ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 3 at 2018 year.

Order result by:
Public date | Title | Authors |

21. Principles of software construction for electronic system thermal design [№3 за 2018 год]
Authors: Madera A.G., Kandalov P.I.
Visitors: 5911
The paper considers conceptual issues on developing a multifunctional software package for thermal design of complex electronic systems. The software package is intended to carry out mathematical and computer analysis of the nonlinear unsteady-state stochastic and determine thermal processes and temperature distributions in electronic systems of any structural complexity and the impact of destabilizing factors. A multifunctional software package should provide a graphical representation of both source data and computer modeling results in the form of tables, graphs, diagrams, etc. Computational algorithms that implement mathematical models should be written and optimized both for personal computers and supercomputer systems through their paralleling using Message Passing Interface (MPI) or Open Multi-Processing (OpenMP). The basic programming language for developing the developed software package is C#. It provides a cross-platform, development speed and convenience, support for selective optimization in C++ and C. An integrated development environment is Microsoft Visual Studio that runs only Microsoft Windows platform. It is possible to run development programs in Linux or Mac OS X using non-Microsoft .NET implementations like Mono. The authors consider the architecture of the developed software package divided into three levels. They are: a presentation level, a business logical level, and a database level that allows effective optimizing the software package, extending its functionality and supporting several platforms like Mac OS X or Linux.

22. A program for calculation of controller settings by the method of advanced frequency characteristics [№3 за 2018 год]
Authors: Margolis B.I., G.A. Mansour
Visitors: 8552
The paper considers the problem of calculating settings of typical general industrial controllers in automatic control systems for technological objects. It shows the possibility of applying the Nyquist stability criterion for extended system frequency characteristics. It also formulates the problem of ensuring the necessary quality of a transient process in a closed system due to the provision of the given degree of oscillation. The obtained condition for the given system oscillation ensures that the controller settings are located on the equal damping line. The paper considers the extended frequency characteristic of the PID controller for the case when a component is introduced into it as a real differentiating element. The authors have obtained the formulas for finding PID controller settings using extended frequency characteristics in the form of parametric dependencies. There are also relations obtained from general formulas for PI and PD controllers. A program developed in MatLab based on the proposed method allows calculating optimal controller settings by the criterion of minimum deviation of transient time and overshoot from the set values. There are also the results of calculating PID controller settings for a control example and the obtained equal damping lines. The paper presents the best transient processes for each of the equal damping lines and the optimal process satisfying the required quality characteristics. It also shows the disadvantages of the method of extended frequency characteristics in the proposed formulation. The paper considered the possibilities of alternative formulation of the problem of synthesizing controller settings and the application of the proposed methods for finding controller settings in multi-loop systems for automatic control of technological objects.

23. Temperature model of potential distribution for non-uniform doping nanotransistors with the silicon-on-insulator structure [№3 за 2018 год]
Author: Masalsky N.V.
Visitors: 6290
The paper discusses development of a 2D analytical temperature model of potential distribution in a work area of a double gate thin-film field nanotransistor with the silicon-on-the-insulator structure with a vertically non-uniform doping work area in the form of the Gaussian function. Double-gate field transistors with the silicon-on-the-insulator structure are the leading representatives of an element basis for a new scientific direction that is high-temperature microelectronics since they are ideal high-temperature devices. For a stationary temperature case, in parabolic approximation using a special function the authors have received an analytical solution for a 2D Poisson equation. They also numerically investigated temperature dependences of surface potential distribution on doping profile parameters in the range of temperatures from 200 K to 500 K. For the selected layout rules, variation of doping profile parameters gives an additional opportunity of controlling the key nanotransistor characteristics along with thickness of work area and gate oxide of a front lock, which is important when analyzing applicability of nanotransistor structures. The authors show that structures with steep doping profiles are more heat-resistant in comparison with homogeneously doping ones. In order to increase the upper bound of a temperature range by 100 K, it is necessary to increase the work area doping level by times. Using a perspective transistor architecture for double gate field nanotransistors with the structure silicon-on-the-insulator allows increasing thermal firmness of their key electrophysical characteristics in comparison with double-gate field transistors with homogeneously doping work area and with their volume analogs. The results of simulation are in close agreement with simulation data received using the ATLASTM software package, which is commercially available for 2D simulation of transistor structures.

24. Development of the spontaneous structuring algorithm of natural complex digital images [№3 за 2018 год]
Authors: E.Ya. Ostrovsky, S.V. Rumyantsev, V.A. Fadeev
Visitors: 4329
The paper considers the way of improving the algorithm of spontaneous formation of a consistent structure on digital matrix objects with observation data of parameters (magnetic, gravimetric, radioactive etc.) of the natural complex under investigation. In the section “A Spontaneous Structuring Concept: Chaos Self-Organization in Stable Homogeneities – Structure Parts” the authors state the problem. They consider a spontaneous structuring technique that is alternative to traditional technologies and reveals stable properties (signs), creates a unique (only possible) consistent structure. In the section “The Algorithm of Spontaneous Formation of a Unique Highly Informative Structure” the authors consider the algorithm as a sequence of key stages that form the basis of the technique of the spontaneous formation of a consistent structure. The section “Experience in Applying Spontaneous Structuring Technique” gives brief overview of technology application. In section “Human Factor or the Role of an Expert in Using the Technology” the authors emphasize the role of a man as an expert when using the spontaneous formation technology of a consistent structure. The conclusion contains possible applications of the technology. Thus, technology development (conception, algorithm and software) for consistent structure formation in the form of a set of the non-crossing stable multidimensional homogeneities (contiguity associations) that represents regions of adequate extrapolation (forecasting) of objects in them.

25. An automated system of information accessibility protecting from attacks by unauthorized traffic in UNIX-like systems [№3 за 2018 год]
Authors: E.V. Palchevsky, A.R. Khalikov
Visitors: 7622
The paper is devoted to the development of a software module for protecting information accessibility during massive DoS and DDoS attacks. The developed system allows automatically determining a type and form of attacks by unau-thorized traffic, and also filtering network packets by a specified limit (from 10 thousand to 7 million per second), with subsequent load distribution by physical and logical cluster cores. At the first stage of development, DoS and DDoS attacks were analyzed, and similar solutions for a DDoS protection system were examined. The second stage is technical development of the automated system for protecting information accessibility AntiDDoS. The authors show basic functionality and the operation scheme of the DDoS attack protection system. The basic functionality is represented by the following technical data: the name of the function, the execution goal, the operating condition and the result of execution. The third stage is approbation of the implemented system within ten days. The results are presented in a table with an average daily load on computer resources. The created information accessibility protection system allows effectively filtering network packets in an automated mode, as well as sending all data to the MySQL database, and then outputting information to the web interface. The web part is one of the control parts of the developed system. It implements the ability to manage the system from personal computers/servers and mobile devices. The developed information accessibility protection system from AntiDDoS unauthorized traffic attacks has shown high stability and reliability when filtering network packets in large and small volumes. The average CPU load during DDoS attacks is 6.64 %. Whereas without using this system, the load during DDoS attack can increase to 100 %. Reduced load is acceptable and allows simultaneous running complex computational operations without disrupting the system.

26. Adequate interdisciplinary models in forecasting time series of statistical data [№3 за 2018 год]
Author: B.M. Pranov
Visitors: 8536
Statistical studies commonly use multivariate linear models to model and predict time series. Their application area is quite extensive. They are quite effective in a situation when a set of points depicting the objects under investigation in a multidimensional parameter space is located near a certain linear subspace (or its shift relative to the origin). Factor analysis easily reveals this effect. If there is no such subspace (linear set), nonlinear dependencies are used to construct more accurate models. In the economy, the Cobb-Douglas function is used to describe the dependence of enterprise profits on the number of employees and the value of fixed assets. It turns out that if we consider fires and other phenomena of society as a kind of its “production”, then the Cobb-Douglas function allows approximating a corresponding time series with a high degree of accuracy. As a result, we get a number of interesting models in the new subject areas. The results of calculations showed that the Cobb-Douglas function is good at approximating the time series of the total number of fires in the territory of the Russian Federation. The prognostic values calculated by such models are very close to the real ones. A significant number of European countries, as well as the United States use a similarly adequate approximation of the time series of the total number of fires. Such modeling is also appropriate for a tourism industry. The paper considers the models of total hotel income depending on the number of employees and the size of fixed assets.

27. F-Ranking: a computer system for ranking fuzzy numbers [№3 за 2018 год]
Authors: A.V. Radaev, A.V. Korobov, Yatsalo B.I.
Visitors: 6834
In many areas of human activities, people face uncertainties. One of the ways of handling and analyzing uncertainties is using fuzzy sets including fuzzy logic and fuzzy numbers. The use of fuzzy numbers within decision analysis inevitably leads to the problems of their comparison and ranking. Despite the variety of ranking methods, the majority of the existing systems with fuzzy numbers use only defuzzification methods. However, the replacement of a fuzzy number by one real number (like the replacement of the probability distribution density by the corresponding mathematical expectation) inevitably leads to narrowing and loss of information in the original fuzzy number. The paper presents an original computer system F-Ranking for ranking different fuzzy numbers. The system allows using fuzzy numbers with singletons, triangular, trapezoidal and piecewise (including sectionally continuous from above) fuzzy numbers as input data. F-Ranking system includes six methods for ranking fuzzy numbers based on defuzzification: three defuzzification based ranking methods (a centroid index, median, and an integral of alpha-cut mean values) along with two ranking methods based on pairwise comparison (Fuzzy Rank Acceptability Analysis) using Integral and Yuan’s fuzzy preference relations. For the last two methods, a preference fuzzy measure of one fuzzy number over another as well as Fuzzy Rank Acceptability Indexes are available. The paper briefly describes the algorithms of the mentioned methods. The authors make a review of existing systems, which can be used for ranking fuzzy numbers. There is the structure of F-Ranking system with input/output forms and examples of ranking fuzzy numbers using different methods. These examples show the features of the ranking methods under consideration as well as the possibilities of F-Ranking system in general.

28. High-level architecture of training simulation systems of complex technical systems [№3 за 2018 год]
Authors: A.V. Roditelev , Giatsintov A.M.
Visitors: 7689
The paper provides a detailed description of the training simulation system (TSS) architecture using the example of an air simulator prototype. A TSS visualization subsystem provides visualization of external environment and a control object using display devices. It should provide reproduction of the created virtual scene with a sufficiently detailed content that allows TSS operators to perform the assigned tasks successfully. The authors give the requirements for TSS subsystems, including those for the TSS visualization subsystem. The developed architecture avoids high coupling of components and provides a unified approach to managing hardware, such as various input devices. Usually, a device has some peculiar properties: specific control software, closed information exchange protocols, different connector types. The developed plugin management systems allows taking into account various hardware features without modifying the main module and other subsystems. The created control interface works with pluggable modules. Plugins are self-sufficient and can be added or removed without violating the integrity of the system. Depending on the workload, data processing can be organized on one machine or each subsystem can operate on a separate machine. Each subsystem is a standalone software complex that may be developed by a third-party developer. The main module and its subsystems can operate on hardware complexes with different processor architectures, endianness (little or big) and operating systems. The paper also describes an algorithm that transforms geographic coordinates received from the modeling subsystem to the coordinate system used by the visualization subsystem.

29. Algorithmic undecidability of the problem of first-order correspondence of computational tree logic formulas [№3 за 2018 год]
Authors: M.N. Rybakov, L.A. Chagrova
Visitors: 3518
It is common to use the first-order language as a formal tool for describing properties of various (computational) structures. On the one hand, this language is well understood and easy to use; on the other, many questions that are im-portant from the applications point of view related to this language are algorithmically undecidable, i.e., cannot be answered using a computer program. These days, there exist various alternative languages that can be used for describing computational processes and their properties, for which the corresponding questions are, in contrast to the first-order language, algorithmically decidable. In this paper, we consider one of such languages, – the language of the Computational Tree Logic (CTL). It is commonly used for program verification as it is capable of describing properties of computational processes, – in particular, properties of the binary relation used in the Kripke semantics. The authors investigate the possibility of finding algorithmically first-order formulas defining the same classes of Kripke frames as the formulas of the language of CTL. It is well known the problem of finding first-order correspondents of propositional intuitionistic formulas is algorithmically undecidable. The authors reduce – using the Gödel translation of intuitionistic formulas into modal ones, and subsequently a translation of resultant modal formulas into CTL-formulas – the first-order correspondence problem for propositional intuitionistic formulas to the first-order correspondence problem for CTL-formulas on Kripke frames. As a result of this reduction, they prove that the first-order correspondence problem for CTL-formulas is algorithmically undecidable. In the conclusion, the authors discuss some possible modifications of their construction for fragments of the language of CTL as well as algorithmic decidability of the CTL correspondence problem for first-order formulas.

30. A neural network method for detecting malicious programs on the Android platform [№3 за 2018 год]
Authors: Tatarnikova, T.M., A.M. Zhuravlev
Visitors: 5519
Continuous growth in the number of malicious programs aimed at the Android operating system makes the problem of their detection very important. The lack of a centralized mechanism for distributing applications and effectiveness of existing solutions exacerbate the problem. The paper demonstrates experimentally the lack of effectiveness of the existing mechanisms for detecting malicious programs in the Android operating system. The need for an automated solution that increases the probability of malicious program detection in the Android operating system including previously unknown modified and obfuscated versions of already known programs determined the purpose of the work. The authors used the methods of neural network classification, static code analysis and analysis of program behavior in a virtual environment. The novelty of the proposed solution is the use of classification features obtained both by static code analysis and by analysis of program behavior on a virtual device. The proposed approach eliminates the shortcomings of existing solutions to the problem under consideration. The ability of the proposed solution to detect malicious programs that were not used in neural network training, as well as obfuscated instances, has been experimentally proven. The practical significance of the proposed solution is its use for building malware detection systems of the Android operating system, which can be applied in the Android application store.

← Preview | 1 | 2 | 3 | 4 | Next →