Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-4
Buzov P.A., Zhikharev A.G., Matorin S.I.
The article deals with the urgent task of improving the functional cost analysis in the interests of introducing a quality management system, since the traditional understanding of this analysis does not meet all the requirements of quality management. To solve the problem, a system-object approach was used, which allows presenting the system as an element "Node-Function-Object" (functional object), taking into account a wider range of input and output connections. As a result of the study, an improved method of functional cost analysis has been developed that meets the requirements of ISO 9001:2015 and allows more accurate accounting of the costs necessary to obtain the final product. An example of the decomposition of the production process by means of a system-object approach is given, which made it possible to present the production process in more detail and adequately, in accordance with the requirements of the quality management system and the real input and output links of the processes performed by functional objects.
{"title":"FUNCTIONAL-COST ANALYSIS FOR THE QUALITY MANAGEMENT SYSTEM","authors":"Buzov P.A., Zhikharev A.G., Matorin S.I.","doi":"10.18413/2518-1092-2022-7-2-0-4","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-4","url":null,"abstract":"The article deals with the urgent task of improving the functional cost analysis in the interests of introducing a quality management system, since the traditional understanding of this analysis does not meet all the requirements of quality management. To solve the problem, a system-object approach was used, which allows presenting the system as an element \"Node-Function-Object\" (functional object), taking into account a wider range of input and output connections. As a result of the study, an improved method of functional cost analysis has been developed that meets the requirements of ISO 9001:2015 and allows more accurate accounting of the costs necessary to obtain the final product. An example of the decomposition of the production process by means of a system-object approach is given, which made it possible to present the production process in more detail and adequately, in accordance with the requirements of the quality management system and the real input and output links of the processes performed by functional objects.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The work is devoted to the development of a method for the objects detecting on an agitated sea surface video based on the analysis of the differences in the variability of the object and the sea surface image fragments on the neighboring frames. The proposed method does not use data about the object size, its shape, brightness, etc. The decision function has been developed that can be used to estimate the variability of a given frames fragment, based on the normalized cross-correlation coefficients values of the corresponding fragments on a video subsequent frames. The decision rule has been developed based on the proposed decision function, in which we use the threshold value (the critical domain boundary) determined at the training stage when analyzing the frames sequence fragments containing only the agitated sea surface image. The efficiency of the developed objects detection method on the agitated sea surface is demonstrated based on computational experiments. The values of the decision function critical domain boundary obtained at the training stage and the corresponding values of the type II error probability at the detection stage are given. The presented computational experiments results demonstrate that the developed method makes it possible to detect the object on video frames with the type II error probability equal to zero.
{"title":"OBJECTS DETECTION BASED ON THE SEA SURFACE VIDEO FRAGMENTS CROSS-CORRELATION","authors":"Ursol D.V., Chernomorets D.A., Bolgova E.V., Chernomorets A.A.","doi":"10.18413/2518-1092-2022-7-2-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-2","url":null,"abstract":"The work is devoted to the development of a method for the objects detecting on an agitated sea surface video based on the analysis of the differences in the variability of the object and the sea surface image fragments on the neighboring frames. The proposed method does not use data about the object size, its shape, brightness, etc. The decision function has been developed that can be used to estimate the variability of a given frames fragment, based on the normalized cross-correlation coefficients values of the corresponding fragments on a video subsequent frames. The decision rule has been developed based on the proposed decision function, in which we use the threshold value (the critical domain boundary) determined at the training stage when analyzing the frames sequence fragments containing only the agitated sea surface image. The efficiency of the developed objects detection method on the agitated sea surface is demonstrated based on computational experiments. The values of the decision function critical domain boundary obtained at the training stage and the corresponding values of the type II error probability at the detection stage are given. The presented computational experiments results demonstrate that the developed method makes it possible to detect the object on video frames with the type II error probability equal to zero.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132356533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-3
Kuzminykh E.S., Maslova M.A.
In the age of the heyday of information technology and the development of the functionality of mobile phones, people are starting to use the phone more, because it is very convenient, besides phones have recently become more and more powerful. But do not forget about intruders who are starting to hunt more and more for user data on phones, because it is much easier to get access to a mobile phone than to a well-protected and complexly equipped computer, because few people use special methods to protect their phone from potential threats. If we take into account the new vulnerabilities that appear after each update, which leads to the emergence of "zero-day" threats, then it becomes impossible for an ordinary user to deal with such threats. This article will discuss the main mobile threats, how to deal with them, what to do if the threat has come and your mobile device is in danger, as well as the analysis of the development and relevance of mobile virus software.
{"title":"ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES","authors":"Kuzminykh E.S., Maslova M.A.","doi":"10.18413/2518-1092-2022-7-2-0-3","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-3","url":null,"abstract":"In the age of the heyday of information technology and the development of the functionality of mobile phones, people are starting to use the phone more, because it is very convenient, besides phones have recently become more and more powerful. But do not forget about intruders who are starting to hunt more and more for user data on phones, because it is much easier to get access to a mobile phone than to a well-protected and complexly equipped computer, because few people use special methods to protect their phone from potential threats. If we take into account the new vulnerabilities that appear after each update, which leads to the emergence of \"zero-day\" threats, then it becomes impossible for an ordinary user to deal with such threats. This article will discuss the main mobile threats, how to deal with them, what to do if the threat has come and your mobile device is in danger, as well as the analysis of the development and relevance of mobile virus software.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-1
Migal L.V, B. V.G.
Based on the model of the nuclear shells, a computer model of the spatial structure of the atomic nucleus was constructed. The application of the new approach, by analogy with the modeling of the atom electron shell, allowed us to visualize the structure of the atomic nucleus. In the presented spatial model, the concept of nucleon is also extended to include, besides protons and neutrons, deuterons in the nuclear shell. The nature of quantum and magic numbers is clarified, and the structure of the nuclear shell is shown. The resulting spatial arrangement of nucleons clearly shows the presence of a fine structure in the nucleus. Adequacy of the model is confirmed by correlations of the dependences of the nucleus radius on the charge number, as well as by the curve of the asymmetric nucleus shape dependence on the charge number which almost entirely coincides with a similar dependence of the electric quadrupole moment. The reasons for limiting the number of isotopes existing in nature have been considered. Based on the results obtained, equations for estimating the limiting number of isotopes in atoms for the NP-diagram have been determined.
{"title":"COMPUTER VISUALIZATION OF THE SPATIAL STRUCTURE OF THE ATOMIC NUCLEUS","authors":"Migal L.V, B. V.G.","doi":"10.18413/2518-1092-2022-7-2-0-1","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-1","url":null,"abstract":"Based on the model of the nuclear shells, a computer model of the spatial structure of the atomic nucleus was constructed. The application of the new approach, by analogy with the modeling of the atom electron shell, allowed us to visualize the structure of the atomic nucleus. In the presented spatial model, the concept of nucleon is also extended to include, besides protons and neutrons, deuterons in the nuclear shell. The nature of quantum and magic numbers is clarified, and the structure of the nuclear shell is shown. The resulting spatial arrangement of nucleons clearly shows the presence of a fine structure in the nucleus. Adequacy of the model is confirmed by correlations of the dependences of the nucleus radius on the charge number, as well as by the curve of the asymmetric nucleus shape dependence on the charge number which almost entirely coincides with a similar dependence of the electric quadrupole moment. The reasons for limiting the number of isotopes existing in nature have been considered. Based on the results obtained, equations for estimating the limiting number of isotopes in atoms for the NP-diagram have been determined.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-8
Medvedev A.A., Laptev A.A.
Microexpressions are unconscious, short-term non-verbal signals that allow to determine the emotional state of a person. Microexpressions occur when a person blocks emotions or hides true intentions. Determining non-verbal signals becomes an urgent task in situations where lying or hiding information leads to resource or financial losses, affects the safety and health of other people. The spread of online conferences opens up the possibility of programmatic processing of a human speech video channel to analyze emotions and behavior in order to identify the congruence or inconsistency of person's statements. The article discusses computer vision and machine learning methods that allow extracting and analyzing person's face from a video channel to determine its non-verbal markers and emotional state. The method of facial landmarks, key points of the face, classification of human emotions by facial landmarks, detection of blinking and turning of a person during speech are considered in detail.
{"title":"AN ALGORITHM FOR DETECTING NON-VERBAL MARKERS OF HUMAN BEHAVIOR ON VIDEO","authors":"Medvedev A.A., Laptev A.A.","doi":"10.18413/2518-1092-2022-7-2-0-8","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-8","url":null,"abstract":"Microexpressions are unconscious, short-term non-verbal signals that allow to determine the emotional state of a person. Microexpressions occur when a person blocks emotions or hides true intentions. Determining non-verbal signals becomes an urgent task in situations where lying or hiding information leads to resource or financial losses, affects the safety and health of other people. The spread of online conferences opens up the possibility of programmatic processing of a human speech video channel to analyze emotions and behavior in order to identify the congruence or inconsistency of person's statements. The article discusses computer vision and machine learning methods that allow extracting and analyzing person's face from a video channel to determine its non-verbal markers and emotional state. The method of facial landmarks, key points of the face, classification of human emotions by facial landmarks, detection of blinking and turning of a person during speech are considered in detail.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-6
Knaan A.-R., Polshchikov K.A.
Over the past few decades, due to the explosive growth of social media, online resources, and microblogging sites such as Twitter. There was an influx of user-generated content. The data obtained from these resources is a rich source of information for data mining. Sentiment analysis is a current and important area of research that attempts to determine the polarity of a text. The definition of feelings about current events in the world has become crucial. This article focuses on data mining on Twitter and defining opinions regarding e-learning. The focus is on identifying sentiment from e-learning-related texts that are shared on Twitter. About 3,000 tweets were extracted and the polarity of those tweets was detected, and then visualize the resulting data.
{"title":"ANALYSIS OF PUBLIC REACTION TO E-LEARNING ON TWITTER","authors":"Knaan A.-R., Polshchikov K.A.","doi":"10.18413/2518-1092-2022-7-2-0-6","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-6","url":null,"abstract":"Over the past few decades, due to the explosive growth of social media, online resources, and microblogging sites such as Twitter. There was an influx of user-generated content. The data obtained from these resources is a rich source of information for data mining. Sentiment analysis is a current and important area of research that attempts to determine the polarity of a text. The definition of feelings about current events in the world has become crucial. This article focuses on data mining on Twitter and defining opinions regarding e-learning. The focus is on identifying sentiment from e-learning-related texts that are shared on Twitter. About 3,000 tweets were extracted and the polarity of those tweets was detected, and then visualize the resulting data.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-7
Samigulin T.R., Smirnov I.Z., Laushkina A.A.
The interaction of participants in digital platforms requires a prompt response to actions from each other. At the same time, such interaction is multifaceted, in which, along with the transfer of information, knowledge about the state of the interlocutor, his current emotional state and personal characteristics is necessary. As part of a pilot study at ITMO University, together with psychologists from St. Petersburg State University, a list of markers of aggressive behavior was determined. And within the framework of this work, the implementation of methods for extracting markers of aggressive human behavior through audio and text channels is described. This paper also describes the approach of combining verbal and non-verbal features in speech. From the results obtained in the course of applying methods for extracting markers of aggressive behavior, we can conclude that the use of audio and text channels of information separately is not enough to detect aggressive behavior.
{"title":"DETERMINATION OF MARKERS OF AGGRESSIVE BEHAVIOR BASED ON THE ANALYSIS OF AUDIO AND TEXT CHANNELS","authors":"Samigulin T.R., Smirnov I.Z., Laushkina A.A.","doi":"10.18413/2518-1092-2022-7-2-0-7","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-7","url":null,"abstract":"The interaction of participants in digital platforms requires a prompt response to actions from each other. At the same time, such interaction is multifaceted, in which, along with the transfer of information, knowledge about the state of the interlocutor, his current emotional state and personal characteristics is necessary. As part of a pilot study at ITMO University, together with psychologists from St. Petersburg State University, a list of markers of aggressive behavior was determined. And within the framework of this work, the implementation of methods for extracting markers of aggressive human behavior through audio and text channels is described. This paper also describes the approach of combining verbal and non-verbal features in speech. From the results obtained in the course of applying methods for extracting markers of aggressive behavior, we can conclude that the use of audio and text channels of information separately is not enough to detect aggressive behavior.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132209044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.18413/2518-1092-2022-7-2-0-5
Kostin K.V., Egorov S.F., Chistyakov S.V.
Currently, almost everyone uses information transmission services. To meet all the needs, the power and data transmission rates in modern optical communication systems have reached enormous values. At high transmitted powers, undesirable nonlinear effects occur in the optical fiber, which reduce the efficiency of the entire optical system. Nonlinear effects in optical fibers impose various limitations on the communication channel, and understanding such effects is practically necessary. Four-wave mixing is the dominant nonlinear effect present in optical networks with wavelength-division multiplexing. The general provisions on the mechanism of manifestation of four-wave mixing in an optical fiber are substantiated. The article presents a variant of the classification of nonlinear effects. The types of four-wave mixing are considered. The paper shows the dependence of the FWM effect on the number of signals in the path and the phase ratio between the interacting signals. The authors propose ways to increase the reliability of optical signal transmission in fiber-optic transmission systems.
{"title":"THE INFLUENCE OF THE FOUR-WAVE MIXING EFFECT ON THE TRANSMISSION QUALITY OF OPTICAL SIGNALS","authors":"Kostin K.V., Egorov S.F., Chistyakov S.V.","doi":"10.18413/2518-1092-2022-7-2-0-5","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-2-0-5","url":null,"abstract":"Currently, almost everyone uses information transmission services. To meet all the needs, the power and data transmission rates in modern optical communication systems have reached enormous values. At high transmitted powers, undesirable nonlinear effects occur in the optical fiber, which reduce the efficiency of the entire optical system. Nonlinear effects in optical fibers impose various limitations on the communication channel, and understanding such effects is practically necessary. Four-wave mixing is the dominant nonlinear effect present in optical networks with wavelength-division multiplexing. The general provisions on the mechanism of manifestation of four-wave mixing in an optical fiber are substantiated. The article presents a variant of the classification of nonlinear effects. The types of four-wave mixing are considered. The paper shows the dependence of the FWM effect on the number of signals in the path and the phase ratio between the interacting signals. The authors propose ways to increase the reliability of optical signal transmission in fiber-optic transmission systems.","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124113610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-30DOI: 10.18413/2518-1092-2022-7-1-0-7
A. G. Zhikharev, R.A Mamatov, A.V. Gubkin, P. V. Ignatenko
{"title":"Структурные элементы исчисления систем как функциональных объектов","authors":"A. G. Zhikharev, R.A Mamatov, A.V. Gubkin, P. V. Ignatenko","doi":"10.18413/2518-1092-2022-7-1-0-7","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-1-0-7","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-30DOI: 10.18413/2518-1092-2022-7-1-0-2
M.V Bushuev, O. Abramova
{"title":"Modeling of software and information navigator for amateur anglers","authors":"M.V Bushuev, O. Abramova","doi":"10.18413/2518-1092-2022-7-1-0-2","DOIUrl":"https://doi.org/10.18413/2518-1092-2022-7-1-0-2","url":null,"abstract":"","PeriodicalId":424277,"journal":{"name":"Research Result Information Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}