ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2019 year.

Order result by:
Public date | Title | Authors |

1. A method of situational forecasting of the emergence of novel Industry 4.0 technologies [№2 за 2019 год]
Authors: A.M. Andreev , D.V. Berezkin , I.A. Kozlov
Visitors: 7022
The paper considers the problem of automated forecasting of the emergence and development of inno-vative technologies based on Big Data Streams analysis. It shows that such forecasting is significant due to Industry 4.0. The authors analyze the existing approaches to forecasting, determine their ad-vantages and shortcomings taking into account the specifics of the task and Big Data features. It is proposed to solve the problem using the hybrid approach to data stream analysis developed by the authors. The approach allows automatic monitoring and forecasting the development of situations based on processing streams of heterogeneous data represented by text documents, numerical series, and records in databases. The process of data stream analysis includes detecting events, forming situa-tions, identifying possible scenarios of their further development and preparing proposals for decision makers. The authors describe event models that are used for processing streams of textual and structured da-ta. The incremental clustering method detects IT events in text documents flows. This method is also utilized in the processing of structured data stream to form situational chains reflecting the develop-ment of innovative technologies over time. The method for forming scenarios of the further develop-ment of the analyzed innovation technology is based on the principle of historical analogy. The proposed method allows determining the most probable scenario using logistic regression, as well as identifying the most optimistic and pessimistic scenarios via the Analytic Hierarchy Process method. The authors describe a way to supplement each scenario with recommendations for decision makers regarding the measures that should be taken to facilitate or hinder the development of technol-ogy according to this scenario. The paper provides the examples of situations detected in textual and structured data flows, as well as an example of scenarios and recommendations generated for one of the situations.

2. Transformation of data from heterogeneous monitoring systems [№2 за 2019 год]
Author: Ya.A. Bekeneva
Visitors: 5844
The paper presents an approach to the preparation of data obtained from heterogeneous monitoring systems for their further analysis by data mining methods. The main problem of data analysis in moni-toring various processes is the difference in the description of events for different types of sources, in-cluding a data presentation format. In addition, one event might be described using data from different monitoring systems. The paper presents a formal model of the analyzed process, describes the main problems of analyz-ing heterogeneous data, and highlights formal criteria for assigning records from different sources to a single event. In the proposed approach, a source of data is not only real-time records from various monitoring systems, but also account databases used for storing information. The main idea is that moving objects of different types can perform actions as a unit within the framework of the task being studied (for example, a vehicle and a driver). Account systems allow finding relationships between such moving objects and thereby increase the accuracy of combining records related to one event. The proposed approach has been tested on real data obtained from an enterprise. After applying all described transformations, it has become possible to significantly reduce the excess dimension of an aggregate data table, as well as significantly reduce the number of missing values. When data analy-sis was difficult due to their different formats, such data were brought to a single format and presented in the form of a single table that is convenient for further research using data mining methods.

3. Optimization of the control initialization periodicity based on duplicated computing [№2 за 2019 год]
Authors: V.A. Bogatyrev, D.E. Lisichkin
Visitors: 6999
The paper considers a duplicated computing system equipped with the means of operational and test control. The effectiveness of failure detection system is determined by the completeness of the opera-tional control and the frequency of test control. Reduction of control periodicity intervals decreases system readiness due to increasing time costs for testing, but at the same time it increases its safety as a result of decreasing of system functioning probability in the states of undetected failures. In systems with duplicating of computer nodes, load-sharing modes are possible, when nodes inde-pendently perform a shared query thread between them, as well as the mode of duplicated calculations, when each query is simultaneously performed by two computer nodes when comparing the results at control points. There is a potential for duplicated systems with load sharing to improve control efficiency after a periodic transition into a duplicated calculations mode with a comparison of results. This allows reduc-ing costs for a test control (of a duplicated systems), and initiates it only when the results of duplicate calculations disagree. The work objective is to determine optimal intervals of transition into the mode of duplicated calcu-lations to ensure the maximum probability of system readiness for safe execution of functional re-quests while minimizing downtime and service delays. The authors propose a Markov model for determining the probability of system states, including the system readiness for safe operation, downtime and dangerous undetected failure states. Based on the proposed model, the paper analyzes the influence of the initialization periodicity of the mode of duplicated calculations on the readiness of the system for safe operation. It shows the existence of an optimal initialization frequency of the mode of duplicated computations, which enable the probability system readiness for safe operation to achieve maximum while minimizing system downtime.

4. Development of the case-based reasoning module for identification of acoustic-emission monitoring signals of complex technical objects [№2 за 2019 год]
Authors: Varshavskiy P.R., Alekhin R.V., A.V. Kozhevnikov
Visitors: 7102
The paper examines important issues of developing a module for identifying signals obtained during acoustic emission monitoring of complex technical objects using case-based reasoning (CBR). Case-based methods and systems are used to solve a number of artificial intelligence problems (for example, for modeling plausible reasoning (common sense reasoning), machine learning, intellectual decision support, intelligent information search, data mining and etc.). The storage and analysis of acoustic emission monitoring data of complex technical objects in digi-tal form made it possible to ensure the required speed and multivariate data processing, which the pa-per technology could not provide. As the amount of heterogeneous data grows, the amount of work for an operator in qualitative analyzing has increased. To improve the efficiency of an operator, it is pro-posed to solve the problem of distributing and identifying the acoustic emission monitoring data by CBR tools. The CBR module for identifying acoustic emission signals has been developed in C# using MS Vis-ual Studio. In order to evaluate the effectiveness of the proposed solutions, the paper shows the results of computational experiments on real expert data obtained from acoustic emission monitoring of metal constructions.

5. Comparison of neural network models for classifying text fragments containing biographical information [№2 за 2019 год]
Author: Glazkova A.V.
Visitors: 5688
The paper presents the results of comparison of neural network architectures to solve the automatic text classification problem. The paper focuses on the topic classification of sentences containing bio-graphical facts. The data set was collected on the basis of Wikipedia and represented as a corpus of bi-ographical texts with meta tagging. Each sentence in the corpus is marked according to whether it con-tains any biographical information and what type of information it contains. The paper describes the results of topic classification of the corpus sentences for five neural net-work architectures. They are: feedforward network (FNN), recurrent neural network (RNN), gated re-current unit RNN (GRU), long short-term memory RNN (LSTM) and bidirectional LSTM (BLSTM). These models were trained on the word embedding features obtained for the corpus sentences words. We have tried two types of classification: binary (depending on whether a sentence contain biograph-ical information or not) and multi-class classification (definition of the type of biographical fact). LSTM and BLSTM models have shown the best results. The obtained results will be used to implement biographical information retrieval methods for natural language texts.

6. Implementing metalinguistic abstraction to support OOP using C [№2 за 2019 год]
Authors: A.M. Dergachev, I.O. Zhirkov , I.P. Loginov , Yu.D. Korenkov
Visitors: 4511
The paper shows the use of higher order macro definitions to support the object-oriented programming paradigm in C89 without extensions. Choosing the right programming style is important prior to writing a code. A large class of problems is described using object-oriented programming style. Many main-stream programming languages such as C++, C# or Java provide support for this programming style. However, it is not always possible to utilize these languages as the required development software such as compilers for some platforms might not be available. A typical example of this situation is Applica-tion-Specific Instruction-set Processor (ASIP), which is provided with a C compiler. The smaller set of C language features and its low-level nature allow quick and cheap compiler implementation. At the same time, the C preprocessor can be used for a sophisticated logic generation that goes far beyond simple parameterized substitutions. This paper presents an internal support of the object-oriented programming style implemented in C89 without language extensions via an extensive usage of higher-order macro definitions. The exam-ple code shows the implementation of encapsulation, inheritance and polymorphism principles. Encap-sulation syntactically prohibits accessing private fields and methods in compile time. We pay special attention to type-safety of generated code: the inheritance implementation does not weaken the already weak static typing used in C. The results of this work can be used to construct object-oriented programs using only C89 compiler in case the usage of object-oriented languages is impossible.

7. Efficiency evaluation of methodical and algorithmic support of a special purpose decision support system [№2 за 2019 год]
Authors: Dopira R.V., A.V. Getmanchuk, Potapov A.N., M.V. Semin, D.Yu. Brezhnev
Visitors: 2766
To eliminate information overload when assessing the state of air and space radio control objects for decision-making, we use methodological support and classification algorithms of decision support system (DSS) objects of an automated control system (ACS) for special purposes. The paper presents a method for efficiency evaluation of algorithmic support of a special purpose ACS DSS. The method is based on artificial generation of input data, as well as data representing a set of all possible values based on an exhaustive enumeration in the form of generating programs of ran-dom objects and random areas. This approach uses the analysis of the relative location of regions in a parametric space, which is a catalog of reference values. In this approach, there is no need to compare object parameters with the parameters of all catalog classes. After finding the first input into an area, we consider the possibility of getting the analyzed object into those areas that have intersections with the area in which the object has already got. The obtained experimental results of evaluation of a general computing labor intensity of the spe-cial-purpose ACS DSS when classifying the objects using a combined method is, on average, two times lower than the basic classification method. The obtained result is particularly relevant in the classifi-cation of air and space radio engineering control objects under conditions of intensive real-time data entry.

8. A set-theoretic model of a functional approach to intellectualization of building and construction management processes [№2 за 2019 год]
Author: R.V. Dushkin
Visitors: 6086
The paper describes a functional approach to managing the internal environment of an intelligent building. Such approach implies using and transferring unchangeable states between the peripheral equipment and central engineering systems, the absence of side effects during control actions, as well as the construction of a decentralized network of computations and decision making on an end-user device side based on the Internet of things. This allows simultaneous obtaining of all benefits of differ-ent consideration paradigms of management processes and intellectualization. Additionally, there is an possibility of emergent showing new features of the general approach to increase the degree of control-lability and the operation efficiency of controlled objects. The paper considers mathematical foundations of the organization of a distributed computing envi-ronment for implementation of a functional approach. It also briefly describes possible control scenar-ios in various operation modes of engineering systems of intelligent buildings. The authors describe a set-theoretic model of an intellectualized building management system. This model is a theoretical ba-sis for recommendations on changing the paradigm of constructing a general automated control system for an intelligent building from the automation of engineering processes to the management intellectu-alization and the creation of an artificial intelligence system that implements a complete and autono-mous cycle of building management. The functional approach complete with new technologies (artificial intelligence, decentralized da-tabases, the Internet of things) for managing such objects as intelligent buildings, allows transferring the operation of such buildings to a higher level of service availability, sustainability, environmental friendliness and comprehensive development of not only a controlled object, but also the hierarchy of its supersystems (municipality, region, state).

9. An information technology for verifying special software of military automated systems [№2 за 2019 год]
Authors: R.E. Zhidkov, D.S. Viktorov , E.N. Zhidkov
Visitors: 4870
There is a need to create an information technology of military automated system special software verification that allows effective checking of functionality requirements. This is due to the need to create high-quality software within time and financial constraints of the development process. The paper proposes an information technology that is a combination of methods and software utilities for pro-cessing a source code of the investigated program and technical documentation in order to obtain information of functional defects. The described information technology might be used both at the coding stage and at different testing stages in addition to the existing solutions for searching functionality defects. The verification method has a structure determined by the requirements of regulatory documents in the soft-ware development. This method includes a static analysis technique and a technique for assessing analysis com-pleteness based on source code characteristics. This verification method is designed to check the correctness of the implementation of information-calculated tasks in automated systems for managing troops and military equipment based on the principle of dimensional homogeneity of physical equations. The verification information technology is described as an IDEF0 functional model detailed to the second nesting level with a description of inputs and outputs of all works. In order to support the verification process, the authors propose software utilities for automating routine operations: generating unique identifiers of software ob-jects, searching and intentional defects introducing. These software tools are based on the infrastructure of LLVM compiler and Clang frontend that allow checking the program codes in C, C++, Objective-C.

10. Neural network user behavior analysis for detecting host-level intrusion [№2 за 2019 год]
Authors: V.N. Zuev, Efimov A.Yu.
Visitors: 5892
The paper focuses on applying machine learning for detecting anomalies in user behavior. The number of known attacks is rapidly increasing every year. In order to resist that treatment, there is a need for effective security systems, such as Intrusion Detection Systems (IDS). This type of sys-tems usually uses signature analysis and requires signature updates. Such systems are not capable of detecting unknown attacks. The methods based on anomaly detection are more attractive as they can identify previously un-known attacks without preliminary creating of intrusion signatures for every possible attack. One of the most popular directions for host-based IDS in anomaly detection is user behavior analysis. The paper describes a method of detecting user behavior analysis anomalies based on artificial neu-ral networks. For detecting user behavior anomalies, the method uses the information on user’s com-mands extracted from system log files and software. This information is converted into time series that is used to forecast next user’s commands. The number of forecasting errors determine the presence of an anomaly in user behavior. The experimental results demonstrate that the proposed method is good for detecting anomalies in user behavior, and has low probability of false positive.

| 1 | 2 | 3 | Next →