider the application of variation approach for solution of complex problems of statistic estimation of non-linear dynamic systems meeting the criterion of maximum verisimilitude. We discuss questions of variation and direct estimations adequacy.
The Organization Peculiarities of the Automated Information System "Tutorial System of the Sub-faculty"
Different approaches to decomposition of measured upward radiation into the component reflected by the water object and the noise component, generated by the reflection from atmospheric layers are considered. Advantages and disadvantages of the considered approaches are analyzed from the point of view of their application for the retrieval of surface water quality from the remote sensing observations.
One of the main features of modern complex technical object (CTO) is the variability of their parameters and structures as caused by objective and subjective factors at different phases of the CTO life cycle. The aim of this investigation is to develop principles, methods and algorithms for the tasks decision of comprehensive planning for modernization of the CTO (information systems). These methodological and technical bases are founded on the theory of CTS structure dynamics control developed by authors of this investigation.
One considers the application of variation approach for solution of complex problems of statistic estimation of non-linear dynamic systems due to criterion of maximum verisimilitude. One discusses questions of accounting of a priori information and regularization of marks appreciation.
The problems, which are solved during project development performance of a program product by using of mathematical models, are defined. Diagrams of technological and information interaction between models are shown. The project basic characteristics are defined. The description of the models, which are included in a complex (evaluating and tracking models) is given.
At the moment, the theory, methods and techniques concerning the application of mathematical models are wide-used. The research in this field is very intensive, and area of applications and range of the models' classes are growing permanently. Nevertheless such problems as a problem of multi-criteria models' quality estimation, a problem of analysis and arrangement of models' classes, a problem of justified selection of applied task-oriented models are not well investigated yet. The importance of the considered problem increases when the object of research is described not via a single model, but via a multiple-model complex, consisting of models related to different classes or combined models (f. e. analytical-imitating, logical-algebraic, etc). Aforementioned problems are the primary objects of the theory of mathematical models' and multiple-model complexes' quality control. The article presents methodological and technical basics of this theory.
The development of the Group Expert Technology Tools for various organizational and technical decisions estimations implemented in the St.Petersburg Institute for Informatics and Automation Russian Academy of Sciences (lab of Integrated systems of automation), deals with usage of Internet communication capabilities during cooperative activity of the users. In the article the problems of a place and role of the Group Expert Estimation Technology in general scheme of decision making in conditions of uncertainty, the XML language as opened standard for information exchange between the Internet users, other standards and approaches to organization of the component communications in distributed heterogeneous information environments are esteemed
Development of an effective strategy of the reduction of air pollution in the regional scale requires fast estimation of both existing pollution level and that resulting from the different possible sets of measures affecting the pollutant emissions from industrial sources. In order to accelerate the necessary calculations the Euleran-Lagrangian scheme for regional air pollution modelling and the corresponding computer code were modified for multiprocessor systems. The code was tested on three systems with local memory and different software environment. The results demonstrated the effectiveness of high performance computing in the field of environmental management.
The article is devoted to the development of model-algorithmic support and software tools for automating the integration of Earth remote sensing data and other heterogeneous information resources in solving problems of monitoring and proactive management of territories development. A distinctive feature of the problem statement is the inclusion of tools for modeling the state of natural and technical objects located in the analyzed territory into the resources should be integrated. The development is based on the justification of the technology for integrating heterogeneous information resources, which includes an algorithm for choosing the type of architecture for the created automation tool complex, a method for describing the information process of integrating data and their joint processing, an algorithm for determining the best configuration of information resources when solving thematic problems, as well as a set of software and technological solutions for integration of remote sensing data with other necessary data and their joint use in modeling. As a result of research and developed algorithms application, it has been established that the most preferred type of systems’ architecture for integrating heterogeneous information resources is a service-oriented architecture. To describe the information integration process, it is proposed to use a Business Process Model and Notation. The key component of the development in terms of software and technological solutions for the integration of heterogeneous data is the proposed interaction scheme with data providers and consumers based on data abstraction layer creation. The application of the proposed solution allows you to bring heterogeneous data to a single format suitable for further processing on modeling tools. The testing carried out on specific thematic tasks of monitoring and managing the territories’ development showed the feasibility of the proposed integration technology and the developed software tools, as well as the achievement of a significant gain in the rapidness of solving thematic tasks.
The increasing storage density of modern NAND flash memory chips, achieved both due to scaling down the cell size, and due to the increasing number of used cell states, leads to a decrease in data storage reliability, namely, error probability, endurance (number of P/E cycling) and retention time. Error correction codes are often used to improve the reliability of data storage in multilevel flash memory. The effectiveness of using error correction codes is largely determined by the model accuracy that exhibits the basic processes associated with writing and reading data. The paper describes the main sources of disturbances for a flash cell that affect the threshold voltage of the cell in NAND flash memory, and represents an explicit form of the threshold voltage distribution. As an approximation of the obtained threshold voltage distribution, a Normal-Laplace mixture model was shown to be a good fit in multilevel flash memories for a large number of rewriting cycles. For this model, a performance analysis of the concatenated coding scheme with an outer Reed-Solomon code and an inner multilevel code consisting of binary component codes is carried out. The performed analysis makes it possible to obtain tradeoffs between the error probability, storage density, and the number of P/E cycling. The resulting tradeoffs show that the considered concatenated coding schemes allow, due to a very slight decrease in the storage density, to increase the number of P/E cycling up to 2–2.5 times than their nominal endurance specification while maintaining the required value of the bit error probability.
The most important task of modern robotics is the development of robots to perform the work in potentially dangerous fields which can cause the risk to human health. Currently robotic systems can not become a full replacement for man for solving complex problems in a dynamic environment despite an active development of artificial intelligence technologies.
The robots that implement the copying type of control or the so-called virtual presence of the operator are the most advanced for use in the nearest future. The principle of copying control is based on the motion capture of the remote operator and the formation of control signals for the robot’s drives. A tracking system or systems based on movement planning can be used to control the drives. The tracking systems are simpler, but systems based on motion planning allow to achieve more smooth motion and less wear on the parts of the control object. An artificial delay between the movements of the operator and the control object for necessary data collection is used to implement the control-based motion planning.
The aim of research is a reduction of delay, which appears when controlling the anthropomorphic manipulator drives based on the solution of the inverse dynamic problem, when real time copying type of control is used . For motion path planning it is proposed to use forecast values of the generalized coordinates for manipulator. Based on the measured values of the generalized coordinates of the operator's hand, time series are formed and their prediction is performed. Predictive values of generalized coordinates are used in planning the anthropomorphic manipulator trajectory and solving the inverse dynamic problem. Prediction is based on linear regression with relatively low computational complexity, which is an important criterion for the system operation in the real time operation mode. The developed mathematical apparatus, based on prediction parameters and maximum permissible accelerations of the manipulator drives, allows to find a theoretical estimate of error values limits for planning the operator's hand trajectory using the proposed approach for specific tasks. The adequacy of the maximum theoretical value of the prediction error, as well as the prospects of the proposed approach for testing in practice is confirmed by the software simulation in Matlab environment.
The dynamic method of searching anthropogenic objects in the seabed with au-tonomous underwater vehicles use is offered. Unlike a static method where all devices with geophones onboard are buried and attached to a bottom simultaneously and after the end of a search session float at the same time, the continuity of guiding of search due to dynamic behavior of group of devices is provided in the offered method. It is offered that while the main part of devices with geophones listens to the reflected signal, other part of devices moves further along the route. The continuity of guiding of seismic exploration in the preset area and essential abbreviation of time for its carrying out is in such a way reached. The algorithm of the coordinated behavior of devices with geophones onboard and the submersible moving the radiator is given. The mathematical model of functioning of "the radiator — geophones" system is described. Experiments by determination of optimum parameters of guiding of seismic exploration of anthropogenic objects are made. Results of simulation allowed to evaluate a scoring from use of the offered method, to determine its optimum parameters and to develop recommendations about its use for search of anthropogenic objects in the thickness of a seabed.
The transformable designs of space basing are delivered into orbit in a folded state, which creates the task of their reliable disclosure. In this paper we propose to use an actuator in the form of electrical machines as the executive body. The use of this type of actuator allows controlling the process of deployment.
As a large-sized transformable structure we consider the space-based reflector. At present, the transfer of the machines from the folded state to the operation state is carried out by stages. The paper considers the joint implementation of two stages: the rotation of the root unit of the spoke and the extension of the intermediate unit. Mathematical models for rotational and translational motions are developed which take into account such parameters as bending and contraction of the spoke. Modeling and analysis of the results of different variants of the joint disclosure of the reflector elements are made: the use of the engine for each of the components of the motion and the use of centrifugal force for the extension of the spoke.
The application of the algorithm for correcting the control parameters is considered. One of the important advantages of the algorithm is the ability to carry control in real time. It can be used to calculate the reference control in algorithms based on the two-channel principle.
Modern hardware systems of processing the video data stream for color coding apply the principle of constant brightness proposed in the development of the NTSC color coding system. This principle, like its implementation, is not free from drawbacks: loss of information on the clarity of the encoded color images, degradation of clarity in achromatic details and images as the color saturation increases, etc. In addition, the use of video data decoding formats in digital video data processing systems, such As 4:2:2, 4:2:0, 4:1:1, distorts the decoded video image.
An alternative approach for encoding a color video stream is to apply the principle of constant color luminance. The work describes the coding according to the principle of constant color luminance. A comparative analysis of the transformed images is carried out with the help of the two principles given. The advantage of applying the principle of constant color brightness in digital video coding systems is shown. It is shown that using the principle of constant color brightness it is possible to obtain a gain of more than 6 dB.
The implementation of the principle of constant color luminance for real and integer modern hardware platforms is described. A comparative analysis of the realizations of the principles of constant brightness and constant color luminance was carried out, showing the advantage of applying the principle of constant color luminance for some modern processors.
The application of the principle of constant color luminance in digital video encoding systems can help improve the quality of recoverable color coded images.
This paper is devoted to feature selection and evaluation in an automatic text-independent speaker verification task. In order to solve this problem a speaker verification system based on the Gaussian mixture model and the universal background model (GMM-UBM system) was used.
The application sphere and challenges of modern systems of automatic speaker identification were considered. Overview of the modern speaker recognition methods and main speech features used in speaker identification is provided. Features extraction process used in this article was examined. Reviewed speech features were used for speaker verification including mel-cepstral coefficients (MFCC), line spectral pairs (LSP), perceptual linear prediction cepstral coefficients (PLP), short-term energy, formant frequencies, fundamental frequency, voicing probability, zero crossing rate (ZCR), jitter and shimmer.
The experimental evaluation of the GMM-UBM system using different speech features was conducted on a 50 speaker set and a result is presented. Feature selection was done using the genetic algorithm and the greedy adding and deleting algorithm.
Equal error rate (EER) equals 0,579 % when using 256 component Gaussian mixture model and the obtained feature vector. Comparing to standard 14 MFCC vector, 42,1 % of EER improvement was acquired.
The paper presents mathematical models and investigation results of three variants of allocation of ground-based missiles for destroying asteroids. These missiles differ from each other by geocentric coordinates of control points, their amount and the probabilities of hitting the asteroid in three ways: hitting the asteroid on the descending parts of the trajectory of motion of special warheads; on ascending or descending parts of trajectories; at varying firing azimuths of the considered means.
This paper considers the task of implementing proactive control of robotic systems (RS) for rescuing victims. The use of a wide range of sensory elements in the RS allows one to expand the list of monitored parameters and to generate the control action with the use of predictive and proactive capabilities based on the methods and technology of integrated modeling. A complex of models for making decisions about assistance to victims is presented. The efficiency of such decisions is evaluated.
An improvement of existing navigation algorithms for a generic polygonal linkage is presented. Our algorithm constructs a path between two arbitrary configurations of a polygonal linkage. This path contains att most eight steps
The paper presents the results of research in the field of the development of technol-ogies for processing heterogeneous information from the UAV onboard ma-chine vision system with the aim of UAV navigation and control. The main problems of information processing for UAV navigation and control are considered; general tasks to be solved for mission planning and performing are formulated. The key problems of the unmanned aerial vehicle (UAV) machine vision system are multiband image processing and fusion (both for flight planning and onboard processing), object detection and localization, object tracking, object recognition. Modern methods of object detection, recognition and tracking are analyzed. Advanced techniques and algorithms are compared, and the most effective ones are determined. New original methods are proposed for multiband images fusion based on diffuse morphology. The original methods are developed for deep machine learning, which provide high probabilities of given object detection and recognition. The database of model images for machine learning algorithms is created. The characteristics of the developed algorithms and results of their tests on model and real data are presented.
Summary information on existing integrated circuits (IC) analog master slice array (MSA) and configurable structured array (CSA) crystals of domestic and foreign production-oriented applications in sensor systems, including robots for various purposes, and aircraft are reduced.
The parameters of the new integrated circuits MSA (AGAMC-2.1) and CSA (MH2XA010), as well as the prospects of designing on their basis of radiation-resistant IC for analog signal processing and interfaces of sensors of different physical kind.
The paper describes a method of applying the laws of equilibrium thermodynamics to complex socio-economic systems, in particular, for the development of a methodology of calculation of social dissatisfaction indicators, and also two information systems proposed for calculating this indicator.
Discusses the principles of evaluation the effectiveness of the malefactor in the critical infrastructure. The "operating complex" process modeling of security breach is presented. Investigated uncertainty modeling process of malefactor and ways to overcome them. A mathematical model of aggregate effectiveness of the malefactor, which removes some limitations of existing probabilistic models of random phenomena in the field of information security is developed. The model is called stochastic super indicator and is intended for research of conflict situations in critical infrastructure.
This paper presents a techniques assessing the reliability of the complex structures which can not be reduced to a series-parallel connection of elements. In the case where the system elements can have three mutually exclusive (disjoint) states – up state, “fail-closed” mode, “fail-open” mode there is a need and an opportunity to separate the system failure probability calculations for the "break" and "closure". It is shown that the developed method of estimating the reliability can be used for structures of any complexity with very weak restrictions. Orthogonalization are examples of logic functions based on the incompatibility of individual variables. Correctness of the proposed methods was confirmed by the decision of problems by full exhaustive search. Examples of automated modeling of bridge structure and the structure of the two "stars" connected to a "delta" solved using software ARBITR in which software is implemented algebra of mutually exclusive (disjoint) events.
The issues of energy efficiency of decentralized power complexes with superconducting equipment through the use of protected intellectual dialogue automatic control system that performs the adaptation to the complex modes of operation, external perturbations and conducting biometric access control of operators are considered.
In article questions of complex use of space and land data for the oil pollution of water areas analysis are considered. Stages of data processing are shown and features of these stages are analyzed at the solution of this task with use of space and land data
The review of the 1st, 2nd, 3, 4 and 5 Russian Conference on the Simulation is presented. The points of view are used methods, language and systems of modeling, application areas. Technologies of interaction of imitating modeling with other types of modeling — analytical, integrated, hybrid are analysed. The main tendencies of modeling specified types development are defined.
In this article we treat a question how to develop a procedure of functional and parametric analysis, which is based on calculation of effectiveness of multifuncional complex operation during decision making; we offer correlations for calculation, mark practicability of adding of support devices to information complexes.
A multiple-model approach to description and investigation of control processes in space systems is presented to answer the changeability of space-facilities (SF) parame-ters and structures, which can as caused by objective (subjective) external (internal) reasons. The presented multiple-model complex, as compared with known analogues, has several advantages. It simplifies decision-making in SF control system (CS) structure dynamics management, for it allows seeking for alternatives in finite di-mensional spaces rather than in discrete ones. The complex permits to reduce dimensionality of SF CS structure-functional synthesis problems to be solved in a real-time operation mode. This statement is exemplified by an analysis of SF CS information-technological abilities and goal abilities
The class of problems is considered, such that problems decision demands technoorganizational systems functioning results (effects) estimation. Necessity of the decision of a problem of automation of techno-organizational systems and processes of their functioning models construction is shown for subsequent use of the constructed models for estimation of effects. Problem formalization made, the concept of problem solving on the basis of use of graph-theoretic models transformations is offered. The example of problem solving is offered. Further research directions are considered.
1 - 25 of 70 items