Journal influence
Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)
Bookmark
Next issue
№4
Publication date:
09 September 2024
Journal articles №2 2018
11. Extracting a data schema from the SPARQL endpoint [№2 за 2018 год]Authors: А.О. Mochalov (aomochalov@corp.ifmo.ru) - The National Research University of Information Technologies, Mechanics and Optics (Postgraduate Student); Muromtsev D.I. (d.muromtsev@gmail.com) - The National Research University of Information Technologies, Mechanics and Optics, Ph.D;
Abstract: The paper is devoted to the problem of extracting a data schema from the SPARQL endpoint. The data schema is necessary for writing queries and searching information, as well as for optimizing query execution. The paper considers the existing methods for extracting schemes, notes minuses and pluses of each method. It defines the notion of a data schema to develop own method. A data schema is a dictionary of all triplets, where the predicates are all fixed predicates from the RDFS namespace, as well as triplets that logically follow from the dataset according to RDFS semantics, except for triplets that are elements of well-known dictionaries (RDF, RDFS, Void, OWL, XML Schema, XSD). The elements from the SPARQL endpoint schema will be retrieved using RDFS rules. The work does not use all RDFS semantics rules as not all rules return the elements of the schema according to the definition of the data scheme adopted in this paper. The paper describes the developed method in detail and presents its architecture. It uses the business rules management system Drools to work with inference rules. The paper presents the advantages and disadvantages of the developed method that showed the expected test results. It it noted that the number of classes and properties can be different for the schemes developed and obtained by the developed method. This is only due to the fact that the developed method uses RDF rules.
Keywords: semantic web, linked data, sparql endpoint, owl, data schema, data set, dataset
Visitors: 6207
12. On information support of decision support [№2 за 2018 год]
Authors: Tikhanychev, O.V. (tow65@yandex.ru) - 27 Central Research Institute of the Ministry of Defense of Russia (Senior Researcher), Ph.D;
Abstract: The basis for formalization of information used in the automated management process is the system of classification and coding. It ensures the work of users with software toolsб as well as the interaction of software tools and automated control systems. According to the existing requirements documents, the interaction between automated control systems is organized through specialized interaction protocols: technical, organizational, information, software. However, with the growing scale of managed systems there appears the problem of keeping these protocols up to date, which increases with growing number and types of interacting agents in a management network. Nowadays, there is a wide range of approaches to solving this problem in the world practice. It includes data exchange using XML files, interaction based on HLA technologies, etc. Nevertheless, in general, none of them provides information interaction in distributed multi-agent systems of automated control. After analyzing the capabilities of modern information technologies, the author proposes to solve the problem through abandoning the “hard” principles of information encoding and moving to its classification based on fuzzy set mechanisms, multidimensional OLAP-matrices or RDF-graphs. Features of the organization of automated decision support systems and numerous components of operational information processing in them make interaction based on “fuzzy” information support the most acceptable to solve the problem. There is a conclusion that the proposed approach does not contradict the principles of creating a single information space. It complements them due to the transition from organizational methods of ensuring systems interaction to simpler technological ones. Naturally, this takes into account the limitations for systems that are crucially critical to the error probability in information processing.
Keywords: decision support, control automation, information provision, information and linguistic support, information interaction
Visitors: 7179
13. On the issue of assessing stability of functioning of communication network elements [№2 за 2018 год]
Authors: Popkov G.V. (glebpopkov@rambler.ru) - Siberian State University of Telecommunications and Information Sciences, Ph.D;
Abstract: The article considers the issues of assessing stability of power grid functioning to destructive destabilizing influences (DDI). The proposed method represents an attacked telecommunication network as dynamic hyper network that allow objective assessing an attacked network state in the context of stability. The author introduces a concept of DDI and the related concept of a DDI channel that affects NE elements of a communication network at different levels of hyper network models. Simplicity and convenience of representing an attacked network in the form of dynamic hyper networks makes it possible to extend the class of problems related to determining stability of communication networks to external destructive influences, in particular, to find correlation links between private intruder models, attack models and vulnerability models of a power grid at the investigated level. Such approach allows designing stable communication networks taking into account dynamically changing external factors connected with threats directed to a communication network structure. It also allows effective detecting and blocking threats related to external information influences while ensuring accessibility, integrity, confidentiality of user information. Due to the proposed approaches, it seems appropriate to create knowledge ontologies based on a network response to DDI at network monitoring points, which in turn will effectively design and install information protection tools in real network structures. The author proposes a private mathematical model of external destabilizing influence, which is based on the probability theory. It makes it possible to trace dynamic changes in a network structure and determine quantitative estimates of QoS applications.
Keywords: destructive destabilizing influences, qos, theory of probability, violator’s model, threat model, design of communication networks
Visitors: 6310
14. Adaptive algorithm for optimal route search in time-dependent network [№2 за 2018 год]
Author: Soldatenko A.A. (glinckon@gmail.com) - Siberian Federal University;
Abstract: The Time-Dependent Shortest-Path problem (TDSP) is an extension of the shortest path problem in a graph. TDSP problem arises when designing and operating telecommunications and transport networks. Such networks require considering time and possibility of appearing predictable situations for example traffic jams or traffic reduction. In this case, network is represented with an oriented graph G = (V, E) where for each arc (x, y) E, two functions are defined. First function is time required for moving along the arc (x, y). Second function is arrival time in vertex y if the movement started from vertex x in time t. Such graph is called time-dependent network. The minimum time for moving from vertex x to vertex y is an optimal route between these vertices. It is known that TDSP for a general time-dependent network without any restrictions on network topology or arrival function is NP-hard. When arrival function satisfies FIFO (First-In First-Out) condition, TDSP problem is polynomially solvable. This paper studies TDSP problem for a polynomial case when arrival functions are monotonous. It is proposed to solve TDSP problem using a two-phased algorithm ALT (A* with Landmarks & Triangle). ALT algorithm is one of the modern least cost routing algorithms originally developed for solving the problem of the shortest path in a graph. In the first phase, ALT algorithm places landmarks in network vertices and calculates potential functions. In the second phase it finds the exact value of an optimal route in a graph with A* algorithm. The paper proposes modification of ALT algorithm which is capable of correct and efficient solving the TDSP problem for a sequence of queries for searching for optimal routes in a time-dependent network. The modification consists in using adaptive heuristic for landmark placement and special formulas for calculating potential functions. This heuristic uses experience of processing all completed queries; adapts current set of landmarks for next queries. There is a description of the modified ALT algorithm and estimation of its working time. The paper also gives a description of the software that implements the proposed algorithm. The results of computational experiments confirm the effectiveness of the modified ALT algorithm.
Keywords: time-dependent networks, big graph, optimal routing, alt algorithm, landmarks placement
Visitors: 8712
15. Algorithmic support of the information system for managing innovation projects in an industry [№2 за 2018 год]
Author: M.V. Chernovalova (0208margarita@bk.ru ) - National Research University “MPEI” (Postgraduate Student);
Abstract: Current approaches to project management are focused on the consistent implementation of all phases. They do not take into account the influence of the results obtained earlier and uncertainty factors on innovation project performance indicators and the degree of its feasibility. The paper considers two algorithms that are aimed at solving these problems. The first algorithm takes into account the influence of uncertainty factors on innovation project work duration and implementation costs. A key feature of this algorithm is a system of fuzzy production rules to determine possible deviations of the results of individual project works from the set indicator values. When managing an innovative project, this allows taking into account external and internal uncertainties while minimizing innovation costs. The second algorithm is focused on minimizing the duration of a project or resource costs. The basis for this algorithm is the List Scheduling algorithm. It differs by using fuzzy production rules to provide efficient allocation of available resources depending on the set values of performance indicators, as well as forecasting performance time of a particular work with the allocated resource level. The article also presents the architecture of the proposed information system for project management. It implements the described algorithms and shows the main modules and data flows between them. It is focused on the complex automation of the process of managing innovative projects.
Keywords: project management information system, uncertainty factors, project schedule, fuzzy production rules, decision support, algorithmic support of information systems
Visitors: 8247
16. Algorithmic software of software maintenance complex controlling the reliability level of flight facilities [№2 за 2018 год]
Authors: Dopira R.V. (rvdopira@yandex.ru) - NPO RusBITex (Professor, Head of Department), Ph.D; V.A. Dikarev (dikva@mail.ru) - Institute of Mathematics, Informatics and Natural Sciences, Moscow City Pedagogical University (Professor, Head of Chair), Ph.D; Potapov A.N. (potapov_il@mail.ru) - Military scholastic-scientific centre of the Air forces "Air forces academy named by prof. N.E. Zhukovsky and Yu.A. Gagarin", Ph.D; E.E. Bueshev (rvdopira@yandex.ru ) - Military Scholastic-Scientific Centre of the Air Forces "Zhukovsky and Gagarin Air Forces Academy" (Adjunct ); I.A. Yuriev (rvdopira@yandex.ru ) - Central Research Radiotechnical Institute named after academician A.I. Berg (Deputy Head), Ph.D;
Abstract: Improvement of technical means complexes is related to the need for research on extending the life of equipment while reducing operational costs. One of the ways of improving qualitative indicators of a technical condition (TC) of such complexes throughout their life cycle while reducing operational costs is the transition to technical service (TS) with pe-riodical inspection. Nowadays when using automated control systems (management information systems), maintenance methods with periodic monitoring that consider the actual condition of the equipment are becoming more and more popular. It should be noted that none of the methods is implemented without the prevention; each of them has its specificity when determining the timing and amount of preventive maintenance. To solve of the problem of determining rational frequency using statistical projections successfully, the paper proposes algorithmic support for software maintenance complex controlling the level of reliability of flight facilities. In this case, the developers of an algorithm took into account the volume and frequency of maintenance. The developed algorithm is implemented as a software complex, which allows determining optimal periods of maintenance. The algorithm efficiency is verified based on functioning of the automated workplace of a near zone head to control the engineering status of radio facilities. According to the engineering status, the software package determines the optimal maintenance periods for technical means complexes.
Keywords: software package, technical means, control, level of reliability, maintenance service, algorithmic support
Visitors: 6498
17. An automation technology and means for regional security control process simulation [№2 за 2018 год]
Authors: A.V. Masloboev (masloboev@iimm.ru) - Institute for Informatics and Mathematical Modeling of the Federal Research Center "Kola Scince Center Russian Academy of Sciences" (Associate Professor, Leading Researcher), Ph.D; V.A. Putilov (putilov@iimm.ru) - Institute for Informatics and Mathematical Modeling of the Federal Research Center "Kola Scince Center Russian Academy of Sciences" (Professor, Scientific Supervisor), Ph.D;
Abstract: The general line of research is related to development of information technologies and computer simulation tools for information and analytical support of regional socio-economic systems security management. The research is carried out within implementation of the development strategy of the Russian Federation Arctic zone and national security efforts until 2020 in the Murmansk region. It is focused on engineering high-end information infrastructure for regional development security control problem solving. The paper is focused on development of toolkit to solve the problem of decision-making information support in the field of regional security management. For that purpose a software training simulation system for network-centric control information support of regional security has been developed. The paper considers system architecture and development features of the software package. The package is a multi-agent modeling environment and provides agent-based model automated synthesis and analysis of multi-agent models of network virtual managerial structures for regional security support in crisis situations in socio-economic sphere. System simulation and software toolkit allows formation, analysis and extension of a spectrum of alternative modeling scenario for regional crisis situations. That provides efficient managerial decision making through information support quality and validity enhancement. The program suite consists of autonomous software agents with framework-integrated simulation toolkit and auxiliary software. The system core and components form network-centric multilayer virtual space as an integration framework for problem-oriented coalition-based multi-agent systems for management information support of each domain of regional security. Application of the proposed software system makes it possible to configure modeling environment fast according to specific features of a control problem and provides high variability of computing experiment implementation.
Keywords: multiagents systems, modeling, software package, data support, etworkcentric management, regional security
Visitors: 8850
18. Continuous execution of system dynamics models on input data stream [№2 за 2018 год]
Authors: I.А. Perl (ivan.perl@corp.ifmo.ru) - The National Research University of Information Technologies, Mechanics and Optics (Associate Professor), Ph.D; М.М. Petrova (maria.petrova@corp.ifmo.ru) - The National Research University of Information Technologies, Mechanics and Optics (Postgraduate Student); А.А. Mulyukin (alexprey@ya.ru) - The National Research University of Information Technologies, Mechanics and Optics (Postgraduate Student); О.V. Kalenova (ovkalyonova@corp.ifmo.ru) - The National Research University of Information Technologies, Mechanics and Optics (Postgraduate Student);
Abstract: This article describes a new approach to system dynamics models execution. In most cases when model execution is involved, the input data is a set of static and known data. It is expected that on the model output modeler will get a set of other system or event characteristics computed by the model based on the input parameters. This approach is still used widely in different industries, but it is not the only scenario. With growing popularity of some concepts such as the Internet of Things, the demand on modeling-based solutions, which take continuous data streams as input, has grown significantly. In comparison with stand-alone client-side modeling systems, cloud-based solutions, such as sdCloud, became a reasonable answer to the industry request. Such systems can provide an ability of continuous execution of system dynamics models. In other words, these systems are ready to accept an incoming data stream and perform model execution that will result in streaming modeling results back to the end-user. Running system dynamics models in parallel with the describing process allows performing predictive modeling of the system status in the future. It also allows finding additional hidden external impacts to the model. For example, such approach can be a base for predictive maintenance of complicated technical systems, because it allows computing nearest maintenance time more efficiently.
Keywords: system dynamics, continuous modeling, modeling as a service, cloud computing, Internet of things, processing dataflow, sdcloud
Visitors: 6879
19. Creating panoramic aerial images from quadcopter [№2 за 2018 год]
Authors: Pakhirka A.I. (pahirka@sibsau.ru) - Siberian State Aerospace University named after academician M.F. Reshetnev (Assistant Professor), Ph.D; Zotin A.G. (zotinkrs@gmail.com) - Academician M.F. Reshetnev Siberian State Aerospace University (Associate Professor), Ph.D; V.V. Buryachenko (buryachenko@sibsau.ru) - Academician M.F. Reshetnev Siberian State University of Science and Technology (Associate Professor), Ph.D;
Abstract: The paper considers the approach to forming panoramic images representing highly detailed images of some area. To obtain high-quality panoramic images, there is a need in specialized equipment and, if possible, the maximum survey altitude. These factors can be excluded if stitching the images from cameras of inexpensive unmanned aerial vehicles, i.e. quadcopters. One of the approaches to forming panoramic images is using a set of images or video sequence data obtained when surveying by a quadcopter or other unmanned aerial vehicle. Images are stitched by the methods of matching point features. However, feature points detection algorithms should ensure invariance to any transformations of an image in order to analyze data and generate panoramic images. The research includes applying such algorithms such as FAST, FAST-ER and SURF due to the fact that they are currently the most common solutions for such task. The algorithms for determining correspondences of found feature points are RANSAC and MLESAC. The paper proposes the algorithm of creating a panoramic aerial image from a set of successive landscape images from an unmanned aerial vehicle based on matching key features. The authors also use panoramic image global adjustment through affine processing. A special attention is paid to stitching images using multi-band blending techniques. This provides high-quality visualization in the stitching places of a panoramic aerial image.
Keywords: feature point detectors, fast, surf, panoramic aerial image
Visitors: 4434
20. The algorithm for recognizing situations in a distributed video surveillance system [№2 за 2018 год]
Authors: A.Yu. Kruchinin (kruchinin-al@mail.ru) - Orenburg State University (Associate Professor), Ph.D; D.V. Kolmykov (malin.chyn@gmail.com) - Orenburg State University; R.R. Galimov (rin-galimov@yandex.ru) - Orenburg State University (Associate Professor), Ph.D;
Abstract: CCTV systems are the most important means for preventing and timely handling of contingencies, such as crimes, emergency situations. A big number of cameras and a large control area makes it necessary to introduce video analytics to recognize dangerous situations. In this case it is necessary to take into account the data from a number of video cameras both for detecting a motion path of a recognized object and for increasing recognition reliability. The article proposes an algorithm for recognizing emergencies for a distributed video surveillance system based on stochastic grammars. Recognition of a situation occurs at 3 levels: images are recognized at the lower level, events are recognized at the average level, and situations are recognized at the top. To reduce the system response time, it is proposed to use a multi-agent architecture that allows distributing the load between intelligent cameras. Data exchange occurs only between nearby nodes, so network traffic reduces. The use of a large number of cameras involves zones controlled by several nodes. Combination of detection results from several cameras makes it possible to increase the estimate reliability. However, it is required to know the mutual arrangement of chambers and the angles of their turns. The article suggests some methods for automatic calibration of cameras in a distributed video surveillance system, ways of combining images from different cameras, in particular, based on speed rate vectors of objects. Taking into account certain features of a distributed video surveillance system, there is a developed algorithm for recognizing emergencies for an intelligent surveillance camera. Each camera generates probable situations based on previously recognized events. When a threshold value of probabilistic evaluation of the detection result is exceeded, its refinement is carried out in the process of interaction with neighboring nodes.
Keywords: distributed video surveillance system, contingency detection, multiagents systems
Visitors: 6837
◄ ← Preview | 1 | 2 | 3 | Next → ►