V. Vishnevsky, A. Larionov, Maxim Zvyagin, T. Dinh, Anton Ovchinnikov, R. Kirichek
In recent years, the market for UAV is actively developing as new ways of using UAVs for both personal and industrial applications are being discovered. Many of their core differences allow employment of UAVs in greater numbers than their manned counterparts. A variety of tasks can be accomplished more efficiently by simultaneous usage of multiple UAVs, but this requires a high level of coordination between UAVs. This article discusses features, approaches, and algorithms of UAV group interaction and describes the developed software for centralized control of a small group of UAVs without direct communication between the group members.
{"title":"Software development for controlling a group of UAVs","authors":"V. Vishnevsky, A. Larionov, Maxim Zvyagin, T. Dinh, Anton Ovchinnikov, R. Kirichek","doi":"10.1145/3440749.3442614","DOIUrl":"https://doi.org/10.1145/3440749.3442614","url":null,"abstract":"In recent years, the market for UAV is actively developing as new ways of using UAVs for both personal and industrial applications are being discovered. Many of their core differences allow employment of UAVs in greater numbers than their manned counterparts. A variety of tasks can be accomplished more efficiently by simultaneous usage of multiple UAVs, but this requires a high level of coordination between UAVs. This article discusses features, approaches, and algorithms of UAV group interaction and describes the developed software for centralized control of a small group of UAVs without direct communication between the group members.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vu Nguyen, Jongoh Park, Kyeongjin Joo, Thi Tra Vinh Tran, Trung Tin Tran, Joo-Yeon Choi
The human temperature measurement system has been widely applying in hospitals and public areas during the widespread Covid-19 pandemic. However, the current systems in the quarantine checkpoint are only capable of measuring the human temperature; however, it can not combine with the identification of facial recognition, human temperature information, and wearing mask detection. In addition, in the hospitals as well as the public areas such as schools, libraries, train stations, airports, etc. facial recognition of employees combined with temperature measurement and masking will save the time check and update employee status immediately. This study proposes a method that combines body temperature measurement, facial recognition, and masking based on deep learning. Furthermore, the proposed method adds the ability to prevent spoofing between a real face and face-in-image recognition. A depth camera is used in the proposed system to measure and calculate the length between the human's face and camera to approach the best accuracy of facial recognition and anti-spoofing. Moreover, a low-cost thermal camera measures the human body temperature. The methodology and algorithm for the human face and body temperature recognition are validated through the experimental results.
{"title":"Human Face Recognition and Temperature Measurement Based on Deep Learning for Covid-19 Quarantine Checkpoint","authors":"Vu Nguyen, Jongoh Park, Kyeongjin Joo, Thi Tra Vinh Tran, Trung Tin Tran, Joo-Yeon Choi","doi":"10.1145/3440749.3442654","DOIUrl":"https://doi.org/10.1145/3440749.3442654","url":null,"abstract":"The human temperature measurement system has been widely applying in hospitals and public areas during the widespread Covid-19 pandemic. However, the current systems in the quarantine checkpoint are only capable of measuring the human temperature; however, it can not combine with the identification of facial recognition, human temperature information, and wearing mask detection. In addition, in the hospitals as well as the public areas such as schools, libraries, train stations, airports, etc. facial recognition of employees combined with temperature measurement and masking will save the time check and update employee status immediately. This study proposes a method that combines body temperature measurement, facial recognition, and masking based on deep learning. Furthermore, the proposed method adds the ability to prevent spoofing between a real face and face-in-image recognition. A depth camera is used in the proposed system to measure and calculate the length between the human's face and camera to approach the best accuracy of facial recognition and anti-spoofing. Moreover, a low-cost thermal camera measures the human body temperature. The methodology and algorithm for the human face and body temperature recognition are validated through the experimental results.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"89 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131527046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IoT devices are known to be small, with limited computational and energy capacity. The proliferation of these connected devices and the vulnerabilities resulted from their limitations could lead to threats such as leakage of sensitive information and privacy breach problems. The amount of data generated and transmitted through the IoT is substantial, where this data can be accessed by external entities. Therefore, it is necessary to have an encryption-based system that guarantees the security of this data from unauthorized access. In this paper, we propose Ciphertext Policy Attribute-Based Encryption (CP-ABE) as an encryption solution for data in transit or stored. The proposed solution aims to secure the access control at all layers of communication using (CP-ABE). To evaluate the proposed method, we have conducted performance comparison in every layer of our proposed network topology by measuring the power consumption, After testing the encryption on layers, there is a better layer in performance in terms of the power consumption, and therefore it is better to apply the encryption based on performance measurements by custom simulator that combines the CP-ABE and Internet of Things and Fog Simulation (iFogsim).
{"title":"A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart Homes","authors":"Hmdah Alsolami, O. Bamasag, A. Aljahdali","doi":"10.1145/3440749.3442598","DOIUrl":"https://doi.org/10.1145/3440749.3442598","url":null,"abstract":"IoT devices are known to be small, with limited computational and energy capacity. The proliferation of these connected devices and the vulnerabilities resulted from their limitations could lead to threats such as leakage of sensitive information and privacy breach problems. The amount of data generated and transmitted through the IoT is substantial, where this data can be accessed by external entities. Therefore, it is necessary to have an encryption-based system that guarantees the security of this data from unauthorized access. In this paper, we propose Ciphertext Policy Attribute-Based Encryption (CP-ABE) as an encryption solution for data in transit or stored. The proposed solution aims to secure the access control at all layers of communication using (CP-ABE). To evaluate the proposed method, we have conducted performance comparison in every layer of our proposed network topology by measuring the power consumption, After testing the encryption on layers, there is a better layer in performance in terms of the power consumption, and therefore it is better to apply the encryption based on performance measurements by custom simulator that combines the CP-ABE and Internet of Things and Fog Simulation (iFogsim).","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123603019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper describes the hybrid model of a NoSQL database for storing and subsequent processing of attributes of users, applications, devices, packets containing information on the use of steganographic methods to search for the insiders in corporate networks. Experiments were carried out with data on the network activity of users.
{"title":"Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model","authors":"Igor Kotenko, A. Krasov, I. Ushakov, K. Izrailov","doi":"10.1145/3440749.3442612","DOIUrl":"https://doi.org/10.1145/3440749.3442612","url":null,"abstract":"The paper describes the hybrid model of a NoSQL database for storing and subsequent processing of attributes of users, applications, devices, packets containing information on the use of steganographic methods to search for the insiders in corporate networks. Experiments were carried out with data on the network activity of users.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Binary non-autonomous shift registers, which are widely used as intermediate nodes in cascade pseudo-random sequence generators, are considered. The joint statistical properties of the symbols of the input and output sequences of such registers are studied depending on the used output function. A geometric approach is proposed for description of such properties, within the framework of which the output function can be characterized by its polygon in the unit square [0, 1] × [0, 1]. The properties of such polygons and their relationship with the properties of the used output function are investigated.
{"title":"Polygons characterizing the joint statistical properties of the input and output sequences of the binary shift register","authors":"S. Melnikov, K. Samouylov","doi":"10.1145/3440749.3442601","DOIUrl":"https://doi.org/10.1145/3440749.3442601","url":null,"abstract":"Binary non-autonomous shift registers, which are widely used as intermediate nodes in cascade pseudo-random sequence generators, are considered. The joint statistical properties of the symbols of the input and output sequences of such registers are studied depending on the used output function. A geometric approach is proposed for description of such properties, within the framework of which the output function can be characterized by its polygon in the unit square [0, 1] × [0, 1]. The properties of such polygons and their relationship with the properties of the used output function are investigated.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Abul Hassan, Syed Irfan Ullah, I. Khan, Syed Bilal Hussain Shah, Abdus Salam, A. Khan
Flying Ad-hoc Networks creates rapid topology changes that causes routing problems between Unmanned Aerial Vehicle and ground base station. Mobile Ad-hoc networks and Vehicular Ad-hoc network protocols are conventionally adopted to overcome routing issues. But Still, they do not fully address the routing problem in Flying Ad-hoc Networks. In this paper, Fisheye state routing protocol is implemented and evaluated to fully overcome routing issues in a Flying Ad-hoc Network and fully utilize the limited resource of Unmanned Aerial Vehicles. Performance evaluation is measured in terms of throughput, average end-to-end delay, packet drop analysis as congestion measure with Ad-Hoc On-Demand Distance Vector (AODV), Distance Sequence Distance Vector (DSDV), Optimized Link State Routing (OLSR), Temporary Ordered Routing Protocol (TORA) and Dynamic Source Routing (DSR). Fisheye state routing protocol showed promising results regarding throughput, packet drop rate, and average end-to-end delay compared with traditional protocols. Moreover, with the suggested improvement of the parameters, network lifetime is increased, and resources harvesting becomes under control.
{"title":"Unmanned Aerial Vehicles Routing Formation Using Fisheye State Routing for Flying Ad-hoc Networks","authors":"Muhammad Abul Hassan, Syed Irfan Ullah, I. Khan, Syed Bilal Hussain Shah, Abdus Salam, A. Khan","doi":"10.1145/3440749.3442600","DOIUrl":"https://doi.org/10.1145/3440749.3442600","url":null,"abstract":"Flying Ad-hoc Networks creates rapid topology changes that causes routing problems between Unmanned Aerial Vehicle and ground base station. Mobile Ad-hoc networks and Vehicular Ad-hoc network protocols are conventionally adopted to overcome routing issues. But Still, they do not fully address the routing problem in Flying Ad-hoc Networks. In this paper, Fisheye state routing protocol is implemented and evaluated to fully overcome routing issues in a Flying Ad-hoc Network and fully utilize the limited resource of Unmanned Aerial Vehicles. Performance evaluation is measured in terms of throughput, average end-to-end delay, packet drop analysis as congestion measure with Ad-Hoc On-Demand Distance Vector (AODV), Distance Sequence Distance Vector (DSDV), Optimized Link State Routing (OLSR), Temporary Ordered Routing Protocol (TORA) and Dynamic Source Routing (DSR). Fisheye state routing protocol showed promising results regarding throughput, packet drop rate, and average end-to-end delay compared with traditional protocols. Moreover, with the suggested improvement of the parameters, network lifetime is increased, and resources harvesting becomes under control.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126037549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vladimir Fomin, I. Aleksandrov, D. Gallyamov, R. Kirichek
The Internet of Things (IoT) algorithms process huge amounts of heterogeneous data in real-time. One of the most computationally intensive tasks using cloud technologies is the task of clustering and classifying data. The authors propose to develop an approach to data classification within the “Query by Similarity” paradigm, which uses the technology of data indexing based on Metric Access Methods (MAM). To improve the performance of data indexing, this paper proposes a similar nearest neighbor search method combining a multiple vantage point tree (MVP) and improved algorithms for processing the priority queue of nodes. The following two algorithms for processing the priority queue of nodes were developed: 1) algorithm for all kinds of points-queries, which makes it possible to take into account parent nodes of all higher levels; 2) algorithm for grouped based on clustering of points-queries by reusing previously obtained search results. Experimental results confirm the effectiveness of the proposed approaches and algorithms.
{"title":"Modified Indexing Algorithm based on Priority Queue in Metric Space for MVP Tree","authors":"Vladimir Fomin, I. Aleksandrov, D. Gallyamov, R. Kirichek","doi":"10.1145/3440749.3442617","DOIUrl":"https://doi.org/10.1145/3440749.3442617","url":null,"abstract":"The Internet of Things (IoT) algorithms process huge amounts of heterogeneous data in real-time. One of the most computationally intensive tasks using cloud technologies is the task of clustering and classifying data. The authors propose to develop an approach to data classification within the “Query by Similarity” paradigm, which uses the technology of data indexing based on Metric Access Methods (MAM). To improve the performance of data indexing, this paper proposes a similar nearest neighbor search method combining a multiple vantage point tree (MVP) and improved algorithms for processing the priority queue of nodes. The following two algorithms for processing the priority queue of nodes were developed: 1) algorithm for all kinds of points-queries, which makes it possible to take into account parent nodes of all higher levels; 2) algorithm for grouped based on clustering of points-queries by reusing previously obtained search results. Experimental results confirm the effectiveness of the proposed approaches and algorithms.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information security is earning more attention due to the increase in the size of the data being exchanged over the network. One of the suggested solutions to preserve the secrecy is the cryptography of the information by turning them into codes before the data transfer. The stenographic technique is another way to protect the information, and it is based on hiding the information from the advisory. Cryptography and steganography are methods that allow the information to be sent securely. Current studies suggest that the integration of cryptography and steganography techniques will provide more security and confidentiality compared with the application of each technique individually. The DNA steganography uses the DNA sequence as a carrier to enable secure transfer of the critical data. The principle of this technique is basically to encrypt and conceal messages within high capacity of DNA strands to prevent adversaries from reading and deciphering the messages. This research intends to develop a technique that integrates the sciences of steganography and cryptography to protect the secret fingerprint image in the communication channel and to preserve the confidentiality of the information.
{"title":"An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA Sequence","authors":"Wala'a Al-Ahmadi, A. Aljahdali, A. Munshi","doi":"10.1145/3440749.3442639","DOIUrl":"https://doi.org/10.1145/3440749.3442639","url":null,"abstract":"Information security is earning more attention due to the increase in the size of the data being exchanged over the network. One of the suggested solutions to preserve the secrecy is the cryptography of the information by turning them into codes before the data transfer. The stenographic technique is another way to protect the information, and it is based on hiding the information from the advisory. Cryptography and steganography are methods that allow the information to be sent securely. Current studies suggest that the integration of cryptography and steganography techniques will provide more security and confidentiality compared with the application of each technique individually. The DNA steganography uses the DNA sequence as a carrier to enable secure transfer of the critical data. The principle of this technique is basically to encrypt and conceal messages within high capacity of DNA strands to prevent adversaries from reading and deciphering the messages. This research intends to develop a technique that integrates the sciences of steganography and cryptography to protect the secret fingerprint image in the communication channel and to preserve the confidentiality of the information.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are three interrelated concepts of development of telecommunication networks today: 5G, 6G and Network 2030. The creation of fifth-generation telecommunication networks is the first step towards a fundamental modernization of telecommunication networks towards the emergence of ultra-highly reliable networks with ultra-low delays [3]. Ultra low delays due to fundamental restrictions on the speed of propagation of light lead to decentralization of the network and create preconditions for the decentralization of the economy. If the delay is limited to a value of, for example, 1ms, taking into account the application of this value to the two-way delay and assuming the use of modern high-bandwidth systems as transmission systems, the network range for providing, for example, Tactile Internet services is limited to about 50 km [1, 2]. This means that the operator’s resources (for example, data centers) in communication networks with ultra low latency should be located, if possible, in the center of a circle with a radius of 50 km. This is the decentralization of the network. The Russian Federation will need at least 6-8 thousand data processing centers installed, including in district centers. Naturally, along with it, the economy will decentralize by reducing the digital divide between different territories, which is one of the main tasks of building the state’s digital economy. This process will already begin with the introduction of sixth generation telecommunication networks. One of the most important applications for 2030 networks is the widespread use and distribution of avatars and human holographic copies to reproduce and perform the actions of the person who controls them (telepresence). These networks should effectively reduce the digital device between territories, as well as effectively resist pandemic-like phenomena through telepresence services.
{"title":"Network Decentralization","authors":"A. Koucheryavy","doi":"10.1145/3440749.3442648","DOIUrl":"https://doi.org/10.1145/3440749.3442648","url":null,"abstract":"There are three interrelated concepts of development of telecommunication networks today: 5G, 6G and Network 2030. The creation of fifth-generation telecommunication networks is the first step towards a fundamental modernization of telecommunication networks towards the emergence of ultra-highly reliable networks with ultra-low delays [3]. Ultra low delays due to fundamental restrictions on the speed of propagation of light lead to decentralization of the network and create preconditions for the decentralization of the economy. If the delay is limited to a value of, for example, 1ms, taking into account the application of this value to the two-way delay and assuming the use of modern high-bandwidth systems as transmission systems, the network range for providing, for example, Tactile Internet services is limited to about 50 km [1, 2]. This means that the operator’s resources (for example, data centers) in communication networks with ultra low latency should be located, if possible, in the center of a circle with a radius of 50 km. This is the decentralization of the network. The Russian Federation will need at least 6-8 thousand data processing centers installed, including in district centers. Naturally, along with it, the economy will decentralize by reducing the digital divide between different territories, which is one of the main tasks of building the state’s digital economy. This process will already begin with the introduction of sixth generation telecommunication networks. One of the most important applications for 2030 networks is the widespread use and distribution of avatars and human holographic copies to reproduce and perform the actions of the person who controls them (telepresence). These networks should effectively reduce the digital device between territories, as well as effectively resist pandemic-like phenomena through telepresence services.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, the problem of automating the software delivery processes and resource configuring in computing environments with parallel and distributed architectures to ensure the functioning of digital twins is highly relevant. A large spectrum of the well-known tools for software configuration management is available. However, most of them do not solve problems emerging in the considered subject domain fully. To this end, we propose a new framework for implementing preparing, debugging, delivering, testing, deploying, and configuring virtualized software of digital twins. Currently, we are developing such twins for analyzing the operation of environmentally friendly equipment of infrastructural objects located in the Baikal natural territory. The proposed framework is based on the integrated applying methods and tools of knowledge engineering, multi-agent technologies, conceptual and service-oriented programming, and administration of hybrid distributed computing systems. These systems can include both personal resources and resources of public access centers, grid systems, and cloud or fog platforms. We carried out the practical experiments with the framework prototype. The obtained results have shown that significant speedup in performing the aforementioned processes can be achieved.
{"title":"Agent-Based DevOps of Software and Hardware Resources for Digital Twins of Infrastructural Objects","authors":"R. Kostromin, A. Feoktistov","doi":"10.1145/3440749.3442599","DOIUrl":"https://doi.org/10.1145/3440749.3442599","url":null,"abstract":"Nowadays, the problem of automating the software delivery processes and resource configuring in computing environments with parallel and distributed architectures to ensure the functioning of digital twins is highly relevant. A large spectrum of the well-known tools for software configuration management is available. However, most of them do not solve problems emerging in the considered subject domain fully. To this end, we propose a new framework for implementing preparing, debugging, delivering, testing, deploying, and configuring virtualized software of digital twins. Currently, we are developing such twins for analyzing the operation of environmentally friendly equipment of infrastructural objects located in the Baikal natural territory. The proposed framework is based on the integrated applying methods and tools of knowledge engineering, multi-agent technologies, conceptual and service-oriented programming, and administration of hybrid distributed computing systems. These systems can include both personal resources and resources of public access centers, grid systems, and cloud or fog platforms. We carried out the practical experiments with the framework prototype. The obtained results have shown that significant speedup in performing the aforementioned processes can be achieved.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}