ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 3 at 2023 year.

Order result by:
Public date | Title | Authors |

1. Fast quantum search algorithm modelling on conventional computers: Information analysis of the halting problem [№3 за 2023 год]
Authors: Ulyanov, S.V., Ulyanov, V.S.
Visitors: 1475
The paper describes the simplest technique for simulating a quantum algorithm based on the direct matrix representation of quantum operators. This approach is stable and precise, but it requires allocation of operator’s matrices in the computer memory. Since the size of the operators grows exponentially, this approach is useful for simulating quantum algorithms with a relatively small number of qubits (e.g., approximately 11 qubits on a typical desktop computer). This approach enables relatively simple simulation of the operation of the solution quality control system and performance of a reliability analysis. A more efficient fast quality control simulation method is based on computing all or a part of operator matrices as needed on a current computational basis. This method makes it possible to avoid storing all or a part of the operator matrices. In this case, the number of qubits to be simulated (e.g., the number of input qubits or the number of qubits in the system state register) is affected by: (I) the exponential growth in the number of operations required to calculate the result of matrix products; and (II) the size of the state vector allocated in computer memory. It is reasonable if one embodiment of this approach involves simulating up to 19 or more qubits on typical desktop computer, and even more in a system with a vector architecture. Due to particularities of the memory addressing and access processes in a typical desktop computer (such as, for example, a Pentium PC), when a number of qubits is relatively small, the on-demand computing tends to be faster than the direct storage approach. The compute-on-demand approach benefits from applying the results of studying quantum operators and their structure that enables computing the matrix elements more efficiently. The paper considers effective simulation of Grover’s quantum search algorithm using a computer with classical architecture.

2. Developing a data transfer protocol based on a combined data encryption algorithm [№3 за 2023 год]
Authors: Bakaeva, O.A., Baraboshkin, D.A.
Visitors: 895
From a technical point of view, information transfer is impossible without using data transfer protocols. One of the main requirements for such protocols is data protection. The most reliable method that ensures the protection of information transmitted over various communication channels is data encryption. The article analyzes standard encryption algorithms: AES, RSA, Diffie-Hellman protocol and SHA256 data hash function. It identifies some of their features that do not allow ensuring maximum data protection during their transfer completely. Therefore, the development of a combined data encryption algorithm, the essence of which is the use of existing algorithms at different stages of encryption, will help to avoid the problems that arise when using a single protocol. The research subject is functioning of standard encryption algorithms: AES, RSA, Diffie-Hellman protocol and SHA256 data hash function. The main result of the work is creating a data transfer protocol based on a combined data encryption algorithm. The protocol includes the development of the packet structure, the implementation of the Client Resolving and Handshake processes, as well as various types of Payload structures. At the end, the parameters of the DH (Diffie-Hellman) and AES encryption algorithms are selected. This sequence of development made it possible to make this data transfer protocol universal and efficient. The article demonstrates the protocol operation that consists of two stages: establishing a connection and data transfer. The practical significance of the work is in the fact that the developed data transfer protocol will help to ensure the completeness, confidentiality and security of any type data transfer (text, graphics, audio file).

3. USB connections control in the local network of computers running under Astra Linux SE [№3 за 2023 год]
Authors: Baranov, A.V., Korepanov, P.M., Lepeshev, I.A.
Visitors: 1934
The constant growth of information security requirements, as well as a major trend towards import replacement in the system software, have led to the widespread use of infrastructure solutions based on the domestic Astra Linux Special Edition (SE) operating system. Astra Linux makes it possible to build secure computing systems including supercomputers for processing confidentional information. At the same time, the audit of connecting USB devices to computers is one of the most important problems of ensuring information security. An analysis of the existing open access works shows the lack of turnkey solutions working in the Astra Linux SE environment. The article discusses a possible technological stack of such solution. The technological stack includes besides Astra Linux the RabbitMQ message-broker sofware, the Flask micro web framework, the PostgreSQL database, and the USBRip forensics tool for keeping track of USB event history on Linux machines. The proposed modular structure of the software USB connections audit system is considered. It includes the modules for collecting USB connections artifacts on controlled computers, the collected information aggregation module, and the module for checking the USB device connection permissions. The proposed structure and technological stack were implemented as a prototype of the software system called ALUMNUS. The prototype was deployed and tested in the secure segment of the MVS-10P OP supercomputer installed at the Joint Supercomputer Center of the Russian Academy of Sciences.

4. A method of deformation of functionally defined objects using graphics processing units [№3 за 2023 год]
Authors: Vyatkin, S.I., Dolgovesov, B.S.
Visitors: 1531
The article discusses a method of modeling deformation of elastic functionally specified objects. Deformation and animation of three-dimensional objects are important functions, but require a large number of calculations. Modeling elastic dynamic objects is used in computer graphics, biomechanics and robotics applications. The aim of the work is to develop a method for modeling deformation of elastic objects on a graphics processor. The subject of the study is the Chebyshev and Jacobi methods and their use in projective dynamics. The theoretical significance of the work is in the combination of Chebyshev and Jacobi methods for solving problems of deformation and animation of surfaces, where the problem is a large number of calculations. Projective dynamics can be effectively accelerated using the Chebyshev method. The practical significance is in implementing the method on a GPU. The combination of the Chebyshev method and the Jacobi method for projective dynamics is optimally implemented on a GPU, since the calculations are well parallelized. As a result, we get a simple implementation that does not require additional libraries to solve this problem and has a small memory. The method does not need to refactorize the matrix with each system change, which is used in direct calculation, and requires large computational costs. When testing the proposed method, we used free form patches based on grids of basic triangles. Testing shows that this approach accelerates the projective dynamics by about one order of magnitude when the Jacobi solution is used at the global stage.

5. A research on concurrent binary tree properties [№3 за 2023 год]
Authors: Grachev, V.G., Ushakov, A.S.
Visitors: 1200
The navigation simulator software “Marine Operation Simulation System” (MOSS) implements the automatic construction technology for a global terrain 3D-model based on the recursive subdivision algorithm with a locally adaptive level of detail control. The algorithm is entirely implemented on the graphics adapter (GPU) and uses massive parallel data processing in compute shaders. The recursive subdivision algorithm is based on using a binary tree; however, classical binary trees explicitly described using pointers are not applicable to GPU implementations due to architectural features. To ensure the parallel execution of the algorithm, the authors use a specialized parallel data structure that is a concurrent binary tree (CBT). The article describes the prerequisites for creating a CBT structure and considers its construction stages from using an implicit binary tree up to representing a binary tree as a binary field augmented with a reduced sum of leaf nodes. The required RAM amount to accommodate a CBT of a given depth is theoretically substantiated. There is an analysis of the algorithmic complexity of constructing a CBT and iterating over its leaf nodes. The article presents and analyzes the results of comparative synthetic performance tests of a concurrent binary tree performed on a central processing unit (CPU) and GPU, as well as the results of the practical application of CBT in MOSS.

6. The system for prescribing personalized treatment by case-based reasoning using a hybrid precedent extraction method [№3 за 2023 год]
Authors: Gribova, V.V., Kovalev, R.I., Okun, D.B.
Visitors: 1408
The paper describes a system for prescribing personalized treatment based on precedents. A unique feature of the system is the extraction of precedents based on a hybrid method combining the extraction of a precedent based on knowledge with a classical method of K-nearest neighbors. The novelty of the proposed approach is in ensuring maximum flexibility and correctness in assessing the convergence of precedents. The paper describes the information and software components of the system. The knowledge base used, as well as all information resources, is built according to its ontologies, which clearly define its structure and semantics. This allows making changes to them quickly without involving programmers and processing the entire system. The system is based on a multi-agent approach. The first stage involves a preliminary calculation and bringing all features to a single metric using the knowledge base. The second stage includes actual calculating the convergence by the K–nearest neighbors method. The convergence of case histories is determined collectively for each attribute. Thus, in practice, the system allows the most flexible and accurate assessment of the similarity of medical histories containing heterogeneous signs. The proposed solution is particularly effective under conditions where there is a shortage of medical knowledge and data, when other types of systems often cannot offer a correct solution, in particular those based on knowledge.

7. An architecture of the decision support system for monitoring a technical condition of critical equipment [№3 за 2023 год]
Authors: Yemelyanov, V.A., Chernyi, S.G., Yemelyanova, N. Yu.
Visitors: 1456
The paper solves an applied problem of improving the existing system for diagnosing critical lined equipment without its decommissioning. The relevance of the work is due to the need to increase the level of automation and objectivity of decision-making during operation of critical lined equipment to prevent accidents in production. The purpose of the study is designing the architecture of a decision support system for monitoring the technical condition of critical lined equipment. As for research methods, for high-level architecture design of the decision support system in the process of monitoring the technical condition of critical lined equipment, we used the architecture modeling language ArchiMate. An object-oriented approach (including object-oriented analysis, object-oriented design and programming) and the unified modelling language UML were used to design the static system structure in the form of the main entities that are responsible for implementing the system functionality to support decision making on the admissibility of using critical lined equipment. As a result, there is a developed model of the top-level architecture of the decision support system for monitoring the technical condition of critical lined equipment. The developed software for a decision support system for monitoring the technical condition of critical lined equipment makes it possible to generate recommendations regarding the operating modes of critical lined equipment. The developed software was tested in the conditions of metallurgical production in the technological process of diagnosing mobile mixers PM350 at the Alchevsk Iron and Steel Works.

8. Compensation of various types of uncertainties when controlling a technical object using intelligent controllers [№3 за 2023 год]
Author: Ignatyev, V.V.
Visitors: 1610
The article presents the research results on the development of hybrid intelligent controllers, which make it possible to ensure the effectiveness of the technical object control, including one functioning under uncertainty. The article is devoted to the issues of compensation of various types of uncertainties in controlling a technical object using intelligent controllers. It also gives a generalized classification of uncertainties and proposes a new classification with the definition of its types that are compensated using the developed methods and algorithms. The uncertainty types are parametric uncertainty, uncertain-ties caused by external influences, linguistic uncertainty. The author highlights linguistic uncertainty and gives methods for its compensation based on a control approach based on a combination of a classical control theory, fuzzy logic, neural network technologies and genetic algorithms. As a part of the demonstration of the approach, the author presents a general description of the entire process of obtaining the desired control for a technical object, including the one operating under conditions of uncertainty. The paper demonstrates the results of the work of the developed methods for controlling technical objects using intelligent controllers based on self-organization of knowledge bases. The basis of the methods is a self-organization algorithm of robust knowledge bases without involving an expert and automating the process of generating control rules. The implementation of these algorithms in control models makes it possible to obtain the desired control for technical objects including those functioning under uncertainty represented by linear or nonlinear mathematical models of the first, second, third order, including the ones with a delay. The presented simulation results confirm that the implementation of the hybrid control approach allows obtaining the desired control of a technical object including the one functioning under uncertainty.

9. Software for automated detection and assessment of building seam failures [№3 за 2023 год]
Authors: Kabanova, V.V., Logunova, O.S., Narkevich, M.Yu., Kornienko, V.D.
Visitors: 1284
The aim of this study is to develop a software module for an automated detection and assessment of building seam failures in an industrial plant. A research involved implementing a software module and a graphical user interface for working with it. The paper proposes a method for detecting seams and assessing building seam failures based on image contrast variation, adaptive threshold, Hough algorithm and several data processing algorithms to complement the Hough algorithm. In order to investigate the condition of building facades of an industrial enterprise, a drone photography and video survey was carried out on the territory of PJSC Magnitogorsk Iron & Steel Works. The resulting collection of images was used to debug the work of the created software module and the method proposed in the article for detecting seams and damage at the building seams. The proposed method is implemented in a software module and allows processing images of different size and pixel brightness. The authors envisage the application of this method with excluded areas in the image. The paper considers current methods of visual inspection of buildings and gives examples of existing software for monitoring the condition of objects. It also describes the procedure of survey performance and presents schemes of joint and fracture detection procedures implemented in the software module. There are the features of the method proposed by the authors. The paper gives an example of gradation of the current and predicted damages of the building seams. The survey included selecting a group of parameters to use in the method; changing in the parameter values enables an expert to adjust joint detection. This development allows estimating the condition of buildings and constructions located at PJSC Magnitogorsk Iron & Steel Works. There are examples of images with separated seams and damages, as well as results of percentage estimations of building connection seams on the image. The results of the study confirm the software module efficiency and the need to implement software modules to monitor the condition of the enterprise territories and buildings.

10. Developing a GH-graph proportional separation algorithm to form of object influence zones in complex technical systems [№3 за 2023 год]
Author: Muntyan, Е.R.
Visitors: 1576
The article suggests one of the possible solutions to the problem the object influence zones in complex technical systems (СTS). It considers the extended perimeter security system as a СTS example, investigates the interaction of its objects (elements). The objects of such a system are mobile or stationary security objects, quadrocopters, decision makers, possible potential perimeter violators; provided that quadrocopters have different technical characteristics, in particular, the their video camera surveillance radii differ. To simulate the process of interaction of security system objects, the authors use a model based on a fuzzy graph with different types of vertices and multiple and different types of connections (GH-graph). Multiple connections in the GH-graph are vector connections that combine several different types of connections into one. Such model allows setting all necessary relationships between system elements and at the same time, it has an advantage in the time of calculating distances compared to graphs using only same type and different types of connections. To solve this problem, the authors propose using GH-graph algorithmic modeling means, including the graph proportional separation algorithm and the means of calculating graph metrics. The paper defines the GH-graph splitting operation, defines the separation criteria: the proportionality of subgraphs by a given parameter and the possibility of subgraph intersection. The authors have carried out the synthesis of the GH-graph proportional separation algorithm in accordance with the criteria and shown the algorithm results using the example of the graph model considered. It is shown that using the proposed graph separation algorithm into proportional subsets and the means of calculating the metric characteristics of the obtained subgraphs make it possible to determine the system object influence zones in accordance with their technical parameters. The paper considers the possibilities of software implementation of the proposed algorithm.

| 1 | 2 | Next →