Pub Date : 2023-06-20DOI: 10.17212/2782-2001-2023-2-23-42
Alena I. Tsibina, G. P. Chikildin
Currently, in metrological laboratories there is a need to transfer temperature units from standards of the highest category by reproducing the fixed points of the international temperature scale. The reproduction process of fixed point involves heating, melting, overheating and solidification of the metal and can sometimes take more than one working day. The purpose of this work was to create and practically test an algorithm that takes into account heat flows in a three-zone furnace for uniform heating and relatively fast reaching the solidification area. Over the past twenty years, several algorithms have been used making it possible to go through all four stages within one working day. This paper describes a practically tested algorithm for controlling three-zone furnaces for reproducing the fixed points of the temperature scale in the range from 156.5985 °C to 1084.62 °C. It takes into account the requirements for maintaining the minimum temperature gradient along the height of the fixed point cell. This algorithm has been used in the furnaces of the West Siberian branch of FSUE "VNIIFTRI". The controller model is based on the principles of automatic control theory using a multi-channel discrete proportional-integral-derivative or PID controller. The model was modified in accordance with the system structure. The main idea is to represent the model of a three-zone furnace as a three-channel control object with mutual influence between the channels. The corresponding controller model is a three-channel control system. In each channel of it there is a PID controller. Depending on the phase of the playback process, the three-channel controller changes its structure and tunes its coefficients. Such a structure made it possible to achieve sufficient productivity of the furnace.
{"title":"Synthesis of a three-channel PID controller for controlling a three-zone medium-temperature furnace","authors":"Alena I. Tsibina, G. P. Chikildin","doi":"10.17212/2782-2001-2023-2-23-42","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-2-23-42","url":null,"abstract":"Currently, in metrological laboratories there is a need to transfer temperature units from standards of the highest category by reproducing the fixed points of the international temperature scale. The reproduction process of fixed point involves heating, melting, overheating and solidification of the metal and can sometimes take more than one working day. The purpose of this work was to create and practically test an algorithm that takes into account heat flows in a three-zone furnace for uniform heating and relatively fast reaching the solidification area. Over the past twenty years, several algorithms have been used making it possible to go through all four stages within one working day. This paper describes a practically tested algorithm for controlling three-zone furnaces for reproducing the fixed points of the temperature scale in the range from 156.5985 °C to 1084.62 °C. It takes into account the requirements for maintaining the minimum temperature gradient along the height of the fixed point cell. This algorithm has been used in the furnaces of the West Siberian branch of FSUE \"VNIIFTRI\". The controller model is based on the principles of automatic control theory using a multi-channel discrete proportional-integral-derivative or PID controller. The model was modified in accordance with the system structure. The main idea is to represent the model of a three-zone furnace as a three-channel control object with mutual influence between the channels. The corresponding controller model is a three-channel control system. In each channel of it there is a PID controller. Depending on the phase of the playback process, the three-channel controller changes its structure and tunes its coefficients. Such a structure made it possible to achieve sufficient productivity of the furnace.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-20DOI: 10.17212/2782-2001-2023-2-77-88
V. Seleznev, A. Gobysh
The flow in time of an initial state ensemble in a multidimensional phase space, as a rule, models some dynamic process. Under what conditions is such a flow generated by a vector field in such a way that the given flow corresponds to the vector field in a unique way? A positive answer to this question is given by the classical uniqueness theorems for the solution of the initial value problem in the case of a regular vector field with the required properties of the modulus of continuity in space variables. In mathematical models of stochastic differential equations, in models of irregular hydrodynamic flows, and in a number of other cases when the flow is generated by a “bad” vector field that has a modulus of continuity in space variables that does not meet the conditions of the uniqueness theorem for solving the initial problem for a vector field, generating this flow, we cannot speak about the correctness of the initial problem for the vector field and, thus, about the correctness of finding the trajectories connecting the initial and actual states of the ensemble of particles in the phase space. In this case, the uniqueness of the flow generated by the vector field remains to be judged only by the properties of the flow itself. The only known result of this type is van Kampen's theorem, which states that the uniqueness of a flow generated by a vector field continuous in space variables is guaranteed by the properties of homeomorphism and the Lipschitz property of the flow in space variables. If the vector velocity field loses the property of continuity in space variables, then van Kampen's theorem does not work and some other properties of the flow are required to guarantee its uniqueness. In this paper, we establish such properties of a flow that guarantee its uniqueness even in the case of a violation of the continuity of the vector field that generates this flow. The conditions of van Kampen's theorem in a certain sense are a special case of the properties of the flow established in this paper, which guarantee its uniqueness as a solution to the initial problem for an irregular vector field. The general construction constructed here makes it possible to establish such properties of flows in various mathematical models that guarantee its uniqueness for a generating vector field.
{"title":"On the uniqueness of the flow generated by an irregular vector field","authors":"V. Seleznev, A. Gobysh","doi":"10.17212/2782-2001-2023-2-77-88","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-2-77-88","url":null,"abstract":"The flow in time of an initial state ensemble in a multidimensional phase space, as a rule, models some dynamic process. Under what conditions is such a flow generated by a vector field in such a way that the given flow corresponds to the vector field in a unique way? A positive answer to this question is given by the classical uniqueness theorems for the solution of the initial value problem in the case of a regular vector field with the required properties of the modulus of continuity in space variables. In mathematical models of stochastic differential equations, in models of irregular hydrodynamic flows, and in a number of other cases when the flow is generated by a “bad” vector field that has a modulus of continuity in space variables that does not meet the conditions of the uniqueness theorem for solving the initial problem for a vector field, generating this flow, we cannot speak about the correctness of the initial problem for the vector field and, thus, about the correctness of finding the trajectories connecting the initial and actual states of the ensemble of particles in the phase space. In this case, the uniqueness of the flow generated by the vector field remains to be judged only by the properties of the flow itself. The only known result of this type is van Kampen's theorem, which states that the uniqueness of a flow generated by a vector field continuous in space variables is guaranteed by the properties of homeomorphism and the Lipschitz property of the flow in space variables. If the vector velocity field loses the property of continuity in space variables, then van Kampen's theorem does not work and some other properties of the flow are required to guarantee its uniqueness. In this paper, we establish such properties of a flow that guarantee its uniqueness even in the case of a violation of the continuity of the vector field that generates this flow. The conditions of van Kampen's theorem in a certain sense are a special case of the properties of the flow established in this paper, which guarantee its uniqueness as a solution to the initial problem for an irregular vector field. The general construction constructed here makes it possible to establish such properties of flows in various mathematical models that guarantee its uniqueness for a generating vector field.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116658751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-20DOI: 10.17212/2782-2001-2023-2-59-76
A. Popov
The issues related to the use of expert assessment methods in order to increase the optimality and objectivity of developed management decisions are considered. The expediency of involving experts is formulated when a collegial management decision is necessary. The basic stages of the research related to the application of the expert assessment method are given. The relevance of the chosen topic is justified by the need to develop effective methods and algorithms aimed at automating the processes of analysis and processing of data obtained during the expert survey, as well as summarizing its results. The aim of the study is to develop and test an algorithm for finding coordinated groups (coalitions) of experts, as well as a method that makes it necessary to work out the final decision on the results of the expert survey. The proposed algorithm for finding coalitions is based on the application of the mathematical apparatus of the theory of sets and algebra of relations; it uses a strict criterion in their formation and replenishment of coalitions, but does not exclude the belonging of experts to several coalitions, which provides a high informative value of the results of expert assessment. The method includes the calculation of weighting coefficients assigned to the formed coalitions taking into account the degrees of experts' membership in them. The resulting decision is formed on the basis of the data obtained by the coalition, which has the maximum dimensionality and the required degree of consistency. The developed method and algorithm were tested on the results of an expert survey for determining the degrees of significance of the processes implemented in communication networks. As a result, coalitions of experts who agreed with each other were formed, as well as the experts, whose opinions are more deviated from the rest, were identified. The coherence of the coalitions is evaluated using the concordance coefficient, and the final decision is formed on the basis of the method of average arithmetic ranks assigned to the studied processes of functioning of communication networks by the experts belonging to the largest coalition.
{"title":"Development and testing of the method and algorithm for forming coalitions of experts in the study of the functioning of communication networks","authors":"A. Popov","doi":"10.17212/2782-2001-2023-2-59-76","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-2-59-76","url":null,"abstract":"The issues related to the use of expert assessment methods in order to increase the optimality and objectivity of developed management decisions are considered. The expediency of involving experts is formulated when a collegial management decision is necessary. The basic stages of the research related to the application of the expert assessment method are given. The relevance of the chosen topic is justified by the need to develop effective methods and algorithms aimed at automating the processes of analysis and processing of data obtained during the expert survey, as well as summarizing its results. The aim of the study is to develop and test an algorithm for finding coordinated groups (coalitions) of experts, as well as a method that makes it necessary to work out the final decision on the results of the expert survey. The proposed algorithm for finding coalitions is based on the application of the mathematical apparatus of the theory of sets and algebra of relations; it uses a strict criterion in their formation and replenishment of coalitions, but does not exclude the belonging of experts to several coalitions, which provides a high informative value of the results of expert assessment. The method includes the calculation of weighting coefficients assigned to the formed coalitions taking into account the degrees of experts' membership in them. The resulting decision is formed on the basis of the data obtained by the coalition, which has the maximum dimensionality and the required degree of consistency. The developed method and algorithm were tested on the results of an expert survey for determining the degrees of significance of the processes implemented in communication networks. As a result, coalitions of experts who agreed with each other were formed, as well as the experts, whose opinions are more deviated from the rest, were identified. The coherence of the coalitions is evaluated using the concordance coefficient, and the final decision is formed on the basis of the method of average arithmetic ranks assigned to the studied processes of functioning of communication networks by the experts belonging to the largest coalition.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131886979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-7-24
In this paper, we consider the synthesis of control systems for objects with a control signal delay by a polynomial matrix method, which is used to locate the poles and, if possible, zeros in the required position. The controller is calculated from the output, i.e. only from the measured values in the plant, which is an advantage over other modal direction synthesis methods where a state vector must be used. It is proposed to approximate the delay link with a Padé series with a limited number of terms, thus obtaining transfer functions of the first and second orders. The desired characteristic polynomial of the closed system is chosen so that it contains the denominators of the approximation transfer functions, which will keep their poles in the closed system. The polynomial synthesis method makes it possible to calculate multichannel controllers both for objects with multiple inputs and multiple outputs (multi input - multi output, MIMO) and for objects with one input and several outputs (single input - multi output, SIMO). The latter include a DC motor with independent excitation, where the armature current and rotor speed are outputs, and the control signal applied to the semiconductor converter is the input. In this work, the control signal is formed with a delay exceeding the time of the transient process of the engine, which significantly affects its dynamics. By applying the proposed approach, it was possible to synthesize a rotor speed control system that is resistant to changes in the delay time in a fairly wide range.
{"title":"Polynomial matrix method for synthesizing regulators for objects with a control signal delay","authors":"","doi":"10.17212/2782-2001-2023-1-7-24","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-7-24","url":null,"abstract":"In this paper, we consider the synthesis of control systems for objects with a control signal delay by a polynomial matrix method, which is used to locate the poles and, if possible, zeros in the required position. The controller is calculated from the output, i.e. only from the measured values in the plant, which is an advantage over other modal direction synthesis methods where a state vector must be used. It is proposed to approximate the delay link with a Padé series with a limited number of terms, thus obtaining transfer functions of the first and second orders. The desired characteristic polynomial of the closed system is chosen so that it contains the denominators of the approximation transfer functions, which will keep their poles in the closed system. The polynomial synthesis method makes it possible to calculate multichannel controllers both for objects with multiple inputs and multiple outputs (multi input - multi output, MIMO) and for objects with one input and several outputs (single input - multi output, SIMO). The latter include a DC motor with independent excitation, where the armature current and rotor speed are outputs, and the control signal applied to the semiconductor converter is the input. In this work, the control signal is formed with a delay exceeding the time of the transient process of the engine, which significantly affects its dynamics. By applying the proposed approach, it was possible to synthesize a rotor speed control system that is resistant to changes in the delay time in a fairly wide range.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-55-80
S. V. Belavskaya, L. I. Lisitsyna, A. Kuzmin, Ekaterina K. Vinskaya, L. G. Navrotsky, V. Razinkin, A. A. Blokhin
The possibility of using an impacting electromagnetic radiation in the high-frequency range for ablation of biological tissues (soft and high density) is considered. A comparative analysis of the characteristics of ablation performed using electromagnetic radiation of the microwave range (microwave ablation method (MWA)) and high-frequency (HF) range is given. It was experimentally revealed that the characteristics of ablation performed by both methods are close to each other. HF ablation techniques performed by non-invasive and invasive methods are proposed and experimentally tested. Laser control of the degree of destruction of biological tissue is proposed which increases the reliability of control. The experiments were carried out using a high-frequency generator at a fixed frequency of 13.56 MHz created with the participation of the authors of this work. The use of an HF generator provided an effect on a biological tissue with a needle-type emitter (medical steel), without using a closed electrical circuit. Pig skin and muscles of cattle were used as biopsies. The processes of burning out the object of exposure, resection and coagulation were performed. It is shown that with HF ablation (HF), the tissue is heated to 120 ° C. A multimeter with the function of a thermal imager CEM DT-898 manufactured in Germany was used to study the temperature in the focus of exposure. This multimeter allows capturinge the area with the maximum temperature at the place of discharge, which occurs when the emitter approaches the skin and heats the skin to a certain temperature, as a result of which thermal ablation occurs. It was revealed that HF ablation occurs practically without affecting the surrounding tissues. A high-frequency electromagnetic system for conducting experimental studies has been developed and implemented. Based on the results of the work, it is proposed to ablate biological tissue using Russian HF generators.
{"title":"A high-frequency electromagnetic system for biological tissues destruction","authors":"S. V. Belavskaya, L. I. Lisitsyna, A. Kuzmin, Ekaterina K. Vinskaya, L. G. Navrotsky, V. Razinkin, A. A. Blokhin","doi":"10.17212/2782-2001-2023-1-55-80","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-55-80","url":null,"abstract":"The possibility of using an impacting electromagnetic radiation in the high-frequency range for ablation of biological tissues (soft and high density) is considered. A comparative analysis of the characteristics of ablation performed using electromagnetic radiation of the microwave range (microwave ablation method (MWA)) and high-frequency (HF) range is given. It was experimentally revealed that the characteristics of ablation performed by both methods are close to each other. HF ablation techniques performed by non-invasive and invasive methods are proposed and experimentally tested. Laser control of the degree of destruction of biological tissue is proposed which increases the reliability of control. The experiments were carried out using a high-frequency generator at a fixed frequency of 13.56 MHz created with the participation of the authors of this work. The use of an HF generator provided an effect on a biological tissue with a needle-type emitter (medical steel), without using a closed electrical circuit. Pig skin and muscles of cattle were used as biopsies. The processes of burning out the object of exposure, resection and coagulation were performed. It is shown that with HF ablation (HF), the tissue is heated to 120 ° C. A multimeter with the function of a thermal imager CEM DT-898 manufactured in Germany was used to study the temperature in the focus of exposure. This multimeter allows capturinge the area with the maximum temperature at the place of discharge, which occurs when the emitter approaches the skin and heats the skin to a certain temperature, as a result of which thermal ablation occurs. It was revealed that HF ablation occurs practically without affecting the surrounding tissues. A high-frequency electromagnetic system for conducting experimental studies has been developed and implemented. Based on the results of the work, it is proposed to ablate biological tissue using Russian HF generators.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-81-90
V. Guzhov, Dmitry S. Khaidukov, K. V. Zakharov, O.Yu. Mayer
The article considers the issue of increasing the spatial resolution during the registration of digital holograms. In practice, discretization is carried out by measuring signal samples using sensors with a certain finite aperture. The resolution is determined by the size of the aperture area over which the averaging takes place. The resolution enhancement method is based on the sampling equation for signals obtained by the subpixel shift method using generalized functions. A subpixel shift is carried out using a spatial shift by a value less than the element of resolution. Apertures of various shapes are used, for example, elliptical, diamond-shaped, hexagonal, but rectangular apertures are most commonly used. The discretization equation involves the use of a two-dimensional aperture function. Below is a way to increase the resolution when using a one-dimensional function. This can be done based on the structure of the holographic signal. In this case, you can use a subpixel shift in only one direction. Digital holography is distinguished by the fact that photodetector matrices which have a spatial resolution much lower than photographic media used in traditional holography methods are used to register the signal,. Therefore, digital holography uses optical schemes with small angles between interfering beams. However, certain restrictions are imposed on the shape of the objects under study. If the objects have a shape that is significantly different from a flat one, it is necessary to use traditional schemes. The article presents mathematical modeling of the resolution enhancement method based on the recovery of signals from a real hologram obtained in the usual way. The increase in resolution is achieved using a one-dimensional subpixel shift. The use of a one-dimensional subpixel shift makes it possible to significantly simplify the optical scheme of the holographic setup.
{"title":"Improving the spatial resolution of digital holograms using one-dimensional subpixel scanning","authors":"V. Guzhov, Dmitry S. Khaidukov, K. V. Zakharov, O.Yu. Mayer","doi":"10.17212/2782-2001-2023-1-81-90","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-81-90","url":null,"abstract":"The article considers the issue of increasing the spatial resolution during the registration of digital holograms. In practice, discretization is carried out by measuring signal samples using sensors with a certain finite aperture. The resolution is determined by the size of the aperture area over which the averaging takes place. The resolution enhancement method is based on the sampling equation for signals obtained by the subpixel shift method using generalized functions. A subpixel shift is carried out using a spatial shift by a value less than the element of resolution. Apertures of various shapes are used, for example, elliptical, diamond-shaped, hexagonal, but rectangular apertures are most commonly used. The discretization equation involves the use of a two-dimensional aperture function. Below is a way to increase the resolution when using a one-dimensional function. This can be done based on the structure of the holographic signal. In this case, you can use a subpixel shift in only one direction. Digital holography is distinguished by the fact that photodetector matrices which have a spatial resolution much lower than photographic media used in traditional holography methods are used to register the signal,. Therefore, digital holography uses optical schemes with small angles between interfering beams. However, certain restrictions are imposed on the shape of the objects under study. If the objects have a shape that is significantly different from a flat one, it is necessary to use traditional schemes. The article presents mathematical modeling of the resolution enhancement method based on the recovery of signals from a real hologram obtained in the usual way. The increase in resolution is achieved using a one-dimensional subpixel shift. The use of a one-dimensional subpixel shift makes it possible to significantly simplify the optical scheme of the holographic setup.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117310793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-25-36
Yuri E. Voskoboinikov
The algorithms based on the decomposition of a noisy image in an orthogonal basis of wavelet functions have been widely used to filter images (especially contrasting ones) over the past four decades. In this case, most wavelet filtering algorithms are of a threshold nature, namely: the decomposition coefficient smaller in an absolute value of a certain threshold value is reset to zero; otherwise the coefficient undergoes some (most often nonlinear) transformation. A certain (and very significant) drawback of threshold algorithms is that all coefficients of a certain decomposition level are processed with one identical threshold value (i.e., a constant value for all de-composition coefficients). This does not allow taking into account the “individual energy” of each decomposition coefficient for its more optimal processing. Therefore, we propose its own filtering factor for each coefficient, built on the basis of the optimal Wiener filtering and where a filtering parameter is introduced to compensate for incomplete a priori information on the value of the processed decomposition coefficients. In order to select a filtering parameter, a statistical approach has been proposed that makes it possible to estimate the optimal value of this parameter with acceptable accuracy. The performed computational experiment has shown the developed algorithm effectiveness for wavelet filtering of images.
{"title":"А locally adaptive wavelet filtering algorithm for images","authors":"Yuri E. Voskoboinikov","doi":"10.17212/2782-2001-2023-1-25-36","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-25-36","url":null,"abstract":"The algorithms based on the decomposition of a noisy image in an orthogonal basis of wavelet functions have been widely used to filter images (especially contrasting ones) over the past four decades. In this case, most wavelet filtering algorithms are of a threshold nature, namely: the decomposition coefficient smaller in an absolute value of a certain threshold value is reset to zero; otherwise the coefficient undergoes some (most often nonlinear) transformation. A certain (and very significant) drawback of threshold algorithms is that all coefficients of a certain decomposition level are processed with one identical threshold value (i.e., a constant value for all de-composition coefficients). This does not allow taking into account the “individual energy” of each decomposition coefficient for its more optimal processing. Therefore, we propose its own filtering factor for each coefficient, built on the basis of the optimal Wiener filtering and where a filtering parameter is introduced to compensate for incomplete a priori information on the value of the processed decomposition coefficients. In order to select a filtering parameter, a statistical approach has been proposed that makes it possible to estimate the optimal value of this parameter with acceptable accuracy. The performed computational experiment has shown the developed algorithm effectiveness for wavelet filtering of images.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-91-100
V. S. Soldatkin, V. Tuev, Artem Yu. Khomyakov
Modern LED light sources make it possible to create the necessary values of photosynthetic irradiance both for growing seedlings and for growing vegetable crops in greenhouse conditions. It is LED light sources that in the near future will replace sodium lamps, which are used in most greenhouses, The area of these greenhouses in the Russian Federation is more than three thousand hectares, with electricity consumption for lighting one hectare of the greenhouse being at least 1 MW per hour. The paper presents the results of experimental studies of the photonic characteristics of LED lamps. Lighting characteristics of LED lamps were measured; light values were recalculated into energy values in accordance with GOST R 58461-2019. Research tests of LED lamps were carried under normal climatic conditions for 10,000 hours, with an intermediate test running time of 5,000 hours. It was found that the arithmetic mean value of photosynthetic irradiance decreased by 1.9 times. In the process of operation, a spectral component in the blue region of the optical spectrum grows from 0.35 to 0.6 relative units, while the spectral component in the yellow-red region of the optical spectrum decreases with time of operation. The decrease in photosynthetic irradiance is caused with the degradation of the phosphor composition over time. The results of these studies can be used by developers of LED light sources in order to improve the preservation of photonic characteristics over time, and in particular, to improve the phosphor composition that provides photosynthetic irradiation of the light source over time.
现代LED光源可以为种植幼苗和在温室条件下种植蔬菜作物创造必要的光合辐照度值。在不久的将来,LED光源将取代大多数温室中使用的钠灯,俄罗斯联邦这些温室的面积超过三千公顷,每公顷温室的照明用电量至少为每小时1兆瓦。本文介绍了LED灯的光子特性的实验研究结果。测量了LED灯具的照明特性;根据GOST R 58461-2019将光值重新计算为能量值。在正常气候条件下对LED灯具进行了10000小时的研究试验,中间试验运行时间为5000小时。结果表明,光合辐照度的算术平均值下降了1.9倍。在运行过程中,光谱蓝色区域的光谱分量从0.35相对单位增加到0.6相对单位,而光谱黄红色区域的光谱分量随着运行时间的增加而减少。光合作用辐照度的下降是由于荧光粉成分随时间的降解而引起的。这些研究的结果可以被LED光源的开发人员使用,以改善光子特性随时间的保存,特别是改善荧光粉成分,提供光源随时间的光合照射。
{"title":"Evaluation of the change in photosynthetic active radiation of the LED light source depending on the operating time","authors":"V. S. Soldatkin, V. Tuev, Artem Yu. Khomyakov","doi":"10.17212/2782-2001-2023-1-91-100","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-91-100","url":null,"abstract":"Modern LED light sources make it possible to create the necessary values of photosynthetic irradiance both for growing seedlings and for growing vegetable crops in greenhouse conditions. It is LED light sources that in the near future will replace sodium lamps, which are used in most greenhouses, The area of these greenhouses in the Russian Federation is more than three thousand hectares, with electricity consumption for lighting one hectare of the greenhouse being at least 1 MW per hour. The paper presents the results of experimental studies of the photonic characteristics of LED lamps. Lighting characteristics of LED lamps were measured; light values were recalculated into energy values in accordance with GOST R 58461-2019. Research tests of LED lamps were carried under normal climatic conditions for 10,000 hours, with an intermediate test running time of 5,000 hours. It was found that the arithmetic mean value of photosynthetic irradiance decreased by 1.9 times. In the process of operation, a spectral component in the blue region of the optical spectrum grows from 0.35 to 0.6 relative units, while the spectral component in the yellow-red region of the optical spectrum decreases with time of operation. The decrease in photosynthetic irradiance is caused with the degradation of the phosphor composition over time. The results of these studies can be used by developers of LED light sources in order to improve the preservation of photonic characteristics over time, and in particular, to improve the phosphor composition that provides photosynthetic irradiation of the light source over time.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-37-54
The purpose of the work is to systematize the available knowledge about information security models presented in standards and scientific research to solve the problem of labor intensity: analysis and selection of an information security model relevant to the information infrastructure of the enterprise; and assessment of the current level of information security of the enterprise. When in identifying and analyzing the information security models used, standards, regulatory legal acts and scientific research in the field of information security are considered within the framework of this work. The systematization of knowledge about information security models was carried out with the help of analysis of standards, scientific research, normative legal acts on information security; identifying common properties of information security models; grouping criteria and evidence confirming the implementation of information security measures by common signs; identifying ways to automate the assessment of the current level of information security. In the course of the work: the main criteria of the information security model were identified; a list of certificates was formed that allow monitoring the implementation of information security measures; common features of criteria, certificates sufficient for grouping were revealed; types of certificates were identified; an algorithm for assessing the current level of information security of an enterprise was formed; methods of automatization of collecting information about models of information security used by an enterprise and evidence of the implementation of information security measures were identified . This work systematizes knowledge about the existing models and allows analyzing the criteria of information security without a need to study all the standards and scientific papers considered in this work, which reduces the labor intensity of the analysis and selection of an information security model relevant to the information infrastructure of an enterprise. The results of this work will be applied to identify the possibility of automating the assessment of the current level of information security of an enterprise.
{"title":"Analysis of information security standards","authors":"","doi":"10.17212/2782-2001-2023-1-37-54","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-37-54","url":null,"abstract":"The purpose of the work is to systematize the available knowledge about information security models presented in standards and scientific research to solve the problem of labor intensity: analysis and selection of an information security model relevant to the information infrastructure of the enterprise; and assessment of the current level of information security of the enterprise. When in identifying and analyzing the information security models used, standards, regulatory legal acts and scientific research in the field of information security are considered within the framework of this work. The systematization of knowledge about information security models was carried out with the help of analysis of standards, scientific research, normative legal acts on information security; identifying common properties of information security models; grouping criteria and evidence confirming the implementation of information security measures by common signs; identifying ways to automate the assessment of the current level of information security. In the course of the work: the main criteria of the information security model were identified; a list of certificates was formed that allow monitoring the implementation of information security measures; common features of criteria, certificates sufficient for grouping were revealed; types of certificates were identified; an algorithm for assessing the current level of information security of an enterprise was formed; methods of automatization of collecting information about models of information security used by an enterprise and evidence of the implementation of information security measures were identified . This work systematizes knowledge about the existing models and allows analyzing the criteria of information security without a need to study all the standards and scientific papers considered in this work, which reduces the labor intensity of the analysis and selection of an information security model relevant to the information infrastructure of an enterprise. The results of this work will be applied to identify the possibility of automating the assessment of the current level of information security of an enterprise.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-29DOI: 10.17212/2782-2001-2023-1-101-113
Andrey S. Streltsov, G. Frantsuzova, Evgeniy A. Basinya
A system for collecting, processing, analyzing, and identifying correlation of events of the enterprise information infrastructure known as SIEM, is proposed for consideration. With the development of corporate information systems, the number of threats related to the violation of accessibility, integrity, and confidentiality in them has increased tenfold. Ensuring information security is a complex task of responding, investigating, and eliminating the consequences of information security incidents (IS). The paper proposes a formalized description of the data that the proposed system uses. In addition, the general architecture and algorithm of functioning are highlighted. Special attention is paid to a detailed description of one of the main parts of the system (data collection agents). The information collection subsystem is characterized by the type of information collected: data on the operation of the application, host, and network or on inter-network interactions. A subsystem of this class accumulates heterogeneous data on a system or network to further analyze them for signs of computer attacks. To collect data, special modules -sensors and agents -are used, Tthe former are usually used to monitor network activity, and the latter are used to monitor and analyze actions in a particular system. The practical application of the improved model is possible both in the framework of research work and in automated information security control systems. The results obtained will be used in the further design of a complex system of continuous monitoring of the enterprise infrastructure. It is planned to consider the data storage subsystem. Subsequent work on the topic will allow us to specify the architecture and algorithm of functioning.
{"title":"Development of a system for collecting, processing, analyzing, identifying and correlating events in the information infrastructure of the enterprise","authors":"Andrey S. Streltsov, G. Frantsuzova, Evgeniy A. Basinya","doi":"10.17212/2782-2001-2023-1-101-113","DOIUrl":"https://doi.org/10.17212/2782-2001-2023-1-101-113","url":null,"abstract":"A system for collecting, processing, analyzing, and identifying correlation of events of the enterprise information infrastructure known as SIEM, is proposed for consideration. With the development of corporate information systems, the number of threats related to the violation of accessibility, integrity, and confidentiality in them has increased tenfold. Ensuring information security is a complex task of responding, investigating, and eliminating the consequences of information security incidents (IS). The paper proposes a formalized description of the data that the proposed system uses. In addition, the general architecture and algorithm of functioning are highlighted. Special attention is paid to a detailed description of one of the main parts of the system (data collection agents). The information collection subsystem is characterized by the type of information collected: data on the operation of the application, host, and network or on inter-network interactions. A subsystem of this class accumulates heterogeneous data on a system or network to further analyze them for signs of computer attacks. To collect data, special modules -sensors and agents -are used, Tthe former are usually used to monitor network activity, and the latter are used to monitor and analyze actions in a particular system. The practical application of the improved model is possible both in the framework of research work and in automated information security control systems. The results obtained will be used in the further design of a complex system of continuous monitoring of the enterprise infrastructure. It is planned to consider the data storage subsystem. Subsequent work on the topic will allow us to specify the architecture and algorithm of functioning.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}