首页 > 最新文献

Sistemnyj Analiz i Prikladnaa Informatika最新文献

英文 中文
Optimization of the iot network protocol choozing for monitoring audio information 音频信息监控的物联网网络协议选择优化
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-32-37
U. A. Vishnyakou, Bahaa Shaya
The subject of research is the choice of a protocol in the Internet of Things (IoT) network for monitoring and analyzing audio information. The purpose of the article is to optimize the process of choosing a protocol for monitoring audio information based on IoT and evaluate the results. The authors have developed an IoT framework for monitoring and analyzing audio and voice information. The IoT network includes a sound sensor (microphone), a unit for analyzing the information received from it and a decision-making module. The description of protocols in the IoT network for assessing the sound level is given: the Wireless USB standard, the narrowband standard of the NB-IoT. The hierarchy analysis method was used to select the best protocol. The methodology and its main formulas for calculating the best option are given. A table of the four selected protocols for the IB network is given. As characteristics of the protocols, the following are considered: downlink speed, latency, device bandwidth, device transmission power. A matrix of paired comparisons of protocol parameter indicators based on expert assessments has been formed. Four matrices of paired comparisons of transmission standards variants in relation to the indicator of speed, delay, bandwidth of devices, transmission power of devices are constructed. Calculations of local vectors and priority vectors of quality indicators were performed for these four matrices. Then the matrix of vectors of global priorities is calculated by calculating the sum of the products of local vectors of matrices of paired comparisons of transmission standards variants on the corresponding priority vectors of quality indicators of the matrix of paired comparisons of protocol parameters. From the results obtained, the best protocol option for the network and sound monitoring was determined by the maximum value.
本文的研究课题是在物联网(IoT)网络中选择一种协议来监控和分析音频信息。本文的目的是优化选择基于物联网的音频信息监控协议的过程,并评估结果。作者开发了一个物联网框架,用于监测和分析音频和语音信息。物联网网络包括一个声音传感器(麦克风)、一个分析从它接收到的信息的单元和一个决策模块。给出了物联网网络中用于声级评估的协议描述:无线USB标准,NB-IoT的窄带标准。采用层次分析法选择最佳协议。给出了计算最优方案的方法和主要公式。给出了IB网络所选择的四种协议的表。协议的特性主要考虑以下几个方面:下行速率、时延、设备带宽、设备传输功率。形成了基于专家评价的协议参数指标配对比较矩阵。构造了4个传输标准变量相对于速率、时延、设备带宽、设备传输功率指标的配对比较矩阵。对这四个矩阵进行了质量指标的局部向量和优先级向量的计算。然后,通过计算传输标准变体配对比较矩阵的局部向量与协议参数配对比较矩阵的质量指标的相应优先级向量的乘积和,计算全局优先级向量矩阵。根据得到的结果,以最大值确定网络和声音监测的最佳协议选项。
{"title":"Optimization of the iot network protocol choozing for monitoring audio information","authors":"U. A. Vishnyakou, Bahaa Shaya","doi":"10.21122/2309-4923-2023-2-32-37","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-32-37","url":null,"abstract":"The subject of research is the choice of a protocol in the Internet of Things (IoT) network for monitoring and analyzing audio information. The purpose of the article is to optimize the process of choosing a protocol for monitoring audio information based on IoT and evaluate the results. The authors have developed an IoT framework for monitoring and analyzing audio and voice information. The IoT network includes a sound sensor (microphone), a unit for analyzing the information received from it and a decision-making module. The description of protocols in the IoT network for assessing the sound level is given: the Wireless USB standard, the narrowband standard of the NB-IoT. The hierarchy analysis method was used to select the best protocol. The methodology and its main formulas for calculating the best option are given. A table of the four selected protocols for the IB network is given. As characteristics of the protocols, the following are considered: downlink speed, latency, device bandwidth, device transmission power. A matrix of paired comparisons of protocol parameter indicators based on expert assessments has been formed. Four matrices of paired comparisons of transmission standards variants in relation to the indicator of speed, delay, bandwidth of devices, transmission power of devices are constructed. Calculations of local vectors and priority vectors of quality indicators were performed for these four matrices. Then the matrix of vectors of global priorities is calculated by calculating the sum of the products of local vectors of matrices of paired comparisons of transmission standards variants on the corresponding priority vectors of quality indicators of the matrix of paired comparisons of protocol parameters. From the results obtained, the best protocol option for the network and sound monitoring was determined by the maximum value.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135592735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of shortest path algorithms on energy consumption of multi-core processors 最短路径算法对多核处理器能耗的影响
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-4-12
A. A. Prihozhy, O. N. Karasik
Modern multi-core processors, operating systems and applied software are being designed towards energy efficiency, which significantly reduces energy consumption. Energy efficiency of software depends on algorithms it implements, and, on the way, it exploits hardware resources. In the paper, we consider sequential and parallel implementations of four algorithms of shortest paths search in dense weighted graphs, measure and analyze their runtime, energy consumption, performance states and operating frequency of the Intel Core i7-10700 8-core processor. Our goal is to find out how each of the algorithms influences the processor energy consumption, how the processor and operating system analyze the workload and take actions to increase or reduce operating frequency and to disable cores, and which algorithms are preferable for exploiting in sequential and parallel modes. The graph extension-based algorithm (GEA) appeared to be the most energy efficient among algorithms implemented sequentially. The classical Floyd-Warshall algorithm (FW) consumed up to twice as much energy, and the blocked homogeneous (BFW) and heterogeneous (HBFW) algorithms consumed up to 52.2 % and 21.2 % more energy than GEA. Parallel implementations of BFW and HBFW are faster by up to 4.41 times and more energy efficient by up to 3.23 times than the parallel implementation of FW and consume less energy by up to 2.22 times than their sequential counterparts. The sequential GEA algorithm consumes less energy than the parallel FW, although it loses FW in runtime. The multi-core processor runs FW with an average frequency of 4235 MHz and runs BFW and HBFW with lower frequency of 4059 MHz and 4035 MHz respectively.
现代多核处理器、操作系统和应用软件正在朝着节能的方向设计,这大大减少了能源消耗。软件的能源效率取决于它实现的算法,同时,它还会利用硬件资源。本文考虑了四种密集加权图中最短路径搜索算法的顺序和并行实现,测量并分析了它们在Intel酷睿i7-10700 8核处理器上的运行时间、能耗、性能状态和工作频率。我们的目标是找出每种算法如何影响处理器能耗,处理器和操作系统如何分析工作负载并采取行动来增加或减少操作频率并禁用核心,以及哪些算法更适合在顺序和并行模式下使用。在顺序实现的算法中,基于图扩展的算法(GEA)是最节能的。经典的Floyd-Warshall算法(FW)消耗的能量是GEA的两倍,阻塞均匀(BFW)和异构(HBFW)算法消耗的能量分别比GEA多52.2%和21.2%。BFW和HBFW并行实现的速度比FW并行实现的速度快4.41倍,能效高3.23倍,能耗低2.22倍。顺序GEA算法比并行FW消耗的能量少,但在运行过程中会丢失FW。多核处理器运行FW的平均频率为4235 MHz,运行BFW和HBFW的频率较低,分别为4059 MHz和4035 MHz。
{"title":"Influence of shortest path algorithms on energy consumption of multi-core processors","authors":"A. A. Prihozhy, O. N. Karasik","doi":"10.21122/2309-4923-2023-2-4-12","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-4-12","url":null,"abstract":"Modern multi-core processors, operating systems and applied software are being designed towards energy efficiency, which significantly reduces energy consumption. Energy efficiency of software depends on algorithms it implements, and, on the way, it exploits hardware resources. In the paper, we consider sequential and parallel implementations of four algorithms of shortest paths search in dense weighted graphs, measure and analyze their runtime, energy consumption, performance states and operating frequency of the Intel Core i7-10700 8-core processor. Our goal is to find out how each of the algorithms influences the processor energy consumption, how the processor and operating system analyze the workload and take actions to increase or reduce operating frequency and to disable cores, and which algorithms are preferable for exploiting in sequential and parallel modes. The graph extension-based algorithm (GEA) appeared to be the most energy efficient among algorithms implemented sequentially. The classical Floyd-Warshall algorithm (FW) consumed up to twice as much energy, and the blocked homogeneous (BFW) and heterogeneous (HBFW) algorithms consumed up to 52.2 % and 21.2 % more energy than GEA. Parallel implementations of BFW and HBFW are faster by up to 4.41 times and more energy efficient by up to 3.23 times than the parallel implementation of FW and consume less energy by up to 2.22 times than their sequential counterparts. The sequential GEA algorithm consumes less energy than the parallel FW, although it loses FW in runtime. The multi-core processor runs FW with an average frequency of 4235 MHz and runs BFW and HBFW with lower frequency of 4059 MHz and 4035 MHz respectively.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135549264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User's interface for extraction of the chemical structure information from the systematic name of organic compound 从有机化合物的系统名称中提取化学结构信息的用户界面
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-59-63
L. A. Grigoryan
The user's interface «Nomenclature Generator» for extraction of the chemical structure information from the systematic name of organic compound represented according to IUPAC nomenclature is developed at the All-Russian Institute for Scientific and Technical Information of Russian Academy of Sciences.
俄罗斯科学院全俄科学技术信息研究所开发了“命名法生成器”用户界面,用于根据IUPAC命名法从有机化合物的系统名称中提取化学结构信息。
{"title":"User's interface for extraction of the chemical structure information from the systematic name of organic compound","authors":"L. A. Grigoryan","doi":"10.21122/2309-4923-2023-2-59-63","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-59-63","url":null,"abstract":"The user's interface «Nomenclature Generator» for extraction of the chemical structure information from the systematic name of organic compound represented according to IUPAC nomenclature is developed at the All-Russian Institute for Scientific and Technical Information of Russian Academy of Sciences.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About development of expert possibilities for consideration of equipment projects and technological decisions 关于发展专家的可能性,以考虑设备项目和技术决策
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-38-41
D. J. Lobach
The purpose of the research described in the article is to formulate and substantiate the methodology for analyzing quantitative patterns of parameters of projects, devices, systems and technologies, that can be used for relative or rating comparison of projected, planned or applied investigated objects without using long-term experimental or operational data. The proposed approach to the analysis of quantitative patterns makes it possible to conduct a primary assessment of the advantages of innovative technologies, acomparative assessment of the safety of technical complexes, a targeted pre-operational assessment of equipment parameters, and to form planned distinctive parameters for the implementation of experimental and commercial technical projects.
本文所描述的研究目的是制定和证实分析项目、设备、系统和技术参数的定量模式的方法,该方法可用于对预计的、计划的或应用的调查对象进行相对或评级比较,而无需使用长期的实验或操作数据。所建议的定量模式分析方法使人们能够对创新技术的优点进行初步评估,对技术综合体的安全性进行比较评估,对设备参数进行有针对性的操作前评估,并为实施实验和商业技术项目形成计划的独特参数。
{"title":"About development of expert possibilities for consideration of equipment projects and technological decisions","authors":"D. J. Lobach","doi":"10.21122/2309-4923-2023-2-38-41","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-38-41","url":null,"abstract":"The purpose of the research described in the article is to formulate and substantiate the methodology for analyzing quantitative patterns of parameters of projects, devices, systems and technologies, that can be used for relative or rating comparison of projected, planned or applied investigated objects without using long-term experimental or operational data. The proposed approach to the analysis of quantitative patterns makes it possible to conduct a primary assessment of the advantages of innovative technologies, acomparative assessment of the safety of technical complexes, a targeted pre-operational assessment of equipment parameters, and to form planned distinctive parameters for the implementation of experimental and commercial technical projects.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control of the temperature regime of the process of bacterial oxidation on the basis of fuzzy logic 基于模糊逻辑的细菌氧化过程温度状态控制
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-42-47
O. A. Jumaev, I. L. Kovaleva, G. B. Mahmudov
The work is devoted to modeling the temperature control system for the process of bacterial oxidation of refractory gold-bearing sulfide ores. The simulation was performed using the Fuzzy Logic Toolbox editor in the MATLAB software package. The substantiation of the set of input and output variables, the type of membership functions was carried out, the base of rules for the inference engine was formed. The main stages of modeling are described and the results are analyzed. The use of trapezoidal membership functions is substantiated.
研究了难处理含金硫化矿细菌氧化过程的温度控制系统。利用MATLAB软件包中的模糊逻辑工具箱编辑器进行仿真。对输入输出变量集、隶属函数类型进行了确证,形成了推理机的规则基础。描述了建模的主要阶段,并对建模结果进行了分析。证明了梯形隶属函数的使用。
{"title":"Control of the temperature regime of the process of bacterial oxidation on the basis of fuzzy logic","authors":"O. A. Jumaev, I. L. Kovaleva, G. B. Mahmudov","doi":"10.21122/2309-4923-2023-2-42-47","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-42-47","url":null,"abstract":"The work is devoted to modeling the temperature control system for the process of bacterial oxidation of refractory gold-bearing sulfide ores. The simulation was performed using the Fuzzy Logic Toolbox editor in the MATLAB software package. The substantiation of the set of input and output variables, the type of membership functions was carried out, the base of rules for the inference engine was formed. The main stages of modeling are described and the results are analyzed. The use of trapezoidal membership functions is substantiated.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite-element model of a sole with the using of cellular objects 利用元胞对象建立鞋底有限元模型
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-24-30
V. V. Naprasnikov, I. L. Kovaleva, Y. V. Polozkov, D. P. Kunkevich, A. V. Borodulya
One of the possible approaches to the formation of the optimization model of the underlay is the use of cellular objects. At the same time, the question of constructing geometric models of such objects is relevant. Code fragments and construction results for one variant of geometry in IronPython language in SpaceClaim environment to solve such a problem are given. A possible approach to solving the problem of forming boundary conditions changing in time and space is described.
形成底层优化模型的一种可能方法是使用元胞对象。同时,构造这些物体的几何模型的问题是相关的。给出了在spacecclaim环境下用IronPython语言编写的一种几何变体的代码片段和构造结果。描述了一种可能的方法来解决形成随时间和空间变化的边界条件问题。
{"title":"Finite-element model of a sole with the using of cellular objects","authors":"V. V. Naprasnikov, I. L. Kovaleva, Y. V. Polozkov, D. P. Kunkevich, A. V. Borodulya","doi":"10.21122/2309-4923-2023-2-24-30","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-24-30","url":null,"abstract":"One of the possible approaches to the formation of the optimization model of the underlay is the use of cellular objects. At the same time, the question of constructing geometric models of such objects is relevant. Code fragments and construction results for one variant of geometry in IronPython language in SpaceClaim environment to solve such a problem are given. A possible approach to solving the problem of forming boundary conditions changing in time and space is described.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network models for organizing the learning process 组织学习过程的网络模型
Pub Date : 2023-10-04 DOI: 10.21122/2309-4923-2023-2-65-69
A. A. Lobaty, D. A. Konopacki
Статья посвящена обоснованию принципов построения сетевых моделей организации и проведения учебного процесса на основе применения основных положений теории множеств, теории графов и теории топологии. Рассматриваются модели организации управления учебным процессом и модели сетевого обучения на примере структуры гипотетического высшего учебного заведения. Проводится анализ топологических свойств сетевых моделей на основе существования свойств гомеоморфизма между топологическими пространствами, характеризующими сложную систему организации учебного процесса. Проведен анализ отношений между множествами элементов рассматриваемой системы, множествами их параметров, численными значениями параметров и информационными характеристиками системы. Рассматривается также множество различных состояний (структур) системы и её подсистем, которые связаны с множествами фазовых координат, что позволяет использовать математический аппарат теории динамических систем случайной структуры. Представление систем организации и проведения учебного процесса с помощью сетевых моделей позволяет создать модели функционирования этих систем, модели информационных потоков и провести их оптимизацию на основе заданных критериев, характеризующих материальные затраты и эффективность систем.
这篇文章是关于建立组织网络模型的基础,并根据集合理论、图理论和拓扑理论的基本条款进行培训。考虑的是培训管理机构的模型和网络培训模型,以建立假设的高等教育机构的结构为例。正在分析网络模型的拓扑特性,基于拓扑空间之间的同构特性,这些特性描述了复杂的培训系统。分析了所讨论系统中的许多元素之间的关系、它们的参数、参数的数值和系统的信息特征。还有许多不同的状态(结构)系统及其子系统,它们与多个相位坐标有关,允许使用动态随机结构理论的数学机器。通过网络模型介绍组织系统和培训过程,可以创建这些系统的功能模型,信息流模型,并根据规定的标准优化这些系统的物质成本和效率。
{"title":"Network models for organizing the learning process","authors":"A. A. Lobaty, D. A. Konopacki","doi":"10.21122/2309-4923-2023-2-65-69","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-65-69","url":null,"abstract":"Статья посвящена обоснованию принципов построения сетевых моделей организации и проведения учебного процесса на основе применения основных положений теории множеств, теории графов и теории топологии. Рассматриваются модели организации управления учебным процессом и модели сетевого обучения на примере структуры гипотетического высшего учебного заведения. Проводится анализ топологических свойств сетевых моделей на основе существования свойств гомеоморфизма между топологическими пространствами, характеризующими сложную систему организации учебного процесса. Проведен анализ отношений между множествами элементов рассматриваемой системы, множествами их параметров, численными значениями параметров и информационными характеристиками системы. Рассматривается также множество различных состояний (структур) системы и её подсистем, которые связаны с множествами фазовых координат, что позволяет использовать математический аппарат теории динамических систем случайной структуры. Представление систем организации и проведения учебного процесса с помощью сетевых моделей позволяет создать модели функционирования этих систем, модели информационных потоков и провести их оптимизацию на основе заданных критериев, характеризующих материальные затраты и эффективность систем.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical bayesian algorithm for processing thermographic images of the cow udder for diagnosing mastitis 统计贝叶斯算法处理奶牛乳房热成像图像诊断乳腺炎
Pub Date : 2023-08-02 DOI: 10.21122/2309-4923-2023-1-42-46
I. I. Hirutsky, A. G. Senkov, Y. A. Rakevich
The article presents results of our experiments carried out to study the invariance of the digital description of the imageThere in the paper is formulated a mathematical problem of multi-hypothetical detection of subclinical and clinical mastitis in dairy cows by the maximum values of udder temperature measured by digital processing of the udder thermal images. The optimal temperature threshold values corresponding to the Bayesian criterion of the minimum average risk in the above multi-hypothesis detection problem are determined by numerical modelling.
本文介绍了我们为研究图像数字描述的不变性而进行的实验结果。本文提出了一个通过对奶牛乳房热图像进行数字处理所测得的乳房温度最大值来检测奶牛亚临床和临床乳房炎的多假设数学问题。通过数值模拟确定了上述多假设检测问题中平均风险最小贝叶斯准则所对应的最优温度阈值。
{"title":"Statistical bayesian algorithm for processing thermographic images of the cow udder for diagnosing mastitis","authors":"I. I. Hirutsky, A. G. Senkov, Y. A. Rakevich","doi":"10.21122/2309-4923-2023-1-42-46","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-1-42-46","url":null,"abstract":"The article presents results of our experiments carried out to study the invariance of the digital description of the imageThere in the paper is formulated a mathematical problem of multi-hypothetical detection of subclinical and clinical mastitis in dairy cows by the maximum values of udder temperature measured by digital processing of the udder thermal images. The optimal temperature threshold values corresponding to the Bayesian criterion of the minimum average risk in the above multi-hypothesis detection problem are determined by numerical modelling.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135015544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
РАЗГРАНИЧЕНИЕ ДОСТУПА В ЛОКАЛЬНОЙ СЕТИ С ИСПОЛЬЗОВАНИЕМ БАЗОВЫХ НАСТРОЕК СЕТЕВОГО ОБОРУДОВАНИЯ 使用基本网络硬件设置区分LAN访问
Pub Date : 2018-10-29 DOI: 10.21122/2309-4923-2018-3-55-61
С. Н. Петров, Д. В. Ахраменко, С. М. Горошко, Т. А. Пулко
The article focused on recommendations for the local network protection from unauthorized access of employees (insider attacks) on the basis of access control, using the basic settings of existing equipment. The use of MAC-based access profiles (MAC-based Access Control) is proposed. The problems of information security at the physical and channel levels, as well as the most common types of attacks are considered. For research purposes, a mockup of a typical local area network was created, including personal computers, ZTE ZXHN H208N modem with support WiFi-access point and the switch DES-1210-52, which connected these devices to the network. Made contact connection to the twisted-pair with clips on the lines Tx and Rx. Kali Linux, tcpdump, bettercap, Wireshark are using as a tools for penetration testing. The network attacks ARP-spoofing with the basic settings of network equipment is discussed. The results of the attack and passive study of the network model are presented. The attack was repeated after activation and configuration IP-MAC-Port Binding, as well as authentication of users based on IEEE 802.1 X standard (MACBased 802.1 X). The results proved the effectiveness of the chosen protective actions.
文章重点介绍了在访问控制的基础上,利用现有设备的基本设置,保护本地网络免受员工未经授权的访问(内部攻击)的建议。提出了使用基于MAC的接入配置文件(基于MAC的访问控制)。考虑了物理和通道级别的信息安全问题,以及最常见的攻击类型。出于研究目的,创建了一个典型局域网的模型,包括个人电脑、支持WiFi接入点的中兴ZXHN H208N调制解调器和将这些设备连接到网络的交换机DES-1210-52。使用线路Tx和Rx上的夹子与双绞线进行接触连接。Kali Linux、tcpdump、bettercap、Wireshark正在用作渗透测试的工具。讨论了网络攻击ARP欺骗与网络设备的基本设置。给出了网络模型的攻击和被动研究结果。在激活和配置IP MAC端口绑定以及基于IEEE 802.1 X标准(基于MAC的802.1 X)对用户进行身份验证后,该攻击再次发生。结果证明了所选择的保护措施的有效性。
{"title":"РАЗГРАНИЧЕНИЕ ДОСТУПА В ЛОКАЛЬНОЙ СЕТИ С ИСПОЛЬЗОВАНИЕМ БАЗОВЫХ НАСТРОЕК СЕТЕВОГО ОБОРУДОВАНИЯ","authors":"С. Н. Петров, Д. В. Ахраменко, С. М. Горошко, Т. А. Пулко","doi":"10.21122/2309-4923-2018-3-55-61","DOIUrl":"https://doi.org/10.21122/2309-4923-2018-3-55-61","url":null,"abstract":"The article focused on recommendations for the local network protection from unauthorized access of employees (insider attacks) on the basis of access control, using the basic settings of existing equipment. The use of MAC-based access profiles (MAC-based Access Control) is proposed. The problems of information security at the physical and channel levels, as well as the most common types of attacks are considered. For research purposes, a mockup of a typical local area network was created, including personal computers, ZTE ZXHN H208N modem with support WiFi-access point and the switch DES-1210-52, which connected these devices to the network. Made contact connection to the twisted-pair with clips on the lines Tx and Rx. Kali Linux, tcpdump, bettercap, Wireshark are using as a tools for penetration testing. The network attacks ARP-spoofing with the basic settings of network equipment is discussed. The results of the attack and passive study of the network model are presented. The attack was repeated after activation and configuration IP-MAC-Port Binding, as well as authentication of users based on IEEE 802.1 X standard (MACBased 802.1 X). The results proved the effectiveness of the chosen protective actions.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"1 1","pages":"55-61"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48565255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ИСПОЛЬЗОВАНИЕ ИНТЕЛЛЕКТУАЛЬНЫХ И БЛОКЧЕЙН ТЕХНОЛОГИЙ В ИНФОРМАЦИОННОМ УПРАВЛЕНИИ 智能和区块链技术在信息管理中的应用
Pub Date : 2018-06-12 DOI: 10.21122/2309-4923-2018-1-45-50
Владимир Анатольевич Вишняков
The aim of this work is the analysis of methods, approaches, technologies, means of information management (IM), using both conventional technologies and adding new intellectual and block chain. Trends in the use of intelligent technologies in information management are given. The developments in the field of intelligent agents based on semantic web, web-services and semantic web-services, the use of cloud computing (CC) are shown. The main ideas of semantic technologies, in which a page of the semantic network contains information in two languages: the natural and special, understood only by intelligent software agents (IA) are discussed. The use of block chain technology for the control of various material and non-material assets are done. Technically, the block chain technology is another application layer on top of the stack of the Internet protocols and can be integrated with the semantic level. The use of intelligent technologies in the information management in the cloud area with the work of IA. The intelligent web (web 3.0), which became the next stage in the development of the Internet is discussed. It forms the semantics on the ontology dase, creating new opportunities for IA to perform various user requests. Analyzes the major developments in the field of intellectualization of IM, and the main tendencies of their development. The result was a list of criteria and their values, which must meet an intelligent system for IM. As trends in the development of IM is considered the improvement of models and methods of joint activity of IA in the cloud area using block chain technology. Three directions of development of intellectual control system are proposed. As the development of information management proposed the creation of an instrumental platform based on multi agent approach, integrating semantic and block chain technology in the cloud area.
这项工作的目的是分析方法,途径,技术,信息管理(IM)的手段,既使用传统技术,又添加新的智能和区块链。给出了在信息管理中使用智能技术的趋势。介绍了基于语义web、web服务和语义web服务的智能代理领域的发展,以及云计算(CC)的应用。讨论了语义技术的主要思想,其中语义网络的一个页面包含两种语言的信息:自然语言和特殊语言,只能由智能软件代理(IA)理解。利用区块链技术对各种物质和非物质资产进行控制。从技术上讲,区块链技术是互联网协议栈之上的另一个应用层,可以与语义层集成。利用智能技术在云领域的信息管理中配合IA的工作。讨论了智能网络(web 3.0),它将成为互联网发展的下一个阶段。它在本体数据库上形成语义,为IA执行各种用户请求创造了新的机会。分析了IM智能化领域的主要进展,以及其发展的主要趋势。结果是一个标准及其值的列表,这些标准和值必须满足IM的智能系统。随着IM的发展趋势被认为是使用区块链技术改进云领域IA联合活动的模型和方法。提出了智能控制系统的三个发展方向。随着信息管理的发展,提出了基于多智能体方法,在云领域集成语义和区块链技术的工具平台的创建。
{"title":"ИСПОЛЬЗОВАНИЕ ИНТЕЛЛЕКТУАЛЬНЫХ И БЛОКЧЕЙН ТЕХНОЛОГИЙ В ИНФОРМАЦИОННОМ УПРАВЛЕНИИ","authors":"Владимир Анатольевич Вишняков","doi":"10.21122/2309-4923-2018-1-45-50","DOIUrl":"https://doi.org/10.21122/2309-4923-2018-1-45-50","url":null,"abstract":"The aim of this work is the analysis of methods, approaches, technologies, means of information management (IM), using both conventional technologies and adding new intellectual and block chain. Trends in the use of intelligent technologies in information management are given. The developments in the field of intelligent agents based on semantic web, web-services and semantic web-services, the use of cloud computing (CC) are shown. The main ideas of semantic technologies, in which a page of the semantic network contains information in two languages: the natural and special, understood only by intelligent software agents (IA) are discussed. The use of block chain technology for the control of various material and non-material assets are done. Technically, the block chain technology is another application layer on top of the stack of the Internet protocols and can be integrated with the semantic level. The use of intelligent technologies in the information management in the cloud area with the work of IA. The intelligent web (web 3.0), which became the next stage in the development of the Internet is discussed. It forms the semantics on the ontology dase, creating new opportunities for IA to perform various user requests. Analyzes the major developments in the field of intellectualization of IM, and the main tendencies of their development. The result was a list of criteria and their values, which must meet an intelligent system for IM. As trends in the development of IM is considered the improvement of models and methods of joint activity of IA in the cloud area using block chain technology. Three directions of development of intellectual control system are proposed. As the development of information management proposed the creation of an instrumental platform based on multi agent approach, integrating semantic and block chain technology in the cloud area.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"373 1","pages":"45-50"},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68015513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Sistemnyj Analiz i Prikladnaa Informatika
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1