Introduction : Modern complex technical systems are often critical. Criticality is due to the consequences of disruption of the functioning of such systems, and their failure to fulfill the required list of functions and tasks. The process of control and management of such systems is carried out using communication systems and networks that become critical for them. There is a need to ensure the stable functioning of the complex technical systems themselves, their control and monitoring systems, communication systems and networks. The paper proposes a method for ensuring the functional stability of a communication system, the basis of which is the process of identifying and eliminating conflicts in it due to the difference between the profile of functioning and the profile of the process of functioning of the system. The proposed model of the process of functioning of the communication system allows, based on changes in the intensity of the impact on the system of destabilizing factors, the identification of conflicts and their elimination, to determine the probability of ensuring the functional stability of the system. The purpose of the study: to develop a methodology for ensuring the functional stability of a communication system under the influence of destabilizing factors and the emergence of conflicts, a model of the process of the system's functioning, which makes it possible to determine the probability of the system being in a functionally stable state. Methods of graph theory and matrix theory, the theory of Markov processes. Results: an approach is proposed for assessing the functional stability of a communication system under the influence of destabilizing factors, a technique has been developed to ensure the functional stability of a communication system. Practical significance: the results of the study can be used in the design and construction of complex technical systems, decision support systems, control, communication and management.
Recently, different attempts have been made to characterize information security threats, particularly in the industrial sector. Yet, there have been a number of mysterious threats that could jeopardize the safety of food processing industry data, information, and resources. This research paper aims to increase the efficiency of information security risk analysis in food processing industrial information systems, and the participants in this study were experts in executive management, regular staff, technical and asset operators, third-party consultancy companies, and risk management professionals from the food processing sector in Sub-Saharan Africa. A questionnaire and interview with a variety of questions using qualitative and quantitative risk analysis approaches were used to gather the risk identifications, and the fuzzy inference system method was also applied to analyze the risk factor in this paper. The findings revealed that among information security concerns, electronic data in a data theft threat has a high-risk outcome of 75.67%, and human resource management (HRM) in a social engineering threat has a low-risk impact of 26.67%. Thus, the high-probability risk factors need quick action, and the risk components with a high probability call for rapid corrective action. Finally, the root causes of such threats should be identified and controlled before experiencing detrimental effects. It's also important to note that primary interests and worldwide policies must be taken into consideration while examining information security in food processing industrial information systems.
Chatbot research has advanced significantly over the years. Enterprises have been investigating how to improve these tools’ performance, adoption, and implementation to communicate with customers or internal teams through social media. Besides, businesses also want to pay attention to quality reviews from customers via social networks about products available in the market. From there, please select a new method to improve the service quality of their products and then send it to publishing agencies to publish based on the needs and evaluation of society. Although there have been numerous recent studies, not all of them address the issue of opinion evaluation on the chatbot system. The primary goal of this paper’s research is to evaluate human comments in English via the chatbot system. The system’s documents are preprocessed and opinion-matched to provide opinion judgments based on English comments. Based on practical needs and social conditions, this methodology aims to evolve chatbot content based on user inter-actions, allowing for a cyclic and human-supervised process with the following steps to evaluate comments in English. First, we preprocess the input data by collecting social media comments, and then our system parses those comments according to the rating views for each topic covered. Finally, our system will give a rating and comment result for each comment entered into the system. Experiments show that our method can improve accuracy better than the referenced methods by 78.53%.
The paper considers the problem of a wireless communication system’s physical level security for a multipath signal propagation channel and the presence of a wiretap channel. To generalize the propagation effects, the Beaulieu-Xie shadowed channel model was assumed. To describe the security of the information transfer process, such a metric as the secure outage probability of was considered. An analytical expression of the secure outage probability was obtained and analyzed depending on the characteristics of the channel and the communication system: the average value of the signal-to-noise ratio in the main channel and the wiretap channel, the effective path-loss exponent, the relative distance between the legitimate receiver and the wiretap and the threshold bandwidth, normalized to the bandwidth of a smooth Gaussian channel. The analysis considers the sets of parameters that cover all practically important scenarios for the functioning of a wireless communication systems: both deep fading (corresponding to the hyper-Rayleigh scenario) and small fading, both in the case of a significant line-of-sight component and a significant number of multipath clusters, and with significant shadowing of the dominant component and a small number of multipath waves, as well as all intermediate options. It is found out that the value of the energy requirements for guaranteed secure communication at a given speed is determined primarily by the power of multipath components, as well as the existence of an irreducible secure outage probability of a communication session with an increase for channels with strong overall shadowing of the signal components, which from a practical point of view is important to take into account when imposing requirements for the values of the signal-to-noise ratio and the data transfer rate in the direct channel, providing the desired degree of security of the wireless communication session.
One of the solutions to the problem of spatio-temporal data anisotropy is the use of a multilevel system of digital twins based on the corresponding industry models and the updated archive data base. The application of this approach has successfully proved itself in information systems for monitoring the parameters of the geomagnetic field and its variations, providing spatio-temporal interpolation of geomagnetic data with an accuracy of 0.81 nT in magnetically quiet periods. At the same time, the problem of information interaction between the levels of the system of digital twins remained unresolved, which is greatly aggravated by the constantly growing volume of data and their heterogeneous nature. The paper proposes a solution to the indicated problem by means of a formalized mechanism for packaging space-time information, in which the identification of data sources is performed on the basis of a hierarchical binary tokenization system. In addition, the proposed software implementation of such an approach is considered, a distinctive feature of which is the combination of traditional clientserver and innovative serverless architectures to implement a highly loaded reactive web application for working with analyzed data. The main stages of the implementation of information interaction are highlighted and programmatically formalized - from obtaining initial information from its sources to verifying data, analyzing them, processing and forming the output information flow of the system. The results of the computational experiments carried out on the example of the problem of monitoring the parameters of the Earth's magnetic field and its variations confirmed the effectiveness of the proposed solutions, expressed both in increasing the reactivity of web-based applications and in increasing the computational speed of formation and filling of information storages that aggregate information from distributed heterogeneous sources.
The paper considers the problem of analysis of the information transmission process by multi-element communication systems in presence of a multipath signal propagation channel. To generalize the propagation effects, the model of the κ–μ fading channel with correlated shadowing was assumed, and the technology used for organizing a multi-element system was the SIMO system, equipped with the maximum-ration combiner of the signal on the receiving side. To describe the characteristics of the information transfer process, an approach based on the higher-order statistics of the ergodic capacity was used. Closed-form analytical expressions for arbitrary-order capacity higher-order statistics were obtained for the channel model under consideration. The behavior of the first four statistics (ergodic capacity, its reliability, skewness and kurtosis coefficients) is analyzed depending on the channel parameters (the number of multipath propagation clusters, the ratio of power of the dominant components to the total power of multipath waves, the degree of shadowing of the dominant components, and the shadowing correlation coefficient). Within the framework of the study, 4 distinct situations of the assumed channel model behavior were considered, which significantly differ in their properties. It is noted that, in contrast to the capacity, its higher-order statistics are significantly more sensitive to the channel parameters and, as a result, are more significant indicators of fluctuations in the information transfer rate within the communication channel. The existence of a pronounced extremum (minimum) of the reliability ergodic capacity dependence from the signal-to-noise ratio was established. It should be accounted for in practical applications, when the requirements of the signal-to-noise ratio that guarantees the desired communication link quality are set.
Nowadays, over-the-horizon surface wave radars are used to solve the problems of monitoring the situation on the water surface adjacent to the border areas of the land. The main advantage of these means is the ability to detect surface objects beyond the optical horizon due to the propagation of an electromagnetic wave along the sea surface in the diffraction zone. However, the accuracy characteristics of such observations turn out to be extremely low due to the small signal-to-noise ratios of the reflected signal, which in turn are caused by the wide directivity pattern of the existing antenna systems. It leads to the prevalence of background reflection in the irradiated region over the radio echo of the target object. For the same reason, stationary targets are undetectable, for which there is no Doppler frequency shift in the reflected signal spectrum. The only way to increase the signal-to-noise ratio is to narrow the radiation pattern in the direction of the detected target (an increase in the antenna system directivity). The article proposes a solution for the described problem by the method of sequential accumulation of reflected signals and their summation according to the principle of optimization of the selection of phase relationships for adjacent pulses (synthesized ape rtures) corresponding to the ev entual front of electromagnetic waves focused in the direction of the hypothetical target. The solution of this problem will significantly narrow the antenna directional pattern, which leads to the achievement of direction finding accuracy that meets the requirements for some navigation systems. In this case, there is no need to change the design of the antenna arrays. Computer simulation of the synthesized antenna array was performed and its directional pattern was constructed. A quantitative assessment of the incre asing the angular resolution was performed in comparison with the potentially possible one determined by the Rayleigh criterion. This circumstance allows us to consider the possibility of using coastal over-the-horizon surface wave radars to detect stationary objects «invisible» by existing radars.
Recently, there has been a rising interest in small satellites such as CubeSats in the aerospace community due to their small size and cost-effective operation. It is challenging to ensure precision performance for satellites with minimum cost and energy consumption. To support maneuverability, the CubeSat is equipped with a propellant tank, in which the fuel must be maintained in the appropriate temperature range. Simultaneously, the energy production should be maximized, such that the other components of the satellite are not overheated. To meet the technological requirements, we propose a multicriteria optimal control design using a nonlinear dynamical thermal model of the CubeSat system. First, a PID control scheme with an anti-windup compensation is employed to evaluate the minimum heat flux necessary to keep the propellant tank at a given reference temperature. Secondly, a linearization-based controller is designed for temperature control. Thirdly, the optimization of the solar cell area and constrained temperature control is solved as an integrated nonlinear model predictive control problem using the quasilinear parameter varying form of the state equations. Several simulation scenarios for different power limits and solar cell coverage cases are shown to illustrate the trade-offs in control design and to show the applicability of the approach.
A widespread use of multi-user interfaces, due to multimodality of traditional interpersonal communication, a transition to a polymerized presentation of information and systems, has allowed the creation of new approaches to their implementation based on distributed terminal systems. An approach to the synthesis of topological structures of such systems implemented in two stages is proposed in the article. The first stage determines a minimum set of communication nodes and their location based on the requirements for the availability of communication nodes for various categories of users and the globality of a distributed terminal system. The second stage determines options for constructing communication nodes and connections between them, which ensure the performance of audio monitoring functions of users of local information spaces while ensuring continuity of a bridge for different categories of users. A model example of the synthesis of a distributed terminal system for audio monitoring of two categories of users (adults and children) in the local information space (home), voice control subsystems of the "smart home" is presented. As a part of its solution, at each stage of the synthesis, the initial data are determined, a formal formulation of the synthesis problem is carried out, an algorithm for the solution and the results are presented. So the task of the first stage of the synthesis is a linear integer mathematical programming problem, solved in the model example by the simplex method, the solution of the second stage problem is based on the alternative graph formalization and the method of "branches and borders". The obtained results clearly demonstrate the capabilities of the proposed scientific and methodological tools for the synthesis of the topological structure of distributed terminal systems and the prospects of its use in the newly arising tasks of the technical implementation of new infocommunication technologies and services.
The development of methodical and mathematical apparatus for formation of a set of diagnostic parameters of complex technical systems, the content of which consists of processing the trajectories of the output processes of the system using the theory of functional spaces, is considered in this paper. The trajectories of the output variables are considered as Lebesgue measurable functions. It ensures a unified approach to obtaining diagnostic parameters regardless a physical nature of these variables and a set of their jump-like changes (finite discontinuities of trajectories). It adequately takes into account a complexity of the construction, a variety of physical principles and algorithms of systems operation. A structure of factor-spaces of measurable square Lebesgue integrable functions, ( spaces) is defined on sets of trajectories. The properties of these spaces allow to decompose the trajectories by the countable set of mutually orthogonal directions and represent them in the form of a convergent series. The choice of a set of diagnostic parameters as an ordered sequence of coefficients of decomposition of trajectories into partial sums of Fourier series is substantiated. The procedure of formation of a set of diagnostic parameters of the system, improved in comparison with the initial variants, when the trajectory is decomposed into a partial sum of Fourier series by an orthonormal Legendre basis, is presented. A method for the numerical determination of the power of such a set is proposed.
New aspects of obtaining diagnostic information from the vibration processes of the system are revealed. A structure of spaces of continuous square Riemann integrable functions ( spaces) is defined on the sets of vibrotrajectories. Since they are subspaces in the afore mentioned factor-spaces, the general methodological bases for the transformation of vibrotrajectories remain unchanged. However, the algorithmic component of the choice of diagnostic parameters becomes more specific and observable. It is demonstrated by implementing a numerical procedure for decomposing vibrotrajectories by an orthogonal trigonometric basis, which is contained in spaces. The processing of the results of experimental studies of the vibration process and the setting on this basis of a subset of diagnostic parameters in one of the control points of the system is provided.
The materials of the article are a contribution to the theory of obtaining information about the technical condition of complex systems. The applied value of the proposed development is a possibility of their use for the synthesis of algorithmic support of automated diagnostic tools.
Preserving the cultural and historical heritage of various world nations, and their thorough presentation is a long-term commitment of scholars and researchers working in many areas. From centuries every generation is aimed at keeping record about its labor, so that it could be revised and studied by the next generations. New information and multimedia technologies have been developed during the past couple of years, which introduced new methods of preservation, maintenance and distribution of the huge amounts of collected material. This article aims to present the virtual museum, an advanced system managing diverse collections of digital objects that are organized in various ways by a complex specialized functionality. The management of digital content requires a well-designed architecture that embeds services for content presentation, management, and administration. All elements of the system architecture are interrelated, thus the accuracy of each element is of great importance. These systems suffer from the lack of tools for intelligent data curation with the capacity to validate data from different sources and to add value to data. This paper proposes a solution for intelligent data curation that can be implemented in a virtual museum in order to provide opportunity to observe the valuable historical specimens in a proper way. The solution is focused on the process of validation and verification to prevent the duplication of records for digital objects, in order to guarantee the integrity of data and more accurate retrieval of knowledge.
As a result of the analysis, it was revealed that social networks (Vkontakte, Facebook), thematic communities in microblogging networks (Twitter), resources for travelers (TripAdvisor), transport portals (Autostrada) are a source of up-to-date and operational information about the traffic situation, the quality of transport services and passenger satisfaction with the quality of levels of transport services. However, the existing transport monitoring systems do not contain software tools capable of collecting and analyzing traffic information located in the Internet environment. This paper discusses the task of building a system for automatically retrieving and classifying road traffic information from transport Internet portals and testing the developed system for analyzing the transport networks of Crimea and the city of Sevastopol. To solve this problem, an analysis of open source libraries for thematic data collection and analysis was carried out. An algorithm for extracting and analyzing texts has been developed. A crawler was developed using the Scrapy package in Python3, and user feedback from the portal http://autostrada.info/ru was collected on the state of the transport system of Crimea and the city of Sevastopol. For texts lemmatization and vector text transformation, the tf, idf, tf-idf methods and their implementation in the Scikit-Learn library were considered: CountVectorizer and TF-IDF Vectorizer. For word processing, Bag-of-Words and n-gram methods were considered. During the development of the classifier model, the naive Bayes algorithm (MultinomialNB) and the linear classifier model with optimization of the stochastic gradient descent (SGDClassifier) were used. As a training sample, a corpus of 225,000 labeled texts from the Twitter resource was used. The classifier was trained, during which the cross-validation strategy and the ShuffleSplit method were used. Testing and comparison of the results of the pitch classification were carried out. According to the results of validation, the linear model with the n-gram scheme [1, 3] and the vectorizer TF-IDF turned out to be the best. During the approbation of the developed system, the collection and analysis of reviews related to the quality of transport networks of the Republic of Crimea and the city of Sevastopol were conducted. Conclusions are drawn and prospects for further functional development of the developed tools are defined.
Today, the list of applications that require accurate operational positioning is constantly growing. These tasks include: tasks of managing groups of Autonomous mobile robots, geodetic tasks of high-precision positioning, navigation and monitoring tasks in intelligent transport systems. Satellite navigation systems are a data source for operational positioning in such tasks. Today, global and local satellite navigation systems are actively used: GPS, GLONASS, BeiDou, Galileo. They are characterized by different completeness of satellite constellation deployment, which determines the accuracy of operational positioning in a particular geographical point, which depends on number of satellites available for observation, as well as the characteristics of the receiver, landscape features, weather conditions and the possibility of using differential corrections. The widespread use of differential corrections at the moment is not possible due to the fact that number of stable operating reference stations is limited - the Earth is covered by them unevenly; reliable data networks necessary for the transmission of differential corrections are also not deployed everywhere; budget versions of single-channel receivers of the navigation signal are widely used, which do not allow the use of differential corrections. In this case, there is a problem of operational choice of the system or a combination of satellite positioning systems, providing the most accurate navigation data. This paper presents a comparison of static and dynamic methods for selecting a system or a combination of satellite positioning systems that provide the most accurate definition of the object's own coordinates when using a single-channel receiver of navigation signals in offline mode. The choice is made on the basis of statistical analysis of data obtained from satellite positioning systems. During the analysis, the results of post-processing of data obtained from satellite navigation systems and refined with the use of differential corrections of navigation data were compared.
Mathematical models of the Earth system and its components represent one of the most powerful and effective instruments applied to explore the Earth system's behaviour in the past and present, and to predict its future state considering external influence. These models are critically reliant on a large number of various observations (in situ and remotely sensed) since the prediction accuracy is determined by, amongst other things, the accuracy of the initial state of the system in question, which, in turn, is defined by observational data provided by many different instrument types. The development of an observing network is very costly, hence the estimation of the effectiveness of existing observation network and the design of a prospective one, is very important. The objectives of this paper are (1) to present the adjoint-based approach that allows us to estimate the impact of various observations on the accuracy of prediction of the Earth system and its components, and (2) to illustrate the application of this approach to two coupled low-order chaotic dynamical systems and to the ACCESS (Australian Community Climate and Earth System Simulator) global model used operationally in the Australian Bureau of Meteorology. The results of numerical experiments show that by using the adjoint-based method it is possible to rank the observations by the degree of their importance and also to estimate the influence of target observations on the quality of predictions.
Internet-of-Things networks are applied in many areas of people life now. A cornerstone in a issue of a possibility of further distribution and use of these networks is the aspect of security support. However, the features of these networks complicate the use of traditional means and systems of computer protection in them. One of such features is the need to analyze very large volumes of data, heterogeneous by the nature, in real time and with the minimum computing expenses. Taking into account the features of computational capabilities of Internet-of-Things networks the architecture of the system for parallel big data processing based on the data processing technology named as Complex Event Processing and the parallel computing platform Hadoop is offered. The issues directly connected to the architecture of the system and with implementation of its principal components are considered. These components are: data collection component, data storage component, data normalization and analysis component, and data visualization component. An interconnection between components is provided by means of the Hadoop Distributed File System that is a basis for creation of the distributed data storage. The data collection component organizes the distributed data acquisition and their storage in the data storage component. The data normalization and analysis component transforms data to a uniform format and processes them by means of correlation rules. The data visualization component presents data in a graphical form more suitable for further perception by the operator. The results of the experimental evaluation of the system performance confirming a conclusion about its high performance are discussed.
The article discusses methodological bases for the organizational and technological control (OTC) of the protection of an information resource (PIR) of electronic document management systems (EDMS) based on software (SW) of information security. The authors developed a conceptual model of control of PIR of EDMS on the basis of conceptual study of the aspects of the formation of OTC PIR EDMS methodology on the basis of the SW of PIR, which has ample opportunities to be used for developing methods of administrative tasks solution. The paper presents a technique for efficiency management of functioning of the information resource protection subsystem (IRPS) in EDMS, assuming optimization of the subsystem controlled parameters that maximize an integral index of efficiency of IRPS functioning and respectively execution of requirements imposed to the subsystem. The algorithm for determining best values of the IRPS controlled parameters and best value of an integral index of efficiency of the subsystem, providing a possibility of creating specific subsystems of IRPS automated management efficiency in EDMS, is given. Results of calculations for a research of an index of temporal non-conflictness of IRPS functioning are analyzed.
In this paper a comprehensive architecture for emotional and affective process in a virtual agent is presented . By fusing video, audio and text emotion of the users as affective sources to the system, the virtual agent can appraise the mood of clients. To emulate the influence of the human hormones in the virtual agent, the proposed system employs Artificial Endocrine System (AES) in the aspects of moods and biological needs, by controlling the concentration level of the influential hormones. The agent affective processor engages AES, personality and mood modules to manage the internal state. Intelligent virtual agent would interact with clients according to its affective state circumstances.
The proposed system presents a complete platform to capture emotional channels through the network to analyze and process them in an affective engine in order to determine the emotional quality of the response.
An algorithm for synthesis of robust control system for a continuous plant with uncertain interval parameters is proposed in the paper. A concept of relative intervality of the following interval mathematical objects is used to ensure robustness of the system: a scalar, a vector, a numerical characteristic of matrix namely trace. The problem is solved by the median modal control method taking into account the relative intervality of trace of the system state matrix. The trace of a matrix is the sum of the eigenvalues. The desired relative intervality value of standard system indicators is guaranteed. It is shown that relative intervality of trace of the system state matrix is equal to relative intervality of trace of multiply eigenvalue when the state matrix has one multiple eigenvalue. Relative intervality of trace of the system state matrix is changed by changing its median component. It is realized by introducing feedback on the plant state vector. The obtained results are illustrated by an example.
The paper presents an analysis of the current state of research into the problems of the control of the asteroid hazard, which has shown the need to create a multilevel system for hitting asteroids. Mathematical models and characteristics of the near-moon system of damage to asteroids are developed and investigated. For a basic system consisting of a single interceptor spacecraft (ISC), estimates of the probabilities of asteroids are given, on the basis of which conclusions are made about the potential effectiveness of this system, and the main directions for further research are indicated. An original dynamic model for planning the application of the near-moon system of hitting asteroids by the ISC group is proposed. Approaches to the solution of problems of modeling and planning the application of this group based on the combined use of the mathematical apparatus of the modern theory of optimal control and operations research are analyzed and substantiated. The analysis also showed that the model-algorithmic support, developed for the present time, can be used not only for the near-moon but also for other levels of the proposed system for protecting the Earth from asteroids.
An algorithm for the formation of a set of effective classification features, based on the truncated search concept and the use of the information about individual classification indicators in the granules selection, is proposed. Its computational efficiency is ensured by the use of simple comparison operations of classification results of individual classes when choosing the most informative granule at the next iteration and using the parallel computing technology on graphics processing units.
Known methods of the truncated selection for the formation of sets of effective classification features are considered. The results of the informative features search are discussed through the example of solving the cloud classification problem on the basis of the application of a probabilistic neural network and the texture information of MODIS satellite imagery. A description of the used classifier and the statistical approach to describing the texture of images is given.
The most effective cloud classification characteristics are determined by comparing the combinations of textural features obtained by truncated selection methods. The study results of the change dynamics in the correctly classified clouds estimation when performing various algorithms for informative features searching are shown. It is established that the method, developed in this paper, makes it possible to reduce the variance of probability values of the correct classification of individual classes.
Smart space is a service orientated infrastructure for knowledge sharing between devices. This paper describes a smart space creation process based on integration of Smart-M3 platform with DD-WRT-based device. Smart-M3 is an open source platform which implements the concept of smart space. Wi-Fi router was chosen as a DD-WRT-based device, which allows using it for smart space organization and provides wireless connection between devices at the same time. This method simplifies deployment of scenarios with several participants. The paper describes a process of compilation and installation of Smart-M3 platform to DD-WRT operating system. Testing of the main Smart-M3 operations showed that a smart space, organized in this way, can be used for considered scenarios. The authors have developed “Smart-M3 Control Panel” web-service which allows users to control the Smart-M3 platform by a graphical web interface. User of “Smart-M3 Control Panel” can view a current status of the platform; launch, stop or reload the platform; view information storage; download log files and change startup options. SocketIO protocol was used for user interaction with a web service.
The article discusses the design of an expert system and a control algorithm of a quasistatic gait of an exoskeleton, which guarantees the stability of the device in the vertical position, on the basis of which mathematical modelling of the object’s motion is carried out. In this work we present an analytical scheme of the device in the form of an eleven-link mechanism, whose links are connected with each other by single-coordinate hinges, which describes the exoskeleton’s motion in two planes: sagittal and frontal. The position of the center of mass, whose coordinates change depending on the position of the legs and body, has been determined. We have developed logical rules that form the expert system and ensure a stable gait of the exoskeleton by placing the center of mass inside the support polygon. Results of numerical modelling of the system step in a specially designed virtual simulator have been obtained.
This paper is devoted to feature selection and evaluation in an automatic text-independent speaker verification task. In order to solve this problem a speaker verification system based on the Gaussian mixture model and the universal background model (GMM-UBM system) was used.
The application sphere and challenges of modern systems of automatic speaker identification were considered. Overview of the modern speaker recognition methods and main speech features used in speaker identification is provided. Features extraction process used in this article was examined. Reviewed speech features were used for speaker verification including mel-cepstral coefficients (MFCC), line spectral pairs (LSP), perceptual linear prediction cepstral coefficients (PLP), short-term energy, formant frequencies, fundamental frequency, voicing probability, zero crossing rate (ZCR), jitter and shimmer.
The experimental evaluation of the GMM-UBM system using different speech features was conducted on a 50 speaker set and a result is presented. Feature selection was done using the genetic algorithm and the greedy adding and deleting algorithm.
Equal error rate (EER) equals 0,579 % when using 256 component Gaussian mixture model and the obtained feature vector. Comparing to standard 14 MFCC vector, 42,1 % of EER improvement was acquired.
. In article new approach to simulation and design of infocommunication systems, in which hierarchical multi-level routing is provided, is offered. Authors considered elements of a set-theoretic base and system of models of infocommunication system, operating not only traditional model elements – bipolar communication networks, – but also the multiple segments such as circuit, star, ring and tree. With use of provisions of the theory of sets to the basic concepts and procedures of a reference model of open system interconnection authors put in compliance mathematical objects providing the strict formal description of infocommunication system in which multipath multiple address physical and logical connections "point-to-multipoint", "multipoint-to-point", "multipoint-to-multipoint" are implemented. On the example of simulation of property of structural reliability of specific infocommunication system constructibility, visualization and systemacity of the developed approach are shown.
In terms of information security, embedded devices are elements of complex cyber-physical systems, systems of the Internet of Things, working in a potentially hostile environment. Therefore, the development of such devices is a challenging problem, often requiring expert solutions. The complexity of developing secure embedded devices is due to different types of potential threats and attacks to the device, as well as the fact that in practice security of embedded devices is usually considered in the final stages of the development process in the form of adding additional security features. In the paper, we propose a design technique aimed at the development of safe and energy-efficient cyber-physical and embedded devices. This technique organizes a search for the best combination of security components on the basis of solving an optimization problem. The efficiency of the proposed technique is demonstrated through the development of a secure system to protect a room perimeter.
The report presents the development of the design methodology for active radio-wave single-position modules of radar control systems of various facilities and the provision of technical vision systems in low visibility conditions, which can also be used for visualizing dangerous objects hidden beneath a person's clothing in heavy passenger traffic. It is based on the focusing technologies of radio-wave radiation with the use of a Luneberg lens and autodyne sensors.
The object of research is a mobile robot system (MRTS) for geological exploration on the lunar surface. The aim of the project is to define a technical appearance and performance characteristics of MRTS, equipped with a drilling rig, and to study scenarios of application of MRTS in the course of geological exploration on the lunar surface. The findings could be useful for further development of MRTS for geological exploration on the Moon's surface as well as for works dedicated to other types of on-planet and robotic vehicles designed to run on the surface of the Moon and Mars.
This work is devoted to the determination of the maximum possible number of sensors connected to one of the local servers of the automated system for monitoring the technical condition of man-made structures. The article presents a simulation model with the time-dependent probabilistic deterministic process of receiving requests and hyperdelta requests service process. The use of hyperdelta distribution in the simulation model is substantiated by comparing simulation results with the results obtained using an analytical model. Based on the simulation results, a database management system for a local server is chosen.
The article shows the approach to construction and use of associative-reflex memory of the cybersystem capable to form scenarios of anticipatory behavior at the level of conditioned reflexes.
An approach to the formation of a stable heterogeneous system of the spacecraft is developed . Requirement to provide quasi-synchronous orbits multiplicity is formed . Decomposition of problem of formation of orbits with a given cycle of track circuit is carried out . Method of forming multiple quasi-synchronous orbits of various geometric characteristics of a single cycle of track circuit in the given operating conditions is developed .
For complex industrial facilities providing integrated security is extremely and very important problem for airport facilities (AF). Features AF is a significant set of requirements: aviation security (AS), personnel security, aircraft security and engineering infrastructure. To ensure the functioning of AF for security purposes apply integrated management system (IMS), consisting of the management system set, in accordance with various standards, including international (ISAGO, ISO, ISO/IEC and other). The task seems appropriate to consider a model-based IMS, supplemented both by AS block and comprehensive audits block. In this issue presents the results of calculations according to the presented model IMS with regard to expanded criteria for AF. By a consensus of experts, the requirements of the "base" ISO much lower on the priority of "profile" for AF requirements ISAGO (IATA).
In the article review of the existing systems of computer sign language is provided and their advantages and disadvantages are identified. The synchronic aspect of these systems was considered. The general case of translation (both sides) from sounding Russian on Russian sign language and vice versa is observed. A new method for constructing a semantic unit of computer sign language is proposed. Lexical meanings of words are defined to match the correspondence "word-gesture". Among the many words alternatives based on the semantic analysis algorithm for each word necessary lexical meaning is confirmed. For simple sentence semantic analyses algorithms are developed. A translation method of the Russian text into Russian sign language based on a comparison of syntactic structures is proposed. Relevant library is developed to determine the syntax constructions. To create the architecture of the future system for gesture recognition are examined existing hardware and media programs. It is noted that this stage there is no solution that meets the specified requirements, so to get a more accurate result, it is necessary to use a combination of these systems.
Risk analysis of information security is now especially hot topic, owing to that that as insurance companies want to have probably more exact characteristics about the probable extent of damage and the necessary sum of insurance, and the company, wishing to insure the information risks, also want to understand, for what and as far as these or those sums are reasonably paid at the conclusion of the contract of insurance. Besides, any of the called parties doesn't want to lose own resources. Thus, it is necessary to learn to receive adequate, but at the same time the complex, aggregated estimates of security of information systems. The comprehensive analysis of security both program and technical component of system, and the personnel of such systems (their socio-technical component) is for this purpose necessary. The purpose of the present article is development and improvement of the task of the main relations considered before option in the "personnel information system-critical documents" complex at socio-engineering attack of the malefactor.
The paper describes the overall architecture of the system of intelligent information security services (SIISS) for usage in critical infrastructures, as well as its constituent components. In the overall architecture of SIISS the event level, the data layer and applied level are determined. Structural and functional models of the SIISS overall architecture are outlined to highlight the main functional mechanisms for selected levels. As key components of SIISS, which provide a more detailed description of their architectural design, we consider the event correlation management module, the prognostic security analyzer, the component of attack and security system behavior modelling, the decision support and reaction component, the visualization module, and the repository.
The analysis of the structural stability of the spacecraft, consisting of different types of spacecraft. Introduced the concept of time-stable structure of a hybrid system SC. Produced decomposition problem temporarily provide a stable structure into two subproblems, namely, sustaining the relative position of the planes of the orbits of spacecraft and sustainable mutual position of the spacecraft in orbit for a specified time. The criteria of the structural stability of a hybrid system SC.
The paper proposes the variant of architecture of sub-search system for analytical monitoring implementation featuring its own database formation and own search index. For accelerating the process of obtaining the documents potentially relevant for user, the external internet search systems are involved on initial stage.
The article deals with reliability assessment methods for systems with three-state elements. It is shown that further development of conventional logic-and-probabilistic methods (LPM) eliminates the LPM deficiencies such as analysis of only two element states and assumption of their independency. Two models of element failure impact on the system reliability are shown which demonstrate the principles of reliability assessment using the ARBITER software which incorporates capabilities of algebra of disjoint event groups and is based on the general logic-and-probabilistic method (GLPM). Description of logic and probabilistic function transformations for disjoint events is shown in the annexes.
Approach to expand the functionality of associative intelligent systems is considered. Control features an associative interaction of signals in these systems and giving them a second signal system are disclosed. Proposals for the analog implementation of such systems are formulated
Multimodality of traditional interpersonal communications points to the purposefulness of using the polymodal dialogue in the process of communicative interaction of infocommunications subscribers. The creation of the polymodal communication systems became possible due to the development of cognitive science and current results in the design area of multimodal interfaces interaction. Application of the existing and expected outcome of signal processing tasks of different modalities in the synthesis of polymodal systems will provide all parties to communicate and their further intellectualization will allow us to approach the infocommunicational interaction of subscribers to the traditional interpersonal communication.
The paper discusses features of construction and operation of automated systems of railway transport. As main distinguishing factors, the great variety and diversity of such systems, their mutual co-relationships and links with public networks, and strong heterogeneity of internal user are highlighted. The architecture of a multi-level intelligent information security system that proposed to protect information in automated systems of railway transport is suggested and discussed. To store data about security in a multilevel intelligent system of protection it is proposed to use a hybrid ontology repository. Formal task statements for intelligent services of data analysis at the top level of the reviewed protection systems are offered. Analysis of these statements showed that development of intelligent services for correlation management, security analysis and attack modeling should be assigned to analysis tasks. Intelligent services for decision support and visual data analysis are among the synthesis tasks.
In article the algorithm of functional reconfiguration instrumentation motion control system to ensure the effectiveness of the target unmanned spacecraft is considered.
The author made the analysis of modern state of GLONASS, determined problems, the main of which is the support of its qualitative work. In order to gain high accuracy of location for users of this system the conception of development of MG NSS GLONASS on the principle of kvalitologiya is given in this article. The problem is solved with the help of interconsistency automatic information processing for qualitative ephemeris and time-frequency support.
The plan operation correction problem of ground based space monitoring information system is considered in this paper. The generalized algorithm of the positional control construction is proposed and illustrated on the numerical example.
A multiple-model approach to description of space and ground based date monitoring information systems (IS) functioning processes is presented. Moreover these systems investigate in conditions when their parameters and structures changeability by objective (subjective) external (internal) reasons. The processes considered in this paper were qualified as control processes of IS structure dynamics. Previously developed concept of active moving object (AMO) was used to form an informal and set-theory-based statement of control problems.
The paper describes the general architecture of the system of verification of filter rules firewall and discusses aspects of the software implementation. The implementation is based on the method of "model checking". SPIN software system is used as a verifier. Also designed user interface is described in the paper. It allows to download data on verifiable system and filtering policy rules. The user interface includes elements for management verification process and presentation of its results. In addition, the proposed system allows using different strategies to resolve the anomalies.
The paper considers the task of designing the ontology based data model for a network attack modeling system which is a part of a SIEM system. The common data scheme is suggested. The scheme was developed based on the SCAP protocol. Related papers on ontology based security systems are analyzed. The design of the SCAP protocol ontology is considered in more detail. The vulnerability ontology is proposed as an example of the common data model of the network attack modeling system.
In the field of information security it is necessary to develop scientific and proved and mathematical methods and the models reflecting specifics of subject domain for ensuring activity of experts, allowing to automate the analysis of information systems user’s security from socio-engineering attacks. The purpose of this paper is consideration of a method of of success probability search of socio-engineering attacking impact on each user in the "personnel - information system - critical documents" complex where users and communications between them are presented as graph. The algorithm assumes search of various acyclic ways between two users.
The paper analyzes the most well known and developed at present data storage systems that are used to build the repository for perspective security information monitoring and management systems (SIEM–systems). Relational DBMSs, XML-databases and stores are analyzed. The relational schema, that integrates analytical modules of SIEM system, is uggested and commented. The classification and characteristics of known tools of implementation and use of XML databases are given. Among triplet stores, the system Virtuoso is chosen. It provides a hybrid approach to implementation of the repository in perspective SIEM systems, which was probated for attack modeling and security analysis.
The paper describes research and development of a software system for sawmill operation planning. Sawmill industry is an important branch of the forestry industry. The aim of the sawing process consists in processing round wood into sawn lumber, as well as technological wood chips. Various tasks related to planning of sawmill operation can be successfully solved with the use of specialized software. Such software allows increasing overall mill productivity, output of high-quality grades of lumber and better matching the production specification. Their use also improves the efficiency of calculating and correcting the operational plans. The paper describes the solution of the problem of calculating monthly volume production plans. Such plans improve the efficiency of calculating the quantity and size-qualitative structure of logs to be sawn and the lumber produced by applying each sawing pattern. The developed software system uses advanced mathematical models and optimization algorithms, implemented in a specialized module. The paper also includes description of the system prototype. The efficiency of the system had been confirmed on real production data of several sawmills in Russia.
We consider the problem of constructing a Bayesian rating system that learns a general ranking function from the results of individual matches and/or tournaments (rankings on small subsets). Extending the results of [9], we construct a rating system that can take into account additional numerical information on tournament results. The paper contains detailed descriptions of Bayesian rating models, inference algorithms, and experimental results.
Cyber warfare marks a new level of information confrontation occurring in computer infrastructure. New and very promising area of information security in conditions of cyber warfare is to build the system of intelligent information protection services. The system of intelligent information protection services uses the technology of security information and event management, which enables to withstand cyber-attacks and cyber terrorism and to ensure the necessary level of infrastructure cyber security. The paper discusses the basic issues for development a system of intelligent protection services and its individual components. Based on the analysis of general regulations for realizing a system of intelligent information protection services, the paper provides a number of basic approaches for implementation intelligent services, such as services for collecting, converting and storing information about security events, services for modeling of attacks and protection system behavior, security decision support services and information visualization services.
Risk analysis of information security nowadays is an extremely important topic, due to the fact that insurance companies want to have probably more exact characteristics about the probable size of a damage and the necessary sum of insurance, and the company, wishing to insure the information risks, also wants to understand, for what it does pay at the conclusion of the contract of insurance and if these fees are reasonable. Besides, both mentioned above parties don't want to lose their resources. Thus, it is necessary to learn to receive adequate, but at the same time complex, aggregated estimates of security of information systems. The purpose of the present article is consideration of setting of general relations in a complex «the personnel information system – critical documents» at socio-engineering attack of the malefactor, and then illustration of work of principles of a likelihood and relational approach on simplified (for availability and brevity of a statement) example. We’ll use the mixed terminology borrowed from the theory of the relations and the theory of relational DB.
The generalized dynamic model of the control of corporate information system is considered. The scheme and the generalized algorithm of the positional control construction using the position optimization method are proposed.
The paper is devoted to the proof of upper bounds of steps of logic-objectiv algorithms for recognition of a complicated image situated on a display screen. It is proved that the problem of separation and recognition of an etalon object from a complicated scene has a polynomial algorithm. The problem of separation and recognition of an object from a class the description of which contains only distinctive attributes of this class belongs to. To decrease the algorithm number of steps a notion of "fuzzy image"' is introduced. The problem of invariant (under rescaling) image recognition is regarded.
The paper proposes a survey of assistive smart spaces and ambient assisted living environments. Also design of a multimodal assistive system for a smart living environment is presented. The system consists of two software coplexes. The first one provides video signal processing and surveillance for detecting and tracking a user as well as analysis of his/her activity. The second software complex provides audio signal processing for automatic recognition of speech messages and non-speech acoustic events. The developed automatic speech recognition system is multilingual one and is able to recognize words both in English and in Russian. At the experiments, 2811 wave files with speech commands and simulated acoustic events have been recorded in total. Recognition rate for speech commands and non-speech acoustic events was 96.5% and 93.8%, respectively.
A model and basic algorithms for processing spatial data using an expert system is proposed. The principal possibility of increasing the efficiency of geo-information systems based on these models and algorithms is shown
The paper describes an architecture of the logistics system based on application of the smart space idea to finding fellow-travelers for drivers. The ontology formed by mobile devices of the system participants and interconnections between them are presented. The paper also describes algorithms for finding appropriate fellow-travelers for drivers as well as definition of the pick-up and drop-off points meeting requirements of both drivers and passengers. Due to the rather large dimension of the problem, the usage of heuristics significantly reducing the dimension of the task is proposed. To demonstrate the possibilities of the architecture and its underlying components, the software prototype of this system has been developed and described.
In this article we treat a question how to develop a procedure of functional and parametric analysis, which is based on calculation of effectiveness of multifuncional complex operation during decision making; we offer correlations for calculation, mark practicability of adding of support devices to information complexes.
In this paper, we give an analytical survey of peculiarities of the Russian sign language and calc signed (gesture) speech, including state-of-the-art of sign lexicons and grammatical constructions, as well as methods for formalization of sign lexicon items. In the course of the multidisciplinary research, a virtual 3D model of human being’s avatar has been adopted for the Russian sign language synthesis, and a multipurpose model of multimodal audio-visual synthesizer aimed for text to Russian auditory speech and calc signed speech transformation.
Procedure of construction and research of dynamical properties of the aggregated composite system for interval control system is presented. Results of Lyapunov’s method development on the objects with parametrical uncertainty class for the purpose of reception of composite model for separate subsystems and their aggregation in system are offered.
A variant of interactive television system with multimodal interface for order multimedia content interesting for a user and control by standard TV functions is considered. The developed dialogue system based on annotated database of telecast and TV channels provides search and choosing required telecast with its following translation.
Issues of development of methodical support and soft-hardware facilities, which improve capabilities of distant learning with using mobile devices, are considered. The analysis of current state of audio-, video- and presentation devices is used for compilation of the actual content of user web-interface adaptive to mobile device features.
An approach is expouned for XML use to specify intertask and external interfaces of real-time software applications. Specification of software application interfaces presents a set of tasks makes up software application; a set of interface elements, that implement intertask links; a sequence of code segments in each task; a set of sensors and effectors that link software application with external environment. Specification elevents equipted by dynamic characteristics of modeling objects.The specification processing permits to check feasibility of specified system.
The article is devoted to the complex approach to modeling, estimating and analysis of the scenarios of degradations and recovering the structured conditions of the disaster tolerance information systems (DTIS). Model-algorithmic supply for the decision of the determination and reconfiguration of the structural conditions DTIS, estimating and analysis of topology of structural conditions using probability and fuzzy-probability approaches have been designed.
The paper presents practical usage items of multiagent technology. It includes description of agent-based system specific features determining an area of their practical application and successful examples of agent-based approach usage for decision of some important practical tasks. The main attention of the paper is paid to the problem of interaction of agents with environment. In this relation description of some multiagent systems’ environments is given. As well the paper includes description of MASDK tool supporting completed life cycle of multiagent systems’ development. Taking into account the focus of the paper the main attention of the tool description is paid to presentation of decisions that are used for realization of interaction agents with environment.
One considers the application of variation approach for solution of problems of statistic estimation of non-linear dynamic systems due to criterion of minimum of least squares. One discusses questions of regularization of marks appreciation.
We give a survey of existing query-by-humming information retrieval systems that use feature extraction. The paper contains a complete description of the most popular feature extraction techniques (CENS and MFCC) and offers a design of an experimental system aimed at comparing different feature sets, vocabulary selection, indexing, and search methods.
A conceptual model of the knowledge management system for interoperability automatization between production network partners is proposed. The knowledge management system has a distributed architecture and is based on usage of the ontology model of the problem domain and such technologies as profiling and competence management. User profiles allow to specify and extend user request and personalize information and knowledge flow from the knowledge management system to the user. Competence profiles of the production network partners allow to find partners for a certain production operation or production/delivery of the required components.
An example of multiagent model for animal population is considered. As expected, it should be used for both quantitative and spatial modeling. The model structure and particular agent functions are defined. The most famous architectures for intellectual agents are presented. Architectures for agents in population model are defined.
Now the important problems of structure dynamic control (SDC) theory are the evaluation and estimation of stability, goal, and informational-technological abilities for modern information system (IS). Our investigation shows that this problem can be solved by attainability set construction of SDC models. Preliminary evaluation of attainability sets for the SDC models lets allows to reduce the time (needed) required for solution of IS SDC tasks. Therefore in practice the different approximation of attainability sets are used. Methods and algorithms of evaluation of attainability sets for the SDC models are proposed.
The paper considers the existing models and systems of network worm propagation simulation. The simulation systems NWS, SSF.App.Worm, GTNetS, PDNS and DIB:S/TRAFEN are described. The paper analyzes the advantages and disadvantages of applying these systems for network worm propagation research.
A model of digital image attributed with virtual memory by analogy with computer memory is developed. In addition to operation of storage element reset the fixation (weaving) operation of virtual storage element is defined. The basic model image representations are described and their practical interpretations are discussed.
The paper describes an approach to intelligent decision support. The approach is based on integration of information and knowledge into context that models a problem to be solved or a situation to be presented to a decision maker. The context takes into account dynamic of the environment. Two types of context are used: abstract and operational. The problem to be solved is modelled by a means of object-oriented constraint networks and interpreted as a temporal consraint satisfaction problem. Compatibility of the problem model with ontology model is ensured through application of formalism of the object-oriented constraint networks for knowledge representation. The approach relies upon a twolevel framework of decision support. The framework has two distinct main phases: the preparatory phase and the decision making phase. The approach is oferred to be implemented using the technology of Web-Services.
This article proposes an approach for investigating the exponential stability of a nonlinear interval dynamical system with nonlinearity of a quadratic type on the base of the Lyapunov’s direct method. It also constructs an inner estimate of the attraction domain to the origin for the system under consideration.
The paper considers issues applied to design and implementation of the system of proactive monitoring of security policy. The approach suggested is based on simulation of user actions in computer network under investigation. The generalized architecture of proactive monitoring system and its functioning techniques are described, problems applied to work in real network and their possible solutions are considered. The paper contains the description of prototype of proactive monitoring system and the example of the prototype using to test network security policy.
Technology of designing functional diagrams of protection system with IDEF and semiautomatic transformation them into UML diagrams of classes are mentioned. Conversion from model to a framework of code is shown.
The Organization Peculiarities of the Automated Information System "Tutorial System of the Sub-faculty"
Principles of building cognitive systems that define modern state of informatics and artificial intelligence are formed and discussed. Methods of representation, processing, and forming cognitive functions, relations, and processes are described. Neurological means for their implementation are described. Issues of organization of cognitive agents and systems are discussed. Applications of the cognitive agents and systems in games and control systems of anthropomorphic robots are shown.
In the paper an approach for investigating asymptotic stability of nonlinear interval timedelay system is proposed on the base of Lyapunov’s direct method and interval analysis. A sufficient condition of asymptotic stability is obtained using the concept of Lyapunov-Krasovsky functional.
The technology of construction of functional model of object both estimation of its labour input and cyclic complexity is given. The appropriate tool means are briefly considered.
Introduction article and short description of decision acceptance support system for updating and analysis of algorithmic models in spreadsheets.
Ones of the perspective mechanisms supplementing existing mechanisms of information resources protection in computer networks are malefactors’ deception mechanisms. These mechanisms are intended for increasing the security of target information systems on the base of attraction of malefactors to false information goals, deceptions, identification of their actions and disclosure. Malefactors’ deception mechanisms are realized by means of development and usage of deception systems (DS) or components named also false information systems, simulators of information systems, traps or honeypots. The paper defines the destination, functions and structure of DS, presents their classification, submits the offered approach to development of perspective DS, offers the schemes of realization of disguised counteraction against network attacks and architecture of the DS prototype developed, describes the experiments spent with the prototype.
The Deep Data Diver system uses a new technology of associative rules search which is based on modified tools of linear algebra and the usage of a data self-organization procedure and an informational structural resonance effect. The unique characteristics of the system allow to search data for highly accurate associations of the items comprising the initial transaction set with a given item. These sets form a basket with high support level and long itemsets. The article provides a general overview of the Deep Data Diver system and gives the comparison results of solving the specific task of market basket analysis.
The paper discusses the design and implementation issues of data fusion decision making systems and proposes the basic principles and architecture for distributed data processing aiming at decision making system learning on the basis of knowledge discovery from data.
In the paper, a review of the taxonomies of the attacks on computer systems is presented. The analysis of the following types of the taxonomies are fulfilled: lists of attack terms; lists of attack categories; attack results categories; empirical lists of attack types; vulnerabilities matrices; actionbased taxonomies; taxonomies based on the attack signatures; security flaws or vulnerabilities taxonomies; incident taxonomies.
The Algebraic Bayessian Networks (ABN) approach is attracted to build effective model of reliability forecasting for complex-structure system nodes, which are hard of access. ABN provides error monitoring for reliability function behavior forecasting.
The new program-technical solutions using real successes and possibilities of domestic science in the field of analytical systems are offered. The possibilities of creation of effective strategic analytical systems of the "partner" class, having no analogies in the world, are discussed.
As a marker characterizing air pollution in the surface layer of the atmosphere of modern cities, the concentration level of particulate matter with a diameter of 2.5 microns or less (Particulate Matter, PM2.5) is often used. The paper discusses the practice of using a relatively cheap optical sensor, which is part of the CityAir station, to measure the concentration of PM2.5 in an urban environment. The article proposes a statistically justified correction of the primary data obtained by CityAir stations on the values of the concentration of suspended particles PM2.5 in the surface layer of the atmosphere of Krasnoyarsk. For the construction of regression models, measurements obtained from E-BAM analyzers located at the same observation posts as the corrected sensors were considered as a reference. For the analysis, primary data was used 1) from 9 automated observation posts of the regional departmental information and analytical system of data on the state of the environment of the Krasnoyarsk Territory (KVIAS); 2) from the 21st CityAir station of the monitoring system of the Krasnoyarsk Scientific Center of the Siberian Branch of the Russian Academy of Sciences. The paper demonstrates that when correcting sensor readings, it is necessary to take into account meteorological indicators. In addition, it is shown that the regression coefficients significantly depend on the season. Supervised learning methods are compared for solving the problem of correcting the readings of inexpensive sensors. Additional information on the results of data analysis, which was not included in the text of the article, is available on the electronic resource https://asm.krasn.ru/ .
The article is focused on a single-channel preemptive queuing system. Two stationary Poisson flows of customers are incoming to the system. The first flow has an absolute priority over the second one: a new high-priority customer from the first flow displaces a low-priority one from the service channel and takes its place. The capacity of the system is limited to k customers. There is a probabilistic push-out mechanism in the system: if a new high-priority customer finds that all the places in the queue are occupied, then it has the right to displace one low-priority customer from the queue with probability a . Both types of customers have the same exponentially distributed service times. Customers who failed to enter the system due to the limited size of the queue, as well as those expelled from the queue or service channel when the push-out mechanism is triggered, are not lost immediately, but they are sent to a special part of the system called the orbit and designed to store repeated customers. In orbit, there are two separate unlimited queues, consisting of low-priority and high-priority repeated customers, respectively. If there are no free places in the system, new customers with a probability q are added to the corresponding orbital queue. The waiting time of repeated customers in orbit is distributed according to an exponential law. The parameter of this law may differ for different types of customers. After waiting in orbit, secondary customers try to re-enter the system. The probabilistic characteristics of the described queuing system are calculated by the method of generating functions, previously proposed by the authors for calculating a similar system without repeated customers. This method allows finding the main probabilistic characteristics of distributions for both types of customers. Particular attention is paid to the study of the dependence of the loss probabilities for both types of customers on the parameters of the system, primarily on the push-out probability a , the capacity of the system k , and the probability of repeated circulation (probability of persistence) q . It is shown that the effect of blocking the system and the effect of the linear law of customers’ losses, previously identified in similar problems without repeated customers, remain valid even in the presence of secondary repeated customers. The theoretical results are proved by numerical calculations. The blocking area for the second type of customers was calculated along with the area of linear loss law for both types of customers. We studied the influence of the probability of repeated circulation q on the shape of these areas and on the dependence of the loss probabilities for both types of customers on the push-out probability a .
Modern methods of process planning in conveyor systems with buffers of a certain size between processing devices allow optimizing schedules for single tasks or fixed task packages with a limited number of them and a limited number of devices. The use of mathematical models of the processes of performing single tasks (task packages) used by these methods in optimizing the composition of packages and schedules for their execution in systems with an arbitrary number of packages and devices is impossible. At the same time, mathematical models of the processes of executing task packages in conveyor systems in the presence of buffers of limited sizes between devices are the basis for the development of methods for optimizing their (package) compositions and schedules for the implementation of actions with them on the devices of conveyor systems. In this regard, the article develops mathematical models of multi-stage processes of performing an arbitrary number of task packages in conveyor systems in the presence of intermediate buffers of limited sizes for two and three devices, as well as for an arbitrary number of devices. The use of these models makes it possible to determine the time points of the start of the execution of task packages on the devices of conveyor systems, taking into account the limited size of intermediate buffers, as well as the duration of time intervals for the use of these resources and the efficiency of their use over time. An algorithm has also been developed for mathematical modeling of the processes of executing task packages in conveyor systems in the presence of intermediate buffers of limited size, which calculates the time characteristics of these processes based on a given order of implementation of actions with task packages on the devices of conveyor systems. An application has been developed that implements synthesized mathematical models of the processes of executing task packages in conveyor systems with intermediate buffers of limited sizes and an appropriate method for modeling these processes. Versatile testing of the developed application has shown that the obtained mathematical models and the modeling method adequately describe the course of multi-stage processes of task packages in pipeline systems, set using different values of their (processes) parameters.
Scenario: System reliability monitoring focuses on determining the level at which the system works as expected (under certain conditions and over time) based on requirements. The edge computing environment is heterogeneous and distributed. It may lack central control due to the scope, number, and volume of stakeholders. Objective: To identify and characterize the Real-time System Reliability Monitoring strategies that have considered Artificial Intelligence models for supporting decision-making processes. Methodology: An analysis based on the Systematic Mapping Study was performed on December 14, 2022. The IEEE and Scopus databases were considered in the exploration. Results: 50 articles addressing the subject between 2013 and 2022 with growing interest. The core use of this technology is related to networking and health areas, articulating Body sensor networks or data policies management (collecting, routing, transmission, and workload management) with edge computing. Conclusions: Real-time Reliability Monitoring in edge computing is ongoing and still nascent. It lacks standards but has taken importance and interest in the last two years. Most articles focused on Push-based data collection methods for supporting centralized decision-making strategies. Additionally, to networking and health, it concentrated and deployed on industrial and environmental monitoring. However, there are multiple opportunities and paths to walk to improve it. E.g., data interoperability, federated and collaborative decision-making models, formalization of the experimental design for measurement process, data sovereignty, organizational memory to capitalize previous knowledge (and experiences), calibration and recalibration strategies for data sources.
The paper is devoted to improving the accuracy of digital sensors with a time lag. The relevance of the topic is due to the widespread use of sensors of this type, which is largely due to a sharp increase in the requirements for measurement accuracy. The timeliness is associated also with the extensive application of digital technologies for information processing in control systems, communications, monitoring and many others. To eliminate the errors caused by the time delay of digital sensors, it is suggested to use an astatic high-speed corrector. The applicability of this corrector is justified by the properties of discrete-time dynamical systems. In this regard, at first, the conditions are considered under which the discrete systems are physically realizable and have a finite duration of the transient since in this latter case they are the fastest. It is also shown that in order to measure a polynomial signal of limited intensity with zero error in steady-state mode, the astatism order of the sensor must be one value greater than the degree of this signal. Based on the above conditions, the main result of the article is proved – a theorem in which the conditions for the existence of the astatic high-speed corrector are established. When this corrector is switched on at the output of the digital sensor or when its software is being corrected an upgraded sensor is formed, the error of which will be zero in steady-state mode. This is due to the fact that the corrector eliminates the error of the digital sensor caused by its time delay, which is assumed to be multiple of the sampling period. The order of the corrector as a system is determined by the integer solution of the equation obtained in the work, which relates the degree of the measured polynomial signal, the time delay of the digital sensor, the permissible overshoot of the upgraded sensor and the relative order of the desired corrector. This equation is solved for the cases, where the degree of the measured signals is not greater than one, the overshoot is equal to the frequently assigned values, and the time delay does not exceed four sampling periods. The corresponding order of the upgraded sensor is given in tabular form. This makes it possible to find the required corrector without solving the shown equation in many cases. The effectiveness of the suggested approach with respect to improving the accuracy of digital sensors is shown by a numerical example. The zero error value of the upgraded sensor is confirmed both by computer simulation and numerical calculation. The results obtained can be used in the development of high-precision digital sensors of various physical quantities.
An effective economy requires prompt prevention of misconduct of legal entities. With the ever-increasing transaction rate, an important part of this work is finding market collusions based on statistics of electronic traces. We report a solution to this problem based on a quantum-theoretical approach to behavioral modeling. In particular, cognitive states of economic subjects are represented by complex-valued vectors in space formed by the basis of decision alternatives, while decision probabilities are defined by projections of these states to the corresponding directions. Coordination of multilateral behavior then corresponds to entanglement of the joint cognitive state, measured by standard metrics of quantum theory. A high score of these metrics indicates the likelihood of collusion between the considered subjects. The resulting method for collusion discovery was tested with open data on the participation of legal entities in public procurement between 2015 and 2020 available at the federal portal https://zakupki.gov.ru. Quantum models are built for about 80 thousand unique pairs and 10 million unique triples of agents in the obtained dataset. The reliability of collusion discovery was defined by comparison with open data of Federal antimonopoly service available at https://br.fas.gov.ru. The achieved performance allows the discovery of about one-half of known pairwise collusions with a reliability of more than 50%, which is comparable with detection based on classical correlation and mutual information. For three-sided behavior, in contrast, the quantum model is practically the only available option since classical measures are typically limited to the bilateral case. Half of such collusions are detected with a reliability of 40%. The obtained results indicate the efficiency of the quantum-probabilistic approach to modeling economic behavior. The developed metrics can be used as informative features in analytic systems and algorithms of machine learning for this field.
The article deals with the problem of forming a digital shadow of the process of moving a person. An analysis of the subject area was carried out, which showed the need to formalize the process of creating digital shadows to simulate human movements in virtual space, testing software and hardware systems that operate on the basis of human actions, as well as in various systems of musculoskeletal rehabilitation. It was revealed that among the existing approaches to the capture of human movements, it is impossible to single out a universal and stable method under various environmental conditions. A method for forming a digital shadow has been developed based on combining and synchronizing data from three motion capture systems (virtual reality trackers, a motion capture suit, and cameras using computer vision technologies). Combining the above systems makes it possible to obtain a comprehensive assessment of the position and condition of a person regardless of environmental conditions (electromagnetic interference, illumination). To implement the proposed method, a formalization of the digital shadow of the human movement process was carried out, including a description of the mechanisms for collecting and processing data from various motion capture systems, as well as the stages of combining, filtering, and synchronizing data. The scientific novelty of the method lies in the formalization of the process of collecting data on the movement of a person, combining and synchronizing the hardware of the motion capture systems to create digital shadows of the process of moving a person. The obtained theoretical results will be used as a basis for software abstraction of a digital shadow in information systems to solve the problems of testing, simulating a person, and modeling his reaction to external stimuli by generalizing the collected data arrays about his movement.
The article presents an analytical review of research in the affective computing field. This research direction is a component of artificial intelligence, and it studies methods, algorithms and systems for analyzing human affective states during interactions with other people, computer systems or robots. In the field of data mining, the definition of affect means the manifestation of psychological reactions to an exciting event, which can occur both in the short and long term, and also have different intensity. The affects in this field are divided into 4 types: affective emotions, basic emotions, sentiment and affective disorders. The manifestation of affective states is reflected in verbal data and non-verbal characteristics of behavior: acoustic and linguistic characteristics of speech, facial expressions, gestures and postures of a person. The review provides a comparative analysis of the existing infoware for automatic recognition of a person’s affective states on the example of emotions, sentiment, aggression and depression. The few Russian-language, affective databases are still significantly inferior in volume and quality compared to electronic resources in other world languages. Thus, there is a need to consider a wide range of additional approaches, methods and algorithms used in a limited amount of training and testing data, and set the task of developing new approaches to data augmentation, transferring model learning and adapting foreign-language resources. The article describes the methods of analyzing unimodal visual, acoustic and linguistic information, as well as multimodal approaches for the affective states recognition. A multimodal approach to the automatic affective states analysis makes it possible to increase the accuracy of recognition of the phenomena compared to single-modal solutions. The review notes the trend of modern research that neural network methods are gradually replacing classical deterministic methods through better quality of state recognition and fast processing of large amount of data. The article discusses the methods for affective states analysis. The advantage of multitasking hierarchical approaches is the ability to extract new types of knowledge, including the influence, correlation and interaction of several affective states on each other, which potentially leads to improved recognition quality. The potential requirements for the developed systems for affective states analysis and the main directions of further research are given.
The problem of classification using a compartmental spiking neuron model is considered. The state of the art of spiking neural networks analysis is carried out. It is concluded that there are very few works on the study of compartmental neuron models. The choice of a compartmental spiking model is justified as a neuron model for this work. A brief description of such a model is given, and its main features are noted in terms of the possibility of its structural reconfiguration. The method of structural adaptation of the model to the input spike pattern is described. The general scheme of the compartmental spiking neurons’ organization into a network for solving the classification problem is given. The time-to-first-spike method is chosen for encoding numerical information into spike patterns, and a formula is given for calculating the delays of individual signals in the spike pattern when encoding information. Brief results of experiments on solving the classification problem on publicly available data sets (Iris, MNIST) are presented. The conclusion is made about the comparability of the obtained results with the existing classical methods. In addition, a detailed step-by-step description of experiments to determine the state of an autonomous uninhabited underwater vehicle is provided. Estimates of computational costs for solving the classification problem using a compartmental spiking neuron model are given. The conclusion is made about the prospects of using spiking compartmental models of a neuron to increase the bio-plausibility of the implementation of behavioral functions in neuromorphic control systems. Further promising directions for the development of neuromorphic systems based on the compartmental spiking neuron model are considered.
When building autonomous real-time systems (RTS), it is necessary to solve the problem of optimal multitasking loading of a number of parallel functioning digital signal processors. One of the reserves for achieving the desired result is the implementation of samples from the sensor signals of information about the magnitude of the signal most rarely in time. In this case, it is necessary to provide a linear or stepwise approximation of the signal by samples with an acceptable reconstruction error. One of the system tasks of these processors is filtering signals or limiting the spectrum to the cutoff frequency. A distinctive feature of the approach proposed in the article is the fulfillment of the condition: if the measurement of this frequency is difficult (for example, in the electromechanical means of the RTS), then for such signals it is proposed to match the maximum values of the harmonic half-wave parameters: approximation error, speed and acceleration. The study opens up the prospect of applying new approaches to sampling the time of signals in the amplitude-time domain and determining the equivalent cutoff frequency of the signal spectrum for such signals. In this article, the dependences of the value of the unit of system time for input-output of data on the degree of agreement between the maximum values of the signal parameters are obtained. A mathematical model of the extreme behavior of a signal between two adjacent samples is given in the form of a harmonic half-wave. The study is also extended to convex composite harmonic functions, according to which the signal can deviate from the results of a linear or stepwise approximation of the signal for these samples. The comparison of the models by the value of the relative time sampling intervals, depending on the degree of matching of the maximum parameters of the harmonic half-wave, is carried out. When comparing, in addition to these maximum parameters, the relationship of the maximum signal speed with the error of approximating the samples by steps and the relationship of the maximum acceleration of the signal with the maximum error of the linear approximation was taken into account. The results make it possible to determine the duration of the intervals of uniform sampling of the signal time based on the results of the inspection of the control object, substantiate a significant increase in the sampling interval of time or a similar increase in the number of tasks to be solved per unit of system time.
The question of behavioral functions modeling of animals (in particular, the modeling and implementation of the conditioned reflex) is considered. The analysis of the current state of neural networks with the possibility of structural reconfiguration is carried out. The modeling is carried out by means of neural networks, which are built on the basis of a compartmental spiking model of a neuron with the possibility of structural adaptation to the input pulse pattern. The compartmental spike model of a neuron is able to change its structure (the size of the cell body, the number and length of dendrites, the number of synapses) depending on the incoming pulse pattern at its inputs. A brief description of the compartmental spiking model of a neuron is given, and its main features are noted in terms of the possibility of its structural reconfiguration. The method of structural adaptation of the compartmental spiking model of the neuron to the input pulse pattern is described. To study the work of the proposed model of a neuron in a network, the choice of a conditioned reflex as a special case of the formation of associative connections is justified as an example. The structural scheme and algorithm of formation of a conditioned reflex with both positive and negative reinforcement are described. The article presents a step-by-step description of experiments on the associative connection’s formation in general and conditioned reflex (both with positive and negative reinforcement), in particular. The conclusion is made about the prospects of using spiking compartmental models of neurons to improve the efficiency of the implementation of behavioral functions in neuromorphic control systems. Further promising directions for the development of neuromorphic systems based on spiking compartmental models of the neuron are considered.
The paper proposes a method for fusioning multi-angle images implementing the algorithm for quasi-optimal clustering of pixels to the original images of the land surface. The original multi-angle images formed by the onboard equipment of multi-positional location systems are docked into a single composite image and, using a high-speed algorithm for quasi-optimal pixel clustering, are reduced to several colors while maintaining characteristic boundaries. A feature of the algorithm of quasi-optimal pixel clustering is the generation of a series of partitions with gradually increasing detail due to a variable number of clusters. This feature allows you to choose an appropriate partition of a pair of docked images from the generated series. The search for reference points of the isolated contours is performed on a pair of images from the selected partition of the docked image. A functional transformation is determined for these points. And after it has been applied to the original images, the degree of correlation of the fused image is estimated. Both the position of the reference points of the contour and the desired functional transformation itself are refined until the evaluation of the fusion quality is acceptable. The type of functional transformation is selected according to the images reduced in color, which later is applied to the original images. This process is repeated for clustered images with greater detail in the event that the assessment of the fusion quality is not acceptable. The purpose of present study is to develop a method that allows synthesizing fused image of the land surface from heteromorphic and heterogeneous images. The paper presents the following features of the fusing method. The first feature is the processing of a single composite image from a pair of docked source images by the pixel clustering algorithm, what makes it possible to isolate the same areas in its different parts in a similar way. The second feature consists in determining the functional transformation by the isolated reference points of the contour on the processed pair of clustered images, which is later applied to the original images to combine them. The paper presents the results on the synthesis of a fused image both from homogeneous (optical) images and from heterogeneous (radar and optical) images. A distinctive feature of the developed method is to improve the quality of synthesis, increase the accuracy and information content of the final fused image of the land surface.
The paper proposes a method of copyright protection for vector maps, based on the embedding of raster digital watermarks. The method combines original ideas, namely, a vector data watermarking approach that does not distort the coordinate information of vector objects and embedding of noise-like images that encode a binary sequence. The use of noise-like carrier allows to simplify the verification procedure, and also to ensure the resistance of the hidden bit sequence to distortions, including interpolation errors. In comparison with previous investigations made by the authors when solving problems of vector data protection, the robustness of the embedded noise-like digital watermarks has been significantly increased by developing a new algorithm for detection of the binary sequence hidden in the spectrum of a noise-like image. The purpose of the experimental studies was to assess the attainable probability of correct sequence extraction for various parameters and embedding conditions. The study of information capacity showed that the potential amount of information embedded in each polygon without distorting the watermark sequence depends on the type of a map, namely on the number of vertices that make up each polygon. An experimental study on robustness against potentially possible transformations aimed at maliciously deleting the digital watermark from the vector map is performed. The developed method demonstrates resistance to affine transformations, cropping, addition, removal and reordering of vertices / objects, and, thus, seems to be the optimal solution to the problem of copyright protection for vector data. The analysis of the method quality according to the criteria of accuracy, durability, information capacity, and computational complexity is performed. The results of all conducted studies confirm the efficiency and the effectiveness of the proposed method for vector map protection, as well as its distinct advantage over the prior art.
A context-aware approach to intelligent decision support based on user digital traces is proposed. The concept of human digital life with regard to intelligent decision support is discussed. The aims of addressing this concept in diverse domains are clarified and approaches to modelling human digital life are identified. In the proposed approach, digital traces serve as a source of information to reveal user preferences and decision-making behaviour. Perspectives on decision support based on user digital traces are developed. The research outcomes are the specification of requirements to intelligent decision support based on user digital traces, the principles, conceptual framework and information model of such support. The principles form the basis for the conceptual framework of intelligent decision support based on user digital traces. Components of the conceptual model are user profiles; a user digital life model that structures information containing in the digital traces; group patterns that describe preferences and decision-making behavior shared by a user group; and a decision maker ontology. The information model defines information flows between the framework’s components, identifies tasks that require solutions to implement the framework and offers techniques for this. The novelties of the research are applying the concept of human digital life to intelligent decision support and context-dependent ontological inference of the type of user as a decision-maker, which determines a group of users sharing their preferences and behaviours with the active user, to predict a recommended decision. The paper contributes to the areas of modelling human digital life and intelligent decision support.
The paper describes research results of features of error detection in data vectors by sum codes. The task is relevant in this setting, first of all, for the use of sum codes in the implementation of the checkable discrete systems and the technical means for the diagnosis of their components. Methods for sum codes constructing are described. A brief overview in the field of methods for sum codes constructing is provided. The article highlights codes for which the values of all data bits are taken into account once by the operations of summing their values or the values of the weight coefficients of the bits during the formation of the check vector. The paper also highlights codes that are formed when the data vectors are initially divided into subsets, in particular, into two subsets. An extension of the sum code class obtained by isolating two independent parts in the data vectors, as well as weighting the bits of the data vectors at the stage of code construction, is proposed.
The paper provides a generalized algorithm for two-module weighted codes construction, and describes their features obtained by weighing with non-ones weight coefficients for one of data bits in each of the subvectors, according to which the total weight is calculated. Particular attention is paid to the two-module weight-based sum code, for which the total weight of the data vector in the residue ring modulo M = 4 is determined. It is shown that the purpose of the inequality between the bits of the data vector in some cases gives improvements in the error detection characteristics compared to the well-known two-module codes. Some modifications of the proposed two-module weighted codes are described. A method for calculating the total number of undetectable errors in the two-module sum codes in the residue ring modulo M = 4 with one weighted bit in each of the subsets is proposed. Detailed characteristics of error detection by the considered codes both by the multiplicities of undetectable errors and by their types (unidirectional, symmetrical and asymmetrical errors) are given. The proposed codes are compared with known codes. A method for the synthesis of two-module sum encoders on a standard element base of the single signals adders is proposed. The classification of two-module sum codes is presented.
The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle.
The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique.
Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.
Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background.
It is convenient to describe such systems using state-transition models utilizing special language tools, both graphical and textual. Methodology for automated development of systems with complex behavior using the designed CIAO language (Cooperative Interaction of Automata Objects), which allows formally specifying the required behavior based on an informal description of the reacting system, is presented.
An informal description of a reacting system can be provided verbally in a natural language or in another way adopted in a specific domain. Further, according to this specification in the CIAO language, a software system for interacting automata in the C++ programming language is generated with a special system.
The generated program implements a behavior guaranteed to correspond to a given specification and original informal description. CIAO provides both graphical and textual notation. Graphic notation is based on an extended notation of state machine diagrams and component diagrams of the unified modeling language UML, which are well established in describing the behavior of event-driven systems.
The text syntax of the CIAO language is described by context-free grammar in regular form. Automatically generated C++ code allows using of both library and any external functions written manually.
At the same time, the evident correspondence of the formal specification and the generated code is preserved on conditions that the external functions conform to their specifications.
As an example, an original solution to D. Knut's problem of a responsive elevator control system is proposed. The effectiveness of the proposed methodology is demonstrated, since the automaton-converter generating the C++ code is presented as a responsive system, is specified in the CIAO language and implemented by the bootstrapping. The proposed methodology is compared with other well-known formal methods for describing systems with complex behavior.
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized.
The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems.
The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper.
A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.
A problem of reducing a linear time-invariant dynamic system is considered as a problem of approximating its initial rational transfer function with a similar function of a lower order. The initial transfer function is also assumed to be rational. The approximation error is defined as the standard integral deviation of the transient characteristics of the initial and reduced transfer function in the time domain. The formulations of two main types of approximation problems are considered: a) the traditional problem of minimizing the approximation error at a given order of the reduced model; b) the proposed problem of minimizing the order of the model at a given tolerance on the approximation error.
Algorithms for solving approximation problems based on the Gauss-Newton iterative process are developed. At the iteration step, the current deviation of the transient characteristics is linearized with respect to the coefficients of the denominator of the reduced transfer function. Linearized deviations are used to obtain new values of the transfer function coefficients using the least-squares method in a functional space based on Gram-Schmidt orthogonalization. The general form of expressions representing linearized deviations of transient characteristics is obtained.
To solve the problem of minimizing the order of the transfer function in the framework of the least squares algorithm, the Gram-Schmidt process is also used. The completion criterion of the process is to achieve a given error tolerance. It is shown that the sequence of process steps corresponding to the alternation of coefficients of polynomials of the numerator and denominator of the transfer function provides the minimum order of transfer function.
The paper presents an extension of the developed algorithms to the case of a vector transfer function with a common denominator. An algorithm is presented with the approximation error defined in the form of a geometric sum of scalar errors. The use of the minimax form for error estimation and the possibility of extending the proposed approach to the problem of reducing the irrational initial transfer function are discussed.
Experimental code implementing the proposed algorithms is developed, and the results of numerical evaluations of test examples of various types are obtained.
The successful solution of practical cosmonautics problems is largely achieved by contemporary advances in measurement and computing technology, as well as by improvements in methods of primary and secondary processing of trajectory measurements. Therefore, in long-range programs of space exploration and space technology development, much attention is paid to improving existing and developing new algorithmic and technical means of navigation support for flights of space objects with the purpose to expand capabilities and increasing the efficiency of autonomous navigation systems of spacecraft, as well as ground-based and perspective orbital systems of space monitoring. Currently, active work is underway to modernize and develop promising complexes of specialized optoelectronic devices for monitoring near-Earth space based on angular measurements. The article considers the application of the variational approach for solving problems of statistical estimation of the trajectory parameters of the orbital object by angular measurements, which were carried out by ground-based optoelectronic means that are part of the modern space control system. Models and algorithms for determining estimates of orbital parameters that implement the variational version of the maximum likelihood method are presented, as well as the results of test calculations related to iterative solution of the two-point boundary value problem of variational estimation. The main purpose of the numerical calculations is a study of convergence of the proposed estimation algorithm, as well as the impact of measurement errors on the displacement of the obtained estimates relative to their exact values. The simulation results, presented in the article, correspond to the conditions of the orbital motion of METEOR PRIRODA spacecraft and were obtained using the ephemeris data of the NORAD catalog in TLE-elements.
Analysis of the trends of military-technical confrontation in the aerospace sector allows us to identify a number of areas that directly affect the information and control side of the operation of aviation radio control systems, including: group use of means of attack and defence; the qualitative complexity of the laws of the mutual spatial placement of the aircraft; high dynamics, nonstationarity of environment; use of control modes and information support on the verge of buckling, which is characteristic of super-maneuverable aircraft and intensively maneuvering targets tracking systems; the discrepancy of the dynamic properties of airborne targets and interceptors; growing complexity of information support algorithms.
Mathematical apparatus used for synthesis of aircraft control systems must provide: effective guidance on targets maneuvering under complex laws, including the change of signs of derivatives; guaranteed withdrawal from the boundaries of stable (dangerous) work, including collision prevention in groups; accounting for the discrepancy between the dynamic properties; redistribution of control priorities in the guidance process; universality of the formation of guidance methods and feasibility of information support algorithms.
Analysis of the possibilities of classical optimization methods based on minimization of quadratic quality functionals showed that they are not able to meet the totality of these requirements and thus new approaches are required.
As such, it is proposed to use the synthesis of control signals that are optimal for a minimum of quadratic-biquadrate quality functional.
The application of this approach in the framework of computationally efficient local optimization is considered.
An example of the synthesis of a method of guidance, illustrating the possibility of the formation of control signals, providing guidance of inertial aircraft to intensively maneuvering targets accounting for both linear and nonlinear dependences on the operation errors and the mismatch of the dynamic characteristics of the target and interceptor.
The most important task of modern robotics is the development of robots to perform the work in potentially dangerous fields which can cause the risk to human health. Currently robotic systems can not become a full replacement for man for solving complex problems in a dynamic environment despite an active development of artificial intelligence technologies.
The robots that implement the copying type of control or the so-called virtual presence of the operator are the most advanced for use in the nearest future. The principle of copying control is based on the motion capture of the remote operator and the formation of control signals for the robot’s drives. A tracking system or systems based on movement planning can be used to control the drives. The tracking systems are simpler, but systems based on motion planning allow to achieve more smooth motion and less wear on the parts of the control object. An artificial delay between the movements of the operator and the control object for necessary data collection is used to implement the control-based motion planning.
The aim of research is a reduction of delay, which appears when controlling the anthropomorphic manipulator drives based on the solution of the inverse dynamic problem, when real time copying type of control is used . For motion path planning it is proposed to use forecast values of the generalized coordinates for manipulator. Based on the measured values of the generalized coordinates of the operator's hand, time series are formed and their prediction is performed. Predictive values of generalized coordinates are used in planning the anthropomorphic manipulator trajectory and solving the inverse dynamic problem. Prediction is based on linear regression with relatively low computational complexity, which is an important criterion for the system operation in the real time operation mode. The developed mathematical apparatus, based on prediction parameters and maximum permissible accelerations of the manipulator drives, allows to find a theoretical estimate of error values limits for planning the operator's hand trajectory using the proposed approach for specific tasks. The adequacy of the maximum theoretical value of the prediction error, as well as the prospects of the proposed approach for testing in practice is confirmed by the software simulation in Matlab environment.
A brief review of the main research areas in the field of controlled vibration protection systems is given. It is shown that Vibration systems with indirect control processes of oscillations allow with a minimum expenditure of energy to ensure programmable switching parameters and structures, in which the dissipative restoring and inertial forces generated on the basis of active impact. Within synthesis of indirect control the chains of new auxiliary mathematical constructs for finding optimal synthesizing functions of the elastic-damping units parameters control are obtained. It enabled to separate a base model with intermittent damping and base model with impulse trap. As a result of the study, based on the harmonic balance method, the dynamic properties of the basic model with intermittent damping, calculation formulas are obtained for determining the parameters of the compensation effect and calculating the dynamic coefficient. It is established that, with an optimal sequence of damping switching, the resonant phenomena are eliminated, and the transient processes decay within one period of the kinematic perturbation. The basic model with a pulse trap imitates the limiting variant of intermittent damping and realizes the process of superimposing constraining bonds, the sequence and duration of which are new variables essentially increasing controllability. And for indirect pulse control, there exicts a certain minimum of power consumption independent of the achieved effect of vibration protection. A regulated increase in the duration of the application of the restraining coupling in the low-frequency region and a decrease in this duration in the high-frequency region provides a monotonically decreasing dependence on the dynamic coefficients over the entire frequency range. An example of a solution to the optimization problem of controlling the damping process for a basic model of a vibration isolation system is considered. It is established that intermittent damping is an indispensable feature of the optimality of the vibration isolation system: the damper switches on when the sign of the object's speed has changed and turns off when the object's displacement sign has changed.
The article presents the differential ranging method of locating modern earth stations with narrow radiation patterns. Earth station position data is proposed to be calculated using maximum-likelihood procedure system solution from three differential equations using one of numerical methods. In this case supplementary assessment parameter of location, calculated by measuring a mutual signal delay of an earth station, relayed through a spacecraft on geostationary orbit and a mobile repeater on the unmanned aerial vehicle, can improve the accuracy of coordinate estimation earth station.
For the developed method the analytical expressions of potential accuracy of calculation of coordinates of the earth station on the basis of the Cramer–Rao lower bound are developed.
To measure the positioning accuracy of located emitters it is suggested to use the errors ellipsoid corresponding to the provision of a source of a radio emission in space.
The analysis of standard routes of the movement of a repeater on the unmanned aerial vehicle is carried out and the conclusion is drawn that the best accuracy and the shortest route simultaneously are achieved, if the unmanned aerial vehicle follows a circular trajectory along the control area.
Calculation of potential accuracy of positioning of the terrestrial station for the area of 50 by 50 km is executed.It is shown that the error of the estimates, received as a result of statistical tests, doesn’t surpass the size of a big half shaft of the error ellipsoid calculated with application of analytical expressions.
The application of the developed method is possible in the implementation of the software of electronic control systems to counteract illegitimate use of frequency resource of space vehicles-satellite repeaters communication system.
At present, the orbital constellations of satellites with the possibility of receiving, processing and relaying the ADS-B («Automatic Dependent Surveillance — Broadcast») system signals that ensure globality and continuity of the air traffic monitoring are being created and gradually enhanced. In accordance with the concept of ADS-B technology usage , each air traffic participant broadcasts its identity, location, and status parameters in broadcast mode. Due to the fact that the system was not designed to receive signals onboard the satellite, there are certain problems related to their energy availability, the presence of collisions of messages from different sources, the effect of Doppler effect and other factors. Developed simulation model of aviation surveillance systems based on the reception of signals containing identification and navigation information and transmitted over the air in the broadcasting mode. Software-implemented simulation algorithms allow to set various constraints and assumptions (radiation sources distribution, aviation communication systems signals receiving points, information transmitting channel, signals frequency and duration distribution models) and obtain the target indicators estimates of the space and ground-based aviation surveillance systems functioning, taking into account various spatial and energy factors and conditions for the radio signals propagation, and controlled objects actual placement and their movement dynamics in the world airspace. Simulation model use methods and examples for calculating the space and ground aviation surveillance systems functioning target indicators are presented.
This study is devoted to the existing and future information technology that forms a base for concepts of Industry 4.0 and cyber-physical systems using examples of firms that apply this technology. Examples include manufacturing and transportation companies. The objective of this paper is to analyse the impact of intelligent information technologies in Industry 4.0 and cyber-physical systems on the enterprise management principles in near future. The transformation trends are illustrated on case-study examples. The literature and case-study analysis shows that enterprise management in manufacturing and transportation lacks understanding of Industry 4.0 and cyber-physical systems in terms of application to concrete business models. The reviews cases lead to the conclusion that the Industry 4.0 and cyber-physical technology applications are rather contextual and engineering-oriented. The implementation of the main principle of the Industry 4.0 and cyber-physical technology , i.e., the self-organisation and self-adaption of dynamic networked structures along the entire product lifecycle to ensure the flexible individual manufacturing at the mass production costs, has been yet applied very restrictively and mostly in research projects. The paper presents an original interpretation of the service-oriented approach to modeling and solution of the information technology assessment and selection problems to facilitate a broader application in firms. This approach is based on the structural dynamics control theory developed by the authors.
The constructive method for multicriteria optimization of control processes of deterministic and not fully defined controlled systems with distributed parameters, described by linear multidimensional parabolic partial differential equations with internal and boundary control actions, is proposed. The optimization problem is considered when an uniform approximation accuracy of object’s final state to the required spatial distribution of controlled function is given. The suggested approach is based on the one-criterion option in the form of minimax convolution of the normalized quality criteria and the subsequent transition to the equivalent form of a typical variational problem with constraints. It is applied to the deterministic model of an object described by an infinite system of differential equations with respect to time-dependent modes of the controlled quantity expansion in a series of eigenfunctions of the initial-boundary value problem. Further procedures for the preliminary parametrization of control actions, based on analytical optimum conditions and reduction to semi-infinite programming problems, allow one to find the desired extremals using their Chebyshev properties and fundamental laws of the domain in typical application conditions of estimating the accuracy of approaching the object’s final state to the required one in a uniform metric. The obtained results are extended to the tasks of program control on the principle of guaranteed result by ensembles of object trajectories under conditions of interval uncertainty of the parametric characteristics of the distributed system and multiple external disturbances. A demonstrated example of a multicriteria optimization of an innovation technology of metal induction heating prior a hot forming is of special interest. The typical optimization criteria such as energy consumption, metal loss due to scale formation, and heating accuracy are considered as components of vector optimization criterion.
The short historical sketch of researches of efficiency of systems functioning purposeful processes is given in this paper. The review of some relevant research problems of the operational properties solved abroad is provided.
On the basis of the analysis of features of efficiency research of systems functioning purposeful processes, as well as research of other operational properties, such as effectiveness, performance, operational and dynamic capabilities by domestic and foreign authors, the conclusion is drawn on relevance of the solution of some modern research problems on the basis of analytical estimation of operational properties indicators. A number of new systems and processes of their functioning operational properties researches directions is given. Among them, there are system capability (potentiality) and information technologies capability. Features of agile (dynamical, improved due to environment impact) systems and processes of their functioning, a role of information technologies are considered during functioning of such agile systems.
Main features of systems improvement and details of transition processes of such systems functioning improvement are described. The role of information technologies for systems improvement is discussed. The obtained results allowed to conduct research of operational properties of the improved systems, research of information technologies usage during system functioning. Examples of models of the improved system functioning effects formation are offered. Such models are developed taking into account the realization of information and non-information actions during the improved system functioning.
For the unified estimation of indicators of operational properties the method of analytical estimation of operational properties is offered. This method is based on the sequence of operational properties estimation schemes use. The sequence of the three schemes of operational properties estimation, which allows to estimate all described operational properties. Features of estimation of systems operational properties using the offered estimation method are revealed. The obtained results should allow to proceed to the solution of research problems of systems operational properties based on mathematical models use. An example of operational properties of information technology use indicators calculation is provided.
Nowadays it is highly important for any organization to manage its resources effectively because of an unstable economy. There are two main resources of an organization: human resources and knowledge, which humans have. One of the ways for knowledge management is formalization of the competence management process by means of information systems. The choice of system depends on future use cases and system requirements. The purpose of this research is to analyze the competence management systems based on revealed common use cases and requirements. The result of the paper is a list with revealed common use cases and requirements, which could be useful for developing a new competence management system or for improving and modification an existing one. Based on the determined use cases and requirements the reference model of context-oriented competence management system in expert networks and context classification for current situation formalization have been developed. Developed reference model is oriented to take into account the current situation in the expert network. For this purposes a context model has been proposed that distinguishes participant context, active context, and project context. For the reference model efficiency estimation task for expert group search with needed competence set has been considered in the paper. In case of small amount of experts in expert network the classical system shows the better results but in case of large amount of experts the proposed system is better.
Nowadays, the systems developed to integrate real physical processes and virtual computational processes — the cyber-physical systems (CPS), are used in multiple areas of industry and critical national infrastructure, such as manufacturing, medicine, traffic management and security, automotive engineering, industrial process control, energy saving, ecological management, industrial robots, technical infrastructure management, distributed robotic systems, protection target systems, nanotechnology and biological systems technology. With wide use, the level of IT and cyberrisks increases drastically and successful attacks against the CPS will lead to unmanageable and unimaginable consequence. Thus, the need in well-designed risk assessment system of CPS is clear and such system can provide an overall view of CPS security status and support efficient allocations of safeguard resources. The nature of CPS differs from IT mainly with the requirement for real-time operations, thus, traditional risk assessment method for IT system can be adopted in CPS. Design of a unified modelling language based domain specific language described in this paper achieves synergy from in IT industry widely used UML modelling technique and the domain specific risk management extensions. As a novelty for UML modelling, especially for simulation purposes, the presented DSL is enriched by a set of stochastic attributes of modelled activities. Such stochastic attributes are usable for further implementation of discrete-event system simulators.
This article presents an analytic survey of various end-to-end speech recognition systems, as well as some approaches to their construction and optimization. We consider models based on connectionist temporal classification (CTC), models based on encoder-decoder architecture with attention mechanism and models using conditional random field (CRF). We also describe integration possibilities with language models at a stage of decoding. We see that such an approach significantly reduces recognition error rates for end-to-end models. A survey of research works in this subject area reveals that end-to-end systems allow achieving results close to that of the state-of-the-art hybrid models. Nevertheless, end-to-end models use simple configuration and demonstrate a high speed of learning and decoding. In addition, we consider popular frameworks and toolkits for creating speech recognition systems.
Currently, crowd computing is gaining popularity. However, the quality of results obtained by means of crowd computing is often unpredictable, and that fact puts limits on the practical applicability of this technology. Therefore, systematization of information about modern methods for quality control in crowd computing is an important task that can pave the way to new research efforts in this area and therefore widen the scope of its applicability. The paper discusses the results of systematic literature review of journal articles from ScienceDirect and IEEE Xplore bibliographic databases, published after 2012. The paper also identifies main directions in crowd computing quality control, corresponding models and assumptions. In particular, it shows that most scientific attention is concentrated around consensus methods and game theoretic methods.
The paper considers an approach to the design of a system for data and security events collecting, storing and processing based on Elastic Stack tools. The tasks of monitoring and incident management are analyzed; architectural solutions for monitoring systems are studied; requirements to such systems are defined; and the architecture of systems for data and security events collecting, storing and processing is suggested. The developed software prototype of such system is described, and the results of experiments are specified.
Modern hardware systems of processing the video data stream for color coding apply the principle of constant brightness proposed in the development of the NTSC color coding system. This principle, like its implementation, is not free from drawbacks: loss of information on the clarity of the encoded color images, degradation of clarity in achromatic details and images as the color saturation increases, etc. In addition, the use of video data decoding formats in digital video data processing systems, such As 4:2:2, 4:2:0, 4:1:1, distorts the decoded video image.
An alternative approach for encoding a color video stream is to apply the principle of constant color luminance. The work describes the coding according to the principle of constant color luminance. A comparative analysis of the transformed images is carried out with the help of the two principles given. The advantage of applying the principle of constant color brightness in digital video coding systems is shown. It is shown that using the principle of constant color brightness it is possible to obtain a gain of more than 6 dB.
The implementation of the principle of constant color luminance for real and integer modern hardware platforms is described. A comparative analysis of the realizations of the principles of constant brightness and constant color luminance was carried out, showing the advantage of applying the principle of constant color luminance for some modern processors.
The application of the principle of constant color luminance in digital video encoding systems can help improve the quality of recoverable color coded images.
The transformable designs of space basing are delivered into orbit in a folded state, which creates the task of their reliable disclosure. In this paper we propose to use an actuator in the form of electrical machines as the executive body. The use of this type of actuator allows controlling the process of deployment.
As a large-sized transformable structure we consider the space-based reflector. At present, the transfer of the machines from the folded state to the operation state is carried out by stages. The paper considers the joint implementation of two stages: the rotation of the root unit of the spoke and the extension of the intermediate unit. Mathematical models for rotational and translational motions are developed which take into account such parameters as bending and contraction of the spoke. Modeling and analysis of the results of different variants of the joint disclosure of the reflector elements are made: the use of the engine for each of the components of the motion and the use of centrifugal force for the extension of the spoke.
The application of the algorithm for correcting the control parameters is considered. One of the important advantages of the algorithm is the ability to carry control in real time. It can be used to calculate the reference control in algorithms based on the two-channel principle.
Researches are part of works on creation of the small size robotic research vessel for complex environmental monitoring of the sea coastal water area of the Black Sea, and also lakes and the rivers, with basing in Sevastopol. On the basis of the created analytical nonlinear model of the vessel of catamaran type with two rudder propellers, considering its mass-dimensional and traction characteristics, the initial and simplified ways of management of angular speed and ship's heading at "strong" maneuvers with the use of the method of final states are developed. "Strong" maneuvers in navigation are understood as maneuvers with big corners of turn of wheels when the linearized models of vessels are inapplicable. The developed ways of management have appearance of the simple structures which obviously depend on the setting influence, length of the vessel, emphasis of rudder propellers, vessel moment of inertia, and also the known nonlinear functions of current status — speeds on longitudinal and cross axes of the vessel, angular speed and turning angle of rudder propellers. In the simplified way values of measurements of speeds are not used.
Among issues which arise when developing software complexes for real-time systems (RTS) one should resolve common multi-task system issues of ensuring logical correctness of the system being created (preserving the integrity of informational resources, eliminating the possibility of mutual task blocking), as well as issues of ensuring dynamic correctness, specific for RTS (feasibility of the application tasks). In the long run, resolving these issues is reduced to checking the correctness of how synchronizing operators which ensure consistent execution of application tasks are scattered in the task bodies. In order to perform such checking statically, models which represent the scattering of synchronizing operators in application tasks are constructed.
In this paper several methods of processing such models are proposed which are based on constructing special multi-partite graphs — graphs of synchronizing operator dependencies. Two varieties of such graphs are resented: a) graphs of bundles, which ensure verification of logical correctness of multi-task applications (correctness of intersections of critical interval pairs); and b) graphs of bundles and critical intervals, which ensure verification of dynamic correctness of RTS applications.
The article presents a methodology for substantiation of requirements for the technical vision system of a robotic complex. A technical vision system of the robotic complex is viewed as a combination of two subsystems: measurement and recognition. To implement the methodology we developed methods for calculating partial optimality criteria for substantiation of the technical requirements and evaluation of search area of the optimal values of measuring instruments characteristics of the technical vision system of a robotic complex; a recursive procedure for choosing the optimal values of measuring instruments characteristics of the technical vision system; a scheme of trade-off for evaluating the optimal technical requirements for advanced measurement instruments of the technical vision system in different technical and economical conceptions.
The search for optimal solution is done according to partial optimality criteria: recognition efficiency, the cost and risks of creating measuring instruments. For creating the recursive procedure based on formulated assumptions and assertions, a criterion, which provides the search of Pareto-optimal solutions, was synthesized. The developed methodology takes into account the existing (more suitable) technical and economical conceptions of creating a robotic complex while choosing trade-offs.
The task of creating a methodology for evaluating the efficiency of information systems and technologies is considered. A distinctive feature of information systems is their service nature which results in the need of indirect estimation of their efficiency through terminal positive effect of metasystem, for the benefit of which this system was created or adapted.
The brief summary of the existing approaches and techniques for estimating efficiency of information systems and technologies is provided. Ambiguity of the used efficiency measurements, resulting in the difficulties of the creation of a formalized, numerical technique for efficiency estimation, was revealed.
The quantitative efficiency evaluations of an information system, which take into account the probabilistic nature of the basic data used for creation of these estimates, are offered. The options of necessary and sufficient criteria for efficiency of information systems, expressed through efficiency of metasystems for the benefit of which they function, are provided.
In the paper we consider the evolution of design technologies of reconfigurable computer systems based on FPGAs of various families. Five FPGA-based generations of reconfigurable computer systems with high placement density, from Xilinx Virtex-E to modern Virtex UltraScale, are described. We show results of design of high real performance energy-efficient reconfigurable computer systems. The main contribution is a liquid cooling system designed for Virtex UltraScale FPGAs. It provides independent circulation of the cooling liquid in the 19” 3U computational module for cooling of 96-128 FPGA chips that generate 9.6-12.8 kWatt of heat in total. The distinctive features of the designed immersion liquid cooling system are high cooling efficiency with power reserve for the designed perspective FPGA families, resistance to leaks and their consequences, and compatibility with traditional water cooling systems based on industrial chillers.
The paper proceeds research of the security event correlation methods in Security Information and Event Management (SIEM) systems. In this part we consider correlation methods of information security events that can be applied during separate correlation stages described in the previous paper. Classification of the considered correlation methods and analysis of their advantages and disadvantages are provided. The effectiveness of using these methods at different stages of the correlation process is evaluated.
For cloud computing systems with web interface a set of probabilistic models is proposed. At the same time a model of Java applications with a web interface based on servlet and filters is considered. These models are based on queuing theory and extend its applications by studying the multichannel systems with “warm-up”, “cooling” and phase-type approximation of Markovian and non-Markovian processes. Transition diagrams and matrices for the microstates of queuing systems being models of applications with a web interface are described, and a scheme for computing the stationary probability distributions for requests number, waiting time and expected time in system is being developed. The paper discusses the received computation results of the proposed modeling approach and their application to assessing the performance of the cloud systems using applications based on servlet and filters.
We propose a mathematical method based on the use of complex functions as a status attributed to the state of the object functions. The method is focused on the direct de-scription of the mathematical model of the feedback channel of ergatic systems. Status functions are formed as an optimal, orthonormal basis of the system. The rules for working with the status functions are introduced, and their interpretation is proposed. A method for forming the operator for conversing signals given as status functions is proposed. Thus, the mathematical support of an analysis of the interaction in the integrated educational environment is improved on the basis of modelling competence portraits of participants of the learning process, which is characterized by the use of status functions. This allowed for the multicomponent assessment of competence in the form of complex-valued functions.
The paper is devoted to the analysis of security event correlation methods in Security Information and Event Management (SIEM) systems. The correlation process is considered to be a multilevel hierarchy of stages. The goal of each stage consists in executing appropriate operations on security data being processed. Based on this analysis we outline each correlation stage and their interaction scheme.
The paper suggests the mathematical models of data visualization in SIEM-systems. The visualization models formalize three main stages of the visualization process. At the first stage the models are being suggested which fulfill the unification of data on the computer network objects having heterogeneous structures and different sources. At the second stage, on the basis of the suggested models, a multidimensional matrix of relations is generated. At the third stage a uniform approach to the visualization of various security aspects of the computer network on the basis of constructed matrix is proposed.
In the article the option of application of provisions of the theory of sets and the theory of hierarchical systems for the formal description of elements of the open systems realizing interdependent multi-level processes of routing is offered. Infrastructure facilities, in which distribution of the material resources, energy or information with the use of hierarchically nested functions of control of flows and/or routings is realized, can serve as real prototypes of such open systems.
Summary information on existing integrated circuits (IC) analog master slice array (MSA) and configurable structured array (CSA) crystals of domestic and foreign production-oriented applications in sensor systems, including robots for various purposes, and aircraft are reduced.
The parameters of the new integrated circuits MSA (AGAMC-2.1) and CSA (MH2XA010), as well as the prospects of designing on their basis of radiation-resistant IC for analog signal processing and interfaces of sensors of different physical kind.
The article aims to consider the modernization method of information systems based on the analysis of their functional capacity. Estimates of the structural and functional composition of environmental monitoring information systems for the realization and search of the optimal solutions to the problems of restructuring are considered.
Control procedures for accessing shared resources in multi-task real-time software applications are analyzed. Two approaches to preventing priority inversion – basic and transitive procedures of priority inheritance – are analyzed in detail. To illustrate the considered notions and statements, concrete examples of multi-task application configurations are provided along with their execution diagrams under particular scenarios of system events, which demonstrate insufficient response time of tasks with sufficient computing resources and even mutual task clinches. The nomenclature of attributes to be included into task and resource descriptors for task management with the two priority inheritance procedures is proposed. The sufficient conditions for the basic procedure to prevent priority inheritance are formulated. The procedure of transitive priority inheritance is demonstrated to be capable of detecting a mutual task clinch in the application.
Main concepts and principles for research problems of operational properties of information technologies statement and the solution as mathematical tasks are considered in the article. Such problems solutions could be based on properties indicators under study defined with use of prognostic mathematical models. For such indicators definition following results were obtained: the review of approaches to the description of operational properties of information technologies in literature; the practical analysis of such properties; properties main features; the main concepts and the operational properties of information technologies principles research; the scheme of effects of information technologies formation; the conceptual scheme of under study properties estimation. The results obtained allow passing to definition of indicators, calculated with use of mathematical models, passing to development of conceptual and mathematical statements of research problems under study, and to the solution of these tasks, as mathematical problems of estimation, analysis and synthesis of operational properties of information technologies.
The article describes general features, distinctions and prospects of using different types of operational properties in the theory of targeted processes efficiency, theories of system capability, as well as for solving problems of systems engineering, problems of military science and tasks of econometrics. General approaches are offered for operational properties usage based on forecasting if characteristics of effects comply with characteristics of requirements under different conditions, using mathematical models. These approaches make it possible to solve a considerable range of current and new problems in different areas. A ratio scale of the order of operational properties is suggested. It allows one to determine the relations between various operational properties. It reflects the level of compliance between characteristics of effects and purposes of functioning.
It is proposed to use a neural network to calculate an approximation of the probabilistic-time characteristics of multichannel queuing systems (QS) with a "warm-up" and the unlimited capacity of the queue. From the results of numerical experiments, we observe a significant reduction in the complexity of computing probabilistic-time characteristics of the multi-channel QS with "warm-up" with minor errors of calculation of characteristics, compared with the numerical iterative algorithms. The advisability of the use of Bayesian regularization method for training a neural network and the best number of neurons are shown.
The article describes the basics of creating operational river flood forecasting systems, based on the integrated use of modern information technologies and integrated proactive modeling. Their practical implementation is also shown. The distinctive features of the proposed interdisciplinary approach are: a) the widespread use of heterogeneous data from a network of gauging stations and Earth remote sensing satellites; b) implementation of forecasting systems based on service-oriented architecture; c) creation of an intelligent interface for selecting the type and parameter setting of hydrological models; d) ensuring convenient and accessible presentation of the forecast results using web-services. Practical testing of the developed software prototype has confirmed the possibility of automatic high-precision operational (from several hours to several days) forecasting of floodingzones and depths of river valleys.
To solve the problems of design and operational management of fiber-optic communication systems a value of error probability in subdetector area sometimes is necessary. Optimization of transmission systems for this parameter is particularly relevant for fragments of all-optical networks. In article, the estimation of bit error probability is presented for the worst case of optical signal processing. The obtained analytical model was the basis of a method for estimating the possibility of using multi-level optical signals in fiber-optic communication systems. The method allows to determine the suitability of a given transmission system reliability receive signals with a given size of the ensemble.
This paper considers the problem of a choice of algorithms and data structures to achieve the effective processing of events generated by intrusion detection systems. The proposed approach is based on balanced binary trees and speeds up the operations of adding and searching records in the structure. The paper provides the theoretical and experimental confirmation of the efficiency of the developed approach
A numerical-analytical method for non-stationary queueing systems models computation is presented. The solution of Chapman—Kolmogorov equations is found in the analytical form. The algorithm and its practical implementation with Java language are discussed. Computation time and results precision for the presented method and the Runge—Kutta type method used in Matlab are compared.
Several topical physicochemical issues in the area of high-molecular compounds and biophysics requires real-time registration of the spatial distribution of low-molecular ions. A device utilizing conductometric method based on high-frequency electrode pairs switching in traveling wave mode is proposed for the spatial distribution of low-molecular ion study. Technical features, advantages and applications of the device is described. Results of device testing are presented.
Analysis of Intrusion Detection System techniques is a perspective area for the protection of networks and network systems. This paper presence the overview of attack detection mechanisms based on data mining approach. The novelty of the this kind of mechanisms is the ability to create self-learning systems for intrusion detection. Also the article describes the basic elements of intrusion detection algorithms.
The paper proposes a method and a set of patterns for the problem of ontology matching, identified in the previous work of the author. The proposed method integrates the lexical, structural and semantic approaches. The presented patterns for knowledge integration and ontology alignment can significantly facilitate the process of ontology matching due to usage of the schemes based on typical solutions.
In article, on the example of the tasks arising at research of products properties, created at the enterprises of a military-industrial complex, problems of operational and ex-change properties of complex technical systems research are investigated. Operational properties of systems characterize results (effects) of activity with use of systems (op-erational properties, in particular, are efficiency of system functioning for achievement of the given objective, system potential, system capabilities). Exchange properties characterize properties of exchange of results of activity (exchange properties, in par-ticular, are competitiveness of a product, competitiveness of the enterprise). As shown, it is expedient to study exchange properties of systems using the concept and method-ology of estimation of operational properties of systems. Indicators for operational properties estimation proposed and on their basis indicators for exchange properties of the systems suggested. Indicators suggested in such a way that their estimation suppose usage of mathematical models. This gives the chance to solve a range of research prob-lems of operational and exchange properties of systems. Need of definition of concept is proved, and then the concept of model of a research problem proposed. The direc-tions of research problems models usage for automation of the solution of operational and exchange properties research problems discussed.
The paper presents an approach to hybrid systems control based on smart space technology. The approach proposed bears two primary distinctive features: first, hybrid system control is decentralized and various control functions are implemented in separate services, communicating via ontology-based smart space; second, the services are represented by a hybrid automata formalism allowing to employ a model-driven development for hybrid control systems. The approach is illustrated by practical communication scenario of several physical devices in the context of smart home environment.
Fundamental properties of the angular-spatial symmetry of radiation fields in the uniform slab of a finite optical thickness are used for improvement of the numerical methods and algorithms of the classical radiative transfer theory. A new notion of so called photometrical invariants is introduced. The basic boundary-value problem of the radiative transfer theory is reformulated in new terms for the subsequent simplification of algorithms of numerical modeling methods such as spherical harmonics, discrete ordinates, Gauss-Seidel, Case and Hunt-Grant methods. This simplification leads to two-fold decrease of the ranks of linear algebraic equations with simultaneous reduction of numerical modeling intervals connected with angular and spatial variables.
The redundant variables method for checking and correction of computing processes in real time is considered, that is necessary for increasing of the computing processes reliability. The questions of equivalence of the initial and extended systems, improve immunity, correction ahead are considered. The redundant variables method is compared with other known methods of control, diagnosis and correction of computer systems.
Merits and demerits of straight and iterative methods for BD LAES are shown. In article is offered the new «direct» method (algorithm) for solution of BD LES with varied parameters. It effectively uses basic solution LAES and matrix sparseness information and allows in the tasks using BD LAES, which need to be solved repeatedly, significantly increase speed of settlement algorithms due to reduction of number of computing operations, to lower requirements for random access memory volumes of computers.
Solutions for electronic document analysis are reviewed and suggested in the article. Approach is based on semantic markup and object domain and includes 3 steps.
The article presents a model of regulating the heat balance of the body of the reindeer, depending on the animal's behavior, physiological condition and the impact of external factors of weather and solar radiation, are the relevant formulas and the results of the identification experiments. The model can be used to study the exchange of animals and determining the boundaries favorable for their livelihood zones.
It is recognized that incorporating context information into recommender systems is one of the most effective ways to increase their quality and predictive abilities. The paper surveys primary methods of enhancing collaborative filtering systems by taking actual context information into account. The focus is mostly on different flavours of contextual prefiltering and matrix factorization approaches which are the most popular and promising.
The analysis of a current state of researches in the field of an information technology of designing of the automated systems of monitoring is carried out. The approach to creation of the distributed system of the information on the control of a condition of space objects and objects of a land space infrastructure on the basis of a modern information technology of the automated gathering, integration and the complex analysis of all types of information, circulating in a contour as separate management information system (MIS) of technological processes, and management information system of preparation and start-up and management information system of the cosmodrome as a whole, and creations of a multilevel management information system of the cosmodrome with use of modern principles of the organization of the corporative information systems is offered.
In this paper we carried out the search of adequate description with the categories and functors for multifunctional infocommunications systems
One of the approaches to the detection of network anomalies is the analyses of parameters of functioning of a network. Characteristics, calculated on a wavelet coefficients, indeed, are more sensitive to changes in the number, than the characteristics calculated directly in a row, but this requires more calculations, the spectral-time algorithms, of course, subject to optimize for application in real-time systems. In addition, there are different approaches to the implementation of wavelet expansions, each of which has its place on the informative value (the number of qualifying ratios), the authentic values, the computational complexity of the transformations. The article offers a reasonable approach to the implementation of these algorithms for use in real-time anomaly detection systems.
In article the way of data processing of biometric measurements, in particular to methods of digital processing of the hand-written text, intended for аuthentification of the user on hand-written handwriting in access monitoring systems is considered. Technical result is increase of reliability of access in all systems demanding use of means of identification of the personality.
The market of tools for development of neural intelligent systems presented in thousands of software titles, due to multiple tasks of intelligent information processing . The paper provides an overview of tools that are applicable for development of neural components of intelligent security systems.
The redundant variables method for checking and correction of computing processes in real time is considered, that is necessary for increasing of the computing processes reliability. The systems with reproducible function are synthesized and analyzed. The results of simulation for different methods of integration are considered. It are registered, that the using of the redundant variables method permit to increase the accuracy of calculations.
The paper describes an integrated approach and respective tools which provide methods and means for analysis and verification for representatives of all four major classes of languages used to describe telecom applications: languages of general purpose executable specifications (SDL), languages for high-level descriptions of complex systems behavior patterns and their interconnections (UCM), special purpose language for verification of telecom applications (interpreting MSC, communicating finite state machines, Dynamic-REAL), and industrial imperative languages (C/C++). Verification of specifications is complemented with automated construction of test suites, which ensure the specified test coverage rate of source behavioral specifications and are optimal with respect to specified performance criteria. Tests are run in a specialized automated test-run environment either on system models, or on actual system implementations inserted in respective program shells which provide communication of the system under test with the test environment. The test shell allows for automated analysis of the test-run results along with the test-runs as well.
The meaning of terms "bioinformatics", "medical informatics", "biomedical informatics" is discussed as applied to the latter's goals, problems and methods. Justification is given to the definition of biomedical informatics that is in our opinion most complete. The milestones in the history of Russian biomedical informatics are listed as well as the main scientific schools within this line of investigation headed by Russia’s leading scientists. The article provides an examination of the activity of the laboratory of biomedical informatics and the characteristics of solving the problems of biomedical informatics at SPIIRAS
Museum exposition presents computer machinery of mid XX – beginning XXI cen-turies. Visitors are acquainted with a history of informatics, computer technologies and communication. Origin and development of computer means in this country as well as informatics coming into being a fundamental science are the main topics of the exposition
The paper provides an analytical review of perspective research directions according to the talks by leading foreign and domestic experts in the security of computer networks, presented at the 6th International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security» (MMM–ACNS–2012), held in St. Petersburg from 17 to 19 October, 2012. World-known scientists, such as A. Stavrou, B. Livshits, L. Khan, and F. Martinelli, made invited talks. On sections of the conference there were discussed topical issues related to the intrusion prevention, detection, and response, anti-malware techniques, applied cryptography and security protocols, access control and information protection, security event and information management, security modeling and cloud security, and security policies.
A formalism for description of labelled transition systems, which unifies the format of states of the systems, the format of computer language instructions represented by labels of the systems and the format and semantics of transition rules, and thus makes the development of operational semantics of computer languages more technological, is proposed.
Operational properties defined as properties of systems and processes of their functioning, which characterize their ability to achieve objectives of activity. Some classes of the practical tasks, related to necessity of operational properties estimation, such as estimation of the capability of systems, efficiency, productivity, profitability of system usage and other similar operational properties are considered. The problem of operational properties research introduced. The concept of problem of operational properties of systems and processes of their functioning research offered. The concept based on usage of the synthetic relations – the interconnected, nested and hierarchical relations and on use of a method of research, based on creation of such synthetic relations. Within this concept the unified conceptual schemes of estimation of operational properties, such, as system capability, efficiency, profitability, efficacy, performance, efficiency, effectiveness are offered. The concept of modeling in problems of operational properties of systems and processes of their functioning research offered. Models of the synthetic relations and their usage for estimation of indicators of operational properties of systems and processes of their functioning are given.
The relevance of the problem of information and telecommunication systems protection is stipulated by increasing the complexity of hardware and software, high dynamics of their development, distributed and heterogeneous structure and many other factors. Analogy between evolution and natural selection in nature and information and telecommunication systems, including security systems, is obvious. The paper suggests the conception of adaptive protection of information and telecommunication systems which is based on hybrid mechanisms integrating the paradigms of nervous and neural networks.
A method for estimation of time, requiered for external events processing by distributed program applications is presented. It is shown that feasibility of such applications may depend on variation of task execution time and message delivery time. The influence of this variation shall be taken into account during feasibility checking for task chain, that participate in reaction to concrete separate external events.
The basic requirements for airborne satellite navigation equipment based on the existing Russian and international regulations are reviewed. The functions of airborne equipment providing the aircraft operations in accordance with the modern concept of navigation, based on characteristics, are described.
The paper is intended to analyze attack modeling problems in large computer networks with the use of different models, methods and tools. The famous models, as well as methods and tools for attack modelling are examined in detail on the basis of the characteristics of large networks as information security related objects and objects of attack, and directions for further development are provided. The role of information security requirements in attack modeling iterations is shown. Examples of attack modeling problems associated with different types of NOT-factors are presented.
The paper discusses problems of decision support for configuring flexible networked organizations. It is shown that one of the most perspective forms of decision support in the above domain is collaborative recommending systems. Such systems recommend some solutions (related to products, services, technologies, tools, materials and business-models) based on user groups’ requirements, their preferences, and willingness to compromise and propose new ideas. Specific features of collaborative recommending systems are considered together with major problems that need to be solved in order to increase the efficiency of such systems. Approaches to solve the above mentioned problems are proposed.
Process of the solution of systems capability research challenges and efficiency of their functioning research challenges as well as automation of processes of the solution of these challenges are considered. Research challenges of systems capability are related to the class of new challenges, such ones that their decision should improve functioning of a number of systems considered. Systems considered are the ones which include cooperating groups of people and complexes of technical devices. Examples of important practical challenges of systems capability research and efficiency of their functioning are given, problem sources are described. The problem of the solution of systems capability research challenges and efficiency of their functioning is stated. The basic principle of this problem research – an "immersion" principle is introduced. On the basis of "immersion" principle requirements to modeling in systems capability research challenges and efficiency of their functioning, requirements to challenges solutions methods and to information technologies used for such challenges solutions are justified.
Establishment of psychologically comfortable environment of interaction is one of the main tasks in developing user interfaces for social robots. The naturalness of the appearance of the humanoid robots and methods of their communications contribute to self-disclosure of the user and improve the efficiency of the dialogue. The paper analyzes the methods of estimation success of the dialogue, and means of recording and analysis of user preferences which are necessary for configuration of the user’s profile and personified servicing provided by informational robot.
In this paper the authors dwell on assessing the quality of life of patients suffering from diseases of the phonation. The introduction to a generalized mathematical evaluation to determine the quality of life of people with dysphonia is proposed, as well as software that automates the process of evaluating.
This article is devoted to modern computer speech technology in queuing systems for the population. Problems of working out of the effective and convenient speech interface, methods of detection and correction of errors of recognition, model for the comparative analysis of speech dialogue scenarios, mathematical models for calculation of service characteristics of demands and optimization of functioning contact centers with self-service on the basis of speech recognition are considered.
Today different information technologies increasingly become an integral part of everyday life. Offices, apartments and vehicles are equipped with all sorts of sensors, cameras and other devices to monitor the changing environment around them. The goal of space outfit is to provide more convenient and transparent usage of devices in this space. These environments are named smart spaces. Human actions are recorded in the context of smart space around the person and processed by different informational systems that use this context in order to more adequately respond to human interaction with technical devices. This paper presents an analysis of modern context-oriented systems. Their architectures were considered, examined their advantages and disadvantages, and derived general principles for their construction.
Methods for measuring music similarity allow for implementations of completely automated content-based music recommendation systems (similar to Pandora, but without the manual work of expert musicologists). This paper presents a novel method of measuring music harmony similarity based on an original probabilistic graphical model. The model includes information about the current chord and mode; we introduce a hidden parameter, style, which governs the probability of using of a certain chord within the context of a certain mode, and propose to measure the similarity as a distance between parameter vectors of the probability distribution function for style. Similar to some methods for extracting chord progressions, our model includes neither the rhythmic information nor the dependencies between neighboring chords. We describe the implementation of our model done with the Infer.NET system and show experimental results on generated data. The results of experiments with real-world data are negative, which indicates that simple bag-of-chords models are not suitable for the music similarity task
The problem of innovation activity planning is considered which can result in manufacture modernization. Definitions of a novelty, an innovation, innovative activity are suggested. Indicators for innovation activity quality assessment are justified. The plan of innovation activity, concept of system innovation capability are defined; statement of the problem of innovation activity planning is realized. It is offered to solve this problem, as a mathematical optimization problem. System of models is developed. It allows to obtain recurrent formulas for calculation of objective function values, as well as to recalculate these values once the plan of innovation activity has been changed. The method of fragmentary controlled stochastic search is offered on the base of features of developed models. Algorithms of effects characteristics recalculation for the problem decision are described. The procedure of data acquisition, data preparation and problem solving results interpretation is considered.
In this work modern mechanisms defining complexity of management in modern social systems (in the private and state enterprises, hi-tech Programs, structures of the state management-regulation of economic processes) are analyzed. It is shown that the principal difficulty of modern complexity of management consists in management of not completely formalized technologies of activity of social systems of a great number. Modern feature of management in difficult social systems is an essential influence of technologies of the market which aren't regulated by norms and institutes, and also essential influence of natural restrictions of cogitative possibilities of the person to operate-manage. Influence of poorly regulated technologies in the market can be reduced by use of network, organizational, collective, informational and other developed technologies of maintenance of management and by use of methods integrating science. And reduction of influence of mental restrictions demands creation of new cognitive technologies of management which allow to divide functions at the mental level.
This paper presents the current state of art in the field of automated musical harmony analysis. Research in this field can be motivated by the real-world problems of creating completely automated content-based music recommendation systems (similar to Pandora, but with-out the manual work of expert musicologists). The paper is mainly focused on probabilistic graphical models as one of the most promising approaches, although we also give background in alternative methods. We consider works that use Markov chain models, hidden Markov models, and multi-level graphical models. Along with the models that capture only harmonic information—chord progressions, in some cases also the key,—we also list several models that combine harmonic structure with rhythmic or stream structure.
The survey, based on domestic and foreign literature, as well as the results of projects carried out by the order for Russian Foundation for Basic Research, is devoted to the problems research current state analysis of the integration and complex automation of management processes by the main and auxiliary production, logistic, service organizationaltechnical systems that supports life-cycle (LC) of a specific product; problems of creation, use and development of intelligent information technologies, including technologies of ubiquitous computing and communications, and multimodal user interfaces; problems of multicriteria evaluation and analysis of the contribution of information technologies and systems into the mainstream enterprise (firms), including when selecting and implementing effective technologies of life-cycle products (LCP) management. The main feature of this review is that the consideration of all these problems is based on a new cybernetic paradigm of the XXI century, associated with the concept of complexity control.
This paper describes the comparison of the modern optical character recognition systems aimed to find the systems, which do more precise segmentation, and to detect the capabilities of systems to allocate different types of areas. The results of the segmentation methods of OCR systems are analyzed. The effectiveness of the process of segmentation is evaluated. Based on the results of studies and observations made, recommendations to use for different types of documents are made.
A graphic formalism «itinerary nets» is expounded for representation of real–time software application structures. The formalism is oriented to verification of static and dynamic properties of task interfaces. The bounds are defined for applicability of verification that is based on using of states and transitions graphs. A method is defined for assessing the value of blocking factor in systems with concatenated critical intervals of access to shared resources. The method is based on introduce of task profile feature.
The usage of large vocabulary is necessary for the inflective language dictation task, because in these languages there are lots of word-forms that comprise a word paradigm. In the paper, a survey of existing speech recognition systems that use large and extra-large vocabulary is presented, methods and models applying in these systems are described, data about recognition accuracy are given.
Various methods of aggregative indices are widely used in mathematical apparatus of control and monitoring systems aimed at detecting the typical situations and potential dangers (in terminology of JDP-information fusion models). The danger detection (identification, recognition) is not an end in itself at the information fusion process; at its peak this process develops a decision on the detected dangers’ prevention. This paper presents a methodological apparatus intended for a choice of an appropriate version of the detected danger’s prevention strategy and based upon a certain interpretation of the aggregative indices method in analytical planning methods.
Current status and perspectives of an interdisciplinary knowledge domain including informatics, computer science, control theory, and IT applications were analyzed. Scientificand- methodological and applied problems of IT integration with existing and future industrial and socio-economical structures were stated.
Various representations of the same source data are very actual in Internet and intranet systems. One of the perspective ways to obtain such representations is the method of multilevel metatransformations of the given data according to dynamically set requirements.
The class of problems in socio-economic systems is considered, such that problems decision demands capability estimation. Challenge of systems capability estimation formulated. It is shown that analytical estimation of capability on the base of systemic concepts application is necessary. System capability property is defined, capability problems solving topicality justified. Concept of capability research problems solving suggested, capability indicators are justified. Few socio-economic systems capability research problem statements are considered.
Some existing approaches to representation and organization of contexts in different information systems are analyzed. A two-level context management model for intelligent decision support in dynamic structured domains is proposed. A model for description of information resources of an open information environment is given. A technology model of context-aware decision support system is designed.
One considers the application of the variation approach for the decision of problems of statistical estimation of parametres of models of nonlinear dynamic systems by criterion of the least squares with use of discrete and is discrete-continuous measurements. One discusses questions of regularization of marks appreciation.
Metaapproach allows to study information systems, including programming languages and systems, as well as data in different formats, as multilevel developed systems and to construct corresponding converters for them. The paper studies traditional and special programming languages and data representation languages viewed by metaapproach, where languages are divided to classes with internal and external metafunctionality. Examples of code and conversions between languages are shown, some conversion problems and ways of their solving are noted, estimations of efficiency of application of different languages are given, and conclusions on usefulness of discussed languages and of the entire approach for solving typical problems and information presentation are stated.
Experience of Data Mining application for operative risk forecasting in patients with ischemic heart disease is described. The comparison results of the developed system with the known systems are given.
The article deals with a probability of instrumental approach to a psychosomatic status estimation in the article. This approach is bases on joint (combined) processing polytypic biometric data which is results of pulse measurements, vibroimage registration and psychological testing. The article is concern with minimum program-instrumental complex solution. Also, in article a polytypic biometric data bases design is presented.
A brief survey of key results is presented on the feasibility analysis of real–time applications that are implemented by multicore processors with various scheduling methods. A method for estimation of task response time is suggested for scheduling with static task priorities. Number of planning points and number of context switches are estimated for quantum– based and non–quantum scheduling methods.