首页 > 最新文献

Informatsionno-Upravliaiushchie Sistemy最新文献

英文 中文
Formation of adaptive subscriptions to the Internet of things data broker 形成物联网数据代理的自适应订阅
Q3 Mathematics Pub Date : 2022-10-28 DOI: 10.31799/1684-8853-2022-5-23-31
O. Isaeva, S. Isaev, N. Kulyasov
Intoduction: the possibility of interaction with the physical world through the network infrastructures of spatially distributed nodes of Internet of Things, despite the undeniable advantages of the technology, produce significant loads on information consumers. In this regard, the current interest is the creation of methods that provide the reduction of transmitted data due to the adaptive synchronization of monitoring systems with the time of real processes. One effective way to solve this problem is to use the discrete Fourier transform to determine the sampling period of the observations. Purpose: to develop an approach to the formation of adaptive data broker subscriptions based on the study of the cyclicity of observations of Internet of Things devices. Methods: the discrete Fourier transform method was applied and, based on the calculated parameters of the harmonic series, a conclusion about the frequency characteristics of the data was made. The main peaks describing the periodicity of the data are selected, the fluctuation points are determined and, according to the Kotelnikov theorem (Nyquist-Kotelnikov-Shannon Sampling Theorem), a sampling frequency that provides a sufficient intensity of observations is chosen. Results: within the corporate network of the Krasnoyarsk Scientific Center, an infrastructure of devices and applications of the Internet of Things has been deployed to monitor temperature, humidity and PM2.5 in specialized technological rooms with telecommunications equipment. The analysis showed that for different rooms the data are periodic, but their harmonic profiles do not coincide. The choice of harmonic values, the fluctuation amplitude of which determines the dynamics of changes in the observed data, should be carried out periodically for each observed device. This approach is implemented in the broker software, which distributes data in subscriptions from each of the devices in accordance with the frequency of their changes. Practical relevance: the analysis of the frequency characteristics of the data determines the broker settings, which distributes the information flows, which is one of the aspects of reliability of the IoT infrastructure. In addition, observing data changes will allow us to identify malfunctions in the operation of cooling systems, which can lead to the failure of complex, expensive equipment with increased heat irradiation.
产品:通过物联网空间分布节点的网络基础设施与物理世界进行交互的可能性,尽管该技术具有不可否认的优势,但会给信息消费者带来巨大的负担。在这方面,当前的兴趣是创建由于监测系统与实际过程的时间的自适应同步而减少传输数据的方法。解决这个问题的一个有效方法是使用离散傅立叶变换来确定观测值的采样周期。目的:基于对物联网设备观测周期性的研究,开发一种形成自适应数据代理订阅的方法。方法:应用离散傅立叶变换方法,根据谐波级数的计算参数,对数据的频率特性进行总结。选择描述数据周期性的主峰,确定波动点,并且根据Kotelnikov定理(奈奎斯特·科特尔尼科夫-香农采样定理),选择提供足够观测强度的采样频率。结果:在克拉斯诺亚尔斯克科学中心的企业网络中,部署了物联网设备和应用的基础设施,用于在配有电信设备的专业技术室中监测温度、湿度和PM2.5。分析表明,对于不同的房间,数据是周期性的,但它们的谐波轮廓并不一致。谐波值的选择,其波动幅度决定了观测数据的动态变化,应定期为每个观测设备进行。这种方法在代理软件中实现,该软件根据每个设备的更改频率在订阅中分发数据。实际相关性:对数据频率特性的分析确定了分配信息流的代理设置,这是物联网基础设施可靠性的一个方面。此外,观察数据变化将使我们能够识别冷却系统运行中的故障,这些故障可能会导致复杂、昂贵的设备在热辐射增加的情况下发生故障。
{"title":"Formation of adaptive subscriptions to the Internet of things data broker","authors":"O. Isaeva, S. Isaev, N. Kulyasov","doi":"10.31799/1684-8853-2022-5-23-31","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-5-23-31","url":null,"abstract":"Intoduction: the possibility of interaction with the physical world through the network infrastructures of spatially distributed nodes of Internet of Things, despite the undeniable advantages of the technology, produce significant loads on information consumers. In this regard, the current interest is the creation of methods that provide the reduction of transmitted data due to the adaptive synchronization of monitoring systems with the time of real processes. One effective way to solve this problem is to use the discrete Fourier transform to determine the sampling period of the observations. Purpose: to develop an approach to the formation of adaptive data broker subscriptions based on the study of the cyclicity of observations of Internet of Things devices. Methods: the discrete Fourier transform method was applied and, based on the calculated parameters of the harmonic series, a conclusion about the frequency characteristics of the data was made. The main peaks describing the periodicity of the data are selected, the fluctuation points are determined and, according to the Kotelnikov theorem (Nyquist-Kotelnikov-Shannon Sampling Theorem), a sampling frequency that provides a sufficient intensity of observations is chosen. Results: within the corporate network of the Krasnoyarsk Scientific Center, an infrastructure of devices and applications of the Internet of Things has been deployed to monitor temperature, humidity and PM2.5 in specialized technological rooms with telecommunications equipment. The analysis showed that for different rooms the data are periodic, but their harmonic profiles do not coincide. The choice of harmonic values, the fluctuation amplitude of which determines the dynamics of changes in the observed data, should be carried out periodically for each observed device. This approach is implemented in the broker software, which distributes data in subscriptions from each of the devices in accordance with the frequency of their changes. Practical relevance: the analysis of the frequency characteristics of the data determines the broker settings, which distributes the information flows, which is one of the aspects of reliability of the IoT infrastructure. \u0000In addition, observing data changes will allow us to identify malfunctions in the operation of cooling systems, which can lead to the failure of complex, expensive equipment with increased heat irradiation.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49617212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical review of methods for automatic detection of user engagement in virtual communication 虚拟通信中用户参与度自动检测方法的分析综述
Q3 Mathematics Pub Date : 2022-10-28 DOI: 10.31799/1684-8853-2022-5-12-22
Anastasiya Dvoynikova, I. Kagirov, A. Karpov
Introduction: The solution of the task of the recognition and assessment of user engagement in the acts of human-machine interaction or telecommunication, achieved through the use of automatic means, is highly important in computer recognition of human psycho-emotional states. This is necessary for e-learning, business and entertainment applications design. Purpose: To conduct a comparative analysis of the current information support in the field of automatic recognition and assessment of user involvement in human-machine interaction or virtual communication, as well as to establish a methodology for building a data body based on the idea of multimodal communication. Results: The conducted analysis of research papers has shown that in most existing databases there is a substantial lack of data for natural online communication. Moreover, not all databases contain different modalities in “human-machine-human” communication system. Text and audio modalities turn out to be important for a multilevel engagement classification task, aimed at the determination of engagement intensity. It is also promising to take into account “body language” features, such as facial expressions, movements of the body and the head, gestures. For the correct assessment of involvement, an engagement database must contain meta-data on the psycho-emotional states of communicants. Neural network-based approaches to the automatic detection of user engagement show the best performance. Practical relevance: Based on the obtained analytical conclusions, the authors of the paper are going to elaborate an original software system for automatic recognition of user engagement, and to collect a data set for machine learning purposes. The presented review formulates basic requirements for such systems and contributes to the solution of the problem of automatic recognition of psycho-emotional states. Discussion: The survey leads to the conclusion that the notion of engagement as understood in studies on automatic emotion recognition differs from that used in psychology. User (or communicant) engagement in terms of info- and communicative sphere implies the manifestation of a person's mental activity level (emotional, cognitive, and behavioral components) changing dynamically while interacting with another person or computer system.
前言:解决人机交互或通信行为中用户参与度的识别和评估任务,通过使用自动化手段来实现,在计算机识别人类心理-情绪状态中具有重要意义。这对于电子学习、商业和娱乐应用程序的设计是必要的。目的:对当前人机交互或虚拟通信中用户参与自动识别与评估领域的信息支持进行比较分析,建立基于多模态通信思想的数据体构建方法。结果:对研究论文进行的分析表明,在大多数现有数据库中,存在大量缺乏自然在线交流的数据。此外,并非所有数据库都包含“人-机-人”通信系统的不同模式。文本和音频模式对于旨在确定参与强度的多层次参与分类任务非常重要。它还承诺将考虑“肢体语言”特征,如面部表情、身体和头部的动作、手势。为了正确评估投入,投入数据库必须包含关于沟通者心理情绪状态的元数据。基于神经网络的用户参与度自动检测方法表现出最好的性能。实际意义:基于获得的分析结论,本文作者将详细阐述一个用于自动识别用户参与度的原始软件系统,并收集用于机器学习目的的数据集。本文阐述了这种系统的基本要求,有助于解决心理情绪状态的自动识别问题。讨论:调查得出的结论是,自动情绪识别研究中理解的投入概念与心理学中使用的概念不同。用户(或交流者)在信息和交流领域的参与度意味着一个人的心理活动水平(情感、认知和行为成分)在与另一个人或计算机系统交互时动态变化的表现。
{"title":"Analytical review of methods for automatic detection of user engagement in virtual communication","authors":"Anastasiya Dvoynikova, I. Kagirov, A. Karpov","doi":"10.31799/1684-8853-2022-5-12-22","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-5-12-22","url":null,"abstract":"Introduction: The solution of the task of the recognition and assessment of user engagement in the acts of human-machine interaction or telecommunication, achieved through the use of automatic means, is highly important in computer recognition of human psycho-emotional states. This is necessary for e-learning, business and entertainment applications design. Purpose: To conduct a comparative analysis of the current information support in the field of automatic recognition and assessment of user involvement in human-machine interaction or virtual communication, as well as to establish a methodology for building a data body based on the idea of multimodal communication. Results: The conducted analysis of research papers has shown that in most existing databases there is a substantial lack of data for natural online communication. Moreover, not all databases contain different modalities in “human-machine-human” communication system. Text and audio modalities turn out to be important for a multilevel engagement classification task, aimed at the determination of engagement intensity. It is also promising to take into account “body language” features, such as facial expressions, movements of the body and the head, gestures. For the correct assessment of involvement, an engagement database must contain meta-data on the psycho-emotional states of communicants. Neural network-based approaches to the automatic detection of user engagement show the best performance. Practical relevance: Based on the obtained analytical conclusions, the authors of the paper are going to elaborate an original software system for automatic recognition of user engagement, and to collect a data set for machine learning purposes. The presented review formulates basic requirements for such systems and contributes to the solution of the problem of automatic recognition of psycho-emotional states. Discussion: The survey leads to the conclusion that the notion of engagement as understood in studies on automatic emotion recognition differs from that used in psychology. User (or communicant) engagement in terms of info- and communicative sphere implies the manifestation of a person's mental activity level (emotional, cognitive, and behavioral components) changing dynamically while interacting with another person or computer system.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46965286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of ways and solutions to increase the efficiency of detecting computer attacks on the objects of critical information infrastructure 研究提高关键信息基础设施对象计算机攻击检测效率的方法和解决方案
Q3 Mathematics Pub Date : 2022-09-12 DOI: 10.31799/1684-8853-2022-4-29-43
V. Kuzmin, A. Menisov
Introduction: In the era of information technology almost all organizations face a wide range of automated and rapidly spreading cyber threats. This is due not only to the growing complexity, diversity and scale of digitalization, but also to the enlargement of cyber threats and the area of their possible implementation. Purpose: To compare possible ways of improving the effectiveness of attack detection for the objects of critical information infrastructure (CII): to detect a rare event, anomaly or novelty in the functions of the objects of CII. Results: The principle of operation of the proposed (effective) approach to cyberattack detection is to identify and separate anomalies from normal functioning of objects with the use of the concept of dynamic change of labels for a variable class over time. Dynamic novelty detection is compared to other approaches in terms of F1-score. For SWaT data, which is a layout of a critical information infrastructure object as an automated control system, it was determined that attack detection improved by up to 7% using the proposed approach. Practical relevance: The results of the research have shown a reduction in the risk of conducting (developing) a computer attack on critical information infrastructure objects. A possible targeted application of the dynamic novelty detection approach is to optimize the means of protecting information at critical information infrastructure facilities, as well as to integrate the proposed approach into the information security system as an intelligent detector.
引言:在信息技术时代,几乎所有组织都面临着广泛的自动化和快速传播的网络威胁。这不仅是因为数字化的复杂性、多样性和规模日益扩大,也因为网络威胁及其可能实施的领域不断扩大。目的:比较提高关键信息基础设施(CII)对象攻击检测有效性的可能方法:检测CII对象功能中的罕见事件、异常或新颖性。结果:所提出的(有效的)网络攻击检测方法的操作原理是使用随时间变化的变量类标签动态变化的概念,识别和分离对象的正常功能和异常。动态新颖性检测在f1得分方面与其他方法进行了比较。对于SWaT数据,这是一个关键信息基础设施对象作为自动化控制系统的布局,确定使用提议的方法,攻击检测提高了7%。实际意义:研究结果表明,对关键信息基础设施对象进行(发展)计算机攻击的风险降低了。动态新颖性检测方法的一个可能的目标应用是优化关键信息基础设施的信息保护手段,并将所提出的方法作为智能探测器集成到信息安全系统中。
{"title":"A study of ways and solutions to increase the efficiency of detecting computer attacks on the objects of critical information infrastructure","authors":"V. Kuzmin, A. Menisov","doi":"10.31799/1684-8853-2022-4-29-43","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-29-43","url":null,"abstract":"Introduction: In the era of information technology almost all organizations face a wide range of automated and rapidly spreading cyber threats. This is due not only to the growing complexity, diversity and scale of digitalization, but also to the enlargement of cyber threats and the area of their possible implementation. Purpose: To compare possible ways of improving the effectiveness of attack detection for the objects of critical information infrastructure (CII): to detect a rare event, anomaly or novelty in the functions of the objects of CII. Results: The principle of operation of the proposed (effective) approach to cyberattack detection is to identify and separate anomalies from normal functioning of objects with the use of the concept of dynamic change of labels for a variable class over time. Dynamic novelty detection is compared to other approaches in terms of F1-score. For SWaT data, which is a layout of a critical information infrastructure object as an automated control system, it was determined that attack detection improved by up to 7% using the proposed approach. Practical relevance: The results of the research have shown a reduction in the risk of conducting (developing) a computer attack on critical information infrastructure objects. A possible targeted application of the dynamic novelty detection approach is to optimize the means of protecting information at critical information infrastructure facilities, as well as to integrate the proposed approach into the information security system as an intelligent detector.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48769507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal processing of capacitive force sensors installed in the foot of an anthropomorphic robot 拟人机器人足部电容式力传感器的信号处理
Q3 Mathematics Pub Date : 2022-09-12 DOI: 10.31799/1684-8853-2022-4-20-28
Konstantin Krestovnikov, A. Erashov
Introduction: The force-moment sensing of the functional surfaces in robots based on compact capacitive force sensors can significantly improve interaction with the environment and humans. Capacitive force sensors provide high measurement accuracy and speed, but the electromagnetic interference can affect significantly the signal. When processing signals the influence of external noise must be taken into account, which increases the computation time. Purpose: To apply the developed interface circuit for processing signals from capacitive primary force transducers in a real-world robot. Results: Experimental verification of the developed solutions implied simulation of a step of the pedipulator of an anthropomorphic robot with the calculation of the coordinates of the center of pressure exerted on the foot with the four installed capacitive sensors. Software filtering and measuring capabilities of the microcontroller made it possible to achieve a signal-to-noise ratio of approximately 62.24 dB, which allows a closed-loop control system to function correctly. The average time for calculating the coordinates of the center of pressure on the foot with software filtering of the signal on the on-board computer of the robot was from 3.1 to 6.1 ms and meets the requirements for the sensory system of a walking robot. Practical relevance: The interface circuit allows to scale the number of connected primary force transducers, while software processing allows to normalize transducer signals by applying the calculated correction factors. Proposed solutions can be used in different robotic systems for real-time force measurement.
摘要:基于紧凑型电容式力传感器的机器人功能表面的力力矩传感可以显著改善机器人与环境和人的交互作用。电容式力传感器具有较高的测量精度和测量速度,但电磁干扰对测量信号的影响较大。在处理信号时,必须考虑外部噪声的影响,这增加了计算时间。目的:将所开发的接口电路应用于实际机器人中处理电容式主力传感器的信号。结果:实验验证了所开发的解决方案,模拟了拟人机器人的一个步骤,计算了四个安装的电容传感器对足部施加的压力中心的坐标。微控制器的软件滤波和测量功能使其能够实现约62.24 dB的信噪比,从而使闭环控制系统能够正确运行。在机器人车载计算机上对信号进行软件滤波计算足部压力中心坐标的平均时间为3.1 ~ 6.1 ms,满足步行机器人的感官系统要求。实际意义:接口电路允许扩展连接的主力传感器的数量,而软件处理允许通过应用计算的校正因子来规范化传感器信号。所提出的解决方案可用于不同的机器人系统进行实时力测量。
{"title":"Signal processing of capacitive force sensors installed in the foot of an anthropomorphic robot","authors":"Konstantin Krestovnikov, A. Erashov","doi":"10.31799/1684-8853-2022-4-20-28","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-20-28","url":null,"abstract":"Introduction: The force-moment sensing of the functional surfaces in robots based on compact capacitive force sensors can significantly improve interaction with the environment and humans. Capacitive force sensors provide high measurement accuracy and speed, but the electromagnetic interference can affect significantly the signal. When processing signals the influence of external noise must be taken into account, which increases the computation time. Purpose: To apply the developed interface circuit for processing signals from capacitive primary force transducers in a real-world robot. Results: Experimental verification of the developed solutions implied simulation of a step of the pedipulator of an anthropomorphic robot with the calculation of the coordinates of the center of pressure exerted on the foot with the four installed capacitive sensors. Software filtering and measuring capabilities of the microcontroller made it possible to achieve a signal-to-noise ratio of approximately 62.24 dB, which allows a closed-loop control system to function correctly. The average time for calculating the coordinates of the center of pressure on the foot with software filtering of the signal on the on-board computer of the robot was from 3.1 to 6.1 ms and meets the requirements for the sensory system of a walking robot. Practical relevance: The interface circuit allows to scale the number of connected primary force transducers, while software processing allows to normalize transducer signals by applying the calculated correction factors. Proposed solutions can be used in different robotic systems for real-time force measurement.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69413379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying machine learning algorithms for PE-header-based malware detection on the Windows operating system 机器学习算法在Windows操作系统上应用于基于PE头的恶意软件检测
Q3 Mathematics Pub Date : 2022-09-12 DOI: 10.31799/1684-8853-2022-4-44-57
Duc C. Le, Mau Pham, Duy Dinh, Hao T. Do
Introduction: The rapid growth of malware and its malicious use result in significant financial losses for various organizations. Many researchers are interested in applying machine learning methods to solve the problem of malware detection. Nevertheless, because of the diversity of algorithms, each machine learning algorithm has its advantages and disadvantages for a given situation. Purpose: To apply machine learning for malware detection in the Windows operating system using Portable Executable header; to compare six different machine learning algorithms based on several criteria. Results: The comparison of various algorithms, including such classifiers as Random Forest, Decision Tree, Naive Bayes, Support Vector Machine, Multilayer Perceptron, k-Nearest Neighbors algorithm with a large dataset shows that some algorithms such as Random Forest, Decision Tree, k-Nearest Neighbors, and Multilayer Perceptron can detect malware with very high accuracy (> 98%). The Random Forest algorithm is especially well suited for Windows OS malwaredetection. At the same time, Naive Bayes classifier also has a high accuracy rate (> 96%) and fast processing time. Therefore, we may consider using Naive Bayes as an alternative.
简介:恶意软件的快速增长及其恶意使用给各个组织带来了巨大的经济损失。许多研究人员对应用机器学习方法来解决恶意软件检测问题感兴趣。然而,由于算法的多样性,每种机器学习算法在特定情况下都有其优缺点。目的:利用可移植可执行文件头,将机器学习应用于Windows操作系统中的恶意软件检测;基于几个标准来比较六种不同的机器学习算法。结果:随机森林、决策树、朴素贝叶斯、支持向量机、多层感知器、k近邻算法等分类器与大型数据集的比较表明,随机森林、判决树、k近邻、多层感知器等算法对恶意软件的检测准确率非常高(>98%)。随机森林算法特别适用于Windows操作系统的恶意软件检测。同时,朴素贝叶斯分类器也具有较高的准确率(>96%)和快速的处理时间。因此,我们可以考虑使用朴素贝叶斯作为一种替代方法。
{"title":"Applying machine learning algorithms for PE-header-based malware detection on the Windows operating system","authors":"Duc C. Le, Mau Pham, Duy Dinh, Hao T. Do","doi":"10.31799/1684-8853-2022-4-44-57","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-44-57","url":null,"abstract":"Introduction: The rapid growth of malware and its malicious use result in significant financial losses for various organizations. Many researchers are interested in applying machine learning methods to solve the problem of malware detection. Nevertheless, because of the diversity of algorithms, each machine learning algorithm has its advantages and disadvantages for a given situation. Purpose: To apply machine learning for malware detection in the Windows operating system using Portable Executable header; to compare six different machine learning algorithms based on several criteria. Results: The comparison of various algorithms, including such classifiers as Random Forest, Decision Tree, Naive Bayes, Support Vector Machine, Multilayer Perceptron, k-Nearest Neighbors algorithm with a large dataset shows that some algorithms such as Random Forest, Decision Tree, k-Nearest Neighbors, and Multilayer Perceptron can detect malware with very high accuracy (> 98%). The Random Forest algorithm is especially well suited for Windows OS malwaredetection. At the same time, Naive Bayes classifier also has a high accuracy rate (> 96%) and fast processing time. Therefore, we may consider using Naive Bayes as an alternative.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49522189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating the response time of a data-intensive computing environment 估计数据密集型计算环境的响应时间
Q3 Mathematics Pub Date : 2022-09-12 DOI: 10.31799/1684-8853-2022-4-12-19
A. Gorbunova, V. Vishnevsky
Introduction: The amount of digital data is constantly growing as well as the need for its storage and processing for various purposes. To conduct data analysis, high-performance computing environments associated with parallelization methods, and, accordingly, data-intensive applications are used. The lack of quality tools for evaluating the effectiveness of the process of parallel data processing or tasks leads to excessive allocation of resources. Purpose: To develop mathematical models of data-intensive computing environments and methods for their performance analysis, i.e., for estimating the average system response time based on the data on system performance at the level of subtask solving. Results: We present a mathematical model of a parallel computing system in the form of a queueing system with parallel query processing on various architectures, including non-Poisson input flow and non-exponential service times. As a method for analyzing the average response time, we use a combination of simulation modeling with one of the machine learning methods (artificial neural networks). The effectiveness of the method is confirmed by numerical experiments and depends neither on the type of input flow, nor on the type of distribution of query service times, nor on the number of servers in the nodes of the system. The approximation error of the average response time does not exceed 10%, which makes it possible to optimize the generally accepted resource allocation, significantly reducing the amount of the resources. Practical relevance: The presented models and the method of their analysis can be used for efficient planning and allocation of resources for data-intensive systems.
简介:数字数据的数量在不断增长,对其存储和处理的需求也在不断增长。为了进行数据分析,需要使用与并行化方法相关的高性能计算环境,以及相应的数据密集型应用程序。缺乏用于评估并行数据处理或任务过程有效性的高质量工具,导致资源分配过多。目的:开发数据密集型计算环境的数学模型及其性能分析方法,即基于子任务解决级别的系统性能数据估计平均系统响应时间。结果:我们提出了一个并行计算系统的数学模型,该模型采用排队系统的形式,在各种体系结构上进行并行查询处理,包括非泊松输入流和非指数服务时间。作为一种分析平均响应时间的方法,我们将模拟建模与机器学习方法(人工神经网络)相结合。该方法的有效性通过数值实验得到了证实,既不取决于输入流的类型,也不取决于查询服务时间的分布类型,更不取决于系统节点中服务器的数量。平均响应时间的近似误差不超过10%,这使得优化普遍接受的资源分配成为可能,从而显著减少了资源量。实际相关性:所提出的模型及其分析方法可用于数据密集型系统的有效规划和资源分配。
{"title":"Estimating the response time of a data-intensive computing environment","authors":"A. Gorbunova, V. Vishnevsky","doi":"10.31799/1684-8853-2022-4-12-19","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-12-19","url":null,"abstract":"Introduction: The amount of digital data is constantly growing as well as the need for its storage and processing for various purposes. To conduct data analysis, high-performance computing environments associated with parallelization methods, and, accordingly, data-intensive applications are used. The lack of quality tools for evaluating the effectiveness of the process of parallel data processing or tasks leads to excessive allocation of resources. Purpose: To develop mathematical models of data-intensive computing environments and methods for their performance analysis, i.e., for estimating the average system response time based on the data on system performance at the level of subtask solving. Results: We present a mathematical model of a parallel computing system in the form of a queueing system with parallel query processing on various architectures, including non-Poisson input flow and non-exponential service times. As a method for analyzing the average response time, we use a combination of simulation modeling with one of the machine learning methods (artificial neural networks). The effectiveness of the method is confirmed by numerical experiments and depends neither on the type of input flow, nor on the type of distribution of query service times, nor on the number of servers in the nodes of the system. The approximation error of the average response time does not exceed 10%, which makes it possible to optimize the generally accepted resource allocation, significantly reducing the amount of the resources. Practical relevance: The presented models and the method of their analysis can be used for efficient planning and allocation of resources for data-intensive systems.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44223361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Search for EEG signal patterns in simulating phobic anxiety disorder situations in a VR environment 在虚拟现实环境中模拟恐惧焦虑症情况的脑电信号模式搜索
Q3 Mathematics Pub Date : 2022-09-12 DOI: 10.31799/1684-8853-2022-4-58-67
A. Tychkov, Denis Chernyhov, P. Churakov, Z. Yuldashev, N. Bofanova, A. Alimuradov, V. Gorbunov, R. Zolotarev, Mihail Nikitin
Introduction: Effective and prompt formulation of diagnostic conclusions about the presence of anxiety-phobic disorders requires the improvement of existing and the development of new methods for diagnosing and treating patients, including the use of virtual reality technology. Purpose: To analyze a reaction of an individual to a stimulus that triggers a fear response to virtual reality scenes (height exposure). To identify electroencephalographic (EEG) signal markers related to the level of anxiety and virtual reality environment susceptibility of an individual. Methods: A group of nine conditionally healthy males aged 23 to 26 years old who reported neither history of somatic symptoms nor organic brain disorders was formed to conduct the research. The immersion into virtual reality was accompanied by the registration of EEG signals and subsequent completion of a self-assessment questionnaire by the subjects. Results: The state of rest (a reference value) and the state of high emotional stress experience (at the height of a skyscraper) in the virtual reality environment were compared. The results obtained allow to make a conclusion that the simulated situation of being at a height causes a decrease in the indices of alpha, theta, beta rhythms, and an increase in the delta rhythm index of the EEG signal relative to the state of rest in various subjects, regardless of the intensity of fear manifestation. Practical relevance: The conducted research is among the pioneering studies in assessing the effect of virtual reality technologies on human phobic anxiety state. Some objective electrophysiological markers related to the level of anxiety were determined to confirm the presence of patterns in the functional state of the cerebral cortex with a sense of anxiety in individuals immersed in a virtual reality environment.
引言:关于焦虑恐惧症的诊断结论的有效和及时制定需要改进现有的诊断和治疗患者的新方法,包括使用虚拟现实技术。目的:分析个人对刺激的反应,该刺激会引发对虚拟现实场景(身高暴露)的恐惧反应。识别与个体焦虑水平和虚拟现实环境易感性相关的脑电图(EEG)信号标记。方法:由9名年龄在23至26岁之间的有条件健康男性组成一组,他们既没有躯体症状史,也没有器质性脑疾病史。沉浸在虚拟现实中的同时,受试者还登记了脑电图信号,随后完成了自我评估问卷。结果:比较了虚拟现实环境中的休息状态(参考值)和高情绪压力体验状态(在摩天大楼的高度)。所获得的结果允许得出这样的结论:在各种受试者中,无论恐惧表现的强度如何,处于高度的模拟情况都会导致脑电信号的α、θ、β节律指数相对于休息状态的下降,以及δ节律指数的增加。实际相关性:所进行的研究是评估虚拟现实技术对人类恐惧焦虑状态影响的开创性研究之一。确定了一些与焦虑水平相关的客观电生理标志物,以证实在沉浸在虚拟现实环境中的个体中,大脑皮层功能状态中存在具有焦虑感的模式。
{"title":"Search for EEG signal patterns in simulating phobic anxiety disorder situations in a VR environment","authors":"A. Tychkov, Denis Chernyhov, P. Churakov, Z. Yuldashev, N. Bofanova, A. Alimuradov, V. Gorbunov, R. Zolotarev, Mihail Nikitin","doi":"10.31799/1684-8853-2022-4-58-67","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-58-67","url":null,"abstract":"Introduction: Effective and prompt formulation of diagnostic conclusions about the presence of anxiety-phobic disorders requires the improvement of existing and the development of new methods for diagnosing and treating patients, including the use of virtual reality technology. Purpose: To analyze a reaction of an individual to a stimulus that triggers a fear response to virtual reality scenes (height exposure). To identify electroencephalographic (EEG) signal markers related to the level of anxiety and virtual reality environment susceptibility of an individual. Methods: A group of nine conditionally healthy males aged 23 to 26 years old who reported neither history of somatic symptoms nor organic brain disorders was formed to conduct the research. The immersion into virtual reality was accompanied by the registration of EEG signals and subsequent completion of a self-assessment questionnaire by the subjects. Results: The state of rest (a reference value) and the state of high emotional stress experience (at the height of a skyscraper) in the virtual reality environment were compared. The results obtained allow to make a conclusion that the simulated situation of being at a height causes a decrease in the indices of alpha, theta, beta rhythms, and an increase in the delta rhythm index of the EEG signal relative to the state of rest in various subjects, regardless of the intensity of fear manifestation. Practical relevance: The conducted research is among the pioneering studies in assessing the effect of virtual reality technologies on human phobic anxiety state. Some objective electrophysiological markers related to the level of anxiety were determined to confirm the presence of patterns in the functional state of the cerebral cortex with a sense of anxiety in individuals immersed in a virtual reality environment.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41804941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using the spectral approach in image and arbitrary data processing 光谱方法在图像和任意数据处理中的应用
Q3 Mathematics Pub Date : 2022-09-09 DOI: 10.31799/1684-8853-2022-4-2-11
A. Timofeev, A. Sultanov, I. Meshkov, A. Gizatulin
Introduction: The transfer of image processing operations to the spectral region is considered. Due to the duality of information representation, coding, filtering, compression and other transformations are possible both in the space of an object and in the region of spatial frequencies, in relation to its spatial spectrum. Purpose: To evaluate the efficiency of performing image processing operations and arbitrary digital information in the spectral domain. Results: A method for spectral holographic coding is proposed, which provides a gain in noise immunity by 7–8 dB and has less complexity of coding and decoding when changing redundancy over a wide range. During the coding process, the source data block is replaced by a code word, which is a linear one-dimensional hologram of a virtual point source. For transmission over a communication channel, we synthesize a signal with a given spectrum, the shape of which is a one-dimensional hologram, with its values rounded to one bit and the hologram itself being a sequence of zeros and ones – one means the presence of the corresponding harmonic in the spectrum, zero means the absence. To create a signal with such a line spectrum, it suffices to add a set of harmonics of equal amplitude with numbers corresponding to the position numbers of the units in the hologram. This operation is one of the types of orthogonal frequency division multiplexing, characterized in that the frequencies of the orthogonal subcarriers are in a multiple ratio, and amplitude shift keying is used as digital modulation. We propose a spectral method for image compression based on a detailed analysis of the spatial spectrum of an image and the removal of a large number of insignificant areas from it. Practical relevance: The reduction in the amount of information and, accordingly, the size of the image can be 4–8 times or more with a slight decrease in image quality.
介绍:考虑将图像处理操作转移到光谱区域。由于信息表示的对偶性,编码、滤波、压缩和其他转换都是可能的,在一个对象的空间和空间频率区域,相对于它的空间频谱。目的:评价光谱域图像处理操作和任意数字信息的效率。结果:提出了一种光谱全息编码方法,该方法在大范围内改变冗余时,可提供7-8 dB的抗噪增益,并且编码和解码的复杂性较低。在编码过程中,源数据块被一个码字取代,该码字是虚拟点源的线性一维全息图。为了在通信信道上传输,我们合成一个具有给定频谱的信号,其形状是一维全息图,其值四舍五入到一位,全息图本身是一个0和1的序列- 1表示频谱中存在相应的谐波,0表示不存在谐波。要产生具有这种线谱的信号,只需添加一组振幅相等的谐波,这些谐波的数字与全息图中单元的位置数字相对应。该操作是正交频分复用的一种,其特点是正交子载波的频率呈倍数比,并使用移幅键控作为数字调制。本文提出了一种基于对图像空间频谱的详细分析和去除图像中大量不重要区域的图像压缩光谱方法。实际相关性:信息的减少,相应地,图像的大小可以是4-8倍或更多,图像质量略有下降。
{"title":"Using the spectral approach in image and arbitrary data processing","authors":"A. Timofeev, A. Sultanov, I. Meshkov, A. Gizatulin","doi":"10.31799/1684-8853-2022-4-2-11","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-4-2-11","url":null,"abstract":"Introduction: The transfer of image processing operations to the spectral region is considered. Due to the duality of information representation, coding, filtering, compression and other transformations are possible both in the space of an object and in the region of spatial frequencies, in relation to its spatial spectrum. Purpose: To evaluate the efficiency of performing image processing operations and arbitrary digital information in the spectral domain. Results: A method for spectral holographic coding is proposed, which provides a gain in noise immunity by 7–8 dB and has less complexity of coding and decoding when changing redundancy over a wide range. During the coding process, the source data block is replaced by a code word, which is a linear one-dimensional hologram of a virtual point source. For transmission over a communication channel, we synthesize a signal with a given spectrum, the shape of which is a one-dimensional hologram, with its values rounded to one bit and the hologram itself being a sequence of zeros and ones – one means the presence of the corresponding harmonic in the spectrum, zero means the absence. To create a signal with such a line spectrum, it suffices to add a set of harmonics of equal amplitude with numbers corresponding to the position numbers of the units in the hologram. This operation is one of the types of orthogonal frequency division multiplexing, characterized in that the frequencies of the orthogonal subcarriers are in a multiple ratio, and amplitude shift keying is used as digital modulation. We propose a spectral method for image compression based on a detailed analysis of the spatial spectrum of an image and the removal of a large number of insignificant areas from it. Practical relevance: The reduction in the amount of information and, accordingly, the size of the image can be 4–8 times or more with a slight decrease in image quality.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45489658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the effectiveness of the information security system process based on the theory of stochastic indicators 基于随机指标理论的信息安全系统过程有效性评价
Q3 Mathematics Pub Date : 2022-06-24 DOI: 10.31799/1684-8853-2022-3-31-44
A. Sukhov
Introduction: Under the conditions of imperfect methods and means of detection and response to computer attacks there is a constant growth of destructive impacts aimed at critical information systems. This generates a need to develop research methods for early warning systems to provide information security in case of malware attacks. One of the effective ways to solve this problem is to use the methods of the theory of stochastic indicators. Purpose: The development of a tool for evaluating the effectiveness of the information security system functioning. Results: We describe deterministic, random and indefinite components of the information security system functioning. Constant and functional indicators are constructed, their distinctive features are revealed. To solve the problem of evaluating the effectiveness of the process under consideration stochastic superindicators are constructed. We have also described the features of the construction of stochastic indicators of different ranks on the basis of the theory of the effectiveness of targeted processes and purposeful systems. Practical relevance: Through the developed stochastic time indicators, the probabilistic and temporal characteristics of the destructive impact are estimated, with the intervals and time points of its occurrence taken into account. This allows the system to be timely warned of a possible destructive impact scenario for the elements of critical information infrastructure.
引言:在检测和应对计算机攻击的方法和手段不完善的情况下,针对关键信息系统的破坏性影响不断增加。这就需要开发预警系统的研究方法,以在恶意软件攻击的情况下提供信息安全。解决这一问题的有效方法之一是运用随机指标理论的方法。目的:开发一种评估信息安全系统运作有效性的工具。结果:我们描述了信息安全系统功能的确定性、随机性和不确定性组成部分。构建了恒定的、功能性的指标,揭示了它们的鲜明特征。为了解决考虑过程有效性的评估问题,构造了随机超指标。在目标过程和目标系统有效性理论的基础上,我们还描述了不同等级随机指标的构建特征。实际相关性:通过开发的随机时间指标,估计破坏性影响的概率和时间特征,并考虑其发生的间隔和时间点。这使系统能够及时收到对关键信息基础设施要素可能产生的破坏性影响的警告。
{"title":"Evaluating the effectiveness of the information security system process based on the theory of stochastic indicators","authors":"A. Sukhov","doi":"10.31799/1684-8853-2022-3-31-44","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-3-31-44","url":null,"abstract":"Introduction: Under the conditions of imperfect methods and means of detection and response to computer attacks there is a constant growth of destructive impacts aimed at critical information systems. This generates a need to develop research methods for early warning systems to provide information security in case of malware attacks. One of the effective ways to solve this problem is to use the methods of the theory of stochastic indicators. Purpose: The development of a tool for evaluating the effectiveness of the information security system functioning. Results: We describe deterministic, random and indefinite components of the information security system functioning. Constant and functional indicators are constructed, their distinctive features are revealed. To solve the problem of evaluating the effectiveness of the process under consideration stochastic superindicators are constructed. We have also described the features of the construction of stochastic indicators of different ranks on the basis of the theory of the effectiveness of targeted processes and purposeful systems. Practical relevance: Through the developed stochastic time indicators, the probabilistic and temporal characteristics of the destructive impact are estimated, with the intervals and time points of its occurrence taken into account. This allows the system to be timely warned of a possible destructive impact scenario for the elements of critical information infrastructure.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43102889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The variant of post-quantum cryptosystem based on burst-correcting codes and on the complete decoding problem 基于突发纠错码和完全译码问题的后量子密码系统变体
Q3 Mathematics Pub Date : 2022-06-24 DOI: 10.31799/1684-8853-2022-3-45-54
A.Yu. Ovchinnikov
Introduction: Today the investigations of post-quantum cryptosystems secure against quantum computations is the area of great interest. An important direction here is code-based cryptography utilizing the mathematical problems from error-correcting coding theory. The improvement of existing code-based systems may be achieved both in practical part (reducing the key sizes) and theoretically by using more complicated mathematical code-based tasks. Purpose: The development of public-key code-based cryptosystem using low-density parity-check codes with burst correction; the estimation of the parameters of the obtained system. Results: The variant of code-based cryptosystem using random block permutation low-density parity-check codes is proposed. The cryptocomplexity of the system is supposed to be based on the complete decoding problem, which is believed to be a harder mathematical problem than those used in existing systems. With high probability, the analysis of the system by using decoding methods is not possible at all, which both increases the long-term cryptocomplexity of the system and allows to reduce the key size. The evaluation of the underlying code selection is performed, the approaches to the selection of the parameters of the proposed system on the basis of the required level of cryptocomplexity are considered. Practical relevance: The proposed system allows to reduce the public-key size as compared to the classical McEliece system, cryptocomplexity also comparable, with the underlying mathematical problem to be more stable against perspective attacks.
引言:如今,对量子计算安全的后量子密码系统的研究是人们非常感兴趣的领域。这里的一个重要方向是基于代码的密码学,它利用了纠错编码理论中的数学问题。现有基于代码的系统的改进可以在实践部分(减小密钥大小)和理论上通过使用更复杂的数学基于代码的任务来实现。目的:利用带突发校正的低密度奇偶校验码开发基于公钥的密码系统;得到的系统参数的估计。结果:提出了一种使用随机块置换低密度奇偶校验码的基于码的密码系统变体。系统的密码复杂度应该基于完全解码问题,这被认为是一个比现有系统中使用的更难的数学问题。在很大的概率下,使用解码方法对系统进行分析是根本不可能的,这既增加了系统的长期密码复杂度,又允许减小密钥大小。对底层代码选择进行了评估,并考虑了基于所需密码复杂度级别选择所提议系统参数的方法。实际意义:与经典的McEliece系统相比,所提出的系统允许减少公钥大小,密码复杂度也相当,与潜在的数学问题相比,对于透视攻击更加稳定。
{"title":"The variant of post-quantum cryptosystem based on burst-correcting codes and on the complete decoding problem","authors":"A.Yu. Ovchinnikov","doi":"10.31799/1684-8853-2022-3-45-54","DOIUrl":"https://doi.org/10.31799/1684-8853-2022-3-45-54","url":null,"abstract":"Introduction: Today the investigations of post-quantum cryptosystems secure against quantum computations is the area of great interest. An important direction here is code-based cryptography utilizing the mathematical problems from error-correcting coding theory. The improvement of existing code-based systems may be achieved both in practical part (reducing the key sizes) and theoretically by using more complicated mathematical code-based tasks. Purpose: The development of public-key code-based cryptosystem using low-density parity-check codes with burst correction; the estimation of the parameters of the obtained system. Results: The variant of code-based cryptosystem using random block permutation low-density parity-check codes is proposed. The cryptocomplexity of the system is supposed to be based on the complete decoding problem, which is believed to be a harder mathematical problem than those used in existing systems. With high probability, the analysis of the system by using decoding methods is not possible at all, which both increases the long-term cryptocomplexity of the system and allows to reduce the key size. The evaluation of the underlying code selection is performed, the approaches to the selection of the parameters of the proposed system on the basis of the required level of cryptocomplexity are considered. Practical relevance: The proposed system allows to reduce the public-key size as compared to the classical McEliece system, cryptocomplexity also comparable, with the underlying mathematical problem to be more stable against perspective attacks.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46383029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Informatsionno-Upravliaiushchie Sistemy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1