ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 3 at 2022 year.

Order result by:
Public date | Title | Authors |

21. The method of intersegment estimation of the motion patterns from kinematic trajectories registered by exoskeleton system tools [№3 за 2022 год]
Authors: Provotorov N.V., Taratonov I.N., Philippovich Yu.N.
Visitors: 1153
The paper considers the method of intersegment estimation of the operator’s motion patterns from kin-ematic trajectories registered by the exoskeleton system tools (further EXO). Its purpose is due to the task of detecting and classifying the movements of the operator of the exoskeleton physical perfor-mance support system in real time for predictive control of the structure executive elements and for forecasting the further human-machine system state. The paper defines kinematic trajectories as limb segment motion projections on the Cartesian coor-dinate system planes. Such projections are grouped by affiliation to the described plane and to the limb segment and represent the informational model of the investigated motion. This statement is also true for the expected motion model expressed in the same way as trajectory patterns. In the framework of the problem of defining motion patterns, the authors propose the method of in-tersegment estimation of kinematic trajectories. The method is based on achievements in biomechanics of human motions, especially in the part of kinematic-cyclic research. The main idea is the search of motion signs represented by one pattern or an ordered sequence in the trajectories described by the limb segments in frontal or sagittal planes. Digital signal processing area is used as basic algorithms for defining motion patterns. The developed method is presented in the form of a model that is the basis of a software prototype. The paper also presents the results of the prototype approbation on empirical da-ta received by the exoskeleton system research platform.

22. Automatic detection of audio defects using parallel computing [№3 за 2022 год]
Authors: Rybakov, A.A., Freylekhman S.A.
Visitors: 1555
The paper is devoted to research aimed at automatic detection of defects and anomalies that occur in the audio record digital signal. Defect detection methods are mainly used in digitizing analog audio records and restoring damaged signals. Anomaly detection methods have a wide range of applications including the development of security and environmental monitoring systems, the identification of arti-ficially edited records, restoration of archival audio recordings of cultural value for a certain time peri-od of society development and formation, the fight against so-called deepfakes, encryption and decryp-tion of classified information encoded in audio data and much more. Modern technologies and techniques make it possible to efficiently eliminate the found defects by mathematical manipulation of the signal by an audio engineer or using smart and adaptive digital signal editing tools. However, for this purpose, the defect must be accurately detected and localized, its type and the possible origin must also be determined. There is special software developed within the framework of this work to solve the problem of au-tomatic detection of defects in a digital signal of an audio record. It was verified on digitized audio rec-ords of various quality. Since digital media data including audio records have a large size, the aspect of parallel distributed processing is of particular importance during the analysis. Due to this fact, the de-veloped defect detection code was upgraded to take into account the need to run on Intel Xeon Phi Knights Landing massively parallel microprocessors and demonstrated high scaling efficiency.

23. A computer system for developing digital information models of oil recycling processes [№3 за 2022 год]
Authors: Furaev D.N., Chistyakova T.B.
Visitors: 1878
The paper highlights main general characteristics of the secondary oil refining processes. It proposes a generalized information description of the secondary oil refining processes as the objects of design and management. It also considered the prerequisites for creating and experience of using digital infor-mation models in the field of oil refining on the example of Russian companies. The authors propose a functional structure of a computer system for designing digital information models of oil recycling facilities and a set of tools including information, mathematical support and software. The latter allow, according to the design specification, developing a digital information model that meets the requirements of the technical specification for performance, energy efficiency, quality of a digital information mo- del – the model adequacy, the level of detail, information content, the model economy. There is the structure of information, mathematical and software in the paper. Information support is a set of various databases: characteristics of raw materials and catalysts, characteristics of the main technological equipment and pipeline parts, design standards. Mathematical support is a library of mathematical models of oil recycling processes including models of the kinetics of chemical reactions, heat exchange processes and hydrodynamics. Software is a set of software environments, both author's developments and existing software used at certain design stages. The proposed structure of the computer system is flexible and applicable for all types of oil recy-cling processes; the modular principle of architecture construction allows building reconfigurable in-formation and mathematical support for various types of oil refining processes. The computer system has been tested on the example of catalytic cracking and isomerization processes.

24. A method for simplifying task tracking in video game development projects [№3 за 2022 год]
Authors: Sharaeva R.A. , Kugurakova V.V., Selezneva N.E.
Visitors: 2682
Computer game development differs from “traditional” IT project development mainly due to the high degree of process creativity, which should be taken into account when applying software engineering methods. The research topic is studying the specifics of project management process automation and devel-oping a tool embodying the methods and recommendations formed for the game industry. The authors have analyzed topical scientific sources to set the goal and objectives correctly. As a result, they have highlighted a number of functions necessary for team task trackers that are: assigning a role or a task to an employee, creating dependent tasks, Gantt chart, giving access to information about related tasks to an employee, distributing links and documents, creating reusable templates. Based on the extensive research results, the paper presents a methodology that simplifies the work of the project manager in terms of task management. The approach includes creation of the following features: executors automatically receive tasks according to their field of concern; automatic creation of duplicates and configuration of task dependencies; automatic transfer of artifacts to dependent tasks; generating a project template according to a brief. The work is interesting for the field of interac-tive project development with a prevailing game-dev component. In order to check the result effectiveness, the generated practical approaches were integrated into the LeanTime system. The proposed approach has shown the reduction of time for management tasks by more than 20%; in case of need for many new templates the reduction can even exceed 40%. The designed web-tool can then be integrated as an automation tool not only in the development processes of gamedev projects, but in general for any highly specialized IT development areas.

25. Boundary values evaluation for average response time to an information system user request [№3 за 2022 год]
Authors: Shelest M.N. , Tatarnikova, T.M.
Visitors: 1285
The paper proposes methods for estimating the upper and lower bounds of the average response time of large information systems to a user request. A user request is a transaction consisting of a sequence of commands for which computing re-sources are reserved. The transaction is formalized as a route, which is a chain of “server-buffer” pairs, their number is equal to the number of transaction commands. At the same time, the service device is a mean of executing transaction commands; the buffer is a memory for fixing the results of executing transaction commands and waiting for the time to arrive for service. Allocation of loosely coupled route groups allows parallel processing of transactions. The authors propose a mathematical scheme of a large information system that organizes transac-tion routes in the form of a queuing network, so that each user request passes a certain route from the service devices. The method for estimating the upper bound on the average response time of the system to a user request is based on adding redundant dependencies and duplicating some service nodes. The method for estimating the lower bound of the average response time of the system to a user request is based on the removal of serving nodes that play the role of a weak connection between neighboring routes of the queuing network. The proposed methods allow selecting such parameters that meet the requirements for the infor-mation system being developed and, accordingly, meet the indicators of the quality of service for users of information systems.

26. Developing a password generator using GUI MATLAB [№3 за 2022 год]
Authors: Shchukarev, I.A. , Markova E.V.
Visitors: 2154
Nowadays, in most cases accounts of various sites, portals and cloud storages have weak passwords. In addition, the passwords created by users themselves are of insufficient length, which directly affects their reliability. Therefore, first of all it is necessary to create sufficiently complex and long passwords to ensure account security. In this paper, the authors present a developed a graphical computer application that allows automat-ic generating of passwords with custom settings and displaying the result in the appropriate field. The created passwords are almost impossible to guess since they include a combination of random upper and lower case letters of the English alphabet, numbers and special service characters. The authors im-plement the ability to change the password length, to output the result to the program window and save it to a separate text file named parol.txt. This application and the entire graphical user interface are not written in a specialized programming language, such as Python or C++, which is typical for programs of this type, but in the MATLAB tech-nical calculation environment using the MATLAB GUI and MATLAB Compiler SDK. The MATLAB Compiler SDK capabilities made it possible to create a standalone exe application, not an m-file, which is the MATLAB program internal format and works only if there is fully installed MATLAB environ-ment. To make it convenient for the end user, the program is designed as a stand-alone graphical appli-cation that can run on any computer with MATLAB Runtime installation that allows running compiled applications on systems without the installed MATLAB. The program is built using MATLAB GUI and MATLAB Compiler SDK. As a result, this application can be used by organizations with a network se-curity department, as it can facilitate the creation of many new random passwords for a large number of computers and employee accounts.

← Preview | 1 | 2 | 3