首页 > 最新文献

2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Analysis and exploitation of Geospatial Big Data: State of art 地理空间大数据分析与利用研究进展
Yassine Loukili, Mohamed El Mehdi El Aissi, Sarah Benjelloun, Y. Lakhrissi, Hiba Chougrad, Safae Elhaj Ben Ali, Abdessamad El Boushaki
Over the past decade, big data with a spatial component "GEOSPATIAL BIG DATA" (GSBD) has become a focus of global interest, attracting increasing attention from universities, industry, governments and other organizations. The possibility of managing and processing GSBD to help decision-making therefore appears to be an important scientific and societal issue. This state of the art successively explores the concepts of big data, of spatial component and presents some main existing solutions for the management and processing of GSBD.
近十年来,具有空间成分的大数据“地理空间大数据”(GEOSPATIAL big data, GSBD)已成为全球关注的焦点,越来越受到大学、行业、政府和其他组织的关注。因此,管理和处理GSBD以帮助决策的可能性似乎是一个重要的科学和社会问题。本研究先后探索了大数据、空间分量的概念,并提出了目前GSBD管理和处理的一些主要解决方案。
{"title":"Analysis and exploitation of Geospatial Big Data: State of art","authors":"Yassine Loukili, Mohamed El Mehdi El Aissi, Sarah Benjelloun, Y. Lakhrissi, Hiba Chougrad, Safae Elhaj Ben Ali, Abdessamad El Boushaki","doi":"10.1109/AICT50176.2020.9368706","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368706","url":null,"abstract":"Over the past decade, big data with a spatial component \"GEOSPATIAL BIG DATA\" (GSBD) has become a focus of global interest, attracting increasing attention from universities, industry, governments and other organizations. The possibility of managing and processing GSBD to help decision-making therefore appears to be an important scientific and societal issue. This state of the art successively explores the concepts of big data, of spatial component and presents some main existing solutions for the management and processing of GSBD.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132191591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On The Distributed Determinization Of Large NFAs 大型NFAs的分布式确定
Cheikh Ba, A. Gueye
Large NFAs are automata that cannot fit in a single computer, or the computations would not fit within the computer RAM, or may take a long time. We describe and implement a distributed solution of such NFAs determinization. Our method drastically reduces required iterations, and avoids producing useless states of the determinized automaton, contrary to some previous implementations of well-known powerset construction. A running example is provided with execution details. Finally, complexity analysis is given. This work will help in bringing out relevant programming artifacts for our long term goal that consists of a high level distributed graph language.
大型nfa是无法在单个计算机中适应的自动机,或者计算不适合计算机RAM,或者可能需要很长时间。我们描述并实现了这种NFAs确定的分布式解决方案。我们的方法大大减少了所需的迭代,并避免了产生确定自动机的无用状态,这与之前一些著名的powerset构造的实现相反。提供了一个运行的示例,其中包含执行细节。最后进行了复杂性分析。这项工作将有助于为我们的长期目标(包括高级分布式图形语言)带来相关的编程工件。
{"title":"On The Distributed Determinization Of Large NFAs","authors":"Cheikh Ba, A. Gueye","doi":"10.1109/AICT50176.2020.9368741","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368741","url":null,"abstract":"Large NFAs are automata that cannot fit in a single computer, or the computations would not fit within the computer RAM, or may take a long time. We describe and implement a distributed solution of such NFAs determinization. Our method drastically reduces required iterations, and avoids producing useless states of the determinized automaton, contrary to some previous implementations of well-known powerset construction. A running example is provided with execution details. Finally, complexity analysis is given. This work will help in bringing out relevant programming artifacts for our long term goal that consists of a high level distributed graph language.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Expert system with Fuzzy logic for protecting Scientific Information Resources 基于模糊逻辑的科学信息资源保护专家系统
M. Rakhmatullaev, S. Normatov
Analysis of the state of development of research on the protection of valuable scientific and educational databases, library resources, information centers, publishers show the importance of information security, especially in corporate information networks and systems for data exchange. Corporate library networks include dozens and even hundreds of libraries for active information exchange, and they (libraries) are equipped with information security tools to varying degrees. The purpose of the research is to create effective methods and tools to protect the databases of the scientific and educational resources from unauthorized access in libraries and library networks using fuzzy logic methods. As a model and solution method, a fuzzy model of second-type correspondences is proposed, which makes it possible to comprehensively solve the problem of identifying threats in the event of a situation, as well as provide recommendations on how to eliminate them. For the creation of a knowledge database, experts are involved who determine the functions of belonging to "Situation-Threat-Methods of eliminating threats". The research results are used in the expert system the corporate network of electronic libraries to protect scientific and educational information from unauthorized access.
通过对保护有价值的科教数据库、图书馆资源、信息中心、出版商信息安全的研究现状分析,说明了信息安全的重要性,特别是在企业信息网络和数据交换系统中。企业图书馆网络包括数十个甚至数百个图书馆,用于积极的信息交换,它们(图书馆)都不同程度地配备了信息安全工具。本研究的目的是利用模糊逻辑方法,建立有效的方法和工具,以保护图书馆和图书馆网络中的科教资源数据库不受未经授权的访问。作为一种模型和求解方法,提出了一种二类对应的模糊模型,可以全面解决某一情况下的威胁识别问题,并为如何消除威胁提供建议。为了建立知识库,需要专家确定属于“形势-威胁-消除威胁的方法”的功能。研究成果应用于电子图书馆企业网络专家系统中,保护科教信息不被非法访问。
{"title":"Expert system with Fuzzy logic for protecting Scientific Information Resources","authors":"M. Rakhmatullaev, S. Normatov","doi":"10.1109/AICT50176.2020.9368598","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368598","url":null,"abstract":"Analysis of the state of development of research on the protection of valuable scientific and educational databases, library resources, information centers, publishers show the importance of information security, especially in corporate information networks and systems for data exchange. Corporate library networks include dozens and even hundreds of libraries for active information exchange, and they (libraries) are equipped with information security tools to varying degrees. The purpose of the research is to create effective methods and tools to protect the databases of the scientific and educational resources from unauthorized access in libraries and library networks using fuzzy logic methods. As a model and solution method, a fuzzy model of second-type correspondences is proposed, which makes it possible to comprehensively solve the problem of identifying threats in the event of a situation, as well as provide recommendations on how to eliminate them. For the creation of a knowledge database, experts are involved who determine the functions of belonging to \"Situation-Threat-Methods of eliminating threats\". The research results are used in the expert system the corporate network of electronic libraries to protect scientific and educational information from unauthorized access.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128886860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MRI video edge detection based on Fuzzy inference technique 基于模糊推理技术的MRI视频边缘检测
S. I. Jabbar, Abathar Qahtan Aladi
Objects recognition of the Magnetic Resonance Imaging (MRI) is a powerful tool in the detection of the geometric parameters such as area and perimeter. When outlining the border of an object, it is hard to calculate the area when it has irrelevant details inside the outline. Therefore, in this work we presented and applied a new technique based on fuzzy inference technique which helps to identify objects across MRI video with more accurate way. Fuzzy video edge detection technique was compared with Canny operator technique based on two assessment metrics (FOM and Pinho). Fuzzy video edge detection technique is superior than Canny operator with 14.5% and 7.5% based on the mean values of quantitative assessments (FOM and Pinho) respectively. The results are promising and it is possible to implement this technique and apply it on other medical imaging videos.
磁共振成像(MRI)是物体识别中检测物体面积、周长等几何参数的有力工具。在勾画一个物体的边界时,当轮廓内有不相关的细节时,很难计算出该物体的面积。因此,我们提出并应用了一种基于模糊推理的新技术,该技术有助于更准确地识别MRI视频中的物体。基于FOM和Pinho两个评价指标,对模糊视频边缘检测技术与Canny算子技术进行了比较。基于定量评价(FOM)均值和Pinho均值,模糊视频边缘检测技术分别以14.5%和7.5%的准确率优于Canny算子。结果是有希望的,并有可能实现该技术,并将其应用于其他医学成像视频。
{"title":"MRI video edge detection based on Fuzzy inference technique","authors":"S. I. Jabbar, Abathar Qahtan Aladi","doi":"10.1109/AICT50176.2020.9368811","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368811","url":null,"abstract":"Objects recognition of the Magnetic Resonance Imaging (MRI) is a powerful tool in the detection of the geometric parameters such as area and perimeter. When outlining the border of an object, it is hard to calculate the area when it has irrelevant details inside the outline. Therefore, in this work we presented and applied a new technique based on fuzzy inference technique which helps to identify objects across MRI video with more accurate way. Fuzzy video edge detection technique was compared with Canny operator technique based on two assessment metrics (FOM and Pinho). Fuzzy video edge detection technique is superior than Canny operator with 14.5% and 7.5% based on the mean values of quantitative assessments (FOM and Pinho) respectively. The results are promising and it is possible to implement this technique and apply it on other medical imaging videos.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131422137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automation Check Vulnerabilities Of Access Points Based On 802.11 Protocol 基于802.11协议的接入点漏洞自动检测
D. Subbotin, I. Babalova, V. Bazanov, N. Ivanov
Wi-Fi technology has a huge distribution around the world. There are a large number of devices that in one way or another work with different versions of the 802.11 protocol. However, this technology has a large number of different vulnerabilities. Many of them can be solved in the production of Wi-Fi modules. But not all manufacturers produce modules with fixed vulnerabilities. Therefore, the objective of this article is to create a product that can automatically check the stability of a wi-fi module to DoS attacks.
Wi-Fi技术在世界各地有着广泛的分布。有大量的设备以这样或那样的方式使用不同版本的802.11协议。然而,这种技术有大量不同的漏洞。其中许多问题可以在Wi-Fi模块的生产中得到解决。但并非所有制造商都生产具有固定漏洞的模块。因此,本文的目标是创建一个可以自动检查wi-fi模块对DoS攻击的稳定性的产品。
{"title":"Automation Check Vulnerabilities Of Access Points Based On 802.11 Protocol","authors":"D. Subbotin, I. Babalova, V. Bazanov, N. Ivanov","doi":"10.1109/AICT50176.2020.9368611","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368611","url":null,"abstract":"Wi-Fi technology has a huge distribution around the world. There are a large number of devices that in one way or another work with different versions of the 802.11 protocol. However, this technology has a large number of different vulnerabilities. Many of them can be solved in the production of Wi-Fi modules. But not all manufacturers produce modules with fixed vulnerabilities. Therefore, the objective of this article is to create a product that can automatically check the stability of a wi-fi module to DoS attacks.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of integral model of speech recognition system for Uzbek language 乌兹别克语语音识别系统整体模型的开发
M. Musaev, Ilyos Khujayorov, M. Ochilov
In this paper investigates the approach to realization of recognition of Uzbek words on the basis of end-to-end models is considered. Also presented are some theoretical data on the architecture of neural networks used in the integrated model, and the results of preliminary experimental studies conducted on their basis. Deep recurrent neural networks, which combine the multiple levels of representation that have proved so effective in deep networks with the flexible use of long-range context that empowers RNNs. When trained end-to-end with suitable regularization, we find that deep BRNNs achieve a test set error of CER=49.1% on our dataset.
本文研究了基于端到端模型的乌兹别克语词识别的实现方法。本文还介绍了用于集成模型的神经网络结构的一些理论数据,以及在此基础上进行的初步实验研究的结果。深度递归神经网络,它结合了在深度网络中被证明非常有效的多层表示,以及远程上下文的灵活使用,赋予了rnn能力。当使用合适的正则化方法进行端到端训练时,我们发现深度brnn在我们的数据集上达到了CER=49.1%的测试集误差。
{"title":"Development of integral model of speech recognition system for Uzbek language","authors":"M. Musaev, Ilyos Khujayorov, M. Ochilov","doi":"10.1109/AICT50176.2020.9368719","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368719","url":null,"abstract":"In this paper investigates the approach to realization of recognition of Uzbek words on the basis of end-to-end models is considered. Also presented are some theoretical data on the architecture of neural networks used in the integrated model, and the results of preliminary experimental studies conducted on their basis. Deep recurrent neural networks, which combine the multiple levels of representation that have proved so effective in deep networks with the flexible use of long-range context that empowers RNNs. When trained end-to-end with suitable regularization, we find that deep BRNNs achieve a test set error of CER=49.1% on our dataset.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of machine learning in the development of databases of recommendation resources and music services 机器学习在推荐资源和音乐服务数据库开发中的应用
Kseniya V. Tcyguleva, Anna E. Stepanova, D. Silnov
The problem of using computer-assisted learning technologies for organization musical recommendations according to user’s preferences. The main content of work is an analysis of spectrograms of musical compositions of various styles and directions and its further processing using the algorithms of neural network. In this research the problem of making new way of musical classification is solving and proving the idea about the fact that musical preferences can be developed on basics of compiling several packs of digital tags, that were stated to compositions because of the work of neural network.
利用计算机辅助学习技术根据用户喜好组织音乐推荐的问题。工作的主要内容是利用神经网络算法对不同风格和方向的音乐作品的谱图进行分析和进一步处理。在本文的研究中,通过神经网络的工作,解决并证明了音乐偏好可以在编译数组数字标签的基础上发展的问题,这是音乐分类新方法的问题。
{"title":"Application of machine learning in the development of databases of recommendation resources and music services","authors":"Kseniya V. Tcyguleva, Anna E. Stepanova, D. Silnov","doi":"10.1109/AICT50176.2020.9368586","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368586","url":null,"abstract":"The problem of using computer-assisted learning technologies for organization musical recommendations according to user’s preferences. The main content of work is an analysis of spectrograms of musical compositions of various styles and directions and its further processing using the algorithms of neural network. In this research the problem of making new way of musical classification is solving and proving the idea about the fact that musical preferences can be developed on basics of compiling several packs of digital tags, that were stated to compositions because of the work of neural network.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contribution of Temporal Sequence Activities To Predict Bug Fixing Time 时间序列活动对预测Bug修复时间的贡献
Nuno Pombo, R. Teixeira
The bug-fixing process challenges development teams and practitioners for best practices that may pave the way not only to efficient human resources management but also to provide information in advance on the required time to investigate and fix a bug. In this study, we proposed a temporal sequence activity model based on Hidden Markov Models to predict bug fixing time. Comprehensive evaluation results of two different scenarios based on bug reports existing in the the Bugzilla repository were provided. Our experiments demonstrate the feasibility of the proposed model in which the most accurate configuration was obtained with the 50 percent of bug records for training and test set.
bug修复过程向开发团队和实践者挑战最佳实践,这些最佳实践不仅可以为有效的人力资源管理铺平道路,还可以提前提供调查和修复bug所需时间的信息。在这项研究中,我们提出了一个基于隐马尔可夫模型的时间序列活动模型来预测bug修复时间。基于Bugzilla存储库中已有的bug报告,给出了两种不同场景的综合评估结果。我们的实验证明了所提出模型的可行性,在该模型中,训练和测试集的错误记录占50%,获得了最准确的配置。
{"title":"Contribution of Temporal Sequence Activities To Predict Bug Fixing Time","authors":"Nuno Pombo, R. Teixeira","doi":"10.1109/AICT50176.2020.9368603","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368603","url":null,"abstract":"The bug-fixing process challenges development teams and practitioners for best practices that may pave the way not only to efficient human resources management but also to provide information in advance on the required time to investigate and fix a bug. In this study, we proposed a temporal sequence activity model based on Hidden Markov Models to predict bug fixing time. Comprehensive evaluation results of two different scenarios based on bug reports existing in the the Bugzilla repository were provided. Our experiments demonstrate the feasibility of the proposed model in which the most accurate configuration was obtained with the 50 percent of bug records for training and test set.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Information and Communication Technologies in the Design of Transport and Logistics Centers of the New Silk Road 新丝绸之路交通物流中心设计中的高效信息通信技术
Zh. Ismailov, D. Kononov, M. Furugyan
Problems of planning the execution of a set of jobs arising during the design and operation of backbone networks and transport and logistics centers are considered. This problem is formalized as the problem of finding the best schedule in a multi-agent system. Various options of problems of job planning and correction of deadlines depending on available throughput and processing capabilities are considered (all jobs are non-preemptive; all jobs allow interruptions and switching from one machine to another; part of jobs allows interruptions and switching, and part does not allow; in addition to machines non-renewable resource is also used). The mathematical solution is based on the reduction of incoming and outgoing flows to transport and logistics centers with a minimum cost in the backbone network. The areas of using the obtained results in the design systems of transport and logistics centers are proposed.
考虑了骨干网络和运输物流中心的设计和运营过程中出现的一系列工作的规划执行问题。这个问题形式化为在多智能体系统中寻找最佳调度的问题。根据可用的吞吐量和处理能力,考虑了作业规划和修正截止日期问题的各种选择(所有作业都是非抢占式的;所有的工作都允许中断和从一台机器切换到另一台机器;部分工作允许中断和切换,部分不允许;除了机器,不可再生资源也被使用)。数学解决方案是基于在骨干网中以最小的成本减少运输和物流中心的进出流量。提出了在运输和物流中心设计系统中使用所得结果的领域。
{"title":"Efficient Information and Communication Technologies in the Design of Transport and Logistics Centers of the New Silk Road","authors":"Zh. Ismailov, D. Kononov, M. Furugyan","doi":"10.1109/AICT50176.2020.9368751","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368751","url":null,"abstract":"Problems of planning the execution of a set of jobs arising during the design and operation of backbone networks and transport and logistics centers are considered. This problem is formalized as the problem of finding the best schedule in a multi-agent system. Various options of problems of job planning and correction of deadlines depending on available throughput and processing capabilities are considered (all jobs are non-preemptive; all jobs allow interruptions and switching from one machine to another; part of jobs allows interruptions and switching, and part does not allow; in addition to machines non-renewable resource is also used). The mathematical solution is based on the reduction of incoming and outgoing flows to transport and logistics centers with a minimum cost in the backbone network. The areas of using the obtained results in the design systems of transport and logistics centers are proposed.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-organizing algorithm for pilot modeling the reaction of society to the phenomenon of the Black Swan 自组织算法用于模拟社会对黑天鹅现象的反应
M. Artemenko, V. Budanov, N. Korenevskiy
The work is devoted to pilot modeling of the reaction of society to technogenic and biological sudden environmental influences. For the description, the methodology of the socio-technical landscape is used, which reflects the development of certain social practices in the digital and technical environments. At the bifurcation points of the evolution of the socio-technical landscape, the phenomena of the "Black Swan" and "Boomerang Blow" arise - a powerful impulse effect on the landscape. There is an urgent problem of predicting reaction reactions. The aim of the work is the development and pilot study of a self-organizing algorithm of structural-parametric identification of transients. Impacts of a technical and biological nature are considered as objects of research: the development of the use of artificial intelligence and computer technology in medicine and the spread of COVID 19. Models for countries: UK, Russia and Uzbekistan are given. It is shown that the reaction of the sociotechnical landscape is acceptable described by homogeneous differential equations of the second degree with a complex exponentially harmonic function on the right side. The most adequate mathematical models are given. This work was supported by the Russian Science Foundation grant # 19-18-00504.
这项工作致力于对社会对技术和生物突发环境影响的反应进行初步建模。对于描述,使用了社会技术景观的方法,这反映了数字和技术环境中某些社会实践的发展。在社会技术景观演变的分叉点上,出现了“黑天鹅”和“回旋镖打击”的现象-对景观的强大冲动效应。预测反应反应是一个迫切的问题。工作的目的是开发和试点研究一种自组织算法的结构参数识别瞬态。技术和生物性质的影响被视为研究对象:人工智能和计算机技术在医学中的应用的发展以及COVID - 19的传播。给出了一些国家的模式:英国、俄罗斯和乌兹别克斯坦。结果表明,社会技术景观的反应是可以接受的,用二次齐次微分方程和右边的复指数调和函数来描述。给出了最适当的数学模型。这项工作得到了俄罗斯科学基金会资助号19-18-00504的支持。
{"title":"Self-organizing algorithm for pilot modeling the reaction of society to the phenomenon of the Black Swan","authors":"M. Artemenko, V. Budanov, N. Korenevskiy","doi":"10.1109/AICT50176.2020.9368792","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368792","url":null,"abstract":"The work is devoted to pilot modeling of the reaction of society to technogenic and biological sudden environmental influences. For the description, the methodology of the socio-technical landscape is used, which reflects the development of certain social practices in the digital and technical environments. At the bifurcation points of the evolution of the socio-technical landscape, the phenomena of the \"Black Swan\" and \"Boomerang Blow\" arise - a powerful impulse effect on the landscape. There is an urgent problem of predicting reaction reactions. The aim of the work is the development and pilot study of a self-organizing algorithm of structural-parametric identification of transients. Impacts of a technical and biological nature are considered as objects of research: the development of the use of artificial intelligence and computer technology in medicine and the spread of COVID 19. Models for countries: UK, Russia and Uzbekistan are given. It is shown that the reaction of the sociotechnical landscape is acceptable described by homogeneous differential equations of the second degree with a complex exponentially harmonic function on the right side. The most adequate mathematical models are given. This work was supported by the Russian Science Foundation grant # 19-18-00504.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1