Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-4-16
V. N. Rutkovsky, D. V. Kapski
The article analyzes various adaptive control algorithms used in the intelligent system of the largest city – Minsk. An adaptive control algorithm has been developed depending on the dynamically changing load of a local intersection. On the example of one of the intersections, an example of the implementation of this algorithm is given. Recommendations are given for the further application of this algorithm on the street network.
{"title":"Analysis, development and implementation of adaptive algorithms for (flexible) traffic light regulations","authors":"V. N. Rutkovsky, D. V. Kapski","doi":"10.21122/2309-4923-2023-3-4-16","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-4-16","url":null,"abstract":"The article analyzes various adaptive control algorithms used in the intelligent system of the largest city – Minsk. An adaptive control algorithm has been developed depending on the dynamically changing load of a local intersection. On the example of one of the intersections, an example of the implementation of this algorithm is given. Recommendations are given for the further application of this algorithm on the street network.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-40-46
A. G. Miheev, V. D. Bryljov, V. S. Gruzinov, M. V. Savel'ev
In modern higher education, it is required not only to prepare students to perform work on finished tasks in the subject area they have studied. It is also necessary to prepare students for independent activities, in which students do not work on ready-made tasks, but, on the contrary, are looking for niches in business, in which they themselves can offer in the subject area they have mastered, business-demanded solutions. This is another area of activity, which also requires development while studying at a university. It can be defined as "entrepreneurial competencies of a student." In recent years, the direction "Startup as a Diploma" has been developing, in which a university graduate protects not conditional academic work, but a real technological project with business prospects, to which the students developing it have ownership rights. The creation and maintenance of such projects changes the relationship between student and teacher, for this activity it is necessary to change the traditional teaching methodology. As a task of teachers, we decided to do the following: Find a subject area related to IT development, in which, due to recent achievements, there are opportunities for fast, technically not very complex technological solutions available to students, with the help of which you can create popular solutions. The work proposes an open source software development project, within which students can, performing tasks that are feasible for themselves, create software applications that are in demand in practice, as well as develop development strategies for related business projects. The project is dedicated to solving the problem of determining the coordinates of observed objects and phenomena based on data entered simultaneously by several users in different places using household mobile devices without using special technological equipment such as theodolites or tacheometers. The authors developed a mobile application, the value of which lies in the fact that in the public field allows you to realize the monitoring potential of the population interested in preventing unwanted or dangerous events and preventing emergency situations; professional allows you to assess the quality of the navigation signal in conditions of possible targeted interference; in the educational aspect organize training in the methods of joint fixation of objects and target designation on educational geopolygons. Currently, the project is being developed by students of the Department of Data Analysis and Machine Learning of the Financial University under the Government of the Russian Federation and the Moscow State University of Geodesy and Cartography. This paper presents a description of the project, the proposed solution architecture. References to source code repositories are given. The results of the pilot versions of the software are given.
{"title":"Methodology for collective location fixing of observed emergencies by intersection/resection based on mobile telecomunication application with cartographic interface","authors":"A. G. Miheev, V. D. Bryljov, V. S. Gruzinov, M. V. Savel'ev","doi":"10.21122/2309-4923-2023-3-40-46","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-40-46","url":null,"abstract":"In modern higher education, it is required not only to prepare students to perform work on finished tasks in the subject area they have studied. It is also necessary to prepare students for independent activities, in which students do not work on ready-made tasks, but, on the contrary, are looking for niches in business, in which they themselves can offer in the subject area they have mastered, business-demanded solutions. This is another area of activity, which also requires development while studying at a university. It can be defined as \"entrepreneurial competencies of a student.\" In recent years, the direction \"Startup as a Diploma\" has been developing, in which a university graduate protects not conditional academic work, but a real technological project with business prospects, to which the students developing it have ownership rights. The creation and maintenance of such projects changes the relationship between student and teacher, for this activity it is necessary to change the traditional teaching methodology. As a task of teachers, we decided to do the following: Find a subject area related to IT development, in which, due to recent achievements, there are opportunities for fast, technically not very complex technological solutions available to students, with the help of which you can create popular solutions. The work proposes an open source software development project, within which students can, performing tasks that are feasible for themselves, create software applications that are in demand in practice, as well as develop development strategies for related business projects. The project is dedicated to solving the problem of determining the coordinates of observed objects and phenomena based on data entered simultaneously by several users in different places using household mobile devices without using special technological equipment such as theodolites or tacheometers. The authors developed a mobile application, the value of which lies in the fact that in the public field allows you to realize the monitoring potential of the population interested in preventing unwanted or dangerous events and preventing emergency situations; professional allows you to assess the quality of the navigation signal in conditions of possible targeted interference; in the educational aspect organize training in the methods of joint fixation of objects and target designation on educational geopolygons. Currently, the project is being developed by students of the Department of Data Analysis and Machine Learning of the Financial University under the Government of the Russian Federation and the Moscow State University of Geodesy and Cartography. This paper presents a description of the project, the proposed solution architecture. References to source code repositories are given. The results of the pilot versions of the software are given.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-33-38
S. A. Pauliukavets, A. A. Velchenko, A. A. Radkevich
The paper developed a mathematical model of the control system for a mobile tracked robot, which takes into account the kinematic parameters (angular speeds of rotation of the rollers and the center of mass of the robot, the linear speed of the robot and its angle of rotation relative to the normal to the axis) and dynamic parameters (moments of inertia, resistance forces and electromechanical parameters used electric motors), which made it possible to give the most complete mathematical representation of the description of the movement of a caterpillar mobile robot. A control system for mobile robots along a predetermined trajectory is obtained, taking into account position feedback.
{"title":"Mathematical model of the control system of mobile caterpillar robot taking into account kinematic and dynamic parameters","authors":"S. A. Pauliukavets, A. A. Velchenko, A. A. Radkevich","doi":"10.21122/2309-4923-2023-3-33-38","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-33-38","url":null,"abstract":"The paper developed a mathematical model of the control system for a mobile tracked robot, which takes into account the kinematic parameters (angular speeds of rotation of the rollers and the center of mass of the robot, the linear speed of the robot and its angle of rotation relative to the normal to the axis) and dynamic parameters (moments of inertia, resistance forces and electromechanical parameters used electric motors), which made it possible to give the most complete mathematical representation of the description of the movement of a caterpillar mobile robot. A control system for mobile robots along a predetermined trajectory is obtained, taking into account position feedback.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-17-22
A. V. Gulaj, V. A. Gulaj, A. V. Dubovik
This paper shows the results of computer modeling of the processes of excitation and propagation of autowaves in distributed active media with inhomogeneous properties. The study of autowaves by the cellular automata method is based on the Wiener–Rosenbluth model, according to which each element of the active environment can be in one of three states: rest, excitation and refractoriness. The software module "AutoWaveModel" has been developed in C++ using the Qt library and OpenGL technology for modeling dynamic processes of excitation of spiral waves and pacemakers. The heterogeneity of the properties of the active environment in the model under consideration is set, in particular, by introducing into the field (volume) of modeling a certain number of inactive elements distributed according to a random law. It is established that the decay of autowaves occurs when about 30-60% of inactive elements are introduced from their total number in the model, moreover, the wave propagation process becomes more stable with an increase in the decay coefficient of the activator of all elements. As one of the factors creating heterogeneity of the active distributed environment, the change in the decay coefficient of the activator in its volume is also considered. In this case, each cell of the model is assigned a random value of the specified coefficient, lying in a given interval from the minimum to the maximum value. With a significant difference in the values of the activator decay coefficient in near areas of the active environment and a sufficiently high excitation threshold, the wave front is curved due to its acceleration or deceleration. In this case, the destruction of the wave is also observed, which is unable to overcome the area with a reduced decay coefficient of the activator.
{"title":"Modeling of autowave processes in active media with inhomogeneous properties","authors":"A. V. Gulaj, V. A. Gulaj, A. V. Dubovik","doi":"10.21122/2309-4923-2023-3-17-22","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-17-22","url":null,"abstract":"This paper shows the results of computer modeling of the processes of excitation and propagation of autowaves in distributed active media with inhomogeneous properties. The study of autowaves by the cellular automata method is based on the Wiener–Rosenbluth model, according to which each element of the active environment can be in one of three states: rest, excitation and refractoriness. The software module \"AutoWaveModel\" has been developed in C++ using the Qt library and OpenGL technology for modeling dynamic processes of excitation of spiral waves and pacemakers. The heterogeneity of the properties of the active environment in the model under consideration is set, in particular, by introducing into the field (volume) of modeling a certain number of inactive elements distributed according to a random law. It is established that the decay of autowaves occurs when about 30-60% of inactive elements are introduced from their total number in the model, moreover, the wave propagation process becomes more stable with an increase in the decay coefficient of the activator of all elements. As one of the factors creating heterogeneity of the active distributed environment, the change in the decay coefficient of the activator in its volume is also considered. In this case, each cell of the model is assigned a random value of the specified coefficient, lying in a given interval from the minimum to the maximum value. With a significant difference in the values of the activator decay coefficient in near areas of the active environment and a sufficiently high excitation threshold, the wave front is curved due to its acceleration or deceleration. In this case, the destruction of the wave is also observed, which is unable to overcome the area with a reduced decay coefficient of the activator.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-60-64
V. V. Naprasnikov, Zirui Wang, I. L. Kovaleva, S. N. Novikov
One of the possible approaches in the formation of the geometric part of the finite-element model in the process of teaching students is the use of the language IronPython in SpaceClaim environment with the purpose of subsequent modeling on the platform ANSYS WorkBench. The comparative advantages of Design Modeler and SpaceClaim for such a problem are described. An example of using this approach in a real learning process is given.
{"title":"Using SpaceClaim scripts to create training models","authors":"V. V. Naprasnikov, Zirui Wang, I. L. Kovaleva, S. N. Novikov","doi":"10.21122/2309-4923-2023-3-60-64","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-60-64","url":null,"abstract":"One of the possible approaches in the formation of the geometric part of the finite-element model in the process of teaching students is the use of the language IronPython in SpaceClaim environment with the purpose of subsequent modeling on the platform ANSYS WorkBench. The comparative advantages of Design Modeler and SpaceClaim for such a problem are described. An example of using this approach in a real learning process is given.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-24-32
A. A. Ivaniuk, D. O. Mozhejko
This article discusses the issue of studying the parameters of the bounce of electrical contacts of switches in digital systems. Digital circuits of bounce analyzer are described. The results of experimental studies of the behavior of electrical contacts of various buttons and switches are presented. It is shown that various electric switches have random and unique characteristics, which can be used to solve the problems of random numbers generating, identifying of digital devices and user’s authentication. Prototyping of the proposed circuits was carried out on Digilent ZYBO Z7-10 debug boards, digital circuits were designed in VHDL for the Xilinx Zynq-7000 FPGA chip.
{"title":"Digital circuit for switch contact bounce analysis","authors":"A. A. Ivaniuk, D. O. Mozhejko","doi":"10.21122/2309-4923-2023-3-24-32","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-24-32","url":null,"abstract":"This article discusses the issue of studying the parameters of the bounce of electrical contacts of switches in digital systems. Digital circuits of bounce analyzer are described. The results of experimental studies of the behavior of electrical contacts of various buttons and switches are presented. It is shown that various electric switches have random and unique characteristics, which can be used to solve the problems of random numbers generating, identifying of digital devices and user’s authentication. Prototyping of the proposed circuits was carried out on Digilent ZYBO Z7-10 debug boards, digital circuits were designed in VHDL for the Xilinx Zynq-7000 FPGA chip.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-48-54
A. A. Vasilyev
This article presents an analysis of both technical and non-technical factors contributing to the growth in volume and diversity of cyber attacks. Social interaction on the Internet contributes to the increased frequency of cyber attacks and exacerbates destructive consequences that extend beyond technical aspects, impacting societal and personal realms. Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment. Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. The heightened technical proficiency of attackers equips them with new tools for breaching digital security. Concurrently, inadequate awareness and careless user behavior online jeopardize the protection of personal and confidential data. This work demonstrates that cyber risks escalate due to both ongoing technological changes and human actions. Understanding the dynamics of these factors becomes critically important for developing more effective measures to safeguard the digital environment.
{"title":"Reasons for the increase in cyber attacks: analysis of technical and non-technical factors","authors":"A. A. Vasilyev","doi":"10.21122/2309-4923-2023-3-48-54","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-48-54","url":null,"abstract":"This article presents an analysis of both technical and non-technical factors contributing to the growth in volume and diversity of cyber attacks. Social interaction on the Internet contributes to the increased frequency of cyber attacks and exacerbates destructive consequences that extend beyond technical aspects, impacting societal and personal realms. Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment. Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. The heightened technical proficiency of attackers equips them with new tools for breaching digital security. Concurrently, inadequate awareness and careless user behavior online jeopardize the protection of personal and confidential data. This work demonstrates that cyber risks escalate due to both ongoing technological changes and human actions. Understanding the dynamics of these factors becomes critically important for developing more effective measures to safeguard the digital environment.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-09DOI: 10.21122/2309-4923-2023-3-56-59
A. I. Paramonov, I. A. Trukhanovich
In the modern educational context the problem of plagiarism is urgent and requires the development of effective methods of detection and prevention of this phenomenon. The application of authorship identification methods in the field of student plagiarism detection is considered. Different check, detect and analyze plagiarism approaches in various works are investigated. Both classical methods, which include text comparison and similarity search, and modern methods based on machine learning algorithms, as well as their combination and potential modifications, are considered. The advantages and limitations of each method are also discussed, and recommendations are given for choosing one or another approach according to the specific requirements of the research. Special attention is paid to such modern methods as metadata analysis and the application of neural networks. Stylistic analysis reveals authorial peculiarities such as word choice, preferred wording, and even punctuation. Lexical and syntactic models are used to identify repetitive phrases and structures that may indicate plagiarism. Statistical methods can identify anomalies in the use of words and phrases, and machine learning can create models to calculate the probability of plagiarism based on large amounts of data. Ultimately, an comparison of authorship identification techniques in the field of student plagiarism detection is provided, which aims to provide valuable information about different approaches and their applicability, and to help researchers and educators develop effective strategies for detecting and preventing plagiarism in educational environments.
{"title":"Authorship identification methods in student plagiarism detection","authors":"A. I. Paramonov, I. A. Trukhanovich","doi":"10.21122/2309-4923-2023-3-56-59","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-56-59","url":null,"abstract":"In the modern educational context the problem of plagiarism is urgent and requires the development of effective methods of detection and prevention of this phenomenon. The application of authorship identification methods in the field of student plagiarism detection is considered. Different check, detect and analyze plagiarism approaches in various works are investigated. Both classical methods, which include text comparison and similarity search, and modern methods based on machine learning algorithms, as well as their combination and potential modifications, are considered. The advantages and limitations of each method are also discussed, and recommendations are given for choosing one or another approach according to the specific requirements of the research. Special attention is paid to such modern methods as metadata analysis and the application of neural networks. Stylistic analysis reveals authorial peculiarities such as word choice, preferred wording, and even punctuation. Lexical and syntactic models are used to identify repetitive phrases and structures that may indicate plagiarism. Statistical methods can identify anomalies in the use of words and phrases, and machine learning can create models to calculate the probability of plagiarism based on large amounts of data. Ultimately, an comparison of authorship identification techniques in the field of student plagiarism detection is provided, which aims to provide valuable information about different approaches and their applicability, and to help researchers and educators develop effective strategies for detecting and preventing plagiarism in educational environments.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-04DOI: 10.21122/2309-4923-2023-2-13-23
S. S. Dounar, V. K. Jatskevich, A. M. Ausiyevich, D. N. Shvedova, I. Y. Aglushevich
Concept of machine tool’s column in the appearance of vertical bionic console is proposed. Console was 3D-transformed from the shape of legacy oak-like structure – Eddystone lighthouse. It is proposed to create the variable-section column with “layer-by-layer” technics from the polymer concrete. FEA shows high stiffness of the column. It increases from 1500 to 11000 N/μm from top to bottom along vertical guideways. Such stiffness needs only 19.3 ton of concrete for the instance of 4.5 m height’s column. FEMmodelling pointed out rather high eigenmode’s frequencies (˃49 Hz). FRF is appropriate for pre-resonance heavy cutting as for post-resonance finishing. Proposed bionic-shape column is perspective as for stand-alone variant so for portal composition created by two opposite columns.
{"title":"Fea study of effectiveness of bionic legacy-shape console as huge machine tool’s column","authors":"S. S. Dounar, V. K. Jatskevich, A. M. Ausiyevich, D. N. Shvedova, I. Y. Aglushevich","doi":"10.21122/2309-4923-2023-2-13-23","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-13-23","url":null,"abstract":"Concept of machine tool’s column in the appearance of vertical bionic console is proposed. Console was 3D-transformed from the shape of legacy oak-like structure – Eddystone lighthouse. It is proposed to create the variable-section column with “layer-by-layer” technics from the polymer concrete. FEA shows high stiffness of the column. It increases from 1500 to 11000 N/μm from top to bottom along vertical guideways. Such stiffness needs only 19.3 ton of concrete for the instance of 4.5 m height’s column. FEMmodelling pointed out rather high eigenmode’s frequencies (˃49 Hz). FRF is appropriate for pre-resonance heavy cutting as for post-resonance finishing. Proposed bionic-shape column is perspective as for stand-alone variant so for portal composition created by two opposite columns.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135592378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-04DOI: 10.21122/2309-4923-2023-2-49-58
V. V. Starovoitov, U. Akhundjanov
In the paper, a new feature for describing a digital image of a handwritten signature based on the frequency distribution of the values of the local curvature of the signature contours, is proposed. The calculation of this feature on the binary image of a signature is described in detail. A normalized histogram of distributions of local curvature values for 40 bins is formed. The frequency values recorded as a 40-dimensional vector are called the local curvature code of the signature. During verification, the proximity of signature pairs is determined by correlation between curvature codes and LBP codes described by the authors in [23]. To perform the signature verification procedure, a two-dimensional feature space is constructed containing images of the proximity of signature pairs. When verifying a signature with N authentic signatures of the same person, N(N-1)/2 patterns of the proximity of pairs of genuine signatures and N images of pairs of proximity of the analyzed signature with genuine signatures are presented in the feature space. The Support Vector Machine (SVM) is used as a classifier. Experimental studies were carried out on digitized images of genuine and fake signatures from two databases. The accuracy of automatic verification of signatures on the publicly available CEDAR database was 99,77 % and on TUIT was 88,62 %.
{"title":"Distribution of local curvature values as a structural feature for off-line handwritten signature verification","authors":"V. V. Starovoitov, U. Akhundjanov","doi":"10.21122/2309-4923-2023-2-49-58","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-49-58","url":null,"abstract":"In the paper, a new feature for describing a digital image of a handwritten signature based on the frequency distribution of the values of the local curvature of the signature contours, is proposed. The calculation of this feature on the binary image of a signature is described in detail. A normalized histogram of distributions of local curvature values for 40 bins is formed. The frequency values recorded as a 40-dimensional vector are called the local curvature code of the signature. During verification, the proximity of signature pairs is determined by correlation between curvature codes and LBP codes described by the authors in [23]. To perform the signature verification procedure, a two-dimensional feature space is constructed containing images of the proximity of signature pairs. When verifying a signature with N authentic signatures of the same person, N(N-1)/2 patterns of the proximity of pairs of genuine signatures and N images of pairs of proximity of the analyzed signature with genuine signatures are presented in the feature space. The Support Vector Machine (SVM) is used as a classifier. Experimental studies were carried out on digitized images of genuine and fake signatures from two databases. The accuracy of automatic verification of signatures on the publicly available CEDAR database was 99,77 % and on TUIT was 88,62 %.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}