The work is dedicated to the development of a mobile chatbot containing an information currency converter, designed for use by a wide range of people. A chatbot is a subject-oriented text-based dialog interface that allows a user to perform a limited set of tasks: getting information about the current rate of currencies (USD or EUR) relative to the national currency and finding out the current rate of cryptocurrencies (Bitcoin, Ethereum, Litecoin) in dollars or euros. To achieve this goal, the selected subject area was analyzed and appropriate conclusions were made. A corresponding study of analogs who perform tasks similar in complexity was carried out, only a few chatbots were identified, as a certain number of bots posted in Telegram no longer provide their services or work incorrectly. The algorithm of the service for currency conversion based on the Telegram messenger is described. The chatbot is implemented in the Python programming language and uses the Pycharm development environment, as it is best suited for programming the intended project and is easy to use. There are two options available to the user: the cryptocurrency rate from the CoinGecko site or the exchange rate from PrivatBank. The article examines the development and improvement of chatbots. Similar Telegram bots, which function similarly to the created one, are reviewed. The author’s bot has been developed, and the architecture and algorithm of the CurrencyBot currency conversion service are presented.
{"title":"Information currency converter based on Telegram messenger","authors":"Yaryna Pavlenko, I. Yurchak","doi":"10.23939/csn2022.01.106","DOIUrl":"https://doi.org/10.23939/csn2022.01.106","url":null,"abstract":"The work is dedicated to the development of a mobile chatbot containing an information currency converter, designed for use by a wide range of people. A chatbot is a subject-oriented text-based dialog interface that allows a user to perform a limited set of tasks: getting information about the current rate of currencies (USD or EUR) relative to the national currency and finding out the current rate of cryptocurrencies (Bitcoin, Ethereum, Litecoin) in dollars or euros. To achieve this goal, the selected subject area was analyzed and appropriate conclusions were made. A corresponding study of analogs who perform tasks similar in complexity was carried out, only a few chatbots were identified, as a certain number of bots posted in Telegram no longer provide their services or work incorrectly. The algorithm of the service for currency conversion based on the Telegram messenger is described. The chatbot is implemented in the Python programming language and uses the Pycharm development environment, as it is best suited for programming the intended project and is easy to use. There are two options available to the user: the cryptocurrency rate from the CoinGecko site or the exchange rate from PrivatBank. The article examines the development and improvement of chatbots. Similar Telegram bots, which function similarly to the created one, are reviewed. The author’s bot has been developed, and the architecture and algorithm of the CurrencyBot currency conversion service are presented.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The work presents a software system for demonstrating the operation of the SCTP transport protocol in comparison with its better-known analogues – TCP and UDP. To reproduce the operation of the chosen protocol, a socket API was created that describes the operation of SCTP, based on RFC 6458. It also describes the transport protocols that are similar to the protocol that was chosen to improve performance, namely TCP and UDP, their strengths and weaknesses, and what has been improved in SCTP. A test software model is described, which is divided into a client part and a server part, which was created to demonstrate the operation of the SCTP transport protocol. The client part consists in sending a message to the server, which will read this message and reset it. The ability to send using the SCTP protocol directly, or UDP encapsulation, thus encapsulating the SCTP packet into a UDP datagram, has been developed. The efficiency and expediency of using the software model are shown and alternative software models designed to implement the SCTP protocol are considered. The means used to implement this decision are justified as well as the platforms and operating systems on which this solution can be reproduced, other than Windows.
{"title":"Improving the efficiency of SCTP network software","authors":"Zakharii-Andrii Feshchenko, I. Yurchak","doi":"10.23939/csn2022.01.147","DOIUrl":"https://doi.org/10.23939/csn2022.01.147","url":null,"abstract":"The work presents a software system for demonstrating the operation of the SCTP transport protocol in comparison with its better-known analogues – TCP and UDP. To reproduce the operation of the chosen protocol, a socket API was created that describes the operation of SCTP, based on RFC 6458. It also describes the transport protocols that are similar to the protocol that was chosen to improve performance, namely TCP and UDP, their strengths and weaknesses, and what has been improved in SCTP. A test software model is described, which is divided into a client part and a server part, which was created to demonstrate the operation of the SCTP transport protocol. The client part consists in sending a message to the server, which will read this message and reset it. The ability to send using the SCTP protocol directly, or UDP encapsulation, thus encapsulating the SCTP packet into a UDP datagram, has been developed. The efficiency and expediency of using the software model are shown and alternative software models designed to implement the SCTP protocol are considered. The means used to implement this decision are justified as well as the platforms and operating systems on which this solution can be reproduced, other than Windows.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the analysis of existing systems for helping blind people to navigate in space, an understanding arose in the creation of a new system that would have a completely different approach to the interaction of a blind user with the existing world. Such a system, having the function of a voice message, provides a blind person with information and thus helps him orientate in space. Existing approaches focus on providing sound signals, which only make it possible to redirect a person in a certain direction, prohibit or allow movement. Therefore, there was a need to develop such a mobile system that would help people with visual impairments to navigate in the room based on the information they received in the form of a voice message. The object of the research is methods and means of helping blind people in the orientation of the premises using the received signal level indicator RSSI (Received Signal Strength Indication). For Wi-Fi and Bluetooth 4.0 devices, RSSI is the only parameter that allows you to measure the distance from the device to a base station or beacon. The developed mobile system combines components such as web client, server application, databases and mobile application to operate the Bluetooth ESP32 module. Based on these components, this article provides a methodology for building a mobile system, describes the development environ- ment with its functions and capabilities, provides a detailed description of launching and configuring programs with explanations of key points in the system’s operation.
基于对帮助盲人在太空中导航的现有系统的分析,一种理解产生于创建一个新的系统,这个系统将以一种完全不同的方式来帮助盲人用户与现有世界进行互动。这种系统具有语音信息的功能,为盲人提供信息,从而帮助他在空间中定位。现有的方法侧重于提供声音信号,这只能使人在某个方向上重新定向,禁止或允许移动。因此,有必要开发这样一种移动系统,帮助有视觉障碍的人根据他们以语音信息的形式收到的信息在房间里导航。本研究的对象是利用接收信号电平指示器RSSI (received signal Strength Indication)来帮助盲人定位房屋的方法和手段。对于Wi-Fi和蓝牙4.0设备,RSSI是唯一允许您测量设备与基站或信标之间距离的参数。所开发的移动系统结合了web客户端、服务器应用、数据库和移动应用等组件来运行蓝牙ESP32模块。基于这些组件,本文给出了构建移动系统的方法,描述了开发环境及其功能和能力,详细描述了程序的启动和配置,并解释了系统运行中的关键点。
{"title":"Mobile system for spatial orientation of people with vision disorders","authors":"Y. Klushyn","doi":"10.23939/csn2022.01.067","DOIUrl":"https://doi.org/10.23939/csn2022.01.067","url":null,"abstract":"Based on the analysis of existing systems for helping blind people to navigate in space, an understanding arose in the creation of a new system that would have a completely different approach to the interaction of a blind user with the existing world. Such a system, having the function of a voice message, provides a blind person with information and thus helps him orientate in space. Existing approaches focus on providing sound signals, which only make it possible to redirect a person in a certain direction, prohibit or allow movement. Therefore, there was a need to develop such a mobile system that would help people with visual impairments to navigate in the room based on the information they received in the form of a voice message. The object of the research is methods and means of helping blind people in the orientation of the premises using the received signal level indicator RSSI (Received Signal Strength Indication). For Wi-Fi and Bluetooth 4.0 devices, RSSI is the only parameter that allows you to measure the distance from the device to a base station or beacon. The developed mobile system combines components such as web client, server application, databases and mobile application to operate the Bluetooth ESP32 module. Based on these components, this article provides a methodology for building a mobile system, describes the development environ- ment with its functions and capabilities, provides a detailed description of launching and configuring programs with explanations of key points in the system’s operation.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In many cases, visual and optical methods can be used in defectoscopy for different materials and products. With the development of microprocessor components and significant expansion of usage of computer technologies and image processing and analysis techniques in different areas, the use of visual and optical methods in defectoscopy for production and research purposes is rapidly developing. In this paper, the author proposes a computer vision system for experiments and research in the area of studying defects of materials and products. The system uses modern methods of image processing and object identification based on their images. The system allows to install the object so that it can be rotated horizontally, take high-quality images of the object using a digital video camera, pre- process images to enhance image quality using a local computing module, transfer images to the main computing module to identify defects and make decisions about rejection of the material or product. To install and rotate the material or product, the author uses the stepper motor 17HS4401 and a horizontal platform fixed on the vertical axis. The stepper motor is controlled using Microstep Driver TB6600 and a local computing module based on a microcontroller with an ARM Cortex-M7 core. The video stream is recorded using a USB microscope video camera which provides sufficiently high image resolution allowing to find defects on the object surface of size 50 micron and larger. Rotation speed can be controlled using a local computing module. The input data for the local computing module can be provided in the form of a video stream or a sequence of images. The local computing module has an LCD screen based on the ВС1602А indicator, programmable LEDs, a keyboard to select operating modes for the stepper motor, a USB port to connect the microscope video camera and an SWD port to program the Flash memory and debug the firmware in real time. Original images or the images after quality enhancement are passed to the main computing module using the SPI interface. The author has developed software for the local computing module to control the stepper motor, record a video stream or series of images of the object area with possible defects, quality enhancement and passing the video stream or images to the main computing module for further processing and analysis. The results can be used in scientific research and in development of automated systems for non-destructive defectoscopy for materials and end products.
{"title":"Computer vision system for research in the area of defectoscopy for materials and products","authors":"V. Puyda","doi":"10.23939/csn2022.01.122","DOIUrl":"https://doi.org/10.23939/csn2022.01.122","url":null,"abstract":"In many cases, visual and optical methods can be used in defectoscopy for different materials and products. With the development of microprocessor components and significant expansion of usage of computer technologies and image processing and analysis techniques in different areas, the use of visual and optical methods in defectoscopy for production and research purposes is rapidly developing. In this paper, the author proposes a computer vision system for experiments and research in the area of studying defects of materials and products. The system uses modern methods of image processing and object identification based on their images. The system allows to install the object so that it can be rotated horizontally, take high-quality images of the object using a digital video camera, pre- process images to enhance image quality using a local computing module, transfer images to the main computing module to identify defects and make decisions about rejection of the material or product. To install and rotate the material or product, the author uses the stepper motor 17HS4401 and a horizontal platform fixed on the vertical axis. The stepper motor is controlled using Microstep Driver TB6600 and a local computing module based on a microcontroller with an ARM Cortex-M7 core. The video stream is recorded using a USB microscope video camera which provides sufficiently high image resolution allowing to find defects on the object surface of size 50 micron and larger. Rotation speed can be controlled using a local computing module. The input data for the local computing module can be provided in the form of a video stream or a sequence of images. The local computing module has an LCD screen based on the ВС1602А indicator, programmable LEDs, a keyboard to select operating modes for the stepper motor, a USB port to connect the microscope video camera and an SWD port to program the Flash memory and debug the firmware in real time. Original images or the images after quality enhancement are passed to the main computing module using the SPI interface. The author has developed software for the local computing module to control the stepper motor, record a video stream or series of images of the object area with possible defects, quality enhancement and passing the video stream or images to the main computing module for further processing and analysis. The results can be used in scientific research and in development of automated systems for non-destructive defectoscopy for materials and end products.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The decentralized technologies of the Ethereum blockchain were analyzed, based on the principles of which a decentralized software service solution was proposed using a smart contract implemented in the specialized Solidity programming language. This contract acts as one of the elements of the server-client application and is the server part for processing methods of interaction with the Ethereum blockchain. The methods include a set of various functions, including for interacting with a collection of non-fungible tokens. The metadata that describes the digital product (non-fungible tokens) is directly linked to the blockchain and resides in a decentralized repository for its most reliable and long-lasting existence. The Ethereum blockchain, in addition to development tools, provides stable support for developers and users thanks to the popular decentralization paradigm, and the relevance and constant development of technologies lead to user interest in products created on their basis. Non- fungible tokens can be used as a cryptocurrency unit, and the decentralized application itself as a platform for collecting funds for a specific purpose. The methods of creating decentralized software services using smart contracts of non-fungible tokens were studied. The selection of the main nodes of the decentralized application is substantiated. A detailed functional diagram of the operation of the basic smart contract methods is proposed together with a diagram that describes all the functional nodes of the decentralized application in general. The results of the interaction of the client part of the software service with the smart contract of the Ethereum blockchain are also demonstrated.
{"title":"Decentralized smart contract software service using ETHEREUM blockchain non-fungible tokens","authors":"A. Ihnatovych, A. Yanchynskyi","doi":"10.23939/csn2022.01.047","DOIUrl":"https://doi.org/10.23939/csn2022.01.047","url":null,"abstract":"The decentralized technologies of the Ethereum blockchain were analyzed, based on the principles of which a decentralized software service solution was proposed using a smart contract implemented in the specialized Solidity programming language. This contract acts as one of the elements of the server-client application and is the server part for processing methods of interaction with the Ethereum blockchain. The methods include a set of various functions, including for interacting with a collection of non-fungible tokens. The metadata that describes the digital product (non-fungible tokens) is directly linked to the blockchain and resides in a decentralized repository for its most reliable and long-lasting existence. The Ethereum blockchain, in addition to development tools, provides stable support for developers and users thanks to the popular decentralization paradigm, and the relevance and constant development of technologies lead to user interest in products created on their basis. Non- fungible tokens can be used as a cryptocurrency unit, and the decentralized application itself as a platform for collecting funds for a specific purpose. The methods of creating decentralized software services using smart contracts of non-fungible tokens were studied. The selection of the main nodes of the decentralized application is substantiated. A detailed functional diagram of the operation of the basic smart contract methods is proposed together with a diagram that describes all the functional nodes of the decentralized application in general. The results of the interaction of the client part of the software service with the smart contract of the Ethereum blockchain are also demonstrated.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article investigates a device for tracking the position of the sun during the day - a tracker for solar power plants. The practice of using solar trackers as a device to increase the efficiency of solar power plants is considered. The relevance of this development in Ukraine and prospects for its development are determined. Methods and principles of increasing the efficiency of solar energy production, expediency of using trackers for solar power plants are analyzed. The aim of the article is to present the stages of development of a biaxial solar tracker and the algorithm of the controlling the angle of inclination of solar panels placed on a moving platform, relative to the obtained data on the position of the sun. The article presents a tracker for solar power plants, its structure and algorithm. It is stated that the principle of operation is to analyze the current position of the sun and automatically set the movable platform with solar panels in the most effective position.
{"title":"Tracker for solar power plants","authors":"I. Zholubak, V. Matviiets","doi":"10.23939/csn2022.01.037","DOIUrl":"https://doi.org/10.23939/csn2022.01.037","url":null,"abstract":"The article investigates a device for tracking the position of the sun during the day - a tracker for solar power plants. The practice of using solar trackers as a device to increase the efficiency of solar power plants is considered. The relevance of this development in Ukraine and prospects for its development are determined. Methods and principles of increasing the efficiency of solar energy production, expediency of using trackers for solar power plants are analyzed. The aim of the article is to present the stages of development of a biaxial solar tracker and the algorithm of the controlling the angle of inclination of solar panels placed on a moving platform, relative to the obtained data on the position of the sun. The article presents a tracker for solar power plants, its structure and algorithm. It is stated that the principle of operation is to analyze the current position of the sun and automatically set the movable platform with solar panels in the most effective position.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Described algorithms of monitoring the employee’s working time at the computer. The main tools for monitoring are presented, the expediency of using such tools and the conditions under which they should be used are substantiated. The work of one of the most common software monitoring models is presented, their advantages and disadvantages are described, and a comparison is made. Algorithmic and software monitoring tools are proposed, which allow monitoring the user’s activity and recording the time spent by the employee at the computer. They are based on monitoring certain data, such as user activity and user presence at the computer.
{"title":"Algorithmic and software tools for monitoring working time of an employee on a computer","authors":"Vasyl Kindii, Y. Paramud","doi":"10.23939/csn2022.01.059","DOIUrl":"https://doi.org/10.23939/csn2022.01.059","url":null,"abstract":"Described algorithms of monitoring the employee’s working time at the computer. The main tools for monitoring are presented, the expediency of using such tools and the conditions under which they should be used are substantiated. The work of one of the most common software monitoring models is presented, their advantages and disadvantages are described, and a comparison is made. Algorithmic and software monitoring tools are proposed, which allow monitoring the user’s activity and recording the time spent by the employee at the computer. They are based on monitoring certain data, such as user activity and user presence at the computer.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problem of context-aware recommendation with content filtering for managing video data as part of an online video hosting platform has been considered. Approaches to creating online video hosting platforms with recommendation of video data have been considered. A comparison of popular online video hosting platforms is given. A method of context-aware recommendation of video data with content-based filtering is proposed, which involves saving information about the user’s interaction with the video, obtaining and saving information about which videos the user liked, determining the user’s context, forming a profile of user preferences, forming a profile of user preferences depending on context, determining the similarity of the video profile to the profile of the user’s preferences (with and without taking into account the context), determining the relevance of the video to the context, and the final determination of the relevance of the video to the user’s preferences based on the proposed summary indicator of relevance. The developed structure of the online video hosting platform with context-aware recommendation of video data is given. The algorithm of its work is considered. The database structure of the online video hosting platform with context-aware recommendation of video data is proposed.
{"title":"Context-aware recommendation method with content-based filtering for video data management","authors":"A. Botchkaryov","doi":"10.23939/csn2022.01.001","DOIUrl":"https://doi.org/10.23939/csn2022.01.001","url":null,"abstract":"The problem of context-aware recommendation with content filtering for managing video data as part of an online video hosting platform has been considered. Approaches to creating online video hosting platforms with recommendation of video data have been considered. A comparison of popular online video hosting platforms is given. A method of context-aware recommendation of video data with content-based filtering is proposed, which involves saving information about the user’s interaction with the video, obtaining and saving information about which videos the user liked, determining the user’s context, forming a profile of user preferences, forming a profile of user preferences depending on context, determining the similarity of the video profile to the profile of the user’s preferences (with and without taking into account the context), determining the relevance of the video to the context, and the final determination of the relevance of the video to the user’s preferences based on the proposed summary indicator of relevance. The developed structure of the online video hosting platform with context-aware recommendation of video data is given. The algorithm of its work is considered. The database structure of the online video hosting platform with context-aware recommendation of video data is proposed.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127495173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problem of context-aware task sequence planning for independent or weakly related tasks by an intelligent agent has been considered. The principle of matching the task to the context is analyzed. The structure of the context-aware task sequence planning module as part of an intelligent agent and the corresponding algorithm are proposed. In the structure of the planning module, three main groups of blocks are implemented: operations with tasks, operations with the context, determining the relevance of tasks to the context. The article also proposes an algorithm for calculating the dynamic priority of a task, an algorithm for determining the relevance of a task to the context, and an algorithm for adapting a set of rules for matching the task to the context. The value of the dynamic priority depends on the static priority of the task, which is assigned when a new task is added, and the degree of correspondence of the task to the context, taking into account the context vector. Two modes of starting the planning algorithm are allowed: when the intelligent agent requests a new task and when the context vector changes. The dynamic priority calculation algorithm is performed independently for each task. As a result, its software implementation has a large parallelization resource. To adapt the set of rules for matching tasks to the context, a scheme of reinforcement learning in a contextual multi-armed bandit was used. For each matching rule, a separate instance of the reinforcement learning procedure is performed. The reinforcement learning method used in the article is Upper-Confidence-Bound Action Selection. The functional scheme of the reinforcement learning procedure, implemented in the prototype of the context-aware task sequence planning module has been proposed. The functional scheme of the reinforcement learning procedure allows the use of data decomposition and functional decomposition to parallelize the corresponding calculations.
{"title":"Task sequence planning by intelligent agent with context awareness","authors":"A. Botchkaryov","doi":"10.23939/csn2022.01.012","DOIUrl":"https://doi.org/10.23939/csn2022.01.012","url":null,"abstract":"The problem of context-aware task sequence planning for independent or weakly related tasks by an intelligent agent has been considered. The principle of matching the task to the context is analyzed. The structure of the context-aware task sequence planning module as part of an intelligent agent and the corresponding algorithm are proposed. In the structure of the planning module, three main groups of blocks are implemented: operations with tasks, operations with the context, determining the relevance of tasks to the context. The article also proposes an algorithm for calculating the dynamic priority of a task, an algorithm for determining the relevance of a task to the context, and an algorithm for adapting a set of rules for matching the task to the context. The value of the dynamic priority depends on the static priority of the task, which is assigned when a new task is added, and the degree of correspondence of the task to the context, taking into account the context vector. Two modes of starting the planning algorithm are allowed: when the intelligent agent requests a new task and when the context vector changes. The dynamic priority calculation algorithm is performed independently for each task. As a result, its software implementation has a large parallelization resource. To adapt the set of rules for matching tasks to the context, a scheme of reinforcement learning in a contextual multi-armed bandit was used. For each matching rule, a separate instance of the reinforcement learning procedure is performed. The reinforcement learning method used in the article is Upper-Confidence-Bound Action Selection. The functional scheme of the reinforcement learning procedure, implemented in the prototype of the context-aware task sequence planning module has been proposed. The functional scheme of the reinforcement learning procedure allows the use of data decomposition and functional decomposition to parallelize the corresponding calculations.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"36 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article is devoted to methods and tools for generating bitsliced descriptions of bijective 4×4 S-Boxes with a reduced number of gates/instructions. Bitsliced descriptions generated by the proposed method make it possible to improve the security and performance of both software implementations of cryptoalgorithms using 4×4 S-Boxes on various processor architectures, as well as FPGA and ASIC based hardware. The paper develops a heuristic method of minimization that uses standard logical instructions AND, OR, XOR, NOT, which are available in most 8/16/32/64-bit processors. Due to the combination of different heuristic techniques (preliminary calculations, exhaustive search to a certain depth, DFS algorithm, refining search) in the method, it was possible to reduce the number of gates in bitsliced descriptions of S-Boxes compared to other known methods. The corresponding software in the form of a utility in the Python language was developed and its operation was tested on 225 S-Boxes of various cryptoalgorithms. It is found that the developed method generates a bitsliced description with a smaller number of gates in 57 % of cases compared to the best known methods implemented in the LIGHTER/Peigen utilities.
本文致力于使用减少门/指令数量的双射4×4 s - box生成位片描述的方法和工具。由所提出的方法生成的位切片描述使得在各种处理器架构以及基于FPGA和ASIC的硬件上使用4×4 s - box的加密算法的两种软件实现的安全性和性能得到改善。本文开发了一种启发式最小化方法,该方法使用大多数8/16/32/64位处理器中可用的标准逻辑指令AND, OR, XOR, NOT。由于该方法结合了不同的启发式技术(初步计算、穷尽搜索到一定深度、DFS算法、精炼搜索),与其他已知方法相比,可以减少s - box的位切片描述中的门数。在Python语言中以实用程序的形式开发了相应的软件,并在225种不同加密算法的s - box上进行了运行测试。研究发现,与LIGHTER/Peigen实用程序中实现的最著名的方法相比,所开发的方法在57%的情况下产生具有较少门数的位切片描述。
{"title":"Method and utility for minimizing bitsliced representations of 4×4 S-boxes","authors":"Y. Sovyn, V. Khoma, I. Opirskyy","doi":"10.23939/csn2022.01.131","DOIUrl":"https://doi.org/10.23939/csn2022.01.131","url":null,"abstract":"The article is devoted to methods and tools for generating bitsliced descriptions of bijective 4×4 S-Boxes with a reduced number of gates/instructions. Bitsliced descriptions generated by the proposed method make it possible to improve the security and performance of both software implementations of cryptoalgorithms using 4×4 S-Boxes on various processor architectures, as well as FPGA and ASIC based hardware. The paper develops a heuristic method of minimization that uses standard logical instructions AND, OR, XOR, NOT, which are available in most 8/16/32/64-bit processors. Due to the combination of different heuristic techniques (preliminary calculations, exhaustive search to a certain depth, DFS algorithm, refining search) in the method, it was possible to reduce the number of gates in bitsliced descriptions of S-Boxes compared to other known methods. The corresponding software in the form of a utility in the Python language was developed and its operation was tested on 225 S-Boxes of various cryptoalgorithms. It is found that the developed method generates a bitsliced description with a smaller number of gates in 57 % of cases compared to the best known methods implemented in the LIGHTER/Peigen utilities.","PeriodicalId":233546,"journal":{"name":"Computer systems and network","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}