Pub Date : 2022-10-28DOI: 10.31799/1684-8853-2022-5-23-31
O. Isaeva, S. Isaev, N. Kulyasov
Intoduction: the possibility of interaction with the physical world through the network infrastructures of spatially distributed nodes of Internet of Things, despite the undeniable advantages of the technology, produce significant loads on information consumers. In this regard, the current interest is the creation of methods that provide the reduction of transmitted data due to the adaptive synchronization of monitoring systems with the time of real processes. One effective way to solve this problem is to use the discrete Fourier transform to determine the sampling period of the observations. Purpose: to develop an approach to the formation of adaptive data broker subscriptions based on the study of the cyclicity of observations of Internet of Things devices. Methods: the discrete Fourier transform method was applied and, based on the calculated parameters of the harmonic series, a conclusion about the frequency characteristics of the data was made. The main peaks describing the periodicity of the data are selected, the fluctuation points are determined and, according to the Kotelnikov theorem (Nyquist-Kotelnikov-Shannon Sampling Theorem), a sampling frequency that provides a sufficient intensity of observations is chosen. Results: within the corporate network of the Krasnoyarsk Scientific Center, an infrastructure of devices and applications of the Internet of Things has been deployed to monitor temperature, humidity and PM2.5 in specialized technological rooms with telecommunications equipment. The analysis showed that for different rooms the data are periodic, but their harmonic profiles do not coincide. The choice of harmonic values, the fluctuation amplitude of which determines the dynamics of changes in the observed data, should be carried out periodically for each observed device. This approach is implemented in the broker software, which distributes data in subscriptions from each of the devices in accordance with the frequency of their changes. Practical relevance: the analysis of the frequency characteristics of the data determines the broker settings, which distributes the information flows, which is one of the aspects of reliability of the IoT infrastructure. In addition, observing data changes will allow us to identify malfunctions in the operation of cooling systems, which can lead to the failure of complex, expensive equipment with increased heat irradiation.
{"title":"Formation of adaptive subscriptions to the Internet of things data broker","authors":"O. Isaeva, S. Isaev, N. Kulyasov","doi":"10.31799/1684-8853-2022-5-23-31","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-5-23-31","url":null,"abstract":"Intoduction: the possibility of interaction with the physical world through the network infrastructures of spatially distributed nodes of Internet of Things, despite the undeniable advantages of the technology, produce significant loads on information consumers. In this regard, the current interest is the creation of methods that provide the reduction of transmitted data due to the adaptive synchronization of monitoring systems with the time of real processes. One effective way to solve this problem is to use the discrete Fourier transform to determine the sampling period of the observations. Purpose: to develop an approach to the formation of adaptive data broker subscriptions based on the study of the cyclicity of observations of Internet of Things devices. Methods: the discrete Fourier transform method was applied and, based on the calculated parameters of the harmonic series, a conclusion about the frequency characteristics of the data was made. The main peaks describing the periodicity of the data are selected, the fluctuation points are determined and, according to the Kotelnikov theorem (Nyquist-Kotelnikov-Shannon Sampling Theorem), a sampling frequency that provides a sufficient intensity of observations is chosen. Results: within the corporate network of the Krasnoyarsk Scientific Center, an infrastructure of devices and applications of the Internet of Things has been deployed to monitor temperature, humidity and PM2.5 in specialized technological rooms with telecommunications equipment. The analysis showed that for different rooms the data are periodic, but their harmonic profiles do not coincide. The choice of harmonic values, the fluctuation amplitude of which determines the dynamics of changes in the observed data, should be carried out periodically for each observed device. This approach is implemented in the broker software, which distributes data in subscriptions from each of the devices in accordance with the frequency of their changes. Practical relevance: the analysis of the frequency characteristics of the data determines the broker settings, which distributes the information flows, which is one of the aspects of reliability of the IoT infrastructure. \u0000In addition, observing data changes will allow us to identify malfunctions in the operation of cooling systems, which can lead to the failure of complex, expensive equipment with increased heat irradiation.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49617212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-28DOI: 10.31799/1684-8853-2022-5-12-22
Anastasiya Dvoynikova, I. Kagirov, A. Karpov
Introduction: The solution of the task of the recognition and assessment of user engagement in the acts of human-machine interaction or telecommunication, achieved through the use of automatic means, is highly important in computer recognition of human psycho-emotional states. This is necessary for e-learning, business and entertainment applications design. Purpose: To conduct a comparative analysis of the current information support in the field of automatic recognition and assessment of user involvement in human-machine interaction or virtual communication, as well as to establish a methodology for building a data body based on the idea of multimodal communication. Results: The conducted analysis of research papers has shown that in most existing databases there is a substantial lack of data for natural online communication. Moreover, not all databases contain different modalities in “human-machine-human” communication system. Text and audio modalities turn out to be important for a multilevel engagement classification task, aimed at the determination of engagement intensity. It is also promising to take into account “body language” features, such as facial expressions, movements of the body and the head, gestures. For the correct assessment of involvement, an engagement database must contain meta-data on the psycho-emotional states of communicants. Neural network-based approaches to the automatic detection of user engagement show the best performance. Practical relevance: Based on the obtained analytical conclusions, the authors of the paper are going to elaborate an original software system for automatic recognition of user engagement, and to collect a data set for machine learning purposes. The presented review formulates basic requirements for such systems and contributes to the solution of the problem of automatic recognition of psycho-emotional states. Discussion: The survey leads to the conclusion that the notion of engagement as understood in studies on automatic emotion recognition differs from that used in psychology. User (or communicant) engagement in terms of info- and communicative sphere implies the manifestation of a person's mental activity level (emotional, cognitive, and behavioral components) changing dynamically while interacting with another person or computer system.
{"title":"Analytical review of methods for automatic detection of user engagement in virtual communication","authors":"Anastasiya Dvoynikova, I. Kagirov, A. Karpov","doi":"10.31799/1684-8853-2022-5-12-22","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-5-12-22","url":null,"abstract":"Introduction: The solution of the task of the recognition and assessment of user engagement in the acts of human-machine interaction or telecommunication, achieved through the use of automatic means, is highly important in computer recognition of human psycho-emotional states. This is necessary for e-learning, business and entertainment applications design. Purpose: To conduct a comparative analysis of the current information support in the field of automatic recognition and assessment of user involvement in human-machine interaction or virtual communication, as well as to establish a methodology for building a data body based on the idea of multimodal communication. Results: The conducted analysis of research papers has shown that in most existing databases there is a substantial lack of data for natural online communication. Moreover, not all databases contain different modalities in “human-machine-human” communication system. Text and audio modalities turn out to be important for a multilevel engagement classification task, aimed at the determination of engagement intensity. It is also promising to take into account “body language” features, such as facial expressions, movements of the body and the head, gestures. For the correct assessment of involvement, an engagement database must contain meta-data on the psycho-emotional states of communicants. Neural network-based approaches to the automatic detection of user engagement show the best performance. Practical relevance: Based on the obtained analytical conclusions, the authors of the paper are going to elaborate an original software system for automatic recognition of user engagement, and to collect a data set for machine learning purposes. The presented review formulates basic requirements for such systems and contributes to the solution of the problem of automatic recognition of psycho-emotional states. Discussion: The survey leads to the conclusion that the notion of engagement as understood in studies on automatic emotion recognition differs from that used in psychology. User (or communicant) engagement in terms of info- and communicative sphere implies the manifestation of a person's mental activity level (emotional, cognitive, and behavioral components) changing dynamically while interacting with another person or computer system.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46965286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-12DOI: 10.31799/1684-8853-2022-4-29-43
V. Kuzmin, A. Menisov
Introduction: In the era of information technology almost all organizations face a wide range of automated and rapidly spreading cyber threats. This is due not only to the growing complexity, diversity and scale of digitalization, but also to the enlargement of cyber threats and the area of their possible implementation. Purpose: To compare possible ways of improving the effectiveness of attack detection for the objects of critical information infrastructure (CII): to detect a rare event, anomaly or novelty in the functions of the objects of CII. Results: The principle of operation of the proposed (effective) approach to cyberattack detection is to identify and separate anomalies from normal functioning of objects with the use of the concept of dynamic change of labels for a variable class over time. Dynamic novelty detection is compared to other approaches in terms of F1-score. For SWaT data, which is a layout of a critical information infrastructure object as an automated control system, it was determined that attack detection improved by up to 7% using the proposed approach. Practical relevance: The results of the research have shown a reduction in the risk of conducting (developing) a computer attack on critical information infrastructure objects. A possible targeted application of the dynamic novelty detection approach is to optimize the means of protecting information at critical information infrastructure facilities, as well as to integrate the proposed approach into the information security system as an intelligent detector.
{"title":"A study of ways and solutions to increase the efficiency of detecting computer attacks on the objects of critical information infrastructure","authors":"V. Kuzmin, A. Menisov","doi":"10.31799/1684-8853-2022-4-29-43","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-29-43","url":null,"abstract":"Introduction: In the era of information technology almost all organizations face a wide range of automated and rapidly spreading cyber threats. This is due not only to the growing complexity, diversity and scale of digitalization, but also to the enlargement of cyber threats and the area of their possible implementation. Purpose: To compare possible ways of improving the effectiveness of attack detection for the objects of critical information infrastructure (CII): to detect a rare event, anomaly or novelty in the functions of the objects of CII. Results: The principle of operation of the proposed (effective) approach to cyberattack detection is to identify and separate anomalies from normal functioning of objects with the use of the concept of dynamic change of labels for a variable class over time. Dynamic novelty detection is compared to other approaches in terms of F1-score. For SWaT data, which is a layout of a critical information infrastructure object as an automated control system, it was determined that attack detection improved by up to 7% using the proposed approach. Practical relevance: The results of the research have shown a reduction in the risk of conducting (developing) a computer attack on critical information infrastructure objects. A possible targeted application of the dynamic novelty detection approach is to optimize the means of protecting information at critical information infrastructure facilities, as well as to integrate the proposed approach into the information security system as an intelligent detector.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48769507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-12DOI: 10.31799/1684-8853-2022-4-20-28
Konstantin Krestovnikov, A. Erashov
Introduction: The force-moment sensing of the functional surfaces in robots based on compact capacitive force sensors can significantly improve interaction with the environment and humans. Capacitive force sensors provide high measurement accuracy and speed, but the electromagnetic interference can affect significantly the signal. When processing signals the influence of external noise must be taken into account, which increases the computation time. Purpose: To apply the developed interface circuit for processing signals from capacitive primary force transducers in a real-world robot. Results: Experimental verification of the developed solutions implied simulation of a step of the pedipulator of an anthropomorphic robot with the calculation of the coordinates of the center of pressure exerted on the foot with the four installed capacitive sensors. Software filtering and measuring capabilities of the microcontroller made it possible to achieve a signal-to-noise ratio of approximately 62.24 dB, which allows a closed-loop control system to function correctly. The average time for calculating the coordinates of the center of pressure on the foot with software filtering of the signal on the on-board computer of the robot was from 3.1 to 6.1 ms and meets the requirements for the sensory system of a walking robot. Practical relevance: The interface circuit allows to scale the number of connected primary force transducers, while software processing allows to normalize transducer signals by applying the calculated correction factors. Proposed solutions can be used in different robotic systems for real-time force measurement.
{"title":"Signal processing of capacitive force sensors installed in the foot of an anthropomorphic robot","authors":"Konstantin Krestovnikov, A. Erashov","doi":"10.31799/1684-8853-2022-4-20-28","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-20-28","url":null,"abstract":"Introduction: The force-moment sensing of the functional surfaces in robots based on compact capacitive force sensors can significantly improve interaction with the environment and humans. Capacitive force sensors provide high measurement accuracy and speed, but the electromagnetic interference can affect significantly the signal. When processing signals the influence of external noise must be taken into account, which increases the computation time. Purpose: To apply the developed interface circuit for processing signals from capacitive primary force transducers in a real-world robot. Results: Experimental verification of the developed solutions implied simulation of a step of the pedipulator of an anthropomorphic robot with the calculation of the coordinates of the center of pressure exerted on the foot with the four installed capacitive sensors. Software filtering and measuring capabilities of the microcontroller made it possible to achieve a signal-to-noise ratio of approximately 62.24 dB, which allows a closed-loop control system to function correctly. The average time for calculating the coordinates of the center of pressure on the foot with software filtering of the signal on the on-board computer of the robot was from 3.1 to 6.1 ms and meets the requirements for the sensory system of a walking robot. Practical relevance: The interface circuit allows to scale the number of connected primary force transducers, while software processing allows to normalize transducer signals by applying the calculated correction factors. Proposed solutions can be used in different robotic systems for real-time force measurement.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69413379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-12DOI: 10.31799/1684-8853-2022-4-44-57
Duc C. Le, Mau Pham, Duy Dinh, Hao T. Do
Introduction: The rapid growth of malware and its malicious use result in significant financial losses for various organizations. Many researchers are interested in applying machine learning methods to solve the problem of malware detection. Nevertheless, because of the diversity of algorithms, each machine learning algorithm has its advantages and disadvantages for a given situation. Purpose: To apply machine learning for malware detection in the Windows operating system using Portable Executable header; to compare six different machine learning algorithms based on several criteria. Results: The comparison of various algorithms, including such classifiers as Random Forest, Decision Tree, Naive Bayes, Support Vector Machine, Multilayer Perceptron, k-Nearest Neighbors algorithm with a large dataset shows that some algorithms such as Random Forest, Decision Tree, k-Nearest Neighbors, and Multilayer Perceptron can detect malware with very high accuracy (> 98%). The Random Forest algorithm is especially well suited for Windows OS malwaredetection. At the same time, Naive Bayes classifier also has a high accuracy rate (> 96%) and fast processing time. Therefore, we may consider using Naive Bayes as an alternative.
{"title":"Applying machine learning algorithms for PE-header-based malware detection on the Windows operating system","authors":"Duc C. Le, Mau Pham, Duy Dinh, Hao T. Do","doi":"10.31799/1684-8853-2022-4-44-57","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-44-57","url":null,"abstract":"Introduction: The rapid growth of malware and its malicious use result in significant financial losses for various organizations. Many researchers are interested in applying machine learning methods to solve the problem of malware detection. Nevertheless, because of the diversity of algorithms, each machine learning algorithm has its advantages and disadvantages for a given situation. Purpose: To apply machine learning for malware detection in the Windows operating system using Portable Executable header; to compare six different machine learning algorithms based on several criteria. Results: The comparison of various algorithms, including such classifiers as Random Forest, Decision Tree, Naive Bayes, Support Vector Machine, Multilayer Perceptron, k-Nearest Neighbors algorithm with a large dataset shows that some algorithms such as Random Forest, Decision Tree, k-Nearest Neighbors, and Multilayer Perceptron can detect malware with very high accuracy (> 98%). The Random Forest algorithm is especially well suited for Windows OS malwaredetection. At the same time, Naive Bayes classifier also has a high accuracy rate (> 96%) and fast processing time. Therefore, we may consider using Naive Bayes as an alternative.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49522189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-12DOI: 10.31799/1684-8853-2022-4-12-19
A. Gorbunova, V. Vishnevsky
Introduction: The amount of digital data is constantly growing as well as the need for its storage and processing for various purposes. To conduct data analysis, high-performance computing environments associated with parallelization methods, and, accordingly, data-intensive applications are used. The lack of quality tools for evaluating the effectiveness of the process of parallel data processing or tasks leads to excessive allocation of resources. Purpose: To develop mathematical models of data-intensive computing environments and methods for their performance analysis, i.e., for estimating the average system response time based on the data on system performance at the level of subtask solving. Results: We present a mathematical model of a parallel computing system in the form of a queueing system with parallel query processing on various architectures, including non-Poisson input flow and non-exponential service times. As a method for analyzing the average response time, we use a combination of simulation modeling with one of the machine learning methods (artificial neural networks). The effectiveness of the method is confirmed by numerical experiments and depends neither on the type of input flow, nor on the type of distribution of query service times, nor on the number of servers in the nodes of the system. The approximation error of the average response time does not exceed 10%, which makes it possible to optimize the generally accepted resource allocation, significantly reducing the amount of the resources. Practical relevance: The presented models and the method of their analysis can be used for efficient planning and allocation of resources for data-intensive systems.
{"title":"Estimating the response time of a data-intensive computing environment","authors":"A. Gorbunova, V. Vishnevsky","doi":"10.31799/1684-8853-2022-4-12-19","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-12-19","url":null,"abstract":"Introduction: The amount of digital data is constantly growing as well as the need for its storage and processing for various purposes. To conduct data analysis, high-performance computing environments associated with parallelization methods, and, accordingly, data-intensive applications are used. The lack of quality tools for evaluating the effectiveness of the process of parallel data processing or tasks leads to excessive allocation of resources. Purpose: To develop mathematical models of data-intensive computing environments and methods for their performance analysis, i.e., for estimating the average system response time based on the data on system performance at the level of subtask solving. Results: We present a mathematical model of a parallel computing system in the form of a queueing system with parallel query processing on various architectures, including non-Poisson input flow and non-exponential service times. As a method for analyzing the average response time, we use a combination of simulation modeling with one of the machine learning methods (artificial neural networks). The effectiveness of the method is confirmed by numerical experiments and depends neither on the type of input flow, nor on the type of distribution of query service times, nor on the number of servers in the nodes of the system. The approximation error of the average response time does not exceed 10%, which makes it possible to optimize the generally accepted resource allocation, significantly reducing the amount of the resources. Practical relevance: The presented models and the method of their analysis can be used for efficient planning and allocation of resources for data-intensive systems.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44223361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-12DOI: 10.31799/1684-8853-2022-4-58-67
A. Tychkov, Denis Chernyhov, P. Churakov, Z. Yuldashev, N. Bofanova, A. Alimuradov, V. Gorbunov, R. Zolotarev, Mihail Nikitin
Introduction: Effective and prompt formulation of diagnostic conclusions about the presence of anxiety-phobic disorders requires the improvement of existing and the development of new methods for diagnosing and treating patients, including the use of virtual reality technology. Purpose: To analyze a reaction of an individual to a stimulus that triggers a fear response to virtual reality scenes (height exposure). To identify electroencephalographic (EEG) signal markers related to the level of anxiety and virtual reality environment susceptibility of an individual. Methods: A group of nine conditionally healthy males aged 23 to 26 years old who reported neither history of somatic symptoms nor organic brain disorders was formed to conduct the research. The immersion into virtual reality was accompanied by the registration of EEG signals and subsequent completion of a self-assessment questionnaire by the subjects. Results: The state of rest (a reference value) and the state of high emotional stress experience (at the height of a skyscraper) in the virtual reality environment were compared. The results obtained allow to make a conclusion that the simulated situation of being at a height causes a decrease in the indices of alpha, theta, beta rhythms, and an increase in the delta rhythm index of the EEG signal relative to the state of rest in various subjects, regardless of the intensity of fear manifestation. Practical relevance: The conducted research is among the pioneering studies in assessing the effect of virtual reality technologies on human phobic anxiety state. Some objective electrophysiological markers related to the level of anxiety were determined to confirm the presence of patterns in the functional state of the cerebral cortex with a sense of anxiety in individuals immersed in a virtual reality environment.
{"title":"Search for EEG signal patterns in simulating phobic anxiety disorder situations in a VR environment","authors":"A. Tychkov, Denis Chernyhov, P. Churakov, Z. Yuldashev, N. Bofanova, A. Alimuradov, V. Gorbunov, R. Zolotarev, Mihail Nikitin","doi":"10.31799/1684-8853-2022-4-58-67","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-58-67","url":null,"abstract":"Introduction: Effective and prompt formulation of diagnostic conclusions about the presence of anxiety-phobic disorders requires the improvement of existing and the development of new methods for diagnosing and treating patients, including the use of virtual reality technology. Purpose: To analyze a reaction of an individual to a stimulus that triggers a fear response to virtual reality scenes (height exposure). To identify electroencephalographic (EEG) signal markers related to the level of anxiety and virtual reality environment susceptibility of an individual. Methods: A group of nine conditionally healthy males aged 23 to 26 years old who reported neither history of somatic symptoms nor organic brain disorders was formed to conduct the research. The immersion into virtual reality was accompanied by the registration of EEG signals and subsequent completion of a self-assessment questionnaire by the subjects. Results: The state of rest (a reference value) and the state of high emotional stress experience (at the height of a skyscraper) in the virtual reality environment were compared. The results obtained allow to make a conclusion that the simulated situation of being at a height causes a decrease in the indices of alpha, theta, beta rhythms, and an increase in the delta rhythm index of the EEG signal relative to the state of rest in various subjects, regardless of the intensity of fear manifestation. Practical relevance: The conducted research is among the pioneering studies in assessing the effect of virtual reality technologies on human phobic anxiety state. Some objective electrophysiological markers related to the level of anxiety were determined to confirm the presence of patterns in the functional state of the cerebral cortex with a sense of anxiety in individuals immersed in a virtual reality environment.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41804941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-09DOI: 10.31799/1684-8853-2022-4-2-11
A. Timofeev, A. Sultanov, I. Meshkov, A. Gizatulin
Introduction: The transfer of image processing operations to the spectral region is considered. Due to the duality of information representation, coding, filtering, compression and other transformations are possible both in the space of an object and in the region of spatial frequencies, in relation to its spatial spectrum. Purpose: To evaluate the efficiency of performing image processing operations and arbitrary digital information in the spectral domain. Results: A method for spectral holographic coding is proposed, which provides a gain in noise immunity by 7–8 dB and has less complexity of coding and decoding when changing redundancy over a wide range. During the coding process, the source data block is replaced by a code word, which is a linear one-dimensional hologram of a virtual point source. For transmission over a communication channel, we synthesize a signal with a given spectrum, the shape of which is a one-dimensional hologram, with its values rounded to one bit and the hologram itself being a sequence of zeros and ones – one means the presence of the corresponding harmonic in the spectrum, zero means the absence. To create a signal with such a line spectrum, it suffices to add a set of harmonics of equal amplitude with numbers corresponding to the position numbers of the units in the hologram. This operation is one of the types of orthogonal frequency division multiplexing, characterized in that the frequencies of the orthogonal subcarriers are in a multiple ratio, and amplitude shift keying is used as digital modulation. We propose a spectral method for image compression based on a detailed analysis of the spatial spectrum of an image and the removal of a large number of insignificant areas from it. Practical relevance: The reduction in the amount of information and, accordingly, the size of the image can be 4–8 times or more with a slight decrease in image quality.
{"title":"Using the spectral approach in image and arbitrary data processing","authors":"A. Timofeev, A. Sultanov, I. Meshkov, A. Gizatulin","doi":"10.31799/1684-8853-2022-4-2-11","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-2-11","url":null,"abstract":"Introduction: The transfer of image processing operations to the spectral region is considered. Due to the duality of information representation, coding, filtering, compression and other transformations are possible both in the space of an object and in the region of spatial frequencies, in relation to its spatial spectrum. Purpose: To evaluate the efficiency of performing image processing operations and arbitrary digital information in the spectral domain. Results: A method for spectral holographic coding is proposed, which provides a gain in noise immunity by 7–8 dB and has less complexity of coding and decoding when changing redundancy over a wide range. During the coding process, the source data block is replaced by a code word, which is a linear one-dimensional hologram of a virtual point source. For transmission over a communication channel, we synthesize a signal with a given spectrum, the shape of which is a one-dimensional hologram, with its values rounded to one bit and the hologram itself being a sequence of zeros and ones – one means the presence of the corresponding harmonic in the spectrum, zero means the absence. To create a signal with such a line spectrum, it suffices to add a set of harmonics of equal amplitude with numbers corresponding to the position numbers of the units in the hologram. This operation is one of the types of orthogonal frequency division multiplexing, characterized in that the frequencies of the orthogonal subcarriers are in a multiple ratio, and amplitude shift keying is used as digital modulation. We propose a spectral method for image compression based on a detailed analysis of the spatial spectrum of an image and the removal of a large number of insignificant areas from it. Practical relevance: The reduction in the amount of information and, accordingly, the size of the image can be 4–8 times or more with a slight decrease in image quality.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45489658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.31799/1684-8853-2022-3-31-44
A. Sukhov
Introduction: Under the conditions of imperfect methods and means of detection and response to computer attacks there is a constant growth of destructive impacts aimed at critical information systems. This generates a need to develop research methods for early warning systems to provide information security in case of malware attacks. One of the effective ways to solve this problem is to use the methods of the theory of stochastic indicators. Purpose: The development of a tool for evaluating the effectiveness of the information security system functioning. Results: We describe deterministic, random and indefinite components of the information security system functioning. Constant and functional indicators are constructed, their distinctive features are revealed. To solve the problem of evaluating the effectiveness of the process under consideration stochastic superindicators are constructed. We have also described the features of the construction of stochastic indicators of different ranks on the basis of the theory of the effectiveness of targeted processes and purposeful systems. Practical relevance: Through the developed stochastic time indicators, the probabilistic and temporal characteristics of the destructive impact are estimated, with the intervals and time points of its occurrence taken into account. This allows the system to be timely warned of a possible destructive impact scenario for the elements of critical information infrastructure.
{"title":"Evaluating the effectiveness of the information security system process based on the theory of stochastic indicators","authors":"A. Sukhov","doi":"10.31799/1684-8853-2022-3-31-44","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-3-31-44","url":null,"abstract":"Introduction: Under the conditions of imperfect methods and means of detection and response to computer attacks there is a constant growth of destructive impacts aimed at critical information systems. This generates a need to develop research methods for early warning systems to provide information security in case of malware attacks. One of the effective ways to solve this problem is to use the methods of the theory of stochastic indicators. Purpose: The development of a tool for evaluating the effectiveness of the information security system functioning. Results: We describe deterministic, random and indefinite components of the information security system functioning. Constant and functional indicators are constructed, their distinctive features are revealed. To solve the problem of evaluating the effectiveness of the process under consideration stochastic superindicators are constructed. We have also described the features of the construction of stochastic indicators of different ranks on the basis of the theory of the effectiveness of targeted processes and purposeful systems. Practical relevance: Through the developed stochastic time indicators, the probabilistic and temporal characteristics of the destructive impact are estimated, with the intervals and time points of its occurrence taken into account. This allows the system to be timely warned of a possible destructive impact scenario for the elements of critical information infrastructure.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43102889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.31799/1684-8853-2022-3-45-54
A.Yu. Ovchinnikov
Introduction: Today the investigations of post-quantum cryptosystems secure against quantum computations is the area of great interest. An important direction here is code-based cryptography utilizing the mathematical problems from error-correcting coding theory. The improvement of existing code-based systems may be achieved both in practical part (reducing the key sizes) and theoretically by using more complicated mathematical code-based tasks. Purpose: The development of public-key code-based cryptosystem using low-density parity-check codes with burst correction; the estimation of the parameters of the obtained system. Results: The variant of code-based cryptosystem using random block permutation low-density parity-check codes is proposed. The cryptocomplexity of the system is supposed to be based on the complete decoding problem, which is believed to be a harder mathematical problem than those used in existing systems. With high probability, the analysis of the system by using decoding methods is not possible at all, which both increases the long-term cryptocomplexity of the system and allows to reduce the key size. The evaluation of the underlying code selection is performed, the approaches to the selection of the parameters of the proposed system on the basis of the required level of cryptocomplexity are considered. Practical relevance: The proposed system allows to reduce the public-key size as compared to the classical McEliece system, cryptocomplexity also comparable, with the underlying mathematical problem to be more stable against perspective attacks.
{"title":"The variant of post-quantum cryptosystem based on burst-correcting codes and on the complete decoding problem","authors":"A.Yu. Ovchinnikov","doi":"10.31799/1684-8853-2022-3-45-54","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-3-45-54","url":null,"abstract":"Introduction: Today the investigations of post-quantum cryptosystems secure against quantum computations is the area of great interest. An important direction here is code-based cryptography utilizing the mathematical problems from error-correcting coding theory. The improvement of existing code-based systems may be achieved both in practical part (reducing the key sizes) and theoretically by using more complicated mathematical code-based tasks. Purpose: The development of public-key code-based cryptosystem using low-density parity-check codes with burst correction; the estimation of the parameters of the obtained system. Results: The variant of code-based cryptosystem using random block permutation low-density parity-check codes is proposed. The cryptocomplexity of the system is supposed to be based on the complete decoding problem, which is believed to be a harder mathematical problem than those used in existing systems. With high probability, the analysis of the system by using decoding methods is not possible at all, which both increases the long-term cryptocomplexity of the system and allows to reduce the key size. The evaluation of the underlying code selection is performed, the approaches to the selection of the parameters of the proposed system on the basis of the required level of cryptocomplexity are considered. Practical relevance: The proposed system allows to reduce the public-key size as compared to the classical McEliece system, cryptocomplexity also comparable, with the underlying mathematical problem to be more stable against perspective attacks.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46383029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}