ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2018 year.

Order result by:
Public date | Title | Authors

21. Modern approaches to training intelligent agents in the Atari environment [№2 за 2018 год]
Authors: D.A. Korobov, S.A. Belyaev
Visitors: 8757
The article describes the research and development of machine learning algorithms for the problem of training intelligent agents in the Atari environment. The environment is the game console Atari2600 emulation on OpenAI Gym platform. The main aims of the research are to describe and compare modern learning algorithms with reinforcement in a number of cases, to expose their advantages and drawbacks and to give suggestions in order to increase their effectiveness. The authors describe a mathematical model of the reinforcement learning task in terms of Markov Decision Process and form a system optimality criterion. In addition, they note the Atari environment properties. There is a description of an operation principle of existing solutions, as well as the tools used in them. The paper considers a basic Q-learning approach and its well-known modification that uses a neural network. It also presents the idea of the algorithm based on policy gradient. The paper gives a description of the approach of “actor-critic” algorithms and considers its asynchronous multithreaded version. All the described algorithms are presented in pseudocode. The authors propose a method of increasing the effectiveness of learning using feature extraction. The developed algorithm for feature vector generation is based on image recognition. The paper describes the steps of feature vector selection and its usage during the learning process. The described algorithms are implemented, and the experiment is conducted. A comparative analysis of the results gave conclusions on the efficiency of the algorithms. Finally, the authors propose some ideas for further increasing the speed and efficiency of training of intelligent agents.

22. Creating panoramic aerial images from quadcopter [№2 за 2018 год]
Authors: Pakhirka A.I., Zotin A.G., V.V. Buryachenko
Visitors: 3994
The paper considers the approach to forming panoramic images representing highly detailed images of some area. To obtain high-quality panoramic images, there is a need in specialized equipment and, if possible, the maximum survey altitude. These factors can be excluded if stitching the images from cameras of inexpensive unmanned aerial vehicles, i.e. quadcopters. One of the approaches to forming panoramic images is using a set of images or video sequence data obtained when surveying by a quadcopter or other unmanned aerial vehicle. Images are stitched by the methods of matching point features. However, feature points detection algorithms should ensure invariance to any transformations of an image in order to analyze data and generate panoramic images. The research includes applying such algorithms such as FAST, FAST-ER and SURF due to the fact that they are currently the most common solutions for such task. The algorithms for determining correspondences of found feature points are RANSAC and MLESAC. The paper proposes the algorithm of creating a panoramic aerial image from a set of successive landscape images from an unmanned aerial vehicle based on matching key features. The authors also use panoramic image global adjustment through affine processing. A special attention is paid to stitching images using multi-band blending techniques. This provides high-quality visualization in the stitching places of a panoramic aerial image.

23. Comparison of the adaptive and rigid algorithms of traffic control based on a simulation model in AnyLogic [№2 за 2018 год]
Authors: Ya.I. Shamlichky, A.S. Okhota, S.N. Mironenko
Visitors: 6638
The growth of an automobile park and traffic volume led to increasing traffic intensity. This causes a transport problem in the conditions of cities with historically developed buildings. The problem is especially serious in key points of the street-road network. The problem is related to the increase in transport delays, queues and traffic jams, which in turn causes a reduction in the communication speed, unjustified fuel overexpenditure and increased wear of vehicle units and assemblies. There are two ways to solve the problem: engineering and construction works (widening the carriageway, applying complex road interchanges) and using automated traffic control system (ATCS). The first option is expensive and takes a long time from development to putting the object into use. The second option is less global in terms of changing a road network, but more productive. There are several types of ATCS. A specially trained operator sets up a hard algorithm manually, which is not always convenient and effective. The adaptive algorithm automatically adjusts to the flow, which is more convenient during the so-called “rush hour”. The change in traffic intensity observed during the day requires a corresponding change in a cycle duration and enable signals. The multi-program rigid control is not capable of taking into account short-term random fluctuations in the number of cars approaching an intersection. The use of ATCS based on the adaptive algorithm will solve the problem with increasing traffic in cities. The citywide ATCS should be based on principles that ensure maximum management efficiency and reliability of the system. The improvement and development of ATCS is essential to any major metropolis.

24. A comparative analysis of methods of calculation the number Pi by standard means [№2 за 2018 год]
Author: Bakaeva, O.A.
Visitors: 9594
The process of the research on finding the number Pi can be divided into three periods: the ancient period, the classical era and the era of modern computers. Each of them has its own methods and tools. The purpose of this work is to analyze and compare various methods of calculating the number Pi using standard tools: MS Excel spreadsheet and Free Pascal programming environment. Computational methods are based on mathematical expressions, which are a qualitative approximation of the number Pi. They are the series of Gregory-Leibniz, Madhava, Neelakant, Euler's and Wallis's formulas, etc. The comparative analysis of these expressions and algo-rithms created on their basis has revealed the fastest and exact method of finding thhe number Pi. The paper describes computational studies, the result of which is finding the number Pi accurate within the 10th decimal place. The pur-pose of this study was to determine which computing environment is more accurate and effective for finding the number Pi. Based on the study results, there is a comparative analysis of MS Excel and Free Pascal computational capabilities regarding laboriousness, calculation time and Pi number computing accuracy. The originality of the work is in calculation of the sum of a series that converges to Pi for each new place of summands. Thus, the author shows in practice the dynamics of series convergence to the number Pi. For each of these approximate values of Pi, the absolute and relative errors are calculated. The number of summands is chosen based on calculation accuracy, which is considered satisfactory if the relative error is <0.001%.

25. Technology of interaction of IACPaaS cloud platform services with external software [№2 за 2018 год]
Authors: Gribova, V.V., F.M. Moskalenko, V.A. Timchenko, Fedorischev L.A.
Visitors: 7661
Modern cloud technologies have a number of advantages over other types of software (simplification of installation, maintenance, access, teamwork, etc.). At the same time, some tasks are impossible to perform on cloud platforms (or non-optimal to perform). Therefore, there is an obvious need in creating standards, interfaces, systems that allow combining capabilities of different software types. This article discusses the architecture and technology of interaction between the cloud platform IACPaaS and external traditional software. The article describes the interaction architecture of the cloud platform and external software, which consists of five main components. Two of the components are on the platform: a service and a proxy agent. The others are on the external system: a web server, a proxy program and external software. The paper describes the features of each component. The authors also present a service development technology taking into account the given architecture. It consists of four main stages: 1) service development on the platform, 2) external software development, 3) web server installation, 4) communication software development – a proxy program. The features of each stage are described. The paper considers the necessary requirements for the development of agents on the platform and the specification of parameters when sending and receiving messages. There are corresponding examples. The paper gives the examples of successful use of the proposed technology when solving transport modeling problems. In the examples, the main computing load is focused on the external software, whereas services for visualizing the results of these calculations are provided on the IACPaaS platform. One example demonstrates the phased implementation of the technology. At the end of the article, there is a discussion of the advantages gained from applying the presented technology.

26. An automation technology and means for regional security control process simulation [№2 за 2018 год]
Authors: A.V. Masloboev, V.A. Putilov
Visitors: 8234
The general line of research is related to development of information technologies and computer simulation tools for information and analytical support of regional socio-economic systems security management. The research is carried out within implementation of the development strategy of the Russian Federation Arctic zone and national security efforts until 2020 in the Murmansk region. It is focused on engineering high-end information infrastructure for regional development security control problem solving. The paper is focused on development of toolkit to solve the problem of decision-making information support in the field of regional security management. For that purpose a software training simulation system for network-centric control information support of regional security has been developed. The paper considers system architecture and development features of the software package. The package is a multi-agent modeling environment and provides agent-based model automated synthesis and analysis of multi-agent models of network virtual managerial structures for regional security support in crisis situations in socio-economic sphere. System simulation and software toolkit allows formation, analysis and extension of a spectrum of alternative modeling scenario for regional crisis situations. That provides efficient managerial decision making through information support quality and validity enhancement. The program suite consists of autonomous software agents with framework-integrated simulation toolkit and auxiliary software. The system core and components form network-centric multilayer virtual space as an integration framework for problem-oriented coalition-based multi-agent systems for management information support of each domain of regional security. Application of the proposed software system makes it possible to configure modeling environment fast according to specific features of a control problem and provides high variability of computing experiment implementation.

27. Search of minimal acyclic path in weighted graphs containing negative weight edges [№2 за 2018 год]
Authors: Gdansky N.I., Kulikova N.L., E.V. Chumakova
Visitors: 7676
The paper considers the problem of determining minimal acyclic routes in weighted graphs containing negative weight edges. It also investigates the possibilities of the Bellman-Ford algorithm. It is shown that in general all its possible modifications, even the deepest ones, can determine only approximate solutions. On the average, the best approximate solutions to the problem are given by a modified version of the Bellman-Ford algorithm, in which cycles are discarded when searching for optimal continuations of the desired path. To ensure the search for exact solutions, the authors propose a modification of the branch and boundary method based on using special acyclic search trees. In the nodes of this tree, along with the number of the next vertex, the current cost of the path and the necessary pointers, there are the numbers of all the untraversed vertices, as well as a special list of negative weight edges. A list of vertices is used for acyclic continue of a path. A list of negative weight edges is necessary to estimate the maximum possible decrese of its acyclic continue. The paper suggests to use special bidirectional lists for more convenient practical implementation of acyclic search trees for one level vertices. In such lists, direct links specify the movement to neighboring level nodes. Back references point to the previous vertex in the path from the initial vertex to the given node. The algorithm is described on a C-like pseudocode. There is also an example that demonstrates the approximate character of Bellman-Ford algorithm modifications on the one hand and the work of the proposed method on the other hand.

← Preview | 1 | 2 | 3