Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928449
A. Kabanov, Y. Gudkov, V. Azarov
The article deals with the problems of ensuring functional, informational and cyber security for vehicles and transport infrastructure facilities. The analysis of the factors causing the growth of threats to the transport sector has been carried out, the list of typical cyber attacks on the components of the transport infrastructure is given. The results of the analysis of the features of automated process control systems of technological processes of vehicles and transport infrastructure facilities are presented. Recommendations on the development of transport security systems are given taking into account the specifics of various types of transport.
{"title":"Problems and Prospects of Security in the Transport Sector","authors":"A. Kabanov, Y. Gudkov, V. Azarov","doi":"10.1109/IT&QM&IS.2019.8928449","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928449","url":null,"abstract":"The article deals with the problems of ensuring functional, informational and cyber security for vehicles and transport infrastructure facilities. The analysis of the factors causing the growth of threats to the transport sector has been carried out, the list of typical cyber attacks on the components of the transport infrastructure is given. The results of the analysis of the features of automated process control systems of technological processes of vehicles and transport infrastructure facilities are presented. Recommendations on the development of transport security systems are given taking into account the specifics of various types of transport.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126780925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928335
Vorunichev Dmitry S., Vorunicheva Kristina U., Dmitrieva Varvara A.
Risk and opportunity management aspects are presented. Risks classification and their characteristic are formulated. Risk assessment multi-criteria approach within the radio-electronic industry is proposed, which can be applied both within the quality management system and in integrated management systems. The safety and risk assessment method is proposed based on the developed multi-criteria approach of risk assessment and the FMEA analysis method.
{"title":"«Safety and Risks Evaluation» Method for the Quality Management System for Radio-Electronic Industry Companies","authors":"Vorunichev Dmitry S., Vorunicheva Kristina U., Dmitrieva Varvara A.","doi":"10.1109/IT&QM&IS.2019.8928335","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928335","url":null,"abstract":"Risk and opportunity management aspects are presented. Risks classification and their characteristic are formulated. Risk assessment multi-criteria approach within the radio-electronic industry is proposed, which can be applied both within the quality management system and in integrated management systems. The safety and risk assessment method is proposed based on the developed multi-criteria approach of risk assessment and the FMEA analysis method.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126475818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928378
M. Marusina, E. Karaseva
Analysis of changes in medical images is one of the most important areas of computer use, which ensures the progress of the diagnostic process at the moment. Along with the quality of visualization, automated diagnostic methods are being developed, CADs are being increasingly used. Today, medical imaging is the most common diagnostic tool in modern medical practice. The most relevant areas for the implementation of medical image analysis in connection with the specificity of the objects under study are methods based on mathematical methods for processing input information, for example, on a fractal analysis (analysis of self-similarity of image parts), which can be realized by calculating the fractal dimension and Hurst index. The obtained data in world practice become the basis for creating new algorithms for qualitative analysis and image processing for creating new algorithms.
{"title":"Automatic Analysis of Medical Images Based on Fractal Methods","authors":"M. Marusina, E. Karaseva","doi":"10.1109/IT&QM&IS.2019.8928378","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928378","url":null,"abstract":"Analysis of changes in medical images is one of the most important areas of computer use, which ensures the progress of the diagnostic process at the moment. Along with the quality of visualization, automated diagnostic methods are being developed, CADs are being increasingly used. Today, medical imaging is the most common diagnostic tool in modern medical practice. The most relevant areas for the implementation of medical image analysis in connection with the specificity of the objects under study are methods based on mathematical methods for processing input information, for example, on a fractal analysis (analysis of self-similarity of image parts), which can be realized by calculating the fractal dimension and Hurst index. The obtained data in world practice become the basis for creating new algorithms for qualitative analysis and image processing for creating new algorithms.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/itqmis.2019.8928419
{"title":"Proceedings of the 2019 IEEE International Conference “Quality Management, Transport and Information Security, Information Technologies” (IT&QM&IS)","authors":"","doi":"10.1109/itqmis.2019.8928419","DOIUrl":"https://doi.org/10.1109/itqmis.2019.8928419","url":null,"abstract":"","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928409
O. A. Tsygankova, D. Atabaeva, A. A. Shavaev, R. A. Girs, Aleksandr A. Chetvertakov
This article describes the problem of deformation research through non-destructive testing for composite materials. Describes the process of developing the installation, allowing with high accuracy to obtain the values of linear deformation of the part due to the use of a servo drive with a high-precision encoder. The installation also allows you to measure the resonant frequency of oscillation of the product. Based on the measurements, it is possible to conduct a comparative analysis of products made of composite materials. According to the test results, a method was developed for assessing the strength properties of a product made of a composite material.
{"title":"Method of Non-Destructive Testing of Composite Materials","authors":"O. A. Tsygankova, D. Atabaeva, A. A. Shavaev, R. A. Girs, Aleksandr A. Chetvertakov","doi":"10.1109/IT&QM&IS.2019.8928409","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928409","url":null,"abstract":"This article describes the problem of deformation research through non-destructive testing for composite materials. Describes the process of developing the installation, allowing with high accuracy to obtain the values of linear deformation of the part due to the use of a servo drive with a high-precision encoder. The installation also allows you to measure the resonant frequency of oscillation of the product. Based on the measurements, it is possible to conduct a comparative analysis of products made of composite materials. According to the test results, a method was developed for assessing the strength properties of a product made of a composite material.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123954208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928358
A. Zhilyaev, O. V. Islamova, M. M. Yakhutlov
The approach to design and production of hi-tech and knowledge-intensive products consisting in use of the computer equipment and information technologies at all stages of life cycle of a product. Use of CALS technologies allows to reduce significantly the project scope as descriptions of many components of the equipment, the machines and systems projected earlier are stored in the unified formats of these network servers available to any user of CALS technologies.
{"title":"The Analysis of Efficiency of Application of the Concept of CALS in Life Cycle of Products of Mechanical Engineering","authors":"A. Zhilyaev, O. V. Islamova, M. M. Yakhutlov","doi":"10.1109/IT&QM&IS.2019.8928358","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928358","url":null,"abstract":"The approach to design and production of hi-tech and knowledge-intensive products consisting in use of the computer equipment and information technologies at all stages of life cycle of a product. Use of CALS technologies allows to reduce significantly the project scope as descriptions of many components of the equipment, the machines and systems projected earlier are stored in the unified formats of these network servers available to any user of CALS technologies.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928372
E. Martyakova, Olga A. Nagornaya, I. G. Bondarenko
In this paper the authors have examined some current trends in using information and communication technologies at universities. They have justified the need to improve existing approaches to university management software products. University management is featured by intensive use of rapidly-growing information and communication technologies, especially, in conditions of economy digitalization. Introduction of the software products tested on management models of business structures is considered as the priority area for information and communication technologies at universities. The paper gives a detailed analysis of the software products introduced to university management system. The authors point out some priority tasks for implementation of the software products. Special attention is drawn to classification of software management products according to the level of the tasks. Three levels of task solution are singled out. These levels are: solving typical tasks, automation of more complex management decisions and partial solution of business process control automation. The possibility of introducing configurations of the management software product which is known as «1C: Management by Objectives and KPIs» is considered. It aims at keeping control over research and scientific work, contract-based research and the work of research laboratories at universities. Some trends of establishing a new university corporate culture based on the principles of combining commercial (quantitative) and humanitarian approaches to assess the efficiency of university management systems are substantiated. It is emphasized that quantitative approaches are based on the balanced system of indicators and the system of key performance indicators to assess efficiency of individual projects implementation. The system of quality indicators covers the level of university's performance regarding training and professional development of the staff that meet requirements of the professional standards and are aware of their social mission.
{"title":"Current Trends in Using Information and Communication Technologies at Universities","authors":"E. Martyakova, Olga A. Nagornaya, I. G. Bondarenko","doi":"10.1109/IT&QM&IS.2019.8928372","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928372","url":null,"abstract":"In this paper the authors have examined some current trends in using information and communication technologies at universities. They have justified the need to improve existing approaches to university management software products. University management is featured by intensive use of rapidly-growing information and communication technologies, especially, in conditions of economy digitalization. Introduction of the software products tested on management models of business structures is considered as the priority area for information and communication technologies at universities. The paper gives a detailed analysis of the software products introduced to university management system. The authors point out some priority tasks for implementation of the software products. Special attention is drawn to classification of software management products according to the level of the tasks. Three levels of task solution are singled out. These levels are: solving typical tasks, automation of more complex management decisions and partial solution of business process control automation. The possibility of introducing configurations of the management software product which is known as «1C: Management by Objectives and KPIs» is considered. It aims at keeping control over research and scientific work, contract-based research and the work of research laboratories at universities. Some trends of establishing a new university corporate culture based on the principles of combining commercial (quantitative) and humanitarian approaches to assess the efficiency of university management systems are substantiated. It is emphasized that quantitative approaches are based on the balanced system of indicators and the system of key performance indicators to assess efficiency of individual projects implementation. The system of quality indicators covers the level of university's performance regarding training and professional development of the staff that meet requirements of the professional standards and are aware of their social mission.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928373
V. Varkentin, Maxim Schukin
The abstract task of recognizing vehicle license plates one from another has become relevant with the general increase of number of vehicles. There were 373 cars per 1,000 people in Russia in 2018. Identification of the vehicle number can be used for various purposes: control of traffic rules, automatic calculation of fines, control of movement of a specific vehicle, etc. There are many solutions to the problem of recognizing the license plate number, including online services. The recognition level of existing tools allows you to fully automate this process and achieve a high level of recognition accuracy. The most promising approach to solving this problem is the use of neural network technologies. This article discusses the development of an application for license plate recognition using neural network technologies.
{"title":"Development of an Application for Car License Plates Recognition Using Neural Network Technologies","authors":"V. Varkentin, Maxim Schukin","doi":"10.1109/IT&QM&IS.2019.8928373","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928373","url":null,"abstract":"The abstract task of recognizing vehicle license plates one from another has become relevant with the general increase of number of vehicles. There were 373 cars per 1,000 people in Russia in 2018. Identification of the vehicle number can be used for various purposes: control of traffic rules, automatic calculation of fines, control of movement of a specific vehicle, etc. There are many solutions to the problem of recognizing the license plate number, including online services. The recognition level of existing tools allows you to fully automate this process and achieve a high level of recognition accuracy. The most promising approach to solving this problem is the use of neural network technologies. This article discusses the development of an application for license plate recognition using neural network technologies.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121714791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928399
V. A. Khakulov, V. A. Shapovalov, A. T. Karyakin, M. V. Ignatov
The decline in the quality of the extracted mineral raw materials amid the rise in price of material and energy resources determines the need to search for new reserves to improve the efficiency of the mining and processing enterprises. Under these conditions, there is no alternative to technical modernization on the basis of an increase in the unit capacity of the mining transport equipment, the robotization of the processes of the explosive separation of a part of ore from the massif in the block with its simultaneous fragmentation, loading and transportation of rock mass. At the same time, the variability of mining and geological and mining conditions does not allow for a significant increase in the utilization rates of modern mining transport complexes. To ensure the profitability of mining operations, we need intelligent loading and transport complexes that ensure the rhythm of work due to the ability to respond adequately to changing mining and technical conditions.
{"title":"Research and Improvement of the Current Management of the Job Rhythms of the Intellectual Complex Excavator – Dump Truck in the Adjacent Faces","authors":"V. A. Khakulov, V. A. Shapovalov, A. T. Karyakin, M. V. Ignatov","doi":"10.1109/IT&QM&IS.2019.8928399","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928399","url":null,"abstract":"The decline in the quality of the extracted mineral raw materials amid the rise in price of material and energy resources determines the need to search for new reserves to improve the efficiency of the mining and processing enterprises. Under these conditions, there is no alternative to technical modernization on the basis of an increase in the unit capacity of the mining transport equipment, the robotization of the processes of the explosive separation of a part of ore from the massif in the block with its simultaneous fragmentation, loading and transportation of rock mass. At the same time, the variability of mining and geological and mining conditions does not allow for a significant increase in the utilization rates of modern mining transport complexes. To ensure the profitability of mining operations, we need intelligent loading and transport complexes that ensure the rhythm of work due to the ability to respond adequately to changing mining and technical conditions.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/IT&QM&IS.2019.8928292
V. Zolotarev, M. Zhukova
The problem of group interaction in game tasks is considered. Due to the fact that modern learning tools based on gamification are often distributed, user-oriented and practically lacking in security subsystems, the logical debugging of group interaction models is information security. Based on information security training as an example, the main features of the interaction model role formation are chosen, such models' peculiarities for various types of game tasks are specified. The issues of assigning and minimizing privileges, phishing and prohibited variants of the interaction of roles counteraction, changing the role and privileges during the game are considered. The limitation of game information flows to prohibit or control the transmitted confidential information is considered separately. The experimental model shows the limitations and features approach, which solves group interaction problems using the role model. The results obtained allow improving the group interaction security by filtering and limiting information flows. Solutions implementation described in the article is possible when developing game cases, quests or other educational game tasks.
{"title":"Role Model Features in Educational Serious Games","authors":"V. Zolotarev, M. Zhukova","doi":"10.1109/IT&QM&IS.2019.8928292","DOIUrl":"https://doi.org/10.1109/IT&QM&IS.2019.8928292","url":null,"abstract":"The problem of group interaction in game tasks is considered. Due to the fact that modern learning tools based on gamification are often distributed, user-oriented and practically lacking in security subsystems, the logical debugging of group interaction models is information security. Based on information security training as an example, the main features of the interaction model role formation are chosen, such models' peculiarities for various types of game tasks are specified. The issues of assigning and minimizing privileges, phishing and prohibited variants of the interaction of roles counteraction, changing the role and privileges during the game are considered. The limitation of game information flows to prohibit or control the transmitted confidential information is considered separately. The experimental model shows the limitations and features approach, which solves group interaction problems using the role model. The results obtained allow improving the group interaction security by filtering and limiting information flows. Solutions implementation described in the article is possible when developing game cases, quests or other educational game tasks.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"22 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}