首页 > 最新文献

Sistemnyj Analiz i Prikladnaa Informatika最新文献

英文 中文
Analysis, development and implementation of adaptive algorithms for (flexible) traffic light regulations (灵活)交通灯规则自适应算法的分析、开发和实现
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-4-16
V. N. Rutkovsky, D. V. Kapski
The article analyzes various adaptive control algorithms used in the intelligent system of the largest city – Minsk. An adaptive control algorithm has been developed depending on the dynamically changing load of a local intersection. On the example of one of the intersections, an example of the implementation of this algorithm is given. Recommendations are given for the further application of this algorithm on the street network.
本文分析了最大城市明斯克智能系统中使用的各种自适应控制算法。提出了一种基于局部交叉口负载动态变化的自适应控制算法。以其中一个交叉口为例,给出了该算法的实现实例。对该算法在街道网络中的进一步应用提出了建议。
{"title":"Analysis, development and implementation of adaptive algorithms for (flexible) traffic light regulations","authors":"V. N. Rutkovsky, D. V. Kapski","doi":"10.21122/2309-4923-2023-3-4-16","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-4-16","url":null,"abstract":"The article analyzes various adaptive control algorithms used in the intelligent system of the largest city – Minsk. An adaptive control algorithm has been developed depending on the dynamically changing load of a local intersection. On the example of one of the intersections, an example of the implementation of this algorithm is given. Recommendations are given for the further application of this algorithm on the street network.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for collective location fixing of observed emergencies by intersection/resection based on mobile telecomunication application with cartographic interface 基于地图界面移动通信应用的交叉/切除观测到的突发事件集体定位方法
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-40-46
A. G. Miheev, V. D. Bryljov, V. S. Gruzinov, M. V. Savel'ev
In modern higher education, it is required not only to prepare students to perform work on finished tasks in the subject area they have studied. It is also necessary to prepare students for independent activities, in which students do not work on ready-made tasks, but, on the contrary, are looking for niches in business, in which they themselves can offer in the subject area they have mastered, business-demanded solutions. This is another area of activity, which also requires development while studying at a university. It can be defined as "entrepreneurial competencies of a student." In recent years, the direction "Startup as a Diploma" has been developing, in which a university graduate protects not conditional academic work, but a real technological project with business prospects, to which the students developing it have ownership rights. The creation and maintenance of such projects changes the relationship between student and teacher, for this activity it is necessary to change the traditional teaching methodology. As a task of teachers, we decided to do the following: Find a subject area related to IT development, in which, due to recent achievements, there are opportunities for fast, technically not very complex technological solutions available to students, with the help of which you can create popular solutions. The work proposes an open source software development project, within which students can, performing tasks that are feasible for themselves, create software applications that are in demand in practice, as well as develop development strategies for related business projects. The project is dedicated to solving the problem of determining the coordinates of observed objects and phenomena based on data entered simultaneously by several users in different places using household mobile devices without using special technological equipment such as theodolites or tacheometers. The authors developed a mobile application, the value of which lies in the fact that in the public field allows you to realize the monitoring potential of the population interested in preventing unwanted or dangerous events and preventing emergency situations; professional allows you to assess the quality of the navigation signal in conditions of possible targeted interference; in the educational aspect organize training in the methods of joint fixation of objects and target designation on educational geopolygons. Currently, the project is being developed by students of the Department of Data Analysis and Machine Learning of the Financial University under the Government of the Russian Federation and the Moscow State University of Geodesy and Cartography. This paper presents a description of the project, the proposed solution architecture. References to source code repositories are given. The results of the pilot versions of the software are given.
在现代高等教育中,不仅要求学生准备在他们所学的学科领域完成任务。也有必要让学生为独立的活动做好准备,在这些活动中,学生不从事现成的任务,而是相反,他们正在寻找商业领域的利基,在这个领域中,他们自己可以在他们掌握的学科领域提供商业需求的解决方案。这是另一个活动领域,也需要在大学学习期间发展。它可以被定义为“学生的创业能力”。近年来,“文凭创业”的方向不断发展,大学毕业生保护的不是有条件的学术成果,而是具有商业前景的真实的技术项目,开发该项目的学生对该项目拥有所有权。这些项目的创建和维护改变了学生和教师之间的关系,因此有必要改变传统的教学方法。作为教师的一项任务,我们决定做以下事情:找到一个与IT开发相关的学科领域,由于最近的成就,有机会为学生提供快速,技术上不是很复杂的技术解决方案,借助这些解决方案,您可以创建流行的解决方案。这项工作提出了一个开源软件开发项目,学生可以在其中执行自己可行的任务,创建实际需要的软件应用程序,并为相关的业务项目制定开发策略。该项目致力于解决在不使用经纬仪、测速表等特殊技术设备的情况下,根据多个用户在不同地点使用家用移动设备同时输入的数据,确定观测物体和现象的坐标的问题。作者开发了一款移动应用程序,其价值在于,在公共领域,您可以实现对有兴趣预防不必要或危险事件和预防紧急情况的人群的监测潜力;专业让您在可能的目标干扰条件下评估导航信号的质量;在教育方面,组织教育地质多边形的联合定位和目标指定方法的培训。目前,该项目由俄罗斯联邦政府下属金融大学数据分析和机器学习系的学生和莫斯科国立大地测量与制图大学共同开发。本文对项目进行了描述,提出了解决方案体系结构。给出了源代码存储库的引用。给出了该软件的试验版本的结果。
{"title":"Methodology for collective location fixing of observed emergencies by intersection/resection based on mobile telecomunication application with cartographic interface","authors":"A. G. Miheev, V. D. Bryljov, V. S. Gruzinov, M. V. Savel'ev","doi":"10.21122/2309-4923-2023-3-40-46","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-40-46","url":null,"abstract":"In modern higher education, it is required not only to prepare students to perform work on finished tasks in the subject area they have studied. It is also necessary to prepare students for independent activities, in which students do not work on ready-made tasks, but, on the contrary, are looking for niches in business, in which they themselves can offer in the subject area they have mastered, business-demanded solutions. This is another area of activity, which also requires development while studying at a university. It can be defined as \"entrepreneurial competencies of a student.\" In recent years, the direction \"Startup as a Diploma\" has been developing, in which a university graduate protects not conditional academic work, but a real technological project with business prospects, to which the students developing it have ownership rights. The creation and maintenance of such projects changes the relationship between student and teacher, for this activity it is necessary to change the traditional teaching methodology. As a task of teachers, we decided to do the following: Find a subject area related to IT development, in which, due to recent achievements, there are opportunities for fast, technically not very complex technological solutions available to students, with the help of which you can create popular solutions. The work proposes an open source software development project, within which students can, performing tasks that are feasible for themselves, create software applications that are in demand in practice, as well as develop development strategies for related business projects. The project is dedicated to solving the problem of determining the coordinates of observed objects and phenomena based on data entered simultaneously by several users in different places using household mobile devices without using special technological equipment such as theodolites or tacheometers. The authors developed a mobile application, the value of which lies in the fact that in the public field allows you to realize the monitoring potential of the population interested in preventing unwanted or dangerous events and preventing emergency situations; professional allows you to assess the quality of the navigation signal in conditions of possible targeted interference; in the educational aspect organize training in the methods of joint fixation of objects and target designation on educational geopolygons. Currently, the project is being developed by students of the Department of Data Analysis and Machine Learning of the Financial University under the Government of the Russian Federation and the Moscow State University of Geodesy and Cartography. This paper presents a description of the project, the proposed solution architecture. References to source code repositories are given. The results of the pilot versions of the software are given.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical model of the control system of mobile caterpillar robot taking into account kinematic and dynamic parameters 考虑运动学和动力学参数的移动履带机器人控制系统数学模型
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-33-38
S. A. Pauliukavets, A. A. Velchenko, A. A. Radkevich
The paper developed a mathematical model of the control system for a mobile tracked robot, which takes into account the kinematic parameters (angular speeds of rotation of the rollers and the center of mass of the robot, the linear speed of the robot and its angle of rotation relative to the normal to the axis) and dynamic parameters (moments of inertia, resistance forces and electromechanical parameters used electric motors), which made it possible to give the most complete mathematical representation of the description of the movement of a caterpillar mobile robot. A control system for mobile robots along a predetermined trajectory is obtained, taking into account position feedback.
本文建立了移动履带机器人控制系统的数学模型,该模型考虑了运动学参数(机器人滚轮和质心的旋转角速度、机器人的线速度及其相对于轴的法线转角)和动力学参数(惯量、阻力和电机机电参数)。这使得对履带式移动机器人的运动描述给出最完整的数学表示成为可能。给出了一种考虑位置反馈的移动机器人沿预定轨迹运动控制系统。
{"title":"Mathematical model of the control system of mobile caterpillar robot taking into account kinematic and dynamic parameters","authors":"S. A. Pauliukavets, A. A. Velchenko, A. A. Radkevich","doi":"10.21122/2309-4923-2023-3-33-38","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-33-38","url":null,"abstract":"The paper developed a mathematical model of the control system for a mobile tracked robot, which takes into account the kinematic parameters (angular speeds of rotation of the rollers and the center of mass of the robot, the linear speed of the robot and its angle of rotation relative to the normal to the axis) and dynamic parameters (moments of inertia, resistance forces and electromechanical parameters used electric motors), which made it possible to give the most complete mathematical representation of the description of the movement of a caterpillar mobile robot. A control system for mobile robots along a predetermined trajectory is obtained, taking into account position feedback.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of autowave processes in active media with inhomogeneous properties 非均匀有源介质中自波过程的建模
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-17-22
A. V. Gulaj, V. A. Gulaj, A. V. Dubovik
This paper shows the results of computer modeling of the processes of excitation and propagation of autowaves in distributed active media with inhomogeneous properties. The study of autowaves by the cellular automata method is based on the Wiener–Rosenbluth model, according to which each element of the active environment can be in one of three states: rest, excitation and refractoriness. The software module "AutoWaveModel" has been developed in C++ using the Qt library and OpenGL technology for modeling dynamic processes of excitation of spiral waves and pacemakers. The heterogeneity of the properties of the active environment in the model under consideration is set, in particular, by introducing into the field (volume) of modeling a certain number of inactive elements distributed according to a random law. It is established that the decay of autowaves occurs when about 30-60% of inactive elements are introduced from their total number in the model, moreover, the wave propagation process becomes more stable with an increase in the decay coefficient of the activator of all elements. As one of the factors creating heterogeneity of the active distributed environment, the change in the decay coefficient of the activator in its volume is also considered. In this case, each cell of the model is assigned a random value of the specified coefficient, lying in a given interval from the minimum to the maximum value. With a significant difference in the values of the activator decay coefficient in near areas of the active environment and a sufficiently high excitation threshold, the wave front is curved due to its acceleration or deceleration. In this case, the destruction of the wave is also observed, which is unable to overcome the area with a reduced decay coefficient of the activator.
本文给出了非均匀分布有源介质中自波的激发和传播过程的计算机模拟结果。元胞自动机方法对自动波的研究基于Wiener-Rosenbluth模型,根据该模型,活动环境的每个元素可以处于三种状态之一:静止状态、激发状态和耐火状态。利用Qt库和OpenGL技术,用c++语言开发了“AutoWaveModel”软件模块,对螺旋波和起搏器的激励动态过程进行建模。通过在建模场(体积)中引入一定数量的按随机规律分布的非活动元素,使所考虑的模型中活动环境的性质具有非均匀性。结果表明,在模型中引入约30-60%的非活性元素时,自动波发生衰减,并且随着所有元素激活剂衰减系数的增加,波的传播过程变得更加稳定。活化剂的体积衰减系数的变化是造成有源分布环境非均质性的因素之一。在这种情况下,模型的每个单元被分配一个指定系数的随机值,从最小值到最大值的给定区间。当激活剂衰减系数的值在活动环境的附近区域有显著差异,并且激发阈值足够高时,波前由于其加速或减速而弯曲。在这种情况下,还观察到波的破坏,它无法克服激活剂衰减系数降低的区域。
{"title":"Modeling of autowave processes in active media with inhomogeneous properties","authors":"A. V. Gulaj, V. A. Gulaj, A. V. Dubovik","doi":"10.21122/2309-4923-2023-3-17-22","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-17-22","url":null,"abstract":"This paper shows the results of computer modeling of the processes of excitation and propagation of autowaves in distributed active media with inhomogeneous properties. The study of autowaves by the cellular automata method is based on the Wiener–Rosenbluth model, according to which each element of the active environment can be in one of three states: rest, excitation and refractoriness. The software module \"AutoWaveModel\" has been developed in C++ using the Qt library and OpenGL technology for modeling dynamic processes of excitation of spiral waves and pacemakers. The heterogeneity of the properties of the active environment in the model under consideration is set, in particular, by introducing into the field (volume) of modeling a certain number of inactive elements distributed according to a random law. It is established that the decay of autowaves occurs when about 30-60% of inactive elements are introduced from their total number in the model, moreover, the wave propagation process becomes more stable with an increase in the decay coefficient of the activator of all elements. As one of the factors creating heterogeneity of the active distributed environment, the change in the decay coefficient of the activator in its volume is also considered. In this case, each cell of the model is assigned a random value of the specified coefficient, lying in a given interval from the minimum to the maximum value. With a significant difference in the values of the activator decay coefficient in near areas of the active environment and a sufficiently high excitation threshold, the wave front is curved due to its acceleration or deceleration. In this case, the destruction of the wave is also observed, which is unable to overcome the area with a reduced decay coefficient of the activator.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using SpaceClaim scripts to create training models 使用spacecclaim脚本创建训练模型
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-60-64
V. V. Naprasnikov, Zirui Wang, I. L. Kovaleva, S. N. Novikov
One of the possible approaches in the formation of the geometric part of the finite-element model in the process of teaching students is the use of the language IronPython in SpaceClaim environment with the purpose of subsequent modeling on the platform ANSYS WorkBench. The comparative advantages of Design Modeler and SpaceClaim for such a problem are described. An example of using this approach in a real learning process is given.
在学生教学过程中,形成有限元几何部分模型的一种可能方法是在spacecclaim环境中使用IronPython语言,并在ANSYS WorkBench平台上进行后续建模。描述了Design Modeler和spacecclaim在这类问题上的比较优势。最后给出了在实际学习过程中应用该方法的一个实例。
{"title":"Using SpaceClaim scripts to create training models","authors":"V. V. Naprasnikov, Zirui Wang, I. L. Kovaleva, S. N. Novikov","doi":"10.21122/2309-4923-2023-3-60-64","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-60-64","url":null,"abstract":"One of the possible approaches in the formation of the geometric part of the finite-element model in the process of teaching students is the use of the language IronPython in SpaceClaim environment with the purpose of subsequent modeling on the platform ANSYS WorkBench. The comparative advantages of Design Modeler and SpaceClaim for such a problem are described. An example of using this approach in a real learning process is given.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital circuit for switch contact bounce analysis 用于开关触点反弹分析的数字电路
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-24-32
A. A. Ivaniuk, D. O. Mozhejko
This article discusses the issue of studying the parameters of the bounce of electrical contacts of switches in digital systems. Digital circuits of bounce analyzer are described. The results of experimental studies of the behavior of electrical contacts of various buttons and switches are presented. It is shown that various electric switches have random and unique characteristics, which can be used to solve the problems of random numbers generating, identifying of digital devices and user’s authentication. Prototyping of the proposed circuits was carried out on Digilent ZYBO Z7-10 debug boards, digital circuits were designed in VHDL for the Xilinx Zynq-7000 FPGA chip.
本文讨论了数字系统中开关电触点弹跳参数的研究问题。介绍了弹跳分析仪的数字电路。介绍了各种按钮和开关的电触点性能的实验研究结果。研究表明,各种电子开关具有随机性和唯一性,可用于解决随机数的生成、数字设备的识别和用户的认证等问题。在Digilent ZYBO Z7-10调试板上对所提出的电路进行了原型设计,并在Xilinx Zynq-7000 FPGA芯片上用VHDL语言设计了数字电路。
{"title":"Digital circuit for switch contact bounce analysis","authors":"A. A. Ivaniuk, D. O. Mozhejko","doi":"10.21122/2309-4923-2023-3-24-32","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-24-32","url":null,"abstract":"This article discusses the issue of studying the parameters of the bounce of electrical contacts of switches in digital systems. Digital circuits of bounce analyzer are described. The results of experimental studies of the behavior of electrical contacts of various buttons and switches are presented. It is shown that various electric switches have random and unique characteristics, which can be used to solve the problems of random numbers generating, identifying of digital devices and user’s authentication. Prototyping of the proposed circuits was carried out on Digilent ZYBO Z7-10 debug boards, digital circuits were designed in VHDL for the Xilinx Zynq-7000 FPGA chip.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors 网络攻击增加的原因:分析技术和非技术因素
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-48-54
A. A. Vasilyev
This article presents an analysis of both technical and non-technical factors contributing to the growth in volume and diversity of cyber attacks. Social interaction on the Internet contributes to the increased frequency of cyber attacks and exacerbates destructive consequences that extend beyond technical aspects, impacting societal and personal realms. Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment. Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. The heightened technical proficiency of attackers equips them with new tools for breaching digital security. Concurrently, inadequate awareness and careless user behavior online jeopardize the protection of personal and confidential data. This work demonstrates that cyber risks escalate due to both ongoing technological changes and human actions. Understanding the dynamics of these factors becomes critically important for developing more effective measures to safeguard the digital environment.
本文分析了导致网络攻击数量和多样性增长的技术和非技术因素。互联网上的社交活动增加了网络攻击的频率,并加剧了超出技术层面的破坏性后果,影响到社会和个人领域。网络协议中的软件错误、漏洞和缺陷构成了持续的安全威胁,特别是在连接设备数量不断增加和管理关键系统的复杂性日益增加的情况下。攻击的动态性和不断发展的渗透方法使网络威胁对现代网络环境的条件具有高度的适应性。此外,社交媒体的广泛使用和社交生活的虚拟化带来了更多的舒适,但也为网络攻击提供了肥沃的土壤,增加了潜在恶意行为者可访问信息的数量。攻击者技术熟练程度的提高为他们提供了破坏数字安全的新工具。同时,不充分的意识和粗心的在线用户行为危及个人和机密数据的保护。这项研究表明,由于持续的技术变革和人类行为,网络风险不断升级。了解这些因素的动态对于制定更有效的措施来保护数字环境至关重要。
{"title":"Reasons for the increase in cyber attacks: analysis of technical and non-technical factors","authors":"A. A. Vasilyev","doi":"10.21122/2309-4923-2023-3-48-54","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-48-54","url":null,"abstract":"This article presents an analysis of both technical and non-technical factors contributing to the growth in volume and diversity of cyber attacks. Social interaction on the Internet contributes to the increased frequency of cyber attacks and exacerbates destructive consequences that extend beyond technical aspects, impacting societal and personal realms. Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment. Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. The heightened technical proficiency of attackers equips them with new tools for breaching digital security. Concurrently, inadequate awareness and careless user behavior online jeopardize the protection of personal and confidential data. This work demonstrates that cyber risks escalate due to both ongoing technological changes and human actions. Understanding the dynamics of these factors becomes critically important for developing more effective measures to safeguard the digital environment.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authorship identification methods in student plagiarism detection 学生抄袭检测中的作者识别方法
Pub Date : 2023-11-09 DOI: 10.21122/2309-4923-2023-3-56-59
A. I. Paramonov, I. A. Trukhanovich
In the modern educational context the problem of plagiarism is urgent and requires the development of effective methods of detection and prevention of this phenomenon. The application of authorship identification methods in the field of student plagiarism detection is considered. Different check, detect and analyze plagiarism approaches in various works are investigated. Both classical methods, which include text comparison and similarity search, and modern methods based on machine learning algorithms, as well as their combination and potential modifications, are considered. The advantages and limitations of each method are also discussed, and recommendations are given for choosing one or another approach according to the specific requirements of the research. Special attention is paid to such modern methods as metadata analysis and the application of neural networks. Stylistic analysis reveals authorial peculiarities such as word choice, preferred wording, and even punctuation. Lexical and syntactic models are used to identify repetitive phrases and structures that may indicate plagiarism. Statistical methods can identify anomalies in the use of words and phrases, and machine learning can create models to calculate the probability of plagiarism based on large amounts of data. Ultimately, an comparison of authorship identification techniques in the field of student plagiarism detection is provided, which aims to provide valuable information about different approaches and their applicability, and to help researchers and educators develop effective strategies for detecting and preventing plagiarism in educational environments.
在现代教育背景下,抄袭问题迫在眉睫,需要开发有效的方法来检测和预防这一现象。探讨了作者身份识别方法在学生抄袭检测领域的应用。研究了不同作品中不同的检查、检测和分析抄袭的方法。考虑了包括文本比较和相似度搜索在内的经典方法和基于机器学习算法的现代方法,以及它们的组合和潜在的修改。讨论了每种方法的优点和局限性,并根据研究的具体要求给出了选择一种或另一种方法的建议。特别关注元数据分析等现代方法和神经网络的应用。文体分析揭示了作者的特点,如用词、首选措辞,甚至标点符号。词汇和句法模型用于识别可能表明抄袭的重复短语和结构。统计方法可以识别单词和短语使用中的异常情况,机器学习可以根据大量数据创建模型来计算剽窃的概率。最后,作者身份识别技术在学生抄袭检测领域的比较,旨在提供不同方法及其适用性的有价值的信息,并帮助研究人员和教育工作者制定有效的策略来检测和防止教育环境中的抄袭。
{"title":"Authorship identification methods in student plagiarism detection","authors":"A. I. Paramonov, I. A. Trukhanovich","doi":"10.21122/2309-4923-2023-3-56-59","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-3-56-59","url":null,"abstract":"In the modern educational context the problem of plagiarism is urgent and requires the development of effective methods of detection and prevention of this phenomenon. The application of authorship identification methods in the field of student plagiarism detection is considered. Different check, detect and analyze plagiarism approaches in various works are investigated. Both classical methods, which include text comparison and similarity search, and modern methods based on machine learning algorithms, as well as their combination and potential modifications, are considered. The advantages and limitations of each method are also discussed, and recommendations are given for choosing one or another approach according to the specific requirements of the research. Special attention is paid to such modern methods as metadata analysis and the application of neural networks. Stylistic analysis reveals authorial peculiarities such as word choice, preferred wording, and even punctuation. Lexical and syntactic models are used to identify repetitive phrases and structures that may indicate plagiarism. Statistical methods can identify anomalies in the use of words and phrases, and machine learning can create models to calculate the probability of plagiarism based on large amounts of data. Ultimately, an comparison of authorship identification techniques in the field of student plagiarism detection is provided, which aims to provide valuable information about different approaches and their applicability, and to help researchers and educators develop effective strategies for detecting and preventing plagiarism in educational environments.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135242368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fea study of effectiveness of bionic legacy-shape console as huge machine tool’s column 仿生遗留型控制台作为大型机床立柱的有效性有限元研究
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-13-23
S. S. Dounar, V. K. Jatskevich, A. M. Ausiyevich, D. N. Shvedova, I. Y. Aglushevich
Concept of machine tool’s column in the appearance of vertical bionic console is proposed. Console was 3D-transformed from the shape of legacy oak-like structure – Eddystone lighthouse. It is proposed to create the variable-section column with “layer-by-layer” technics from the polymer concrete. FEA shows high stiffness of the column. It increases from 1500 to 11000 N/μm from top to bottom along vertical guideways. Such stiffness needs only 19.3 ton of concrete for the instance of 4.5 m height’s column. FEMmodelling pointed out rather high eigenmode’s frequencies (˃49 Hz). FRF is appropriate for pre-resonance heavy cutting as for post-resonance finishing. Proposed bionic-shape column is perspective as for stand-alone variant so for portal composition created by two opposite columns.
提出了立式仿生控制台外观中机床立柱的概念。控制台是由传统的橡树状结构- Eddystone灯塔的形状进行3d转换的。提出了以聚合物混凝土为原料,采用“逐层”工艺制作变截面柱。有限元分析表明该柱具有较高的刚度。沿垂直导轨从上到下从1500 ~ 11000 N/μm增大。以4.5米高的柱子为例,这种刚度只需要19.3吨混凝土。有限元模型指出了相当高的特征模态频率(49 Hz)。FRF既适用于共振前的重切削,也适用于共振后的精加工。拟建的仿生学形状的列是独立变体的观点,也是由两个相对列创建的门户组合的观点。
{"title":"Fea study of effectiveness of bionic legacy-shape console as huge machine tool’s column","authors":"S. S. Dounar, V. K. Jatskevich, A. M. Ausiyevich, D. N. Shvedova, I. Y. Aglushevich","doi":"10.21122/2309-4923-2023-2-13-23","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-13-23","url":null,"abstract":"Concept of machine tool’s column in the appearance of vertical bionic console is proposed. Console was 3D-transformed from the shape of legacy oak-like structure – Eddystone lighthouse. It is proposed to create the variable-section column with “layer-by-layer” technics from the polymer concrete. FEA shows high stiffness of the column. It increases from 1500 to 11000 N/μm from top to bottom along vertical guideways. Such stiffness needs only 19.3 ton of concrete for the instance of 4.5 m height’s column. FEMmodelling pointed out rather high eigenmode’s frequencies (˃49 Hz). FRF is appropriate for pre-resonance heavy cutting as for post-resonance finishing. Proposed bionic-shape column is perspective as for stand-alone variant so for portal composition created by two opposite columns.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135592378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distribution of local curvature values as a structural feature for off-line handwritten signature verification 局部曲率值的分布作为离线手写签名验证的结构特征
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-49-58
V. V. Starovoitov, U. Akhundjanov
In the paper, a new feature for describing a digital image of a handwritten signature based on the frequency distribution of the values of the local curvature of the signature contours, is proposed. The calculation of this feature on the binary image of a signature is described in detail. A normalized histogram of distributions of local curvature values for 40 bins is formed. The frequency values recorded as a 40-dimensional vector are called the local curvature code of the signature. During verification, the proximity of signature pairs is determined by correlation between curvature codes and LBP codes described by the authors in [23]. To perform the signature verification procedure, a two-dimensional feature space is constructed containing images of the proximity of signature pairs. When verifying a signature with N authentic signatures of the same person, N(N-1)/2 patterns of the proximity of pairs of genuine signatures and N images of pairs of proximity of the analyzed signature with genuine signatures are presented in the feature space. The Support Vector Machine (SVM) is used as a classifier. Experimental studies were carried out on digitized images of genuine and fake signatures from two databases. The accuracy of automatic verification of signatures on the publicly available CEDAR database was 99,77 % and on TUIT was 88,62 %.
本文提出了一种基于签名轮廓局部曲率值的频率分布来描述手写签名数字图像的新特征。详细描述了该特征在签名二值图像上的计算。形成了40个箱的局部曲率值分布的规范化直方图。记录为40维矢量的频率值称为签名的局部曲率码。在验证过程中,通过曲率码与作者在[23]中描述的LBP码之间的相关性来确定签名对的接近性。为了执行签名验证过程,构造了一个包含签名对接近度图像的二维特征空间。当对同一个人的N个真实签名进行验证时,特征空间中存在N(N-1)/2个真实签名对的接近模式和N个被分析签名与真实签名的接近对的图像。使用支持向量机(SVM)作为分类器。对两个数据库中真伪签名的数字化图像进行了实验研究。在公开可用的CEDAR数据库上签名自动验证的准确率为99.77%,在TUIT数据库上签名自动验证的准确率为88.62%。
{"title":"Distribution of local curvature values as a structural feature for off-line handwritten signature verification","authors":"V. V. Starovoitov, U. Akhundjanov","doi":"10.21122/2309-4923-2023-2-49-58","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-49-58","url":null,"abstract":"In the paper, a new feature for describing a digital image of a handwritten signature based on the frequency distribution of the values of the local curvature of the signature contours, is proposed. The calculation of this feature on the binary image of a signature is described in detail. A normalized histogram of distributions of local curvature values for 40 bins is formed. The frequency values recorded as a 40-dimensional vector are called the local curvature code of the signature. During verification, the proximity of signature pairs is determined by correlation between curvature codes and LBP codes described by the authors in [23]. To perform the signature verification procedure, a two-dimensional feature space is constructed containing images of the proximity of signature pairs. When verifying a signature with N authentic signatures of the same person, N(N-1)/2 patterns of the proximity of pairs of genuine signatures and N images of pairs of proximity of the analyzed signature with genuine signatures are presented in the feature space. The Support Vector Machine (SVM) is used as a classifier. Experimental studies were carried out on digitized images of genuine and fake signatures from two databases. The accuracy of automatic verification of signatures on the publicly available CEDAR database was 99,77 % and on TUIT was 88,62 %.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Sistemnyj Analiz i Prikladnaa Informatika
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1