ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2019 year.

Order result by:
Public date | Title | Authors

1. The architecture of a production processes monitoring system in terms of geographically distributed production [№2 за 2019 год]
Authors: Solomakha, G.M., Khizhnyak, S.V.
Visitors: 4836
The paper describes an architecture of a production process monitoring system, which provides an op-portunity to receive relevant and detailed information on geographically distributed production, as well as to observe indicators that are aggregations of other indicators. The system enables working in a dis-tributed mode, which simplifies the implementation and operation in terms of geographical distribution of production. All components, subsystems, as well as the protocol and their coordination arrange-ments are focused both on using geographically distributed, and other productions. The paper presents the main drawbacks of the existing solutions regarding work under conditions of geographical distribution of production. It also outlines the requirements for a system architecture, which has the qualities that are necessary for working in such conditions, formed based on the identi-fied drawbacks. The paper describes the main subsystems and components of the proposed system, their purpose, functions and operation principles. There is a description of the interaction protocol be-tween subsystems and components. The approach to the development of such protocol is justified. There is a description of a data processing order, a data storage method, as well as its format and signa-ture. The data is presented in JSON format. The event model is selected as the exchange model between components. The paper justifies the approach to architecture design, presents the main technologies and tools for system development, and justifies this choice. There are architecture schemes in various combinations of distributed components. Several examples of the functioning of individual components and their in-teraction are considered. Based on the conducted research, the authors have made conclusions and proposed possible pro-spects for the development of the covered topic.

2. An information technology for verifying special software of military automated systems [№2 за 2019 год]
Authors: R.E. Zhidkov, D.S. Viktorov , E.N. Zhidkov
Visitors: 4844
There is a need to create an information technology of military automated system special software verification that allows effective checking of functionality requirements. This is due to the need to create high-quality software within time and financial constraints of the development process. The paper proposes an information technology that is a combination of methods and software utilities for pro-cessing a source code of the investigated program and technical documentation in order to obtain information of functional defects. The described information technology might be used both at the coding stage and at different testing stages in addition to the existing solutions for searching functionality defects. The verification method has a structure determined by the requirements of regulatory documents in the soft-ware development. This method includes a static analysis technique and a technique for assessing analysis com-pleteness based on source code characteristics. This verification method is designed to check the correctness of the implementation of information-calculated tasks in automated systems for managing troops and military equipment based on the principle of dimensional homogeneity of physical equations. The verification information technology is described as an IDEF0 functional model detailed to the second nesting level with a description of inputs and outputs of all works. In order to support the verification process, the authors propose software utilities for automating routine operations: generating unique identifiers of software ob-jects, searching and intentional defects introducing. These software tools are based on the infrastructure of LLVM compiler and Clang frontend that allow checking the program codes in C, C++, Objective-C.

3. The quantum genetic algorithm in the problems of intelligent control modeling and supercomputing [№2 за 2019 год]
Authors: Ulyanov, S.V., N.V. Ryabov
Visitors: 6179
This paper considers the use of the quantum genetic algorithm for automatic selection of the optimum type and kind of correlation in the quantum structure of fuzzy inference. When solving intelligent and cognitive control tasks based on quantum soft computing and the principles of quantum deep machine learning, it is important to choose the type and kind of quantum correlation. It is an additional physical and informational computing resource in the formation of the laws of the time variation of the gains of traditional regulators located at the lower (performing) level of the intelligent control system structure. This approach is essential for the realization of adaptive and self-organizing processes of knowledge bases and guaranteed to achieve the control objectives under contingency control situations. Successful solution of the problem of choosing the type and kind of quantum correlations allows strengthening the successful search for solutions of algorithmically un-solvable problems at the classical control level. A genetic algorithm is a powerful computational intelligence toolkit for random searching of effec-tive solutions for poorly formalized tasks. However, it has a big disadvantage when used on a classic computer: low speed and dependence on the expert’s choice of a decision-making space. The paper describes the types of quantum genetic algorithms based on a combination of quantum and classical calculations, and an algorithm consisting only of quantum calculations. In such algorithm, a population can be composed of only one chromosome in a state of superposition. Immersion in the quantum structure of the fuzzy inference quantum genetic algorithm provides a synergistic effect and allows realizing quantum fuzzy inference on a classical processor. The new effect is based on the quantum genetic algorithm extracting information hidden in the clas-sical state laws change over time the gains of traditional regulators on a new unexpected situation con-trol. Such synergistic effect is possible only with end-to-end intellectual information technology of quantum computing and is absent at the classical level of application of the classical computing tech-nology.

4. A complex mathematical model of the air anti-stealth airship radar system [№2 за 2019 год]
Author: S.V. Susha
Visitors: 4067
One of the stages of creating an anti-stealth airship radar system and evaluating its effectiveness is the development of an integrated mathematical model. This paper presents the structure of such model. The model is developed to substantiate the technical appearance of the system and its application features, as well as to evaluate operating effect and combat (information) capabilities. A mathematical model of the system is based on the basic construction principles and a complex structure. The system itself is an information tool representing a complex radio system. The hardware and software of the system should be located both on the ground and in the air. The structure of the system mathematical model includes several functionally complete blocks and models, in particular, models of a target environment, the Earth, on-board systems of the airship radar system, etc. The paper describes particular mathematical models that are a part of an integrated one, their mutu-al interaction. The radar model of the dirigible radar system is based on calculating detection parameters (signal-noise ratio) using the radar equation. It is an analytical model of the receiving-transmitting path and a signal propagation process. Successive changing of its state at certain time intervals simulates the func-tioning dynamics. The model provides a dynamic playout of the input information to the similar output information of a simulated tool. In addition, it provides the ability to simulate an exchange with a con-trol system, has parameters that allow simulating the control of simulated device operation modes. The paper considers the possibilities of a complex mathematical model of an anti-stealth airship ra-dar system.

5. A method of situational forecasting of the emergence of novel Industry 4.0 technologies [№2 за 2019 год]
Authors: A.M. Andreev , D.V. Berezkin , I.A. Kozlov
Visitors: 6992
The paper considers the problem of automated forecasting of the emergence and development of inno-vative technologies based on Big Data Streams analysis. It shows that such forecasting is significant due to Industry 4.0. The authors analyze the existing approaches to forecasting, determine their ad-vantages and shortcomings taking into account the specifics of the task and Big Data features. It is proposed to solve the problem using the hybrid approach to data stream analysis developed by the authors. The approach allows automatic monitoring and forecasting the development of situations based on processing streams of heterogeneous data represented by text documents, numerical series, and records in databases. The process of data stream analysis includes detecting events, forming situa-tions, identifying possible scenarios of their further development and preparing proposals for decision makers. The authors describe event models that are used for processing streams of textual and structured da-ta. The incremental clustering method detects IT events in text documents flows. This method is also utilized in the processing of structured data stream to form situational chains reflecting the develop-ment of innovative technologies over time. The method for forming scenarios of the further develop-ment of the analyzed innovation technology is based on the principle of historical analogy. The proposed method allows determining the most probable scenario using logistic regression, as well as identifying the most optimistic and pessimistic scenarios via the Analytic Hierarchy Process method. The authors describe a way to supplement each scenario with recommendations for decision makers regarding the measures that should be taken to facilitate or hinder the development of technol-ogy according to this scenario. The paper provides the examples of situations detected in textual and structured data flows, as well as an example of scenarios and recommendations generated for one of the situations.

6. An improved neural network training algorithm [№2 за 2019 год]
Authors: V.N. Zuev, V.K. Kemaykin
Visitors: 4495
The paper describes heuristic modification of backpropagation algorithm using for remote batching. The backpropagation algorithm is a common algorithm for neural network training. It causes some difficulties. The main problem is enabling the generalizing of a neural network. The ability of general-izing is a most important characteristics of a neural network. It assumes that a neural produces antici-pated values on data that is not a part of a training process. However, using of noisy data causes re-training and decreasing of a generalizing ability of a neural network. The problems considered in the paper are an important part of a neural network training process. The paper describes a method to use objective functions effectively. The proposed method allows more effective calculating of the values of a goal function that is a base of the backpropagation algorithm. It also ignores failure values in training data and excludes them at earlier stages. In addition, the method allows using heterogeneous data samples for training neural networks, as well as taking into account prior information on the significance of some examples when training. The paper describes the algorithm of the proposed method. The method will improve the accuracy of a neural network for classification and regression tasks.

7. Neural network user behavior analysis for detecting host-level intrusion [№2 за 2019 год]
Authors: V.N. Zuev, Efimov A.Yu.
Visitors: 5852
The paper focuses on applying machine learning for detecting anomalies in user behavior. The number of known attacks is rapidly increasing every year. In order to resist that treatment, there is a need for effective security systems, such as Intrusion Detection Systems (IDS). This type of sys-tems usually uses signature analysis and requires signature updates. Such systems are not capable of detecting unknown attacks. The methods based on anomaly detection are more attractive as they can identify previously un-known attacks without preliminary creating of intrusion signatures for every possible attack. One of the most popular directions for host-based IDS in anomaly detection is user behavior analysis. The paper describes a method of detecting user behavior analysis anomalies based on artificial neu-ral networks. For detecting user behavior anomalies, the method uses the information on user’s com-mands extracted from system log files and software. This information is converted into time series that is used to forecast next user’s commands. The number of forecasting errors determine the presence of an anomaly in user behavior. The experimental results demonstrate that the proposed method is good for detecting anomalies in user behavior, and has low probability of false positive.

8. Optimization of the control initialization periodicity based on duplicated computing [№2 за 2019 год]
Authors: V.A. Bogatyrev, D.E. Lisichkin
Visitors: 6969
The paper considers a duplicated computing system equipped with the means of operational and test control. The effectiveness of failure detection system is determined by the completeness of the opera-tional control and the frequency of test control. Reduction of control periodicity intervals decreases system readiness due to increasing time costs for testing, but at the same time it increases its safety as a result of decreasing of system functioning probability in the states of undetected failures. In systems with duplicating of computer nodes, load-sharing modes are possible, when nodes inde-pendently perform a shared query thread between them, as well as the mode of duplicated calculations, when each query is simultaneously performed by two computer nodes when comparing the results at control points. There is a potential for duplicated systems with load sharing to improve control efficiency after a periodic transition into a duplicated calculations mode with a comparison of results. This allows reduc-ing costs for a test control (of a duplicated systems), and initiates it only when the results of duplicate calculations disagree. The work objective is to determine optimal intervals of transition into the mode of duplicated calcu-lations to ensure the maximum probability of system readiness for safe execution of functional re-quests while minimizing downtime and service delays. The authors propose a Markov model for determining the probability of system states, including the system readiness for safe operation, downtime and dangerous undetected failure states. Based on the proposed model, the paper analyzes the influence of the initialization periodicity of the mode of duplicated calculations on the readiness of the system for safe operation. It shows the existence of an optimal initialization frequency of the mode of duplicated computations, which enable the probability system readiness for safe operation to achieve maximum while minimizing system downtime.

9. Special aspects of DWDM technology for fiber optic multiplexing [№2 за 2019 год]
Authors: Yu.M. Lisetskiy, Yu.S. Perekopayko
Visitors: 4525
The paper considers the importance of DWDM technology for wavelength division multiplexing of fi-ber optic channels that enables multiplication of bandwidth of a fiber optic cable infrastructure. It is achieved by transmitting of up to 160 independent information channels through one optic fiber. Dif-ferent wavelengths are used to carry traffic with different protocols and speeds. This is an important problem for telecommunications service providers owning numerous fiber optic backbone networks and facing the need to dense the traffic in view of dynamic growth of the amount of subscribers, aver-age duration of communication sessions and introduction of new non-voice services. Conventional fiber optic technologies use one pair of fibers to transmit one channel data. On the contrary, the basic feature of DWDM is the ability to transmit N channels through one pair of fibers. It is achieved through transmitting each data stream on adjoining carrying frequencies. Their operating ranges in DWDM technology are usually called wavelengths. The paper analyzes optic multiplexers combining wavelengths into one composite signal before en-tering the fiber optic line. The receiving side then decomposes it into different channels. Their essential feature is the ability to decompose and compose composite signal to single out a wavelength or set of wavelengths and transmit the rest further down the line unchanged. There are demonstrated features of optic multiplexers as well as the evolution of their development. The paper describes the conceptions of Colorless & Omnidirectional ROADM which eliminates the need to reserve a wavelength on a permanent basis or automatically reroute services through vacant wavelengths on another direction in case of line failure. It is noted that the concepts of omnidirectional and colorful DWDM together with Flex Spectrum technology and dynamic plane of WSON manage-ment are key elements of innovative solution for Cisco nLight fiber optic transport networks. Typical-ly, the DWDM technology utilizing ROADM nodes is used to modernize or expand existing fiber optic networks to increase their bandwidth and availability.

10. Efficiency evaluation of methodical and algorithmic support of a special purpose decision support system [№2 за 2019 год]
Authors: Dopira R.V., A.V. Getmanchuk, Potapov A.N., M.V. Semin, D.Yu. Brezhnev
Visitors: 2755
To eliminate information overload when assessing the state of air and space radio control objects for decision-making, we use methodological support and classification algorithms of decision support system (DSS) objects of an automated control system (ACS) for special purposes. The paper presents a method for efficiency evaluation of algorithmic support of a special purpose ACS DSS. The method is based on artificial generation of input data, as well as data representing a set of all possible values based on an exhaustive enumeration in the form of generating programs of ran-dom objects and random areas. This approach uses the analysis of the relative location of regions in a parametric space, which is a catalog of reference values. In this approach, there is no need to compare object parameters with the parameters of all catalog classes. After finding the first input into an area, we consider the possibility of getting the analyzed object into those areas that have intersections with the area in which the object has already got. The obtained experimental results of evaluation of a general computing labor intensity of the spe-cial-purpose ACS DSS when classifying the objects using a combined method is, on average, two times lower than the basic classification method. The obtained result is particularly relevant in the classifi-cation of air and space radio engineering control objects under conditions of intensive real-time data entry.

| 1 | 2 | 3 | Next →