首页 > 最新文献

Analysis and data processing systems最新文献

英文 中文
A method of searching and marking artifacts in images applying detection and segmentation algorithms 一种应用检测和分割算法在图像中搜索和标记伪影的方法
Pub Date : 2021-12-27 DOI: 10.17212/2782-2001-2021-4-7-18
Andrey Kitenko
The paper explores the possibility of using neural networks to single out target artifacts on different types of documents. Numerous types of neural networks are often used for document processing, from text analysis to the allocation of certain areas where the desired information may be contained. However, to date, there are no perfect document processing systems that can work autonomously, compensating for human errors that may appear in the process of work due to stress, fatigue and many other reasons. In this work, the emphasis is on the search and selection of target artifacts in drawings, in conditions of a small amount of initial data. The proposed method of searching and highlighting artifacts in the image consists of two main parts, detection and semantic segmentation of the detected area. The method is based on training with a teacher on marked-up data for two convolutional neural networks. The first convolutional network is used to detect an area with an artifact, in this example YoloV4 was taken as the basis. For semantic segmentation, the U-Net architecture is used, where the basis is the pre-trained Efficientnetb0. By combining these neural networks, good results were achieved, even for the selection of certain handwritten texts, without using the specifics of building neural network models for text recognition. This method can be used to search for and highlight artifacts in large datasets, while the artifacts themselves may be different in shape, color and type, and they may be located in different places of the image, have or not have intersection with other objects.
本文探讨了使用神经网络在不同类型的文档中挑出目标工件的可能性。许多类型的神经网络通常用于文档处理,从文本分析到可能包含所需信息的特定区域的分配。然而,到目前为止,还没有完美的文档处理系统可以自主工作,补偿由于压力、疲劳和许多其他原因可能在工作过程中出现的人为错误。在这项工作中,重点是在初始数据较少的情况下,在图纸中搜索和选择目标工件。本文提出的图像中伪影的搜索和突出显示方法主要包括检测和检测区域的语义分割两个部分。该方法是基于一个老师对两个卷积神经网络的标记数据的训练。第一个卷积网络用于检测带有伪影的区域,本例中以YoloV4为基础。对于语义分割,使用U-Net架构,其基础是预训练的efficientnet0。通过结合这些神经网络,即使对于某些手写文本的选择,也取得了良好的结果,而无需使用构建文本识别神经网络模型的细节。该方法可用于在大型数据集中搜索和突出显示伪影,而伪影本身的形状、颜色和类型可能不同,它们可能位于图像的不同位置,可能与其他对象有或没有交集。
{"title":"A method of searching and marking artifacts in images applying detection and segmentation algorithms","authors":"Andrey Kitenko","doi":"10.17212/2782-2001-2021-4-7-18","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-4-7-18","url":null,"abstract":"The paper explores the possibility of using neural networks to single out target artifacts on different types of documents. Numerous types of neural networks are often used for document processing, from text analysis to the allocation of certain areas where the desired information may be contained. However, to date, there are no perfect document processing systems that can work autonomously, compensating for human errors that may appear in the process of work due to stress, fatigue and many other reasons. In this work, the emphasis is on the search and selection of target artifacts in drawings, in conditions of a small amount of initial data. The proposed method of searching and highlighting artifacts in the image consists of two main parts, detection and semantic segmentation of the detected area. The method is based on training with a teacher on marked-up data for two convolutional neural networks. The first convolutional network is used to detect an area with an artifact, in this example YoloV4 was taken as the basis. For semantic segmentation, the U-Net architecture is used, where the basis is the pre-trained Efficientnetb0. By combining these neural networks, good results were achieved, even for the selection of certain handwritten texts, without using the specifics of building neural network models for text recognition. This method can be used to search for and highlight artifacts in large datasets, while the artifacts themselves may be different in shape, color and type, and they may be located in different places of the image, have or not have intersection with other objects.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A computational scheme for calculating the temperature field when oil production problems 采油问题时温度场的计算方案
Pub Date : 2021-12-27 DOI: 10.17212/2782-2001-2021-4-37-48
Anastasia S. Ovchinnikova
The paper presents an approach to coupled modeling of hydrodynamic and thermal processes occurring in the oil reservoir during field development using thermal methods of enhanced oil recovery. To simulate the processes of non-isothermal multiphase flow, an approach based on implicit calculation of pressure using the finite element method and an explicit calculation of phase saturations is used. A computational scheme for calculating the temperature field is considered. This scheme makes it possible to take into account both heat transfer between phases and heat transfer of a fluid mixture and matrix-rock. In order to take into account the effect of thermal conductivity, a coefficient characterizing the rate of heat transfer between the fluid mixture and the rock is used. The proposed scheme also takes into account the effect of the temperature field on the phases flow in the field reservoir and provides for the possibility of heat sources and sinks occured due to chemical reactions or thermodynamic processes in gaseous phases. Numerical experiments were carried out on a model of a real oil field obtained as a result of history matching of well data. The model contains a large number of wells and is characterized by a high heterogeneity of the porous medium. The applicability of the considered computational scheme is demonstrated on the example of modeling hot water injection into wells crossing a formation with super-viscous oil. The efficiency of thermal methods for the development of super-viscous oil fields is shown. When hot water was injected into the reservoir, the increase in oil production was about 25 % due to a significant decrease in oil viscosity. The time spent for calculating the temperature field while simulating a multiphase flow did not exceed 6 % of the total computational time.
本文提出了一种利用提高采收率的热方法对油田开发过程中发生在油藏中的水动力和热过程进行耦合建模的方法。为了模拟非等温多相流过程,采用了基于有限元法隐式计算压力和显式计算相饱和度的方法。考虑了一种计算温度场的计算格式。该方案可以同时考虑相间传热和流体混合物与基质-岩石的传热。为了考虑热导率的影响,使用了表征流体混合物与岩石之间传热速率的系数。所提出的方案还考虑了温度场对现场储层中相流的影响,并考虑了由于化学反应或气相热力学过程而产生的热源和汇的可能性。通过对井资料进行历史拟合得到的实际油田模型进行了数值实验。该模型包含大量井,并且具有多孔介质高度非均质性的特点。通过对超粘稠油地层的热水注入井进行模拟,验证了该计算方案的适用性。证明了热法开发超粘油田的有效性。当向储层注入热水时,由于原油粘度显著降低,原油产量增加了约25%。在模拟多相流时,计算温度场的时间不超过总计算时间的6%。
{"title":"A computational scheme for calculating the temperature field when oil production problems","authors":"Anastasia S. Ovchinnikova","doi":"10.17212/2782-2001-2021-4-37-48","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-4-37-48","url":null,"abstract":"The paper presents an approach to coupled modeling of hydrodynamic and thermal processes occurring in the oil reservoir during field development using thermal methods of enhanced oil recovery. To simulate the processes of non-isothermal multiphase flow, an approach based on implicit calculation of pressure using the finite element method and an explicit calculation of phase saturations is used. A computational scheme for calculating the temperature field is considered. This scheme makes it possible to take into account both heat transfer between phases and heat transfer of a fluid mixture and matrix-rock. In order to take into account the effect of thermal conductivity, a coefficient characterizing the rate of heat transfer between the fluid mixture and the rock is used. The proposed scheme also takes into account the effect of the temperature field on the phases flow in the field reservoir and provides for the possibility of heat sources and sinks occured due to chemical reactions or thermodynamic processes in gaseous phases. Numerical experiments were carried out on a model of a real oil field obtained as a result of history matching of well data. The model contains a large number of wells and is characterized by a high heterogeneity of the porous medium. The applicability of the considered computational scheme is demonstrated on the example of modeling hot water injection into wells crossing a formation with super-viscous oil. The efficiency of thermal methods for the development of super-viscous oil fields is shown. When hot water was injected into the reservoir, the increase in oil production was about 25 % due to a significant decrease in oil viscosity. The time spent for calculating the temperature field while simulating a multiphase flow did not exceed 6 % of the total computational time.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information processing using the Kalman filter in Matlab Simulink 在Matlab Simulink中利用卡尔曼滤波进行信息处理
Pub Date : 2021-12-27 DOI: 10.17212/2782-2001-2021-4-49-62
V. Telezhkin, Bekhruz B. Saidov
In this paper, we investigate the problem of improving data quality using the Kalman filter in Matlab Simulink. Recently, this filter has become one of the most common algorithms for filtering and processing data in the implementation of control systems (including automated control systems) and the creation of software systems for digital filtering from noise and interference, for example, speech signals. It is also widely used in many fields of science and technology. Due to its simplicity and efficiency, it can be found in GPS receivers, in devices for processing sensor readings for various purposes, etc. It is known that one of the important tasks that should be solved in systems for processing sensor readings is the ability to detect and filter noise. Sensor noise leads to unstable measurement data. This, of course, ultimately leads to a decrease in the accuracy and performance of the control device. One of the methods that can be used to solve the problem of optimal filtering is the development of cybernetic algorithms based on the Kalman and Wiener filters. The filtering process can be carried out in two forms, namely: hardware and software algorithms. Hardware filtering can be built electronically. However, it is less efficient as it requires additional circuitry in the system. To overcome this obstacle, you can use filtering in the form of programming algorithms in a single method. In addition to the fact that it does not require electronic hardware circuitry, the filtering performed is even more accurate because it uses a computational process. The paper analyzes the results of applying the Kalman filter to eliminate errors when measuring the coordinates of the tracked target, to obtain a "smoothed" trajectory and shows the results of the filter development process when processing an electrocardiogram. The development of the Kalman filter algorithm is based on the procedure of recursive assessment of the measured state of the research object.
本文研究了在Matlab Simulink中利用卡尔曼滤波提高数据质量的问题。最近,该滤波器已成为控制系统(包括自动控制系统)实施中滤波和处理数据以及创建用于从噪声和干扰(例如语音信号)中进行数字滤波的软件系统中最常用的算法之一。它也被广泛应用于许多科学和技术领域。由于它的简单和高效,它可以在GPS接收器中找到,在处理各种用途的传感器读数的设备中,等等。众所周知,在处理传感器读数的系统中,应该解决的重要任务之一是检测和过滤噪声的能力。传感器噪声导致测量数据不稳定。当然,这最终会导致控制装置的精度和性能下降。可用于解决最优滤波问题的方法之一是基于卡尔曼和维纳滤波器的控制论算法的发展。滤波过程可以通过两种形式进行,即:硬件算法和软件算法。硬件滤波可以通过电子方式构建。然而,它的效率较低,因为它需要在系统中额外的电路。为了克服这个障碍,您可以在单个方法中以编程算法的形式使用过滤。除了它不需要电子硬件电路这一事实外,执行的滤波甚至更精确,因为它使用了计算过程。分析了在测量被跟踪目标坐标时应用卡尔曼滤波消除误差,得到“平滑”轨迹的结果,并展示了在处理心电图时应用卡尔曼滤波开发过程的结果。卡尔曼滤波算法的发展是基于对研究对象的测量状态进行递归评估的过程。
{"title":"Information processing using the Kalman filter in Matlab Simulink","authors":"V. Telezhkin, Bekhruz B. Saidov","doi":"10.17212/2782-2001-2021-4-49-62","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-4-49-62","url":null,"abstract":"In this paper, we investigate the problem of improving data quality using the Kalman filter in Matlab Simulink. Recently, this filter has become one of the most common algorithms for filtering and processing data in the implementation of control systems (including automated control systems) and the creation of software systems for digital filtering from noise and interference, for example, speech signals. It is also widely used in many fields of science and technology. Due to its simplicity and efficiency, it can be found in GPS receivers, in devices for processing sensor readings for various purposes, etc. It is known that one of the important tasks that should be solved in systems for processing sensor readings is the ability to detect and filter noise. Sensor noise leads to unstable measurement data. This, of course, ultimately leads to a decrease in the accuracy and performance of the control device. One of the methods that can be used to solve the problem of optimal filtering is the development of cybernetic algorithms based on the Kalman and Wiener filters. The filtering process can be carried out in two forms, namely: hardware and software algorithms. Hardware filtering can be built electronically. However, it is less efficient as it requires additional circuitry in the system. To overcome this obstacle, you can use filtering in the form of programming algorithms in a single method. In addition to the fact that it does not require electronic hardware circuitry, the filtering performed is even more accurate because it uses a computational process. The paper analyzes the results of applying the Kalman filter to eliminate errors when measuring the coordinates of the tracked target, to obtain a \"smoothed\" trajectory and shows the results of the filter development process when processing an electrocardiogram. The development of the Kalman filter algorithm is based on the procedure of recursive assessment of the measured state of the research object.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121552415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wavelet introscopy of human organism bionets 人体生物网的小波内窥镜
Pub Date : 2021-12-27 DOI: 10.17212/2782-2001-2021-4-63-72
G. Aldonin, V. V. Cherepanov
In domestic and foreign practice, a great deal of experience has been accumulated in the creation of means for monitoring the functional state of the human body. The existing complexes mainly analyze the electrocardiogram, blood pressure and a number of other physiological parameters. Diagnostics is often based on formal statistical data which are not always correct due to the nonstationarity of bioprocesses and without taking into account their physical nature. An urgent task of monitoring the state of the cardiovascular system is the creation of effective algorithms for computer technologies to process biosignals based on nonlinear dynamic models of body systems since biosystems and bioprocesses have a nonlinear nature and fractal structure. The nervous and muscular systems of the heart, the vascular and bronchial systems of the human body are examples of such structures. The connection of body systems with their organization in the form of self-similar fractal structures with scaling close to the “golden ratio” makes it possible to diagnose them topically. It is possible to obtain detailed information about the state of the human body’s bio-networks for topical diagnostics on the basis of the wavelet analysis of biosignals (the so-called wavelet-introscopy). With the help of wavelet transform, it is possible to reveal the structure of biosystems and bioprocesses, as a picture of the lines of local extrema of wavelet diagrams of biosignals. Mathematical models and software for wavelet introscopy make it possible to extract additional information from biosignals about the state of biosystems. Early detection of latent forms of diseases using wavelet introscopy can shorten the cure time and reduce the consequences of disorders of the functional state of the body (FSO), and reduce the risk of disability. Taking into account the factors of organizing the body’s biosystems in the form of self-similar fractal structures with a scaling close to the “golden ratio” makes it possible to create a technique for topical diagnostics of the most important biosystems of the human body.
在国内外的实践中,在创造人体功能状态监测手段方面积累了大量的经验。现有的复合体主要分析心电图、血压和其他一些生理参数。诊断通常基于正式的统计数据,由于生物过程的非平稳性和没有考虑其物理性质,这些数据并不总是正确的。由于生物系统和生物过程具有非线性性质和分形结构,因此监测心血管系统状态的一项紧迫任务是创建有效的计算机技术算法来处理基于身体系统非线性动态模型的生物信号。心脏的神经和肌肉系统,人体的血管和支气管系统都是这种结构的例子。人体系统与其组织以自相似分形结构的形式联系在一起,其尺度接近“黄金比例”,这使得局部诊断成为可能。在生物信号的小波分析(所谓的小波内窥镜)的基础上,可以获得关于人体生物网络状态的详细信息,用于局部诊断。小波变换可以作为生物信号小波图的局部极值线的图像来揭示生物系统和生物过程的结构。小波内窥镜的数学模型和软件使从生物信号中提取有关生物系统状态的附加信息成为可能。利用小波内窥镜对疾病的潜伏形式进行早期检测,可以缩短治疗时间,减少机体功能状态(FSO)紊乱的后果,降低致残的风险。考虑到以自相似分形结构的形式组织人体生物系统的因素,其尺度接近“黄金比例”,这使得创造一种对人体最重要的生物系统进行局部诊断的技术成为可能。
{"title":"Wavelet introscopy of human organism bionets","authors":"G. Aldonin, V. V. Cherepanov","doi":"10.17212/2782-2001-2021-4-63-72","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-4-63-72","url":null,"abstract":"In domestic and foreign practice, a great deal of experience has been accumulated in the creation of means for monitoring the functional state of the human body. The existing complexes mainly analyze the electrocardiogram, blood pressure and a number of other physiological parameters. Diagnostics is often based on formal statistical data which are not always correct due to the nonstationarity of bioprocesses and without taking into account their physical nature. An urgent task of monitoring the state of the cardiovascular system is the creation of effective algorithms for computer technologies to process biosignals based on nonlinear dynamic models of body systems since biosystems and bioprocesses have a nonlinear nature and fractal structure. The nervous and muscular systems of the heart, the vascular and bronchial systems of the human body are examples of such structures. The connection of body systems with their organization in the form of self-similar fractal structures with scaling close to the “golden ratio” makes it possible to diagnose them topically. It is possible to obtain detailed information about the state of the human body’s bio-networks for topical diagnostics on the basis of the wavelet analysis of biosignals (the so-called wavelet-introscopy). With the help of wavelet transform, it is possible to reveal the structure of biosystems and bioprocesses, as a picture of the lines of local extrema of wavelet diagrams of biosignals. Mathematical models and software for wavelet introscopy make it possible to extract additional information from biosignals about the state of biosystems. Early detection of latent forms of diseases using wavelet introscopy can shorten the cure time and reduce the consequences of disorders of the functional state of the body (FSO), and reduce the risk of disability. Taking into account the factors of organizing the body’s biosystems in the form of self-similar fractal structures with a scaling close to the “golden ratio” makes it possible to create a technique for topical diagnostics of the most important biosystems of the human body.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk-based approach to solving the problem of airline schedule operational management 基于风险的航空公司航班调度管理方法研究
Pub Date : 2021-12-27 DOI: 10.17212/2782-2001-2021-4-19-36
Yulia L. Korotkova, Y. A. Mesentsev
The paper discusses the problem of optimal regulation of aircraft assignments for airline flights. Due to the fact that the activities of the airline are subject to changes caused by both external and internal environment, the planned schedule needs continuous management and control. In the event when the actual flight schedule deviates from the planned one, it is necessary to promptly make a decision on adjusting (restoring) the schedule and reassigning aircraft. Operational schedule management involves making adjustments to the current schedule from a depth of several hours to several days. The solution to the problem is to determine the unambiguous correspondence of flights and specific aircraft subject to maximizing the likelihood of meeting production targets and observing a number of restrictions. The task of managing airline schedules belongs to the class of scheduling optimization problems for parallel-sequential systems studied within the scheduling theory. It is NP-hard and requires the development of computationally efficient solution algorithms. However, the issue of choosing criteria for the optimization problem deserves special attention, since the correct choice plays an essential role in terms of assessing the effectiveness of decision-making. In the theory of decision-making, no general method for choosing the optimality criteria has been found. The definition of the target criterion depends on the expectations of the production. Within the framework of this paper, an original criterion is proposed for constructing an optimal solution to the discrete problem of managing aircraft assignments, the main idea of which is to find a balance between the duration of the schedule and the number of flights with a negative deviation from the planned schedule by assessing the level of punctuality violation risk. The paper gives a detailed concept of punctuality, describes an approach to assessing the level of risk, and also proposes an original formal formulation of the task of operational management of aircraft assignments based on the criterion of minimizing the risk of violation of flight punctuality.
本文讨论了航空公司航班最优调度问题。由于航空公司的活动受到外部和内部环境的变化,计划的时间表需要持续的管理和控制。当实际飞行计划与计划飞行计划发生偏差时,应及时作出调整(恢复)飞行计划和重新分配飞机的决定。操作进度管理包括对当前进度进行调整,从几个小时到几天不等。该问题的解决方案是确定航班和特定飞机的明确对应关系,以最大限度地满足生产目标的可能性并遵守一些限制。航空公司航班调度问题属于调度理论研究的并行顺序系统的调度优化问题。它是np困难的,需要开发计算效率高的求解算法。然而,优化问题的选择准则问题值得特别关注,因为正确的选择对于评估决策的有效性起着至关重要的作用。在决策理论中,没有找到选择最优准则的通用方法。目标标准的定义取决于产品的期望。在本文的框架内,提出了构建离散型飞机分配管理问题最优解的原始准则,其主要思想是通过评估航班违点风险的程度,在航班计划的持续时间和偏离计划的航班数量之间找到一个平衡点。本文详细介绍了准点的概念,描述了一种评估风险等级的方法,并提出了一种基于航班准点违规风险最小化准则的飞机调度运行管理任务的原始形式化表述。
{"title":"A risk-based approach to solving the problem of airline schedule operational management","authors":"Yulia L. Korotkova, Y. A. Mesentsev","doi":"10.17212/2782-2001-2021-4-19-36","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-4-19-36","url":null,"abstract":"The paper discusses the problem of optimal regulation of aircraft assignments for airline flights. Due to the fact that the activities of the airline are subject to changes caused by both external and internal environment, the planned schedule needs continuous management and control. In the event when the actual flight schedule deviates from the planned one, it is necessary to promptly make a decision on adjusting (restoring) the schedule and reassigning aircraft. Operational schedule management involves making adjustments to the current schedule from a depth of several hours to several days. The solution to the problem is to determine the unambiguous correspondence of flights and specific aircraft subject to maximizing the likelihood of meeting production targets and observing a number of restrictions. The task of managing airline schedules belongs to the class of scheduling optimization problems for parallel-sequential systems studied within the scheduling theory. It is NP-hard and requires the development of computationally efficient solution algorithms. However, the issue of choosing criteria for the optimization problem deserves special attention, since the correct choice plays an essential role in terms of assessing the effectiveness of decision-making. In the theory of decision-making, no general method for choosing the optimality criteria has been found. The definition of the target criterion depends on the expectations of the production. Within the framework of this paper, an original criterion is proposed for constructing an optimal solution to the discrete problem of managing aircraft assignments, the main idea of which is to find a balance between the duration of the schedule and the number of flights with a negative deviation from the planned schedule by assessing the level of punctuality violation risk. The paper gives a detailed concept of punctuality, describes an approach to assessing the level of risk, and also proposes an original formal formulation of the task of operational management of aircraft assignments based on the criterion of minimizing the risk of violation of flight punctuality.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Russian and Indian Sign Languages Based on Machine Learning 基于机器学习的俄语和印度手语识别
Pub Date : 2021-09-30 DOI: 10.17212/2782-2001-2021-3-53-74
M. Grif, R. Elakkiya, Alexey L. Prikhodko, M. Bakaev, Rajalakshmi E
In the paper, we consider recognition of sign languages (SL) with a particular focus on Russian and Indian SLs. The proposed recognition system includes five components: configuration, orientation, localization, movement and non-manual markers. The analysis uses methods of recognition of individual gestures and continuous sign speech for Indian and Russian sign languages (RSL). To recognize individual gestures, the RSL Dataset was developed, which includes more than 35,000 files for over 1000 signs. Each sign was performed with 5 repetitions and at least by 5 deaf native speakers of the Russian Sign Language from Siberia. To isolate epenthesis for continuous RSL, 312 sentences with 5 repetitions were selected and recorded on video. Five types of movements were distinguished, namely, "No gesture", "There is a gesture", "Initial movement", "Transitional movement", "Final movement". The markup of sentences for highlighting epenthesis was carried out on the Supervisely.ly platform. A recurrent network architecture (LSTM) was built, implemented using the TensorFlow Keras machine learning library. The accuracy of correct recognition of epenthesis was 95 %. The work on a similar dataset for the recognition of both individual gestures and continuous Indian sign language (ISL) is continuing. To recognize hand gestures, the mediapipe holistic library module was used. It contains a group of trained neural network algorithms that allow obtaining the coordinates of the key points of the body, palms and face of a person in the image. The accuracy of 85 % was achieved for the verification data. In the future, it is necessary to significantly increase the amount of labeled data. To recognize non-manual components, a number of rules have been developed for certain movements in the face. These rules include positions for the eyes, eyelids, mouth, tongue, and head tilt.
本文主要研究了俄语和印度语手语的识别问题。该识别系统包括五个部分:形态、方向、定位、运动和非人工标记。该分析使用了识别印度和俄罗斯手语(RSL)的个体手势和连续手势语言的方法。为了识别单个手势,开发了RSL数据集,其中包括超过1000个手势的35,000多个文件。每个手势重复5次,由至少5名来自西伯利亚的俄罗斯手语聋人母语人士表演。为了分离连续RSL的扩展,我们选择了312个句子,重复5次,并进行了视频记录。分为“无手势”、“有手势”、“起始动作”、“过渡动作”、“结束动作”五种类型。在superely上进行了句子标注,以突出加注。供应平台。构建了一个循环网络架构(LSTM),并使用TensorFlow Keras机器学习库实现。正确识别鼻塞的准确率为95%。对于识别个体手势和连续印度手语(ISL)的类似数据集的工作仍在继续。为了识别手势,使用了mediapipe整体库模块。它包含一组经过训练的神经网络算法,可以获得图像中人的身体、手掌和面部关键点的坐标。验证数据的准确度达到85%。在未来,有必要显著增加标记数据的数量。为了识别非手动成分,已经为面部的某些运动制定了许多规则。这些规则包括眼睛、眼睑、嘴、舌头和头部倾斜的位置。
{"title":"Recognition of Russian and Indian Sign Languages Based on Machine Learning","authors":"M. Grif, R. Elakkiya, Alexey L. Prikhodko, M. Bakaev, Rajalakshmi E","doi":"10.17212/2782-2001-2021-3-53-74","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-3-53-74","url":null,"abstract":"In the paper, we consider recognition of sign languages (SL) with a particular focus on Russian and Indian SLs. The proposed recognition system includes five components: configuration, orientation, localization, movement and non-manual markers. The analysis uses methods of recognition of individual gestures and continuous sign speech for Indian and Russian sign languages (RSL). To recognize individual gestures, the RSL Dataset was developed, which includes more than 35,000 files for over 1000 signs. Each sign was performed with 5 repetitions and at least by 5 deaf native speakers of the Russian Sign Language from Siberia. To isolate epenthesis for continuous RSL, 312 sentences with 5 repetitions were selected and recorded on video. Five types of movements were distinguished, namely, \"No gesture\", \"There is a gesture\", \"Initial movement\", \"Transitional movement\", \"Final movement\". The markup of sentences for highlighting epenthesis was carried out on the Supervisely.ly platform. A recurrent network architecture (LSTM) was built, implemented using the TensorFlow Keras machine learning library. The accuracy of correct recognition of epenthesis was 95 %. The work on a similar dataset for the recognition of both individual gestures and continuous Indian sign language (ISL) is continuing. To recognize hand gestures, the mediapipe holistic library module was used. It contains a group of trained neural network algorithms that allow obtaining the coordinates of the key points of the body, palms and face of a person in the image. The accuracy of 85 % was achieved for the verification data. In the future, it is necessary to significantly increase the amount of labeled data. To recognize non-manual components, a number of rules have been developed for certain movements in the face. These rules include positions for the eyes, eyelids, mouth, tongue, and head tilt.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technology of key feature identification in malware API calls sequences 恶意软件API调用序列关键特征识别技术
Pub Date : 2021-09-30 DOI: 10.17212/2782-2001-2021-3-37-52
V. Voronin, A. Morozov
Today, almost everyone is faced with computer security problems in one or another way. Antivirus programs are used to control threats to the security of malicious software. Conventional methods for detecting malware are no longer effective enough; nowadays, neural networks and behavioral analysis technology have begun to be used for these purposes. Analyzing the behavior of programs is a difficult task, since there is no clear sequence of actions to accurately identify a program as malicious. In addition, such programs use measures to resist such detection, for example, noise masking the sequence of their work with meaningless actions. There is also the problem of uniquely identifying the class of malware due to the fact that malware can use similar methods, while being assigned to different classes. In this paper, it is proposed to use NLP methods, such as word embedding, and LDA in relation to the problems of analyzing malware API calls sequences in order to reveal the presence of semantic dependencies and assess the effectiveness of the application of these methods. The results obtained indicate the possibility of identifying the key features of malware behavior, which in the future will significantly improve the technology for detecting and identifying such programs.
今天,几乎每个人都面临着这样或那样的计算机安全问题。防病毒程序用于控制恶意软件对安全的威胁。检测恶意软件的传统方法不再有效;如今,神经网络和行为分析技术已经开始用于这些目的。分析程序的行为是一项困难的任务,因为没有明确的操作序列来准确地识别程序为恶意程序。此外,这些程序使用一些措施来抵抗这种检测,例如,噪声用无意义的动作掩盖了它们工作的顺序。由于恶意软件可以使用相似的方法,而被分配到不同的类,因此还存在唯一识别恶意软件类别的问题。本文提出使用NLP方法,如词嵌入和LDA来分析恶意软件API调用序列的问题,以揭示语义依赖的存在并评估这些方法应用的有效性。所获得的结果表明,识别恶意软件行为的关键特征是可能的,这将在未来显著提高检测和识别此类程序的技术。
{"title":"Technology of key feature identification in malware API calls sequences","authors":"V. Voronin, A. Morozov","doi":"10.17212/2782-2001-2021-3-37-52","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-3-37-52","url":null,"abstract":"Today, almost everyone is faced with computer security problems in one or another way. Antivirus programs are used to control threats to the security of malicious software. Conventional methods for detecting malware are no longer effective enough; nowadays, neural networks and behavioral analysis technology have begun to be used for these purposes. Analyzing the behavior of programs is a difficult task, since there is no clear sequence of actions to accurately identify a program as malicious. In addition, such programs use measures to resist such detection, for example, noise masking the sequence of their work with meaningless actions. There is also the problem of uniquely identifying the class of malware due to the fact that malware can use similar methods, while being assigned to different classes. In this paper, it is proposed to use NLP methods, such as word embedding, and LDA in relation to the problems of analyzing malware API calls sequences in order to reveal the presence of semantic dependencies and assess the effectiveness of the application of these methods. The results obtained indicate the possibility of identifying the key features of malware behavior, which in the future will significantly improve the technology for detecting and identifying such programs.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of numbers and analysis of overflow in modular arithmetic 模算法中数字的比较与溢出分析
Pub Date : 2021-09-30 DOI: 10.17212/2782-2001-2021-3-75-86
V. Guzhov, I. O. Marchenko, E. Trubilina, Dmitry S. Khaidukov
The method of modular arithmetic consists in operating not with a number, but with its remainders after division by some integers. In the modular number system or the number system in the residual classes, a multi-bit integer in the positional number system is represented as a sequence of several positional numbers. These numbers are the remainders (residues) of dividing the original number into some modules that are mutually prime integers. The advantage of the modular representation is that it is very simple to perform addition, subtraction and multiplication operations. In parallel execution of operations, the use of modular arithmetic can significantly reduce the computation time. However, there are drawbacks to modular representation that limit its use. These include a slow conversion of numbers from modular to positional representation; the complexity of comparing numbers in modular representation; the difficulty in performing the division operation; and the difficulty of determining the presence of an overflow. The use of modular arithmetic is justified if there are fast algorithms for calculating a number from a set of remainders. This article describes a fast algorithm for converting numbers from modular representation to positional representation based on a geometric approach. The review is carried out for the case of a comparison system with two modules. It is also shown that as a result of increasing numbers in positional calculus, they successively change in a spiral on the surface of a two-dimensional torus. Based on this approach, a fast algorithm for comparing numbers and an algorithm for detecting an overflow during addition and multiplication of numbers in modular representation were developed. Consideration for the multidimensional case is possible when analyzing a multidimensional torus and studying the behavior of the turns on its surface.
模算术的方法不是用一个数字来运算,而是用它除以一些整数后的余数来运算。在模数系统或残差类中的数系统中,位置数系统中的多位整数表示为若干位置数的序列。这些数是将原数分成若干互为素数整数的模后的余数(残数)。模块化表示法的优点是执行加法、减法和乘法运算非常简单。在并行执行操作时,使用模块化算法可以显著减少计算时间。然而,模块化表示的缺点限制了它的使用。这些问题包括数字从模块表示到位置表示的缓慢转换;模表示中数字比较的复杂性进行除法运算的难度;以及确定是否存在溢出的困难。如果有从一组余数中计算数字的快速算法,则使用模运算是合理的。本文描述了一种基于几何方法将数字从模表示转换为位置表示的快速算法。对一个有两个模块的比较系统进行了审查。在位置演算中,随着数字的增加,它们在二维环面表面呈螺旋形变化。在此基础上,提出了一种快速的数字比较算法和一种模块化表示中数字加乘溢出检测算法。在分析多维环面并研究其表面上的转弯行为时,可以考虑多维情况。
{"title":"Comparison of numbers and analysis of overflow in modular arithmetic","authors":"V. Guzhov, I. O. Marchenko, E. Trubilina, Dmitry S. Khaidukov","doi":"10.17212/2782-2001-2021-3-75-86","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-3-75-86","url":null,"abstract":"The method of modular arithmetic consists in operating not with a number, but with its remainders after division by some integers. In the modular number system or the number system in the residual classes, a multi-bit integer in the positional number system is represented as a sequence of several positional numbers. These numbers are the remainders (residues) of dividing the original number into some modules that are mutually prime integers. The advantage of the modular representation is that it is very simple to perform addition, subtraction and multiplication operations. In parallel execution of operations, the use of modular arithmetic can significantly reduce the computation time. However, there are drawbacks to modular representation that limit its use. These include a slow conversion of numbers from modular to positional representation; the complexity of comparing numbers in modular representation; the difficulty in performing the division operation; and the difficulty of determining the presence of an overflow. The use of modular arithmetic is justified if there are fast algorithms for calculating a number from a set of remainders. This article describes a fast algorithm for converting numbers from modular representation to positional representation based on a geometric approach. The review is carried out for the case of a comparison system with two modules. It is also shown that as a result of increasing numbers in positional calculus, they successively change in a spiral on the surface of a two-dimensional torus. Based on this approach, a fast algorithm for comparing numbers and an algorithm for detecting an overflow during addition and multiplication of numbers in modular representation were developed. Consideration for the multidimensional case is possible when analyzing a multidimensional torus and studying the behavior of the turns on its surface.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for encryption of cartographic images on the basis of internal reorganization of the digital filter structure 一种基于数字滤波器结构内部重组的地图图像加密方法
Pub Date : 2021-09-30 DOI: 10.17212/2782-2001-2021-3-87-98
I.L. Zhbanov, V. Zhbanova
The paper presents a method for encrypting geo-images based on the reorganization of the internal structure of the filter. Methods for digital image filtering in the MATLAB environment are taken as a basis. The essence of encryption is to control the aliasing of noise and the kernel of smearing. Knowing these values will allow the addressee to recover the transmitted cards with minimal interference, which will be unattainable for the data interceptor. Under conditions of unfavorable factors, conditions sometimes arise that lead to the loss of information content of images and, as a consequence, damage to information. Therefore, the development of methods to minimize their influence is an urgent task of the study. Thus, one of the approaches to the construction of spatial filters with a controlled structure is proposed for the selection of contrasting images in noises of different intensities. The procedure for converting any spatial filter from an initial display to a form that allows you to control its internal state is described. The obtained results of the original and transformed images make it possible to draw conclusions about the possibility of practical application of the proposed invariant spatial filter in the blocks for analyzing the original image. The method can be used to transfer photo, video messages and text information between consumers using data transmission systems for any purpose. Due to the factorial dependence, it is very problematic for information interceptors to find the required resulting position of all image encryption parameters (sizes, type of the distortion function, regularization parameters α and σ) for information interceptors, since the computational costs are not commensurate with the capabilities of modern computers. This can be used to transfer photo, video messages and text information between consumers using data transmission systems for any purpose, especially when transferring cartographic information.
提出了一种基于滤波器内部结构重组的地理图像加密方法。以MATLAB环境下的数字图像滤波方法为基础。加密的本质是控制噪声的混叠和模糊核。知道这些值将允许收件人以最小的干扰恢复传输的卡,这对于数据拦截器来说是无法实现的。在不利因素的条件下,有时会出现导致图像信息内容丢失,从而造成信息损坏的情况。因此,研究如何将它们的影响降到最低是一项紧迫的研究任务。因此,提出了一种构造具有可控结构的空间滤波器的方法,用于在不同强度的噪声中选择对比图像。描述了将任何空间过滤器从初始显示转换为允许您控制其内部状态的形式的过程。通过对原始图像和变换后的图像进行分析,可以得出在块中实际应用所提出的不变空间滤波器对原始图像进行分析的可能性。该方法可用于为任何目的使用数据传输系统在消费者之间传输照片、视频信息和文本信息。由于因子依赖,信息拦截器很难找到信息拦截器所需的所有图像加密参数(大小,失真函数的类型,正则化参数α和σ)的最终位置,因为计算成本与现代计算机的能力不相称。这可以用于为任何目的在使用数据传输系统的消费者之间传输照片、视频信息和文本信息,特别是在传输地图信息时。
{"title":"Method for encryption of cartographic images on the basis of internal reorganization of the digital filter structure","authors":"I.L. Zhbanov, V. Zhbanova","doi":"10.17212/2782-2001-2021-3-87-98","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-3-87-98","url":null,"abstract":"The paper presents a method for encrypting geo-images based on the reorganization of the internal structure of the filter. Methods for digital image filtering in the MATLAB environment are taken as a basis. The essence of encryption is to control the aliasing of noise and the kernel of smearing. Knowing these values will allow the addressee to recover the transmitted cards with minimal interference, which will be unattainable for the data interceptor. Under conditions of unfavorable factors, conditions sometimes arise that lead to the loss of information content of images and, as a consequence, damage to information. Therefore, the development of methods to minimize their influence is an urgent task of the study. Thus, one of the approaches to the construction of spatial filters with a controlled structure is proposed for the selection of contrasting images in noises of different intensities. The procedure for converting any spatial filter from an initial display to a form that allows you to control its internal state is described. The obtained results of the original and transformed images make it possible to draw conclusions about the possibility of practical application of the proposed invariant spatial filter in the blocks for analyzing the original image. The method can be used to transfer photo, video messages and text information between consumers using data transmission systems for any purpose. Due to the factorial dependence, it is very problematic for information interceptors to find the required resulting position of all image encryption parameters (sizes, type of the distortion function, regularization parameters α and σ) for information interceptors, since the computational costs are not commensurate with the capabilities of modern computers. This can be used to transfer photo, video messages and text information between consumers using data transmission systems for any purpose, especially when transferring cartographic information.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent search for accurate solutions to the planning open-pit mining 智能搜索为露天开采规划提供精确的解决方案
Pub Date : 2021-09-30 DOI: 10.17212/2782-2001-2021-3-99-114
A. A. Zuenko, R. Makedonov, Yurii A. Oleynik
A method of intelligent search for accurate solutions to the planning of open-pit mining has been developed. The method is implemented within the framework of the Constraint Programming Paradigm that allows us to process heterogeneous qualitative and quantitative constraints (in particular, economic, technological, etc.) simultaneously, as well as to maintain the model of subject domain being developed which is open to adding new constraints or deleting existing constraints. Various constraints can be added to the model, including those for which it is difficult to find a suitable analytical expression. In contrast to existing methods of local search the proposed method systematically explores the search space. The method allows us to find a global optimum in large dimensional spaces that describe practically significant problems arising in production. Currently, to solve this problem, the methods of integer linear programming are widely used. But its fundamental disadvantage is the need to represent all the constraints in the form of linear equalities and inequalities. However, in practice, some combinatorial optimization problems cannot be linearized and solved using traditional methods of mathematical programming. The developed method is illustrated by the example of a three-dimensional problem of finding the position of an intermediate pit wall by the processing periods taking into account the specified performance for mineral and overburden rocks and the objective profit function taking into account discounting. The types of constraints necessary for modeling the problem under consideration are identified. The possibility of applying the existing inference procedures on constraints is considered for these types. The method proposed makes it possible to obtain accurate solutions due to the intellectualization of the solution process by using highly efficient algorithms of reducing the search space for each type of constraints and specialized heuristics for pruning unpromising alternatives in the search tree.
提出了一种露天矿开采规划精确解的智能搜索方法。该方法在约束编程范式的框架内实现,该框架允许我们同时处理异构的定性和定量约束(特别是经济、技术等),并维护正在开发的主题领域模型,该模型可以开放地添加新的约束或删除现有的约束。可以向模型中添加各种约束,包括那些难以找到合适的解析表达式的约束。与现有的局部搜索方法相比,该方法系统地探索搜索空间。该方法使我们能够在描述生产中出现的实际重大问题的大维度空间中找到全局最优。目前,为了解决这一问题,普遍采用整数线性规划方法。但它的根本缺点是需要用线性等式和不等式的形式来表示所有的约束。然而,在实际应用中,一些组合优化问题不能线性化,不能用传统的数学规划方法求解。通过考虑矿物和覆岩的特定性能和考虑折现的目标利润函数的处理周期确定中间坑壁位置的三维问题的实例说明了所开发的方法。确定了对所考虑的问题进行建模所需的约束类型。考虑了对这些类型的约束应用现有推理过程的可能性。由于求解过程的智能化,该方法使用了高效的算法来减少每种约束的搜索空间,并使用了专门的启发式算法来修剪搜索树中没有希望的备选项,因此可以获得准确的解。
{"title":"Intelligent search for accurate solutions to the planning open-pit mining","authors":"A. A. Zuenko, R. Makedonov, Yurii A. Oleynik","doi":"10.17212/2782-2001-2021-3-99-114","DOIUrl":"https://doi.org/10.17212/2782-2001-2021-3-99-114","url":null,"abstract":"A method of intelligent search for accurate solutions to the planning of open-pit mining has been developed. The method is implemented within the framework of the Constraint Programming Paradigm that allows us to process heterogeneous qualitative and quantitative constraints (in particular, economic, technological, etc.) simultaneously, as well as to maintain the model of subject domain being developed which is open to adding new constraints or deleting existing constraints. Various constraints can be added to the model, including those for which it is difficult to find a suitable analytical expression. In contrast to existing methods of local search the proposed method systematically explores the search space. The method allows us to find a global optimum in large dimensional spaces that describe practically significant problems arising in production. Currently, to solve this problem, the methods of integer linear programming are widely used. But its fundamental disadvantage is the need to represent all the constraints in the form of linear equalities and inequalities. However, in practice, some combinatorial optimization problems cannot be linearized and solved using traditional methods of mathematical programming. The developed method is illustrated by the example of a three-dimensional problem of finding the position of an intermediate pit wall by the processing periods taking into account the specified performance for mineral and overburden rocks and the objective profit function taking into account discounting. The types of constraints necessary for modeling the problem under consideration are identified. The possibility of applying the existing inference procedures on constraints is considered for these types. The method proposed makes it possible to obtain accurate solutions due to the intellectualization of the solution process by using highly efficient algorithms of reducing the search space for each type of constraints and specialized heuristics for pruning unpromising alternatives in the search tree.","PeriodicalId":292298,"journal":{"name":"Analysis and data processing systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Analysis and data processing systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1