Pub Date : 2019-10-17DOI: 10.31799/1684-8853-2019-5-64-75
Yu. Aksenov, Nataliya Dobrenko, Aleksandra Vatyan, R. Kapustin, Svyatoslav Osipov, P. Mavrin, N. Gusarova, Anatolii Shalyto
Introduction: Within the framework of the National Healthcare Project, personalization of a physician’s activity is very important,forming a demand for a Clinical Decision Support System. The available systems miss the functions of prompting a doctor during theclinical process or identifying possible contradictions between different types of medical treatment offered to the patient. Purpose:Development of a solution, free from the above-mentioned problems, for personalized support of the clinical process. Methods:Automata (state machine) approach presenting the clinical process as a set of automata states and possible transitions between them,and a set of design patterns, namely: Abstract Factory, Facade, Adapter and Visitor. Results: A solution for personalized supportof clinical processes is proposed, based on the automata approach and design patterns. The automata approach allows you to dividethe clinical process into separate stages and automatically control the possible transitions and conditions for their implementation,including checking for c ontraindications. The use of design patterns provides a sufficient degree of generalization, allowing you,without affecting the structure of the main application code, to promptly connect the system to the necessary sources of information,and to enter the data about contradictions of various origins, taking them into account when making decisions on the treatment of aparticular patient. Practical relevance: The developed solution, as compared to the available systems, is more efficient at promptingthe doctor during a clinical process, and at identifying possible contradictions between the various types of medical treatment offeredto the patient.
{"title":"Automata approach for personalized support of clinical processes in healthcare","authors":"Yu. Aksenov, Nataliya Dobrenko, Aleksandra Vatyan, R. Kapustin, Svyatoslav Osipov, P. Mavrin, N. Gusarova, Anatolii Shalyto","doi":"10.31799/1684-8853-2019-5-64-75","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-64-75","url":null,"abstract":"Introduction: Within the framework of the National Healthcare Project, personalization of a physician’s activity is very important,forming a demand for a Clinical Decision Support System. The available systems miss the functions of prompting a doctor during theclinical process or identifying possible contradictions between different types of medical treatment offered to the patient. Purpose:Development of a solution, free from the above-mentioned problems, for personalized support of the clinical process. Methods:Automata (state machine) approach presenting the clinical process as a set of automata states and possible transitions between them,and a set of design patterns, namely: Abstract Factory, Facade, Adapter and Visitor. Results: A solution for personalized supportof clinical processes is proposed, based on the automata approach and design patterns. The automata approach allows you to dividethe clinical process into separate stages and automatically control the possible transitions and conditions for their implementation,including checking for c ontraindications. The use of design patterns provides a sufficient degree of generalization, allowing you,without affecting the structure of the main application code, to promptly connect the system to the necessary sources of information,and to enter the data about contradictions of various origins, taking them into account when making decisions on the treatment of aparticular patient. Practical relevance: The developed solution, as compared to the available systems, is more efficient at promptingthe doctor during a clinical process, and at identifying possible contradictions between the various types of medical treatment offeredto the patient.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46645839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-17DOI: 10.31799/1684-8853-2019-5-51-63
Vyacheslav Begishev, E. Sopin, D. Moltchanov, Andrey K. Samuylov, Yuliya V. Gaidamaka, K. Samouylov
Introduction: In 3GPP New Radio (NR) systems, frequent radio propagation path blockages can lead to the disconnection of ongoingsessions already accepted into the system, reducing the quality of service in the network. Controlling access to system resource byprioritizing for the ongoing sessions can increase the session continuity. In this paper, we propose resource allocation with a reservationmechanism. Purpose: Development of a mathematical model for analyzing the effect of this mechanism on other system performanceindicators – dropping probabilities for new and ongoing sessions and system utilization. The model takes into account the key featuresof the 3GPP NR technology, including the height of the interacting objects, the spatial distribution and mobility of the blockers, as wellas the line-of-sight propagation properties between the transceivers for mmWave NR technology. Results: We analyzed the reservationmechanism with the help of a developed model in the form of a resource queueing system with signals, where the base station bandwidthcorresponds to the resource, and the signals model a change in the line-of-sight conditions between the receiving and transmittingdevices. Creating a priority for ongoing sessions whose service has not yet been completed provides a considerable flexibility forbalancing the session continuity and dropping of a new session, with a slight decrease in the efficiency of the radio resource utility. Withthe developed model, we showed that reserving even a small bandwidth (less than 10% of the total resources) to maintain the ongoingsessions has a positive effect on their continuity, as it increases the probability of their successful completion. Practical relevance: The proposed mechanism works more efficiently in overload conditions and with sessions which have a high data transfer raterequirements. This increases the demand for the proposed mechanism in 5G NR communication systems.
{"title":"Performance evaluation of bandwidth reservation for mmWave in 5G NR systems","authors":"Vyacheslav Begishev, E. Sopin, D. Moltchanov, Andrey K. Samuylov, Yuliya V. Gaidamaka, K. Samouylov","doi":"10.31799/1684-8853-2019-5-51-63","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-51-63","url":null,"abstract":"Introduction: In 3GPP New Radio (NR) systems, frequent radio propagation path blockages can lead to the disconnection of ongoingsessions already accepted into the system, reducing the quality of service in the network. Controlling access to system resource byprioritizing for the ongoing sessions can increase the session continuity. In this paper, we propose resource allocation with a reservationmechanism. Purpose: Development of a mathematical model for analyzing the effect of this mechanism on other system performanceindicators – dropping probabilities for new and ongoing sessions and system utilization. The model takes into account the key featuresof the 3GPP NR technology, including the height of the interacting objects, the spatial distribution and mobility of the blockers, as wellas the line-of-sight propagation properties between the transceivers for mmWave NR technology. Results: We analyzed the reservationmechanism with the help of a developed model in the form of a resource queueing system with signals, where the base station bandwidthcorresponds to the resource, and the signals model a change in the line-of-sight conditions between the receiving and transmittingdevices. Creating a priority for ongoing sessions whose service has not yet been completed provides a considerable flexibility forbalancing the session continuity and dropping of a new session, with a slight decrease in the efficiency of the radio resource utility. Withthe developed model, we showed that reserving even a small bandwidth (less than 10% of the total resources) to maintain the ongoingsessions has a positive effect on their continuity, as it increases the probability of their successful completion. Practical relevance: \u0000The proposed mechanism works more efficiently in overload conditions and with sessions which have a high data transfer raterequirements. This increases the demand for the proposed mechanism in 5G NR communication systems.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42499426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-16DOI: 10.31799/1684-8853-2019-5-2-9
L. Abuzin, Nikolai Unknown, D. Ðokovic, I. Kotsireas
Purpose: To construct Hadamard matrices by using Goethals — Seidel difference families having a repeated block, generalizingthe so called propus construction. In particular we construct the first examples of symmetric Hadamard matrices of order 236.Methods: The main ingredient of the propus construction is a difference family in a finite abelian group of order v consisting offour blocks (X1, X2, X3, X4) where X1 is symmetric and X2 X3. The parameters (v; k1, k2, k3, k4; λ) of such family must satisfythe additional condition ki λ v. We modify this construction by imposing different symmetry conditions on some of theblocks and construct many examples of Hadamard matrices of this kind. In this paper we work with the cyclic group Zv of order v.For larger values of v we build the blocks Xi by using the orbits of a suitable small cyclic subgroup of the automorphism groupof Zv. Results: We continue the systematic search for symmetric Hadamard matrices of order 4v by using the propus construction.Such searches were carried out previously for odd v 51. We extend it to cover the case v53. Moreover we construct thefirst examples of symmetric Hadamard matrices of order 236. A wide collection of symmetric and skew-symmetric Hadamardmatrices was obtained and the corresponding difference families tabulated by using the symmetry properties of their blocks.Practical relevance: Hadamard matrices are used extensively in the problems of error-free coding, compression and masking ofvideo information. Programs for search of symmetric Hadamard matrices and a library of constructed matrices are used in themathematical network Internet together with executable on line algorithms.
{"title":"Hadamard matrices from Goethals — Seidel difference families with a repeated block","authors":"L. Abuzin, Nikolai Unknown, D. Ðokovic, I. Kotsireas","doi":"10.31799/1684-8853-2019-5-2-9","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-2-9","url":null,"abstract":"Purpose: To construct Hadamard matrices by using Goethals — Seidel difference families having a repeated block, generalizingthe so called propus construction. In particular we construct the first examples of symmetric Hadamard matrices of order 236.Methods: The main ingredient of the propus construction is a difference family in a finite abelian group of order v consisting offour blocks (X1, X2, X3, X4) where X1 is symmetric and X2 X3. The parameters (v; k1, k2, k3, k4; λ) of such family must satisfythe additional condition ki λ v. We modify this construction by imposing different symmetry conditions on some of theblocks and construct many examples of Hadamard matrices of this kind. In this paper we work with the cyclic group Zv of order v.For larger values of v we build the blocks Xi by using the orbits of a suitable small cyclic subgroup of the automorphism groupof Zv. Results: We continue the systematic search for symmetric Hadamard matrices of order 4v by using the propus construction.Such searches were carried out previously for odd v 51. We extend it to cover the case v53. Moreover we construct thefirst examples of symmetric Hadamard matrices of order 236. A wide collection of symmetric and skew-symmetric Hadamardmatrices was obtained and the corresponding difference families tabulated by using the symmetry properties of their blocks.Practical relevance: Hadamard matrices are used extensively in the problems of error-free coding, compression and masking ofvideo information. Programs for search of symmetric Hadamard matrices and a library of constructed matrices are used in themathematical network Internet together with executable on line algorithms.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45616475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-16DOI: 10.31799/1684-8853-2019-5-24-29
T. Tatarnikova
Introduction: The data from the gyroscopic sensor and acceleration sensor of a smartphone are seldom considered as a possibleinformation leakage, which makes the owners of gadgets working under Android 5 operating system or below vulnerable to losingvaluable information. Purpose: Offering a practical way to counteract the reading of data from a smartphone via third-party channels,and developing a mobile application which would help prevent the leakage of information from the gadget owner via side channelsof information transfer. Results: A review of studies was performed demonstrating the vulnerability of Android 5 smartphones toleaks through third-party channels using acoustic cryptanalysis techniques. It is shown that in modern works, the use of acousticcryptanalysis of noise emitted by a keyboard or by microelectronic components of a computer allows you to arrange the leakage ofvaluable data via a smartphone located next to the computer under attack. A mobile application has been developed which creates activeinterference in the form of vibration and audio signal to the malicious application which accesses the accelerometer and gyroscopein order to retrieve information. The results of an experiment are given, demonstrating the ability of the application to successfullyinterfere with the internal sensors of a smartphone by addressing its vibrating output and audio output, and prevent the attacks overthird-party channels. Practical relevance: The proposed application installed on a smartphone will allow you to communicate moresafely, enter passwords and type secret information on a computer keyboard with a smartphone in its close proximity.
{"title":"Restricting data leakage through non-obvious features of Android 5 smartphone","authors":"T. Tatarnikova","doi":"10.31799/1684-8853-2019-5-24-29","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-24-29","url":null,"abstract":"Introduction: The data from the gyroscopic sensor and acceleration sensor of a smartphone are seldom considered as a possibleinformation leakage, which makes the owners of gadgets working under Android 5 operating system or below vulnerable to losingvaluable information. Purpose: Offering a practical way to counteract the reading of data from a smartphone via third-party channels,and developing a mobile application which would help prevent the leakage of information from the gadget owner via side channelsof information transfer. Results: A review of studies was performed demonstrating the vulnerability of Android 5 smartphones toleaks through third-party channels using acoustic cryptanalysis techniques. It is shown that in modern works, the use of acousticcryptanalysis of noise emitted by a keyboard or by microelectronic components of a computer allows you to arrange the leakage ofvaluable data via a smartphone located next to the computer under attack. A mobile application has been developed which creates activeinterference in the form of vibration and audio signal to the malicious application which accesses the accelerometer and gyroscopein order to retrieve information. The results of an experiment are given, demonstrating the ability of the application to successfullyinterfere with the internal sensors of a smartphone by addressing its vibrating output and audio output, and prevent the attacks overthird-party channels. Practical relevance: The proposed application installed on a smartphone will allow you to communicate moresafely, enter passwords and type secret information on a computer keyboard with a smartphone in its close proximity.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47573374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-16DOI: 10.31799/1684-8853-2019-5-18-23
V. Anisimov, E. Anisimov, T. Saurenko, E. Zotova
Introduction: One of the side effects of introducing modern information technologies in the management of economic, social,organizational and technical systems is the stronger dependence of the management quality on intentional or accidental destructiveinfluences which violate the integrity, confidentiality and availability of the information used. This determines the relevanceof developing appropriate information security systems. The substantiation of the development of such systems requires solvingthe problems of comparative assessment of the destructive impact risks and the cost of their prevention. Purpose: Predicting thedanger of a destructive impact on information processes in control systems. Method: The prediction is based on representingthe destructive effects in the form of a random sequence of events which lead to disruptions in the information processes. Theconsequences of failures are also represented by certain random variables. Results: Methodical approaches are proposed in orderto build models for predicting temporal and volumetric characteristics of damage from destructive influences on information processesin the management of economic, social, organizational and technical systems. In these models, we suggest to assess thedanger of destructive impacts by the probability of the onset of a destructive event at a certain time moment, and by the amountof damage caused by it. The basis for the construction of prediction models is the presentation of damage indicators in the formof step functions of time. The constructive representation of these functions is based on the conditional deterministic approach.The completeness of a priori information usage in determining specific parameters of the damage functions is ensured by applyingthe maximum uncertainty principle. The measure for the uncertainty is entropy. The conditional deterministic approachfor higher uncertainty levels was developed in a stochastic approach. On its basis, classes of stochastic models were proposed,corresponding to various information situations. These models allow you to estimate not only the expected values of damageindicators due to the failure in taking measures to ensure information security while managing targeted systems, but also theirprobabilistic characteristics. Practical relevance: The proposed approaches are the basis for the creation of particular models andtechniques in the interests of well substantiated decisions on the formation of the structure of the organization and managementof information security subsystems.
{"title":"Models of forecasting destructive influence risks for information processes in management systems","authors":"V. Anisimov, E. Anisimov, T. Saurenko, E. Zotova","doi":"10.31799/1684-8853-2019-5-18-23","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-18-23","url":null,"abstract":"Introduction: One of the side effects of introducing modern information technologies in the management of economic, social,organizational and technical systems is the stronger dependence of the management quality on intentional or accidental destructiveinfluences which violate the integrity, confidentiality and availability of the information used. This determines the relevanceof developing appropriate information security systems. The substantiation of the development of such systems requires solvingthe problems of comparative assessment of the destructive impact risks and the cost of their prevention. Purpose: Predicting thedanger of a destructive impact on information processes in control systems. Method: The prediction is based on representingthe destructive effects in the form of a random sequence of events which lead to disruptions in the information processes. Theconsequences of failures are also represented by certain random variables. Results: Methodical approaches are proposed in orderto build models for predicting temporal and volumetric characteristics of damage from destructive influences on information processesin the management of economic, social, organizational and technical systems. In these models, we suggest to assess thedanger of destructive impacts by the probability of the onset of a destructive event at a certain time moment, and by the amountof damage caused by it. The basis for the construction of prediction models is the presentation of damage indicators in the formof step functions of time. The constructive representation of these functions is based on the conditional deterministic approach.The completeness of a priori information usage in determining specific parameters of the damage functions is ensured by applyingthe maximum uncertainty principle. The measure for the uncertainty is entropy. The conditional deterministic approachfor higher uncertainty levels was developed in a stochastic approach. On its basis, classes of stochastic models were proposed,corresponding to various information situations. These models allow you to estimate not only the expected values of damageindicators due to the failure in taking measures to ensure information security while managing targeted systems, but also theirprobabilistic characteristics. Practical relevance: The proposed approaches are the basis for the creation of particular models andtechniques in the interests of well substantiated decisions on the formation of the structure of the organization and managementof information security subsystems.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41709669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-16DOI: 10.31799/1684-8853-2019-5-10-17
V. Osipov, Viktor Nikiforov
Introduction: Various interfering influences raise pressing problems of promptly restoring the flow of distorted frames,remembering about the background and dynamics of the event measurement laws. The traditional methods of recovering flows ofdistorted frames do not fully take into account the peculiarities of this process. Purpose: Exploring the possibilities of recurrent neuralnetworks with controlled elements for restoring frame flows. Results: It is proposed to evaluate the potential of a recurrent neuralnetwork with controlled elements by the number of successful options for restoring a distorted sequence of frames. Evaluation of thecapabilities of such neural networks according to the introduced indicator showed their strong dependence on the type of networkstructure and settings. Recurrent neural networks with spiral structures of layers work better. As the number of the turns in the helixgrows, the network capabilities also grow. Enhancing the capacity of a network to restore distorted frame flows is feasible if we replaceunipolar functions of the synapse weights by bipolar ones. A significant increase in the capabilities of the neural networks under studyis possible by controlling the neuron excitation thresholds in order to provide sequential rather than parallel elimination of variouserrors. In contrast to the conventional neural networks, recurrent neural networks with controlled elements can adapt to changes in№ 5, 2019 ИНФОРМАЦИОННОУПРАВЛЯЮЩИЕ СИСТЕМЫ 17ОБРАБОТКА ИНФОРМАЦИИ И УПРАВЛЕНИЕthe laws inherent in frame flows, and implement controlled associative signal processing. Experiments have shown that these neuralnetworks can use associative connections for taking into account deep current experience in signal processing, and be successfully usedfor restoring distorted frame flows.
各种干扰的影响提出了快速恢复畸变帧流、记住事件测量规律的背景和动态等紧迫问题。传统的恢复扭曲帧流的方法没有充分考虑到这一过程的特点。目的:探索具有控制元素的递归神经网络用于恢复帧流的可能性。结果:建议通过成功恢复扭曲帧序列的选项数量来评估具有控制元素的循环神经网络的潜力。根据引入的指标对这类神经网络的能力进行评价,表明它们对网络结构类型和设置有很强的依赖性。具有螺旋层结构的递归神经网络效果更好。随着螺旋匝数的增加,网络的能力也在增长。用双极函数代替突触权值的单极函数,增强网络恢复扭曲帧流的能力是可行的。通过控制神经元的激励阈值,以提供顺序而不是并行消除各种误差,可以显著提高所研究的神经网络的能力。与传统神经网络相比,具有受控元素的递归神经网络可以适应帧流中固有的№5,2019 ИНФОРМАЦИОННОУПРАВЛЯЮЩИЕ СИСТЕМЫ 17ОБРАБОТКА ИНФОРМАЦИИ И УПРАВЛЕНИЕthe规律的变化,并实现受控的关联信号处理。实验表明,这些神经网络可以使用联想连接来考虑信号处理中的深层电流经验,并成功地用于恢复扭曲的帧流。
{"title":"Recurrent neural networks with controlled elements in restoring frame flows","authors":"V. Osipov, Viktor Nikiforov","doi":"10.31799/1684-8853-2019-5-10-17","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-10-17","url":null,"abstract":"Introduction: Various interfering influences raise pressing problems of promptly restoring the flow of distorted frames,remembering about the background and dynamics of the event measurement laws. The traditional methods of recovering flows ofdistorted frames do not fully take into account the peculiarities of this process. Purpose: Exploring the possibilities of recurrent neuralnetworks with controlled elements for restoring frame flows. Results: It is proposed to evaluate the potential of a recurrent neuralnetwork with controlled elements by the number of successful options for restoring a distorted sequence of frames. Evaluation of thecapabilities of such neural networks according to the introduced indicator showed their strong dependence on the type of networkstructure and settings. Recurrent neural networks with spiral structures of layers work better. As the number of the turns in the helixgrows, the network capabilities also grow. Enhancing the capacity of a network to restore distorted frame flows is feasible if we replaceunipolar functions of the synapse weights by bipolar ones. A significant increase in the capabilities of the neural networks under studyis possible by controlling the neuron excitation thresholds in order to provide sequential rather than parallel elimination of variouserrors. In contrast to the conventional neural networks, recurrent neural networks with controlled elements can adapt to changes in№ 5, 2019 ИНФОРМАЦИОННОУПРАВЛЯЮЩИЕ СИСТЕМЫ 17ОБРАБОТКА ИНФОРМАЦИИ И УПРАВЛЕНИЕthe laws inherent in frame flows, and implement controlled associative signal processing. Experiments have shown that these neuralnetworks can use associative connections for taking into account deep current experience in signal processing, and be successfully usedfor restoring distorted frame flows.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45772062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-16DOI: 10.31799/1684-8853-2019-5-30-37
S. Kuleshov, A. Zaytseva, I. Shalnev
Introduction: Active data, being fragments of executable code transmitted between the nodes of an active network, are an effectivemechanism for the operation of software-reconfigurable distributed systems. Previously, in the works devoted to active data, not enoughattention was paid to the implementation of the runtime environment (the processor) for the executable code of active data, as well asto the issues of building hypervisors and load balancing in distributed systems. Purpose: Developing principles for the construction of virtual machines with active data, providing the reconfigurability of the target devices and network flexibility in general. Evaluatingthe possibility of using the existing approaches to load balancing for networks with active data. Methods: Our study uses the principlesof software-defined system development, the conception of active data, theoretical foundations and technology of virtualization.Results: Is has been proposed to use a distributed system of virtual machines as an active data execution environment, based on theobject-oriented approach to creating distributed applications. Each node of such a distributed system of virtual machines can act aseither a control or slave node during the object interaction. Based on the developed approach, we proposed to solve the problem ofbuilding a network of repeaters using active data, considering an unmanned aerial vehicle as an element of an active info-communicationnetwork which supports the active data technology. Since a distributed system of virtual machines enables asymmetric distribution ofdecentralized network nodes, a method has been developed for a distributed system whose nodes are unmanned aerial vehicles and acontrol node, to control the asymmetry value by creating objects of various decomposition levels. Practical relevance: The proposedmethods provide a way to control the resource consumption of the nodes of a distributed software-reconfigurable network and theamount of network data transmitted. For dynamic management of the load on the network nodes, a resource manager architecture anda resource allocation algorithm are developed.
{"title":"Distributed system of virtual machines for self-organized networks","authors":"S. Kuleshov, A. Zaytseva, I. Shalnev","doi":"10.31799/1684-8853-2019-5-30-37","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-5-30-37","url":null,"abstract":"Introduction: Active data, being fragments of executable code transmitted between the nodes of an active network, are an effectivemechanism for the operation of software-reconfigurable distributed systems. Previously, in the works devoted to active data, not enoughattention was paid to the implementation of the runtime environment (the processor) for the executable code of active data, as well asto the issues of building hypervisors and load balancing in distributed systems. Purpose: Developing principles for the construction of virtual machines with active data, providing the reconfigurability of the target devices and network flexibility in general. Evaluatingthe possibility of using the existing approaches to load balancing for networks with active data. Methods: Our study uses the principlesof software-defined system development, the conception of active data, theoretical foundations and technology of virtualization.Results: Is has been proposed to use a distributed system of virtual machines as an active data execution environment, based on theobject-oriented approach to creating distributed applications. Each node of such a distributed system of virtual machines can act aseither a control or slave node during the object interaction. Based on the developed approach, we proposed to solve the problem ofbuilding a network of repeaters using active data, considering an unmanned aerial vehicle as an element of an active info-communicationnetwork which supports the active data technology. Since a distributed system of virtual machines enables asymmetric distribution ofdecentralized network nodes, a method has been developed for a distributed system whose nodes are unmanned aerial vehicles and acontrol node, to control the asymmetry value by creating objects of various decomposition levels. Practical relevance: The proposedmethods provide a way to control the resource consumption of the nodes of a distributed software-reconfigurable network and theamount of network data transmitted. For dynamic management of the load on the network nodes, a resource manager architecture anda resource allocation algorithm are developed.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46112699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.31799/1684-8853-2019-4-9-18
A. Gruzlikov, N. Kolesov, D. Kostygov, M. Tolmacheva
Introduction: The majority of real complex systems are designed with respect to fault tolerance requirements. However, all theknown approaches are intended only to increase reliability. Purpose: An approach for designing fault-tolerant systems on a chip, aimednot only at increasing the reliability, but also at reducing the energy consumed by the system. Results: A two-stage approach to thedesign of fault-tolerant multicore systems-on-chip (MCSoCs) is proposed. At the first stage, an energy-efficient architecture of thedesigned system is formed. For each core used in the system, the optimal number of additional cores is determined within the frameworkof the imposed restrictions. The optimality criterion is the minimum power consumed by the system. The algorithm proposed for theformation of an energy-efficient architecture is based on the dependence of the power consumed in the system on the values of the supplyvoltage and the clock frequency. At the second stage, a procedure for diagnosing and repairing the system is developed which uses theprinciples of system-level diagnosis, involving mutual checks between the system cores. This procedure allows you to decentralize theprocess of diagnosing and restoring the system after a failure. Additionally, the article examines the organization of the communicationsubsystem based on shared memory. The study is based on a simulation conducted in order to estimate the time for making a decisionabout a failure in systems such as a lattice, torus and hypercube. Practical relevance: The proposed approach allows a system to providethe necessary values for its two most important characteristics: fault tolerance and energy efficiency. At the same time, decentralizationis ensured when making decisions about a failure and restoration. As a result, the system becomes more reliable.
{"title":"Fault-tolerant and energy-efficient MCSoC for information processing and control","authors":"A. Gruzlikov, N. Kolesov, D. Kostygov, M. Tolmacheva","doi":"10.31799/1684-8853-2019-4-9-18","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-4-9-18","url":null,"abstract":"Introduction: The majority of real complex systems are designed with respect to fault tolerance requirements. However, all theknown approaches are intended only to increase reliability. Purpose: An approach for designing fault-tolerant systems on a chip, aimednot only at increasing the reliability, but also at reducing the energy consumed by the system. Results: A two-stage approach to thedesign of fault-tolerant multicore systems-on-chip (MCSoCs) is proposed. At the first stage, an energy-efficient architecture of thedesigned system is formed. For each core used in the system, the optimal number of additional cores is determined within the frameworkof the imposed restrictions. The optimality criterion is the minimum power consumed by the system. The algorithm proposed for theformation of an energy-efficient architecture is based on the dependence of the power consumed in the system on the values of the supplyvoltage and the clock frequency. At the second stage, a procedure for diagnosing and repairing the system is developed which uses theprinciples of system-level diagnosis, involving mutual checks between the system cores. This procedure allows you to decentralize theprocess of diagnosing and restoring the system after a failure. Additionally, the article examines the organization of the communicationsubsystem based on shared memory. The study is based on a simulation conducted in order to estimate the time for making a decisionabout a failure in systems such as a lattice, torus and hypercube. Practical relevance: The proposed approach allows a system to providethe necessary values for its two most important characteristics: fault tolerance and energy efficiency. At the same time, decentralizationis ensured when making decisions about a failure and restoration. As a result, the system becomes more reliable.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48320751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.31799/1684-8853-2019-4-19-28
N. Shilov
Introduction: The use of digital signage is currently a popular way to provide information to large groups of people. However,personalized (oriented to the interests and preferences of a particular user) and contextualized (taking into account the currentsituation) information delivery through digital signage is subject to a number of technological and legislative restrictions. Purpose:Development of a methodology of systems providing personalized information through digital signage. Results: The requirementsto the systems providing personalized information through digital signage have been specified: user anonymity, dynamic evaluationof user interest, user clustering, structured storage and processing of user interests and preferences, situational awareness. Theprinciples of the functioning of the systems of the specified class have been determined taking into account the need to preserveconfidentiality of personal data: information collection without active user participation, usage of anonymous profiles, self-learningand adaptation, ontological modelling of user interests and preferences, application of context management technology. An originalmethodology of the functioning of the considered systems has been proposed, characterized by the presence of feedback for refinementof the information delivered and information about users, as well as by the absence of any active participation of the users. The feedbackis achieved through application of the image analysis techniques, that allow to identify precisely enough the time spent by the users forwatching the information at digital signage as well as their age, gender, and emotions. Partial approbation of the results in the partof assessing personal visual characteristics (gender, age, emotional state) has been carried out based on photo analytics. It is shownthat chosen software tools enable evaluation of the user visual characteristics (age, gender, and emotions) with high precision, andshowing animated images ca affect the emotional state of the viewer. Practical relevance: The proposed requirements, principles andmethodology can be used for creating systems delivering personalized information to large groups of people, such as digital signage andelectronic scoreboards.
{"title":"Personalization of information delivery through digital signage: major requirements and methodology","authors":"N. Shilov","doi":"10.31799/1684-8853-2019-4-19-28","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-4-19-28","url":null,"abstract":"Introduction: The use of digital signage is currently a popular way to provide information to large groups of people. However,personalized (oriented to the interests and preferences of a particular user) and contextualized (taking into account the currentsituation) information delivery through digital signage is subject to a number of technological and legislative restrictions. Purpose:Development of a methodology of systems providing personalized information through digital signage. Results: The requirementsto the systems providing personalized information through digital signage have been specified: user anonymity, dynamic evaluationof user interest, user clustering, structured storage and processing of user interests and preferences, situational awareness. Theprinciples of the functioning of the systems of the specified class have been determined taking into account the need to preserveconfidentiality of personal data: information collection without active user participation, usage of anonymous profiles, self-learningand adaptation, ontological modelling of user interests and preferences, application of context management technology. An originalmethodology of the functioning of the considered systems has been proposed, characterized by the presence of feedback for refinementof the information delivered and information about users, as well as by the absence of any active participation of the users. The feedbackis achieved through application of the image analysis techniques, that allow to identify precisely enough the time spent by the users forwatching the information at digital signage as well as their age, gender, and emotions. Partial approbation of the results in the partof assessing personal visual characteristics (gender, age, emotional state) has been carried out based on photo analytics. It is shownthat chosen software tools enable evaluation of the user visual characteristics (age, gender, and emotions) with high precision, andshowing animated images ca affect the emotional state of the viewer. Practical relevance: The proposed requirements, principles andmethodology can be used for creating systems delivering personalized information to large groups of people, such as digital signage andelectronic scoreboards.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45511313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-04DOI: 10.31799/1684-8853-2019-4-38-44
A. Gorodetskiy, I. Tarasova, V. G. Kurbanov
Introduction: The creation of controlled microrobots capable of moving in human vessels in accordance with a given traffic is asophisticated problem. An effective way to solve it is the use of SEMS (Smart ElectroMechanical System) modules. These modulesconnected in a special way can simulate the operation of a ciliary apparatus or a flagellated propulsor used as propulsive devices for amicrorobot. Purpose: Development of a controlled medical microrobot based on standard SEMS modules. Results: A medical microrobotis developed. The principles of collective movement control for such microrobots are discussed. A special role in microrobot groupcontrol is assigned to the central nervous system of a microrobot which functions as an automatic control system. When synthesizingan optimal situational control over a group of microrobots, logical-probabilistic and logical-linguistic constraints are translatedinto logical-interval ones, reducing the optimization problem to solving a number of classical mathematical programming problems.Practical relevance: The use of various combinations of SEMS modules in medical microrobots allows you to increase their accuracy,speed and adaptability to the environment. This is because in this case, in contrast to the mechanisms commonly used in microrobots,parallelism is introduced not only in the measurement and calculation processes, but also in the execution of control commands. Thedesign features of the developed modules allow you to provide broad technological capabilities of various biomedical robotic complexes.
{"title":"Controlled microrobot for moving in human vessels","authors":"A. Gorodetskiy, I. Tarasova, V. G. Kurbanov","doi":"10.31799/1684-8853-2019-4-38-44","DOIUrl":"https://doi.org/10.31799/1684-8853-2019-4-38-44","url":null,"abstract":"Introduction: The creation of controlled microrobots capable of moving in human vessels in accordance with a given traffic is asophisticated problem. An effective way to solve it is the use of SEMS (Smart ElectroMechanical System) modules. These modulesconnected in a special way can simulate the operation of a ciliary apparatus or a flagellated propulsor used as propulsive devices for amicrorobot. Purpose: Development of a controlled medical microrobot based on standard SEMS modules. Results: A medical microrobotis developed. The principles of collective movement control for such microrobots are discussed. A special role in microrobot groupcontrol is assigned to the central nervous system of a microrobot which functions as an automatic control system. When synthesizingan optimal situational control over a group of microrobots, logical-probabilistic and logical-linguistic constraints are translatedinto logical-interval ones, reducing the optimization problem to solving a number of classical mathematical programming problems.Practical relevance: The use of various combinations of SEMS modules in medical microrobots allows you to increase their accuracy,speed and adaptability to the environment. This is because in this case, in contrast to the mechanisms commonly used in microrobots,parallelism is introduced not only in the measurement and calculation processes, but also in the execution of control commands. Thedesign features of the developed modules allow you to provide broad technological capabilities of various biomedical robotic complexes.","PeriodicalId":36977,"journal":{"name":"Informatsionno-Upravliaiushchie Sistemy","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48665219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}