ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Journal articles №2 2017

11. Recursive algorithm for exact calculation of rank tests for testing statistical hypotheses [№2 за 2017 год]
Authors: Agamirov L.V. (mmk@mati.ru) - MATI (Russian National Research University), Ph.D; Vestyak V.A. (kaf311@mai.ru) - Moscow Aviation Institute (National Research University, Ph.D; Agamirov V.L. (avl095@mail.ru) - Moscow Aviation Institute (National Research University, Ph.D;
Abstract: The paper considers the method of generating exact distributions of nonparametric rank tests by means of the computer combinatorial theory. Relevance of the work consists in the fact that determination of exact distribution of critical values of rank tests for statistical hypotheses testing is complicated by the fact that the exact tables and recurrence formulas for many of the tests do not exist. In addi-tion, approximations often give unsatisfactory results at limited volumes of observations. The task of calculating the distribution for rank tests is a search of all possible sample permutations and calculations of rank sta-tistics, as well as cumulative frequency of their occurrence. The program of generating permutations of elements of samples for nonparametric rank criteria based on the recursive brute-force algorithm of direct enumeration of order statistics vector permutation is developed with the following limited number of op-tions: in all permutation options the elements from the same sample cannot be swapped. It is a universal condition for all the rank criteria exact distributions. The paper refers to the Internet resource that contains the software package implementation of the considered calculation algo-rithm for a rank test. This complex contains four nonparametric criteria: two-sample Wilcoxon test, Lehmann-Rosenblatt test, series test and Kruskal-Wallis test, whose accurate distribution statistics are of greatest interest for technical problems. The algorithm can be used for other rank tests of statistical hypotheses testing. The paper presents an implementation of the generation method of nonparametric rank test exact distributions by computer com-binatorial means. It is based on the developed by the authors recursive direct enumeration of options of order statistics vector permu-tation with following filtration of the results. Thus, the authors solve the problem of determining the critical values of nonparametric rank tests for testing statistical hypotheses.
Keywords: nonparametric rank tests, hypothesis testing, exact distribution, combinatorics, algorithm, software, javascript
Visitors: 10167

12. Clustering software solution [№2 за 2017 год]
Authors: A.S. Grigorash (grigoraschandrey@gmail.com) - Southern Federal University; Kureichik V.M. (kur@tgn.sfedu.ru) - Taganrog Institute of Technology Southern Federal University, Ph.D; V.V. Kureychik (vkur@sfedu.ru) - Southern Federal University (Head of Chair), Ph.D;
Abstract: Nowadays, information technologies have developed considerably. Databases grow too fast, and data processing becomes more and more difficult with each passing day. Data mining methods become an urgent area of study for processing large amounts of data because they allow finding out implicit patterns in data sets. One of the main tasks of data mining is clustering. The authors formulated the clustering problem. Clustering is a NP-complete, difficult task, therefore it is necessary to develop non-standard algorithms and methods for finding an effective solution in polynomial time. The purpose of this research is to build a software package for solving the clustering problem. In order to solve it, there were proposed modified methods of evolutionary modeling and swarm intelligence, which might adaptat to environmental changes. The paper specifies a modification to find quasi-optimal solutions, which allowed significantly reducing the time of cluster for-mation. It also describes modified genetic, ant and bee colony algorithms, as well as an algorithm functioning model as a consistent system. The article considers the structure of the software system and the developed an intuitive user interface. A computational experiment was carried out on different amounts of data banks. A series of computational experiments showed that the time for element clustering approximately equals to 9.4 seconds. The difference between the obtained value and the optimal value is at average of 3–5 %. Within the research, the optimal time is 8–9 seconds. The experiment revealed temporary complexity of the developed complex. It approximately equals to the ICA ≈ O(n2).
Keywords: data mining, evolutionary modeling, generic algorithm, swarm intelligence, bee colony optimization, ant colony optimization
Visitors: 10071

13. Realization and testing of newton methods for unconstrained optimization [№2 за 2017 год]
Author: A.B. Sviridenko (roshechka@gmail.com) - Novorossiysk branch of the Kuban State University (Lecturer);
Abstract: The paper describes an approach to increasing the effectiveness of Newton’s methods for unconstrained optimization based on the Cholesky factorization with step adjustment and finite-difference approximation of the first and second derivatives. The modified Cholesky decomposition of the second derivative matrix is the basis of increasing the efficiency of the Newton’s methods. It defines the solution to the problem of scaling steps during lovering; the approximation by non-quadratic functions; integration with the method of confidence neighborhoods; decrease in norms of priori amendment. The work investigates the possibility of reducing the number of function evaluations by forming the second derivative matrix in accordance with its structure. The article examins the relationship of the approach to increasing the efficiency of the Gaussian exceptions for sparse matrices and the proposed approach to increasing the efficiency of numerical methods of Newton type (using a matrix structure), that is information about matrix positions which store non-zero elements. For Newton’s methods for unconstrained optimization based on the Cholesky factorization with step adjustment and the finite-difference approximation of the first and second derivatives it is the possibility of reducing the number of function evaluations by forming a matrix of the second derivatives in accordance with its structure. The paper contains the descriptions of program implementations, all versions of the algorithms are implemented in Visual Basic .NET, the development environment is Microsoft Visual Studio 2010. The article shows the results of numerical studies of the effectiveness of the developed algorithms given the set of rules described in the work. The work studies an approach to increasing the efficiency of Newton’s methods with finite-difference approximation of the first and second derivatives. This is the basis for further research, the results of which might be used to build Newton-type numerical methods.
Keywords: newton’s methods, matrix structure, finite-difference approximation, cholesky's decomposition, scaling steps, method of confidence neighborhoods, norm of the prior correction, benchmarking, performance profile, collection of test problems
Visitors: 4189

14. n efficient block codig method for binary images [№2 за 2017 год]
Authors: M.P. Bakulina (marina@rav.sscc.ru ) - Institute of Computational Mathematics and Mathematical Geophysics SB RAS (Research Associate), Ph.D;
Abstract: Efficient image compression without quality loss is one of important problems of the information theory. This problem has a wide practical application. It is known that any digital image can be represented by a sequence of messages. There are numerous ways to select messages. The only requirement for these methods is the possibility of restoring an exact copy of the original image from a sequence of messages. One of the ways of choosing messages is that the adjacent picture elements are grouped into blocks. Then, these blocks are encoded according to the probabilities of their occurrence. Thus, short code words are used for the most probable configurations of blocks, and long code words are used for less probable configurations. The result is an average ratio of data compression. This coding is called block coding. The block coding method makes it possible to obtain efficient compression two-level (binary) images without losing quality. This paper considers the solution of this problem. We consider any binary image as many adjacent rectangular blocks of a certain size. These blocks form a set of messages, which characterizes the image. Using the optimal Huffman coding we can achieve the highest data compression. However, in blocks larger than 3×3 a set of messages is very large, and the Huffman code becomes inefficient. In addition, statistical analysis of two-level images shows that a block consisting of white elements has high probability. Based on this observation and applying the known optimal code, this paper proposes an efficient two-step block coding method for binary images. We found the optimal block size at the first stage of coding. We have also compared the experimental results of the compression ratio with the proposed algorithm and the block algorithm JPEG. The results have confirmed the efficiency of the proposed method.
Keywords: binary image, block coding, compression ratio
Visitors: 4837

15. Texturing of 3d models with filled holes [№2 за 2017 год]
Authors: A.P. Kudryashov (kudryashova@dvo.ru) - Institute of Automation and Control Processes Far Eastern Branch of RAS (Junior Researcher), Ph.D; I.V. Solovev (igorek.solovyev@mail.ru) - Institute of Applied Mathematics Far Eastern Branch of RAS;
Abstract: The paper presents an automatic method for texturing three-dimensional computer models. The proposed method is based on the well-known voxel approach, according to which the resulting surface of the scene is obtained by combining a variety of views in the voxel space. Diffuse blurring of weighting function values in the voxel space is used to fill holes. Simple image projection results in visible seams on scan edges. To overcome this problem one normally needs to resort to highly computationally demanding methods. The proposed method of texturing offers a solution for these problems. The texturing algorithm is based on the blending of all available textures, taking into account the weight of each pixel in each triangle, as well the overlap and observability of these triangles. The algorithmic implementation of the method is optimized to improve computational performance of the method and the quality of a generated textured triangulation model. The algorithm of indexing of triangles makes use of a texture map for each view which allows reducing the amount of computation time and therefore to speed up reconstruction and texturing. The multi-core processing provided an additional increase in computational performance. Computational experiments were performed on real three-dimensional scene data obtained by a 3D scanner RangeVision. The experiments showed that the current algorithm is able to generate realistic textures in a short time for highly detailed models.
Keywords: texturing, voxel space, three-dimensional reconstruction, triangulation mesh, volumetric method
Visitors: 7760

16. Design principles of modular software architecture in aviation [№2 за 2017 год]
Author: Chizhikova L.A. (ludmilachizhikova@yahoo.com) - JSC “Sukhoi Civil Aircraft” (Leading Specialist);
Abstract: Software development is a quite difficult and laborious process, which is based on correct and reliable architecture design. Distribution and coordination of duties when working in a group of developers is often a quite difficult and re-sponsible decision due to affection the main result of development. Nowadays, with technological development the control and functionality of aircraft avionics requires more software creation. The role of software development and management is also increasing in the flight simulation and testing equipment fields. More and more tasks are transferred from hardware to software. The article provides the analysis and identification of basic aviation software design aspects, the comparison between the civil aircraft software design architecture and flight simulation software architecture. In order to present a unified software architecture model, the authors made a research on papers on software architecture design in Russian companies, which make Flight Simulation devices and onboard aircraft software architecture. There is also a comparison of these solutions and their commonality. Furthermore, the article considers a model, which is successfully used in software development by Rockwell Automation Company, and makes a research among the works of Delft Technical University on the described topic. The paper proposes a mathematical description of modular software product architecture, which is oriented to the aviation industry. The proposed approach allows unifying a development process, reducing the time and labor of software development, adding innovations without existing structure transformation if the software product is made using the described solution.
Keywords: software, software architecture, software architecture design, software development, flight simulation device, aviation software, mathematical and computer modeling
Visitors: 12125

17. Unified description of information radioelectronic system functioning to estimate training aids software [№2 за 2017 год]
Authors: Abu-Abed, F.N. (aafares@mail.ru) - Tver State Technical University (Associate Professor, Dean), Ph.D; Dopira R.V. (rvdopira@yandex.ru) - NPO RusBITex (Professor, Head of Department), Ph.D; I.N. Ishchuk (Воеrby@rambler.ru) - Military Scholastic-Scientific Centre of the Air Forces “Zhukovsky and Gagarin Air Forces Academy” (associate Professor, Head of Department), Ph.D; E.Yu. Brezhnev (dimanbreg@mail.ru) - Military Scholastic-Scientific Centre of the Air Forces “Zhukovsky and Gagarin Air Forces Academy” (Doctoral Student), Ph.D; Potapov A.N. (potapov_il@mail.ru) - Military scholastic-scientific centre of the Air forces "Air forces academy named by prof. N.E. Zhukovsky and Yu.A. Gagarin", Ph.D;
Abstract: Nowadays, training aids software evaluation is performed according to the coincidence degree of simulated processes with the real one. However, the lack of universality in the description of the mechanisms for operating ergonomic information radio electronic systems (RES), for which training complexes are developed, does not ensure development of tools to form their application strategies taking into account changes in operating conditions that are invariant to RES. As a result, a unified description (representation) of information radio electronic system functioning is relevant. On this basis it is proposed to create software for their training aids. Considering this, the goal of the work is a unified description of information radio electronic systems functioning with further implementation of their training aids software evaluation. A unified description of information radio electronic systems functioning is based on a unified approach to RES representation as structural and logical schemes. Their distinguishing feature is that they take into account radio frequency (RF) interactions with environmental elements expressed through RF actions and RF influences that form cause-effect relationship of RES operation RF-conditions. The possibilities of implementing RES of the functions of selecting, distributing and redistributing resources depend on the mechanisms of controllability in it. To construct structural and logical schemes of ERT operation that take into account operator activity, the paper considers the mechanisms of their controllability. This allows us to develop a scientific and methodological instrument to evaluate software of training facilities for air traffic control operators (ATC) based on the examination results. Moreover, when presenting them as complex hierarchical structure systems and in the information field of ATC operator workplaces using Fisher-х2 criterion and the generalized distribution law.
Keywords: automated, ergo technical, radio-electronic system, structural and logical, control management, mathematical model
Visitors: 9275

18. A software and algorithm complex of enterprise protection and management [№2 за 2017 год]
Authors: Matveykin V.G. (valery.mat@rambler.ru) - Tambov State Technical University, Ph.D; B.S. Dmitrievsky (ipu@ahp.tstu.ru ) - Tambov State Technical University (Associate Professor ), Ph.D; V.I. Mednikov (ipu@ahp.tstu.ru) - Tambov State Technical University (Candidate); S.G. Semerzhinsky (ipu@ahp.tstu.ru) - Tambov State Technical University;
Abstract: The paper presents an enterprise mathematical model interacting with external environment by resource exchange. Current enterprise management, as well as real unauthorized influence on its activities by external environment or a subject is a result of the impact on resources. Unauthorized actions are detected by comparison of actual and calculated values of performance indicators for a selected level of functions execution. If such action is detected, a countermeasure system becomeы active to reach the protected value. The protection success rate is accepted as minimum performance requirements based on statistics and expert way. As a result, the authors have found a technical parameter of enterprise security that quantitatively describes protection inefficiency. The built structure of enterprise protection and management system detects and locates unauthorized effect on its internal processes and the processes of interaction with the environment without human intervention. At the same time it organically combines enterprise management and protection and is significantly different from known systems. The protection and control system, which is implemented as software and algorithm complex, makes it possible to describe all production processes. The paper proposes the means of improving reliability of measurement and obtaining information about resources state. They monitor and identify the external influences on each resource without human intervention. The paper describes the developed means of obtaining quantitative information on resource state and the terms of technical feasibility of the proposed enterprise protection and management system. The proposed secure management algorithms use a resource protection system that provides reliable information at all management levels. The presented the protection and control system raise the enterprise efficiency in the interactions with the environment.
Keywords: enterprise model, protection structure, protection parameters, risk, productive resources, influence subject, unauthorized influence, protection success rate, resource security equation, threat
Visitors: 6352

19. Method of generating sets of alternative variants of building subsystems which are a part of a computer attack protection system [№2 за 2017 год]
Authors: Drobotun E.B. (drobotun@xakep.ru) - Military Academy of the Aerospace Defense (Doctoral Student), Ph.D; Uglovsky E.P. (vavko@mil.ru) - Military Academy of the Aerospace Defence (Head of Laboratory); I.Sh. Zamaltdinov (drobotun@xakep.ru) - Military Academy of the Aerospace Defense (Senior Researcher), Ph.D;
Abstract: Constructing a rational computer attack protection system for an information or automated system assumes creating a set of protection system configurations consisting of a set of separate program and hardware-software components and a further choice of a rational option of creating a computer attack protection system from the created set according to cer-tain criteria. When generating this set, in addition to protection system compliance with necessary functional requirements, it is necessary to consider the parameters of the protected system (its structure and a multiple-level creation system), as well as software and hardware compatibility of components, and also compatibility of components with a hardware-software platform, which is the basis for the constructed protected system. The article presents one of the possible approaches to forming a set of possible options of creating a computer attack protection system, taking into account its decomposition on three subsystem types. They are: computer attack detection subsystems, computer attack counteraction subsystems and subsystems of elimination of consequences of computer attack application.
Keywords: automatized control system, computer attack, infosecurity, protection system design, computer attack protection
Visitors: 7368

20. A system and legal model of information security (data protection) [№2 за 2017 год]
Authors: S.V. Golubchikov (gsv_64@list.ru) - PJSC NPO “Almaz” (Head of Department), Ph.D; V.K. Novikov (gsv_64@list.ru) - The Military Academy of Strategic Rocket Troops after Peter the Great (Associate Professor), Ph.D; А.V. Baranova (abv92@list.ru) - MGIMO University;
Abstract: The paper considers the problems of information security (data protection) in the context of information as a strategic resource of any state, a productive force and an expensive commodity. One of the state activities to solve these prob-lems is the legal regulation of this area. Since information security is an integral part of the overall and national security with its content based on the Constitution of the Russian Federation, as well as on the core documents, the article identifies the levels of security of the Russian Federation. Security is defined as a condition of protection of the vital interests of an individual, society and the state from internal and external threats. Therefore the paper gives the definition of “vital interests” arising from the definition of “security”. The authors formulate the most important purposes for ensuring information security of the Russian Federation. The paper specifies the directions of ensuring the information security of the Russian Federation, as well as organizational and technical measures to protect information in the national information and telecommunication systems. The article presents the developed legal model for ensuring information security. The model reveals the objects of information security that may be under different kinds of influences, such as personal data; various technical means; software; information and technical systems involved in sensing, processing, storage and transmission of information (data); documents (paper, electronic); radiation; substances. There is a conclusion that information security is an integral part of the overall and national security and covers all spheres of activities of the state, citizens, as well as various organizations and businesses.
Keywords: information, infosecurity, security of the information, information sphere, legal model
Visitors: 14521

← Preview | 1 | 2 | 3 | Next →