首页 > 最新文献

Radio Electronics Computer Science Control最新文献

英文 中文
APPLICATION OF SPLINE FUNCTIONS AND WALSH FUNCTIONS IN PROBLEMS OF PARAMETRIC IDENTIFICATION OF LINEAR NONSTATIONARY SYSTEMS 样条函数和Walsh函数在线性非平稳系统参数辨识问题中的应用
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-02 DOI: 10.15588/1607-3274-2023-2-17
А. Stenin, I. G. Drozdovych, M. O. Soldatova
Context. In this article, a generalized parametric identification procedure for linear nonstationary systems is proposed, which uses spline functions and orthogonal expansion in a series according to the Walsh function system, which makes it possible to find estimates of the desired parameters by minimizing the integral quadratic criterion of discrepancy based on solving a system of linear algebraic equations for a wide class of linear dynamical systems. The accuracy of parameter estimation is ensured by constructing a spline with a given accuracy and choosing the number of terms of the Walsh series expansion when solving systems of linear algebraic equations by the A. N. Tikhonov regularization method. To improve the accuracy of the assessment, an algorithm for adaptive partitioning of the observation interval is proposed. The partitioning criterion is the weighted square of the discrepancy between the state variables of the control object and the state variables of the model. The choice of the number of terms of the expansion into the Walsh series is carried out on the basis of adaptive approximation of non-stationary parameters in the observation interval, based on the specified accuracy of their estimates. The quality of the management of objects with variable parameters is largely determined by the accuracy of the evaluation of their parameters. Hence, obtaining reliable information about the actual nature of parameter changes is undoubtedly an urgent task. Objective. Improving the accuracy of parameter estimation of a wide class of linear dynamical systems through the joint use of spline functions and Walsh functions. Method. A generalized parametric identification procedure for a wide class of linear dynamical systems is proposed. The choice of the number of terms of the expansion into the Walsh series is made on the basis of the proposed algorithm for adaptive partitioning of the observation interval. Results. The results of modeling of specific linear non-stationary systems confirm the effectiveness of using the proposed approaches to estimating non-stationary parameters. Conclusions. The joint use of spline functions and Walsh functions makes it possible, based on the proposed generalized parametric identification procedure, to obtain analytically estimated parameters, which is very convenient for subsequent use in the synthesis of optimal controls of real technical objects. This procedure is applicable to a wide class of linear dynamical systems with concentrated and distributed parameters.
上下文。本文在求解一类广义线性动力系统的线性代数方程组的基础上,提出了一种线性非平稳系统的广义参数辨识方法,该方法利用样条函数和沃尔什函数系统的正交级数展开式,通过最小化差异积分二次判据来求得期望参数的估计。在用a . N. Tikhonov正则化方法求解线性代数方程组时,通过构造具有给定精度的样条和选择Walsh级数展开的项数来保证参数估计的准确性。为了提高评估的准确性,提出了一种观测区间的自适应划分算法。划分准则是控制对象状态变量与模型状态变量之差的加权平方。扩展到Walsh序列的项数的选择是在观测区间内非平稳参数的自适应逼近的基础上进行的,基于它们的估计的指定精度。可变参数对象的管理质量在很大程度上取决于其参数评价的准确性。因此,获得有关参数变化的实际性质的可靠信息无疑是一项紧迫的任务。目标。通过样条函数和沃尔什函数的联合应用,提高了一类线性动力系统参数估计的精度。方法。提出了一类广义线性动力系统的广义参数辨识方法。根据所提出的自适应分割观测区间的算法,选择展开到Walsh序列的项数。结果。具体线性非平稳系统的建模结果证实了采用所提方法估计非平稳参数的有效性。结论。利用样条函数和Walsh函数的联合应用,可以根据所提出的广义参数辨识方法得到解析估计的参数,为后续在实际技术对象的最优控制综合中使用提供了方便。该方法适用于具有集中和分布参数的各种线性动力系统。
{"title":"APPLICATION OF SPLINE FUNCTIONS AND WALSH FUNCTIONS IN PROBLEMS OF PARAMETRIC IDENTIFICATION OF LINEAR NONSTATIONARY SYSTEMS","authors":"А. Stenin, I. G. Drozdovych, M. O. Soldatova","doi":"10.15588/1607-3274-2023-2-17","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-17","url":null,"abstract":"Context. In this article, a generalized parametric identification procedure for linear nonstationary systems is proposed, which uses spline functions and orthogonal expansion in a series according to the Walsh function system, which makes it possible to find estimates of the desired parameters by minimizing the integral quadratic criterion of discrepancy based on solving a system of linear algebraic equations for a wide class of linear dynamical systems. The accuracy of parameter estimation is ensured by constructing a spline with a given accuracy and choosing the number of terms of the Walsh series expansion when solving systems of linear algebraic equations by the A. N. Tikhonov regularization method. To improve the accuracy of the assessment, an algorithm for adaptive partitioning of the observation interval is proposed. The partitioning criterion is the weighted square of the discrepancy between the state variables of the control object and the state variables of the model. The choice of the number of terms of the expansion into the Walsh series is carried out on the basis of adaptive approximation of non-stationary parameters in the observation interval, based on the specified accuracy of their estimates. The quality of the management of objects with variable parameters is largely determined by the accuracy of the evaluation of their parameters. Hence, obtaining reliable information about the actual nature of parameter changes is undoubtedly an urgent task. \u0000Objective. Improving the accuracy of parameter estimation of a wide class of linear dynamical systems through the joint use of spline functions and Walsh functions. \u0000Method. A generalized parametric identification procedure for a wide class of linear dynamical systems is proposed. The choice of the number of terms of the expansion into the Walsh series is made on the basis of the proposed algorithm for adaptive partitioning of the observation interval. \u0000Results. The results of modeling of specific linear non-stationary systems confirm the effectiveness of using the proposed approaches to estimating non-stationary parameters. \u0000Conclusions. The joint use of spline functions and Walsh functions makes it possible, based on the proposed generalized parametric identification procedure, to obtain analytically estimated parameters, which is very convenient for subsequent use in the synthesis of optimal controls of real technical objects. This procedure is applicable to a wide class of linear dynamical systems with concentrated and distributed parameters.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"31 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84853345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD FOR SELECTING A SOFTWARE DEVELOPMENT METHODOLOGY TAKING INTO ACCOUNT PROJECT CHARACTERISTICS 考虑到项目特征选择软件开发方法的方法
Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-02 DOI: 10.15588/1607-3274-2023-2-14
M. M. Seniv
Context. With the development of the software industry, the number of applied methodologies and hybrid approaches based on them constantly increases, that is why, the choice of the most suitable/optimal methodology for the project is an urgent problem of software engineering, since the selection process is poorly formalized, requires sufficient experience of the person who will make this decision and depends on many related factors. Objective. The support of decision-making in the process of choosing a methodology for the software project development and increase of the level of adequacy of the above choice. Method. Based on the previously developed algorithm by the author, a generalized method for selecting the best software development methodology is proposed, which consists of 14 steps and takes into account the characteristics of the project, based on the multi-criteria analysis approaches, taking into consideration the opinions of experts for a more reasonable choice of the most suitable methodology for this project. The method uses the aggregated expert evaluation. It was decided to use the AHP to calculate the criteria weights. Based on the established values of criteria, their weights and expert evaluation, the score is calculated for each methodology using the weighted sum and TOPSIS methods. Results. The application of the developed method to the data of actual projects showed a match in 83% of cases (in five out of six cases, the application of the method resulted in the selection of methodology that corresponded to the one actually used in an existing project). In cases when the methodology chosen by the proposed method differed from the one that was actually used, the application of the proposed method recommends going to the stage of the initial determination of criteria and their weights, which will allow making a more adequate choice of methodology. Conclusions. The proposed method can be applied in practice by software project managers to support the decision-making process, and will allow reducing time spent on project management.
上下文。随着软件行业的发展,应用的方法和基于它们的混合方法的数量不断增加,这就是为什么,为项目选择最合适/最优的方法是软件工程的一个紧迫问题,因为选择过程形式化很差,需要做出这个决定的人有足够的经验,并取决于许多相关因素。 目标。在软件项目开发方法选择过程中的决策支持,提高上述选择的充分性水平。 方法。在笔者之前提出的算法的基础上,提出了一种选择最佳软件开发方法的通用方法,该方法包括14个步骤,考虑到项目的特点,在多准则分析方法的基础上,考虑专家的意见,更合理地选择最适合本项目的方法。该方法采用综合专家评价方法。决定采用层次分析法计算各指标的权重。根据标准的既定值、权重和专家评价,使用加权和和TOPSIS方法计算每种方法的得分。结果。将开发的方法应用于实际项目的数据,在83%的情况下显示出匹配(在六分之五的情况下,该方法的应用导致选择的方法与现有项目中实际使用的方法相对应)。如果建议的方法所选择的方法与实际使用的方法不同,建议的方法的应用应进入初步确定标准及其权重的阶段,这将允许对方法进行更充分的选择。结论。所提出的方法可以被软件项目经理在实践中应用,以支持决策过程,并将允许减少花费在项目管理上的时间。
{"title":"METHOD FOR SELECTING A SOFTWARE DEVELOPMENT METHODOLOGY TAKING INTO ACCOUNT PROJECT CHARACTERISTICS","authors":"M. M. Seniv","doi":"10.15588/1607-3274-2023-2-14","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-14","url":null,"abstract":"Context. With the development of the software industry, the number of applied methodologies and hybrid approaches based on them constantly increases, that is why, the choice of the most suitable/optimal methodology for the project is an urgent problem of software engineering, since the selection process is poorly formalized, requires sufficient experience of the person who will make this decision and depends on many related factors.
 Objective. The support of decision-making in the process of choosing a methodology for the software project development and increase of the level of adequacy of the above choice.
 Method. Based on the previously developed algorithm by the author, a generalized method for selecting the best software development methodology is proposed, which consists of 14 steps and takes into account the characteristics of the project, based on the multi-criteria analysis approaches, taking into consideration the opinions of experts for a more reasonable choice of the most suitable methodology for this project. The method uses the aggregated expert evaluation. It was decided to use the AHP to calculate the criteria weights. Based on the established values of criteria, their weights and expert evaluation, the score is calculated for each methodology using the weighted sum and TOPSIS methods.
 Results. The application of the developed method to the data of actual projects showed a match in 83% of cases (in five out of six cases, the application of the method resulted in the selection of methodology that corresponded to the one actually used in an existing project). In cases when the methodology chosen by the proposed method differed from the one that was actually used, the application of the proposed method recommends going to the stage of the initial determination of criteria and their weights, which will allow making a more adequate choice of methodology.
 Conclusions. The proposed method can be applied in practice by software project managers to support the decision-making process, and will allow reducing time spent on project management.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135802115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USING THE BEHAVIOR ANTAGONISM AND THE BIMATRIX GAME THEORY IN THE IT PROJECT MANAGEMENT 行为对抗与双矩阵博弈论在it项目管理中的应用
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-02 DOI: 10.15588/1607-3274-2023-2-16
S. Chernov, Lb. S. Chernova, Ld. S. Chernova, N. Kunanets, S. Titov, E. Trushliakov
Context. The article proposes a method of analyzing the proposals of team members in order to avoid conflict situations at the stage of team formation. Objective. The object of the study is the method of analyzing the proposals of team members while solving project tasks. The purpose of the work is to analyze the developed method of analysis of proposals of team members to avoid or resolve conflict situations at the stage of team activation Method. The developed method is based on the theory of matrix games. Conflicts between individual team members mainly arise at the stage of team formation. For the project manager, it is important to identify the conflict situation in time and find a way out of it to satisfy both team members and without harming the teamwork as a whole. A team created to implement an IT project is often faced with a situation where two of its members have different visions of approaches to creating the final product. At the same time, each of them has experience in the development of similar software products or services by different teams. To effectively solve this situation, we suggest using approaches typical of bimatrix games, when each of these team members is considered as a player. This takes into account the fact that the bimatrix theory of games is based on a conflict between two players whose interests are opposite – an antagonistic zero-sum game is precisely the basis of the developed approach. Results. The proposed method of analysis of proposals of team members contributes to the avoidance or resolution of conflict situations at the stage of their closer interaction. For efficient solution of the said situation, we propose to use approaches being typical for bimatrix games when each of these team members is treated as a player. At the same time, account is taken of the fact that the bimatrix game theory is based on a conflict of two players whose interests are opposite – an antagonistic game with a zero sum being that very element to constitute the basis of the approach developed. Conclusions. The given calculation of the model example shows that the use of the proposed method allows the project manager to give a reasonable preference to another team member, since the expected average profit of this player is greater than that of the first player. In this case, the manager has an opportunity to simulate situations for the players (for the team) and promptly respond to probable deviations of their behavioral strategies from the optimal ones, establish healthy relationships between team members and choose the best proposals for solving project tasks.
上下文。本文提出了一种分析团队成员建议的方法,以避免在团队组建阶段出现冲突情况。目标。研究的对象是在解决项目任务时分析团队成员建议的方法。本工作的目的是分析已开发的团队成员提案分析方法,以避免或解决团队激活阶段的冲突情况。该方法基于矩阵对策理论。团队成员之间的冲突主要发生在团队组建阶段。对于项目经理来说,重要的是及时识别冲突情况,并找到解决冲突的方法,以满足团队成员,同时不损害整个团队。为实现IT项目而创建的团队经常面临这样的情况:其中两个成员对创建最终产品的方法有不同的看法。同时,他们每个人都有由不同团队开发类似软件产品或服务的经验。为了有效地解决这种情况,我们建议使用双矩阵游戏的典型方法,即每个团队成员都被视为玩家。这考虑到了这样一个事实,即双矩阵博弈理论是基于两个利益相反的参与者之间的冲突——一种对抗性的零和博弈正是这种发展方法的基础。结果。所建议的分析团队成员建议的方法有助于避免或解决他们更密切互动阶段的冲突情况。为了有效地解决上述情况,我们建议使用双矩阵游戏的典型方法,即将每个团队成员都视为玩家。与此同时,考虑到双矩阵博弈论是基于两个利益相反的参与者之间的冲突这一事实——一个带有零和的对抗性博弈是构成所开发方法基础的要素。结论。模型示例的计算表明,使用所提出的方法允许项目经理对另一个团队成员给予合理的偏好,因为该参与者的预期平均利润大于第一个参与者。在这种情况下,管理者有机会模拟玩家(团队)的情况,并迅速响应他们的行为策略可能偏离最佳策略,在团队成员之间建立健康的关系,并选择解决项目任务的最佳建议。
{"title":"USING THE BEHAVIOR ANTAGONISM AND THE BIMATRIX GAME THEORY IN THE IT PROJECT MANAGEMENT","authors":"S. Chernov, Lb. S. Chernova, Ld. S. Chernova, N. Kunanets, S. Titov, E. Trushliakov","doi":"10.15588/1607-3274-2023-2-16","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-16","url":null,"abstract":"Context. The article proposes a method of analyzing the proposals of team members in order to avoid conflict situations at the stage of team formation. \u0000Objective. The object of the study is the method of analyzing the proposals of team members while solving project tasks. \u0000The purpose of the work is to analyze the developed method of analysis of proposals of team members to avoid or resolve conflict situations at the stage of team activation \u0000Method. The developed method is based on the theory of matrix games. Conflicts between individual team members mainly arise at the stage of team formation. For the project manager, it is important to identify the conflict situation in time and find a way out of it to satisfy both team members and without harming the teamwork as a whole. A team created to implement an IT project is often faced with a situation where two of its members have different visions of approaches to creating the final product. At the same time, each of them has experience in the development of similar software products or services by different teams. To effectively solve this situation, we suggest using approaches typical of bimatrix games, when each of these team members is considered as a player. This takes into account the fact that the bimatrix theory of games is based on a conflict between two players whose interests are opposite – an antagonistic zero-sum game is precisely the basis of the developed approach. \u0000Results. The proposed method of analysis of proposals of team members contributes to the avoidance or resolution of conflict situations at the stage of their closer interaction. For efficient solution of the said situation, we propose to use approaches being typical for bimatrix games when each of these team members is treated as a player. At the same time, account is taken of the fact that the bimatrix game theory is based on a conflict of two players whose interests are opposite – an antagonistic game with a zero sum being that very element to constitute the basis of the approach developed. \u0000Conclusions. The given calculation of the model example shows that the use of the proposed method allows the project manager to give a reasonable preference to another team member, since the expected average profit of this player is greater than that of the first player. In this case, the manager has an opportunity to simulate situations for the players (for the team) and promptly respond to probable deviations of their behavioral strategies from the optimal ones, establish healthy relationships between team members and choose the best proposals for solving project tasks.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"15 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83945547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STABILIZATION OF DISCRETE-TIME SYSTEMS WITH STATE-DELAYS AND SATURATING CONTROL INPUTS 具有状态延迟和饱和控制输入的离散系统的镇定
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-02 DOI: 10.15588/1607-3274-2023-2-15
Y. Dorofieiev, L. M. Lyubchyk, O. S. Melnikov
Context. The presence of time delays occurs in many complex dynamical systems, particularly in the areas of modern communication and information technologies, such as the problem of stabilizing networked control systems and high-speed communication networks. In many cases, time-delays lead to a decrease in the efficiency of such systems and even to the loss of stability. In the last decade, many interesting solutions using the Lyapunov-Krasovskii functional have been proposed for stability analysis and synthesis of a stabilizing regulator for discrete-time dynamic systems with unknown but bounded state-delays. The presence of nonlinear constraints on the amplitude of controls such as saturation further complicates this problem and requires the development of new approaches and methods. Objective. The purpose of this study is to develop a procedure for calculating the control gain matrix of state feedback that ensures the asymptotic stability of the analyzed system, as well as a procedure for calculating the maximum permissible value of the state-delay under which the stability of the closed-loop system can be ensured for a given set of admissible initial conditions. Method. The paper uses the method of descriptor transformation of the model of a closed-loop system and extends the invariant ellipsoids method to systems with unknown but bounded state-delays. The application of the Lyapunov-Krasovskii functional and the technique of linear matrix inequalities made it possible to reduce the problem of calculating the control gain matrix to the problem of semi-definite programming, which can be solved numerically. An iterative algorithm for solving the bilinear matrix inequality is proposed for calculating the maximum permissible value of the time-delay. Results. The results of numerical modeling confirm the effectiveness of the proposed approach in the problems of stabilizing discrete-time systems under the conditions of state-delays and nonlinear constraints on controls, which allows to recommend the proposed method for practical use for the problem of stability analysis and synthesis of stabilizing regulator, as well as for calculating the maximum permissible value of time-delay. Conclusions. An approach is proposed that allows extending the invariant ellipsoids method to discrete-time dynamic systems with unknown but bounded state-delays for solving the problem of system stabilization using static state feedback based on the application of the Lyapunov-Krasovskii functional. The results of numerical modeling confirm the effectiveness of the proposed approach in the presence of the saturation type nonlinear constraints on the control signals.
上下文。时间延迟的存在发生在许多复杂的动力系统中,特别是在现代通信和信息技术领域,例如稳定网络化控制系统和高速通信网络的问题。在许多情况下,时滞会导致这类系统的效率下降,甚至失去稳定性。在过去的十年中,利用Lyapunov-Krasovskii泛函提出了许多有趣的解,用于具有未知但有界状态延迟的离散动态系统的稳定性分析和稳定调节器的合成。控制幅度的非线性约束(如饱和)的存在使这一问题进一步复杂化,需要开发新的方法和方法。目标。本研究的目的是建立一个保证被分析系统渐近稳定的状态反馈控制增益矩阵的计算过程,以及一个在给定一组可容许初始条件下保证闭环系统稳定的状态延迟的最大允许值的计算过程。方法。本文利用闭环系统模型的广义变换方法,将不变椭球体方法推广到状态时滞未知但有界的系统。利用Lyapunov-Krasovskii泛函和线性矩阵不等式技术,可以将控制增益矩阵的计算问题简化为可数值求解的半定规划问题。提出了一种求解双线性矩阵不等式的迭代算法来计算最大容许时延。结果。数值模拟的结果证实了所提方法在状态延迟和非线性控制约束条件下稳定离散系统问题中的有效性,这使得所提方法可以实际应用于稳定调节器的稳定性分析和综合问题,以及计算最大允许时滞值。结论。基于Lyapunov-Krasovskii泛函的应用,提出了一种将不变椭球体方法推广到具有未知但有界的状态延迟的离散动态系统的静态反馈镇定问题。数值模拟结果证实了该方法在控制信号存在饱和型非线性约束时的有效性。
{"title":"STABILIZATION OF DISCRETE-TIME SYSTEMS WITH STATE-DELAYS AND SATURATING CONTROL INPUTS","authors":"Y. Dorofieiev, L. M. Lyubchyk, O. S. Melnikov","doi":"10.15588/1607-3274-2023-2-15","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-15","url":null,"abstract":"Context. The presence of time delays occurs in many complex dynamical systems, particularly in the areas of modern communication and information technologies, such as the problem of stabilizing networked control systems and high-speed communication networks. In many cases, time-delays lead to a decrease in the efficiency of such systems and even to the loss of stability. In the last decade, many interesting solutions using the Lyapunov-Krasovskii functional have been proposed for stability analysis and synthesis of a stabilizing regulator for discrete-time dynamic systems with unknown but bounded state-delays. The presence of nonlinear constraints on the amplitude of controls such as saturation further complicates this problem and requires the development of new approaches and methods. \u0000Objective. The purpose of this study is to develop a procedure for calculating the control gain matrix of state feedback that ensures the asymptotic stability of the analyzed system, as well as a procedure for calculating the maximum permissible value of the state-delay under which the stability of the closed-loop system can be ensured for a given set of admissible initial conditions. \u0000Method. The paper uses the method of descriptor transformation of the model of a closed-loop system and extends the invariant ellipsoids method to systems with unknown but bounded state-delays. The application of the Lyapunov-Krasovskii functional and the technique of linear matrix inequalities made it possible to reduce the problem of calculating the control gain matrix to the problem of semi-definite programming, which can be solved numerically. An iterative algorithm for solving the bilinear matrix inequality is proposed for calculating the maximum permissible value of the time-delay. \u0000Results. The results of numerical modeling confirm the effectiveness of the proposed approach in the problems of stabilizing discrete-time systems under the conditions of state-delays and nonlinear constraints on controls, which allows to recommend the proposed method for practical use for the problem of stability analysis and synthesis of stabilizing regulator, as well as for calculating the maximum permissible value of time-delay. \u0000Conclusions. An approach is proposed that allows extending the invariant ellipsoids method to discrete-time dynamic systems with unknown but bounded state-delays for solving the problem of system stabilization using static state feedback based on the application of the Lyapunov-Krasovskii functional. The results of numerical modeling confirm the effectiveness of the proposed approach in the presence of the saturation type nonlinear constraints on the control signals.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"80 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74864997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEVELOPMENT OF A METHOD FOR STUDYING TRAFFIC OF MULTISERVICE NETWORKS 多业务网络流量研究方法的发展
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-01 DOI: 10.15588/1607-3274-2023-2-13
V. Morkun, S. Hryshchenko, V. Nizhehorodtsev, M. Filonenko, V. V. Lagovsky
Context. The constant growth in the volume of information, the increase in the speed of information flows in digital communication networks, as before, makes the task of assessing the service stability for traffic flows an urgent one. A simple solution to ensure high service stability is to build a network of sufficient capacity for any traffic that will be thrown at it. To solve the problems of analyzing telecommunication systems, it is necessary to have appropriate models and engineering methods that allow to assess the service stability and predict the characteristics of their operation based on measurement data. In these conditions, the development of new methods for analyzing the traffic of multiservice networks that provide simplicity of calculations and their acceptable accuracy becomes especially relevant. Objective. The purpose of this paper is to study the traffic and service stability for users. Method. We propose a hybrid method for detecting anomalies in multiservice network traffic that uses algorithms without identification, adaptation and Mamdani fuzzy inference. The peculiarity of multiservice traffic as an object for assessing the existence of anomalies is the presence of stochastic processes in it subject to different distribution laws. For the experimental evaluation of the proposed method and algorithms, we have chosen the Poisson and Pareto distribution laws that define the limiting cases of traffic regularity. The method allows for monitoring and managing faults in a multiservice network in order to determine the causes of their occurrence. The following requirements are imposed on the developed algorithms for detecting anomalies in the traffic on multiservice networks: functioning in real or near real time; maintaining a given service stability; simplicity of implementation. The algorithms belong to the class of adaptive hybrid algorithms for identifying traffic parameters. They are used for both stationary and nonstationary traffic. Traffic is modeled as stochastic processes. Each belongs to the corresponding class, which is determined by the law of distribution of stochastic processes. Results. Experimental evaluation of the proposed method and algorithms has shown that they allow us to estimate the trends of these stochastic processes in real time, with high accuracy and while maintaining the service stability. Conclusions. The application of the developed method of troubleshooting management in a multiservice environment helps to improve the service stability by timely detecting problems, reducing the time of their elimination and reducing downtime, which, in turn, affects the increase in service reliability.
上下文。随着数字通信网络中信息量的不断增长和信息流速度的不断加快,通信流服务稳定性的评估成为一个迫切需要解决的问题。确保高服务稳定性的一个简单解决方案是建立一个足够容量的网络,以应对任何可能出现的流量。为了解决分析电信系统的问题,需要有合适的模型和工程方法来评估业务稳定性,并根据测量数据预测其运行特征。在这种情况下,开发新的方法来分析多业务网络的流量,提供简单的计算和可接受的精度变得特别重要。目标。本文的目的是研究用户的流量和服务稳定性。方法。我们提出了一种用于检测多业务网络流量异常的混合方法,该方法使用无识别、自适应和Mamdani模糊推理的算法。多业务流量作为评估异常存在性的对象,其特点是其中存在服从不同分布规律的随机过程。为了对所提出的方法和算法进行实验评估,我们选择了定义交通规则性极限情况的泊松和帕累托分布定律。该方法允许对多业务网络中的故障进行监控和管理,以确定故障发生的原因。对所开发的多业务网络流量异常检测算法提出了以下要求:实时或近实时;维持给定的服务稳定性;实现的简单性。该算法属于交通参数识别的自适应混合算法。它们既用于固定交通,也用于非固定交通。交通建模为随机过程。每一类都属于相应的类,这是由随机过程的分布规律决定的。结果。对所提方法和算法的实验评估表明,它们允许我们在保持服务稳定性的同时实时、高精度地估计这些随机过程的趋势。结论。本文提出的故障管理方法在多业务环境下的应用,可以通过及时发现问题、减少故障排除时间、减少故障停机时间来提高业务的稳定性,从而影响业务可靠性的提高。
{"title":"DEVELOPMENT OF A METHOD FOR STUDYING TRAFFIC OF MULTISERVICE NETWORKS","authors":"V. Morkun, S. Hryshchenko, V. Nizhehorodtsev, M. Filonenko, V. V. Lagovsky","doi":"10.15588/1607-3274-2023-2-13","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-13","url":null,"abstract":"Context. The constant growth in the volume of information, the increase in the speed of information flows in digital communication networks, as before, makes the task of assessing the service stability for traffic flows an urgent one. A simple solution to ensure high service stability is to build a network of sufficient capacity for any traffic that will be thrown at it. To solve the problems of analyzing telecommunication systems, it is necessary to have appropriate models and engineering methods that allow to assess the service stability and predict the characteristics of their operation based on measurement data. In these conditions, the development of new methods for analyzing the traffic of multiservice networks that provide simplicity of calculations and their acceptable accuracy becomes especially relevant. \u0000Objective. The purpose of this paper is to study the traffic and service stability for users. \u0000Method. We propose a hybrid method for detecting anomalies in multiservice network traffic that uses algorithms without identification, adaptation and Mamdani fuzzy inference. The peculiarity of multiservice traffic as an object for assessing the existence of anomalies is the presence of stochastic processes in it subject to different distribution laws. For the experimental evaluation of the proposed method and algorithms, we have chosen the Poisson and Pareto distribution laws that define the limiting cases of traffic regularity. The method allows for monitoring and managing faults in a multiservice network in order to determine the causes of their occurrence. The following requirements are imposed on the developed algorithms for detecting anomalies in the traffic on multiservice networks: functioning in real or near real time; maintaining a given service stability; simplicity of implementation. The algorithms belong to the class of adaptive hybrid algorithms for identifying traffic parameters. They are used for both stationary and nonstationary traffic. Traffic is modeled as stochastic processes. Each belongs to the corresponding class, which is determined by the law of distribution of stochastic processes. \u0000Results. Experimental evaluation of the proposed method and algorithms has shown that they allow us to estimate the trends of these stochastic processes in real time, with high accuracy and while maintaining the service stability. \u0000Conclusions. The application of the developed method of troubleshooting management in a multiservice environment helps to improve the service stability by timely detecting problems, reducing the time of their elimination and reducing downtime, which, in turn, affects the increase in service reliability.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"34 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84292966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TECHNOLOGY FOR IDENTIFYING AND FORMING POSSIBLE RELATIONSHIPS BETWEEN USE CASES IN THE PROCESS OF THE INFORMATION SYSTEM DESIGN 在信息系统设计过程中识别和形成用例之间可能关系的技术
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-01 DOI: 10.15588/1607-3274-2023-2-12
O. Kungurtsev, S. Zinovatna
Context. Use cases are widely used as a means of formulating requirements in the development of information systems. All subsequent design stages depend on the quality of their presentation. Structuring use cases can significantly increase their understanding and maintenance in the face of changing requirements.. Objective. Flexible technologies involve working in small teams. The existing communication between teams is not sufficient to highlight sub use cases at the project level. There is a need for automated analysis of the corpus of all use cases. Method. A mathematical model of a use case which makes it possible to define the criteria for comparing scenarios and eliminate the redundancy of descriptions is proposed. A four-step method for restructuring use cases has been developed. At the first stage, use cases are presented in a formalized form. At the second, they are stored in the repository, which ensures their quick search and placement. At the third stage, procedures of scenario comparison are performed. Scenario similarity criteria are proposed. At the fourth stage, the formation of subordinate use cases is carried out, their texts are coordinated with all interested teams, and the use cases that cause subordinate use cases are corrected. Results. Experiments providing the formalized compilation of use cases by several development teams followed by automated restructuring were carried out to test the proposed solutions. As a result, new subordinate use cases were correctly identified and the scope of use of previously formed ones was expanded. There was a significant reduction in the time for restructuring. Conclusions. The proposed method of restructuring use cases improves the clarity and consistency of requirements, the possibility of their adjustment and maintenance, and reduces the compilation time. The method can be used in the design of any information system, where the requirements are presented in the form of use cases.
上下文。在信息系统开发中,用例被广泛用作表述需求的一种手段。所有后续的设计阶段都取决于它们的呈现质量。在面对不断变化的需求时,结构化用例可以显著地增加对它们的理解和维护。目标。灵活的技术需要在小团队中工作。团队之间现有的沟通不足以突出项目级别的子用例。需要对所有用例的语料库进行自动分析。方法。提出了一个用例的数学模型,该模型可以定义比较场景的标准并消除描述的冗余。已经开发了一个用于重构用例的四步方法。在第一阶段,用例以形式化的形式呈现。其次,它们被存储在存储库中,这确保了它们的快速搜索和放置。在第三阶段,执行场景比较程序。提出了场景相似度准则。在第四阶段,执行下级用例的形成,与所有感兴趣的团队协调它们的文本,并纠正导致下级用例的用例。结果。实验由几个开发团队提供用例的正式编译,随后进行了自动重构,以测试建议的解决方案。结果,新的从属用例得到了正确的识别,并且扩展了先前形成的用例的使用范围。重组的时间大大缩短了。结论。所提出的重构用例的方法提高了需求的清晰度和一致性,以及需求调整和维护的可能性,并减少了编译时间。该方法可用于任何信息系统的设计,其中需求以用例的形式呈现。
{"title":"TECHNOLOGY FOR IDENTIFYING AND FORMING POSSIBLE RELATIONSHIPS BETWEEN USE CASES IN THE PROCESS OF THE INFORMATION SYSTEM DESIGN","authors":"O. Kungurtsev, S. Zinovatna","doi":"10.15588/1607-3274-2023-2-12","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-12","url":null,"abstract":"Context. Use cases are widely used as a means of formulating requirements in the development of information systems. All subsequent design stages depend on the quality of their presentation. Structuring use cases can significantly increase their understanding and maintenance in the face of changing requirements.. \u0000Objective. Flexible technologies involve working in small teams. The existing communication between teams is not sufficient to highlight sub use cases at the project level. There is a need for automated analysis of the corpus of all use cases. \u0000Method. A mathematical model of a use case which makes it possible to define the criteria for comparing scenarios and eliminate the redundancy of descriptions is proposed. A four-step method for restructuring use cases has been developed. At the first stage, use cases are presented in a formalized form. At the second, they are stored in the repository, which ensures their quick search and placement. At the third stage, procedures of scenario comparison are performed. Scenario similarity criteria are proposed. At the fourth stage, the formation of subordinate use cases is carried out, their texts are coordinated with all interested teams, and the use cases that cause subordinate use cases are corrected. \u0000Results. Experiments providing the formalized compilation of use cases by several development teams followed by automated restructuring were carried out to test the proposed solutions. As a result, new subordinate use cases were correctly identified and the scope of use of previously formed ones was expanded. There was a significant reduction in the time for restructuring. \u0000Conclusions. The proposed method of restructuring use cases improves the clarity and consistency of requirements, the possibility of their adjustment and maintenance, and reduces the compilation time. The method can be used in the design of any information system, where the requirements are presented in the form of use cases.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"10 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73364475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UKRAINIAN LANGUAGE TWEETS ANALYSIS TECHNOLOGY FOR PUBLIC OPINION DYNAMICS CHANGE PREDICTION BASED ON MACHINE LEARNING 基于机器学习的乌克兰语推文舆情动态变化预测分析技术
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-30 DOI: 10.15588/1607-3274-2023-2-11
Удк, Технологія Аналізу Україномовних, Твітів Для, Прогнозування Зміни, Динаміки Громадської, НА Думки, Основі Машинного Навчання
Context. Automation of public opinion research will allow not only to reduce the amount of manual work, but also to obtain time slices of the results without additional efforts. Since direct interaction with respondents should be avoided, public opinion should be analyzed based on the sources of its free expression. Social networks are great for this role, as their people freely publish their thoughts or emotionally truthfully react to published information about certain events. Statistics show that data from social networks is not enough to obtain a full-fledged result, because a significant percentage of people do not use social networks. However, the automation of the study of even such a stratum of the population is already a good result for analyzing the dynamics of changes in public opinion in accordance with events in the country/world and, accordingly, for correcting the processes of public administration in the future. Objective of the study is to develop a technology for analyzing the flow of Ukrainian-language content in social networks for public opinion research based on finding clustered thematic groups of tweets. Method. The article develops a technology for finding tweet trends based on clustering, which forms a data stream in the form of short representations of clusters and their popularity for further research of public opinion. An effective approach to tweet collection, filtering, cleaning and pre-processing based on a comparative analysis of Bag of Words, TF-IDF and BERT algorithms is described. The impact of stemming and lemmatization on the quality of the obtained clusters was determined. And optimal combinations of clustering methods (K-Means, Agglomerative Hierarchical Clustering and HDBSCAN) and vectorization of tweets were found based on the analysis of 27 clusterings of one data sample. The method of presenting clusters of tweets in a short format is selected. Results. Algorithms using the Levenstein Distance, i.e. fuzz sort, fuzz set and levenshtein, showed the best results. These algorithms quickly perform checks, have a greater difference in similarities, so it is possible to more accurately determine the limit of similarity. According to the results of the clustering, the optimal solutions are to use the HDBSCAN clustering algorithm and the BERT vectorization algorithm to achieve the most accurate results, and to use K-Means together with TF-IDF to achieve the best speed with the optimal result. Stemming can be used to reduce execution time. Conclusions. In this study, the optimal options for comparing cluster fingerprints among the following similarity search methods were experimentally found: Fuzz Sort, Fuzz Set, Levenshtein, Jaro Winkler, Jaccard, Sorensen, Cosine, Sift4. In some algorithms, the average fingerprint similarity reaches above 70%. 3 effective tools were found to compare their similarity, as they show a sufficient difference between comparisons of similar and different clusters (> 20%). Based on
上下文。民意调查的自动化不仅可以减少人工工作量,还可以在不额外努力的情况下获得结果的时间切片。因为应该避免与被调查者的直接互动,所以应该根据民意自由表达的来源来分析民意。社交网络非常适合这个角色,因为人们可以自由地发表自己的想法,或者对某些事件的公开信息做出情感上的真实反应。统计数据显示,来自社交网络的数据不足以得出一个完整的结果,因为有相当大比例的人不使用社交网络。但是,即使是对人口中这样一个阶层进行自动化研究,对于根据国家/世界的事件分析舆论变化的动态,从而纠正今后的公共行政进程来说,已经是一个很好的结果。本研究的目的是开发一种技术,用于分析乌克兰语内容在社交网络中的流量,用于民意研究,基于发现推文的聚类主题组。方法。本文开发了一种基于聚类的推文趋势发现技术,以聚类及其受欢迎程度的简短表示形式形成数据流,用于进一步的民意研究。在对比分析词袋算法、TF-IDF算法和BERT算法的基础上,提出了一种有效的推文收集、过滤、清洗和预处理方法。测定了词干化和lemmatization对所得到的簇质量的影响。通过对一个数据样本的27个聚类分析,找到了推文聚类方法(K-Means、Agglomerative Hierarchical clustering和HDBSCAN)和向量化的最优组合。选择以短格式呈现tweets集群的方法。结果。使用Levenstein距离的算法,即模糊排序、模糊集和levenshtein,显示出最好的结果。这些算法执行检查速度快,相似度差异大,因此可以更准确地确定相似度的极限。根据聚类结果,最优解是使用HDBSCAN聚类算法和BERT矢量化算法获得最准确的结果,使用K-Means结合TF-IDF获得最优结果的最佳速度。词干处理可用于减少执行时间。结论。在本研究中,实验发现了以下相似度搜索方法中比较聚类指纹的最优选择:Fuzz Sort、Fuzz Set、Levenshtein、Jaro Winkler、Jaccard、Sorensen、Cosine、sif4。在一些算法中,平均指纹相似度达到70%以上。发现了3个有效的工具来比较它们的相似性,因为它们在相似和不同聚类的比较中显示出足够的差异(> 20%)。基于所选择的有效方法,我们成功地对一周5个主题的7天内的9万条推文进行了趋势分析,使用K-Means和TF-IDF进行聚类和矢量化,并以55%的相似度阈值进行模糊排序进行聚类指纹比较。
{"title":"UKRAINIAN LANGUAGE TWEETS ANALYSIS TECHNOLOGY FOR PUBLIC OPINION DYNAMICS CHANGE PREDICTION BASED ON MACHINE LEARNING","authors":"Удк, Технологія Аналізу Україномовних, Твітів Для, Прогнозування Зміни, Динаміки Громадської, НА Думки, Основі Машинного Навчання","doi":"10.15588/1607-3274-2023-2-11","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-11","url":null,"abstract":"Context. Automation of public opinion research will allow not only to reduce the amount of manual work, but also to obtain time slices of the results without additional efforts. Since direct interaction with respondents should be avoided, public opinion should be analyzed based on the sources of its free expression. Social networks are great for this role, as their people freely publish their thoughts or emotionally truthfully react to published information about certain events. Statistics show that data from social networks is not enough to obtain a full-fledged result, because a significant percentage of people do not use social networks. However, the automation of the study of even such a stratum of the population is already a good result for analyzing the dynamics of changes in public opinion in accordance with events in the country/world and, accordingly, for correcting the processes of public administration in the future. \u0000Objective of the study is to develop a technology for analyzing the flow of Ukrainian-language content in social networks for public opinion research based on finding clustered thematic groups of tweets. \u0000Method. The article develops a technology for finding tweet trends based on clustering, which forms a data stream in the form of short representations of clusters and their popularity for further research of public opinion. An effective approach to tweet collection, filtering, cleaning and pre-processing based on a comparative analysis of Bag of Words, TF-IDF and BERT algorithms is described. The impact of stemming and lemmatization on the quality of the obtained clusters was determined. And optimal combinations of clustering methods (K-Means, Agglomerative Hierarchical Clustering and HDBSCAN) and vectorization of tweets were found based on the analysis of 27 clusterings of one data sample. The method of presenting clusters of tweets in a short format is selected. \u0000Results. Algorithms using the Levenstein Distance, i.e. fuzz sort, fuzz set and levenshtein, showed the best results. These algorithms quickly perform checks, have a greater difference in similarities, so it is possible to more accurately determine the limit of similarity. According to the results of the clustering, the optimal solutions are to use the HDBSCAN clustering algorithm and the BERT vectorization algorithm to achieve the most accurate results, and to use K-Means together with TF-IDF to achieve the best speed with the optimal result. Stemming can be used to reduce execution time. \u0000Conclusions. In this study, the optimal options for comparing cluster fingerprints among the following similarity search methods were experimentally found: Fuzz Sort, Fuzz Set, Levenshtein, Jaro Winkler, Jaccard, Sorensen, Cosine, Sift4. In some algorithms, the average fingerprint similarity reaches above 70%. 3 effective tools were found to compare their similarity, as they show a sufficient difference between comparisons of similar and different clusters (> 20%). Based on","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"34 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75813378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MODEL-AGNOSTIC META-LEARNING FOR RESILIENCE OPTIMIZATION OF ARTIFICIAL INTELLIGENCE SYSTEM 基于模型不可知的元学习的人工智能系统弹性优化
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-30 DOI: 10.15588/1607-3274-2023-2-9
V. Moskalenko
Context. The problem of optimizing the resilience of artificial intelligence systems to destructive disturbances has not yet been fully solved and is quite relevant for safety-critical applications. The task of optimizing the resilience of an artificial intelligence system to disturbing influences is a high-level task in relation to efficiency optimization, which determines the prospects of using the ideas and methods of meta-learning to solve it. The object of current research is the process of meta-learning aimed at optimizing the resilience of an artificial intelligence system to destructive disturbances. The subjects of the study are architectural add-ons and the meta-learning method which optimize resilience to adversarial attacks, fault injection, and task changes. Objective. Stated research goal is to develop an effective meta-learning method for optimizing the resilience of an artificial intelligence system to destructive disturbances. Method. The resilience optimization is implemented by combining the ideas and methods of adversarial learning, fault-tolerant learning, model-agnostic meta-learning, few-shot learning, gradient optimization methods, and probabilistic gradient approximation strategies. The choice of architectural add-ons is based on parameter-efficient knowledge transfer designed to save resources and avoid the problem of catastrophic forgetting. Results. A model-agnostic meta-learning method for optimizing the resilience of artificial intelligence systems based on gradient meta-updates or meta-updates using an evolutionary strategy has been developed. This method involves the use of tuner and metatuner blocks that perform parallel correction of the building blocks of a original deep neural network. The ability of the proposed approach to increase the efficiency of perturbation absorption and increase the integral resilience indicator of the artificial intelligence system is experimentally tested on the example of the image classification task. The experiments were conducted on a model with the ResNet-18 architecture, with an add-on in the form of tuners and meta-tuners with the Conv-Adapter architecture. In this case, CIFAR-10 is used as a base set on which the model was trained, and CIFAR-100 is used as a set for generating samples on which adaptation is performed using a few-shot learning scenarios. We compare the resilience of the artificial intelligence system after pre-training tuners and meta-tuners using the adversarial learning algorithm, the fault-tolerant learning algorithm, the conventional model-agnostic meta-learning algorithm, and the proposed meta-learning method for optimizing resilience. Also, the meta-learning algorithms with meta-gradient updating and meta-updating based on the evolutionary strategy are compared on the basis of the integral resilience indicator. Conclusions. It has been experimentally confirmed that the proposed method provides a better resilience to random bit-flip injection compared
上下文。优化人工智能系统对破坏性干扰的弹性问题尚未完全解决,并且与安全关键应用非常相关。优化人工智能系统对干扰影响的弹性是一项与效率优化相关的高级任务,这决定了使用元学习的思想和方法来解决它的前景。当前研究的对象是旨在优化人工智能系统对破坏性干扰的弹性的元学习过程。本研究的主题是优化对抗性攻击、故障注入和任务更改的弹性的架构附加组件和元学习方法。目标。研究目标是开发一种有效的元学习方法来优化人工智能系统对破坏性干扰的弹性。方法。弹性优化是通过结合对抗学习、容错学习、模型不可知元学习、少次学习、梯度优化方法和概率梯度逼近策略的思想和方法来实现的。架构外接程序的选择基于参数有效的知识转移,旨在节省资源并避免灾难性遗忘的问题。结果。提出了一种基于梯度元更新或使用进化策略的元更新优化人工智能系统弹性的模型不可知元学习方法。该方法涉及使用调谐器和元调谐器块对原始深度神经网络的构建块进行并行校正。以图像分类任务为例,实验验证了所提方法提高摄动吸收效率和提高人工智能系统积分弹性指标的能力。实验是在一个具有ResNet-18架构的模型上进行的,该模型带有一个带有con - adapter架构的调谐器和元调谐器形式的附加组件。在本例中,使用CIFAR-10作为训练模型的基础集,使用CIFAR-100作为生成样本的集,使用少量学习场景对样本进行自适应。我们比较了使用对抗学习算法、容错学习算法、传统模型不可知元学习算法和提出的优化弹性的元学习方法进行预训练调谐器和元调谐器后的人工智能系统的弹性。并以整体弹性指标为基础,比较了基于元梯度更新和基于进化策略的元学习算法。结论。实验证明,与故障注入训练相比,该方法对随机比特翻转注入的恢复能力平均提高了5%。此外,与对抗性训练相比,所提出的方法对L对抗性规避攻击提供了更好的弹性,平均提高了4.8%。此外,与传统的调谐器微调相比,对任务变化的适应能力平均提高了4.8%。此外,采用进化策略的元学习平均提供了更高的弹性指标值。缺点是,这种元学习方法需要更多的迭代。
{"title":"MODEL-AGNOSTIC META-LEARNING FOR RESILIENCE OPTIMIZATION OF ARTIFICIAL INTELLIGENCE SYSTEM","authors":"V. Moskalenko","doi":"10.15588/1607-3274-2023-2-9","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-9","url":null,"abstract":"Context. The problem of optimizing the resilience of artificial intelligence systems to destructive disturbances has not yet been fully solved and is quite relevant for safety-critical applications. The task of optimizing the resilience of an artificial intelligence system to disturbing influences is a high-level task in relation to efficiency optimization, which determines the prospects of using the ideas and methods of meta-learning to solve it. The object of current research is the process of meta-learning aimed at optimizing the resilience of an artificial intelligence system to destructive disturbances. The subjects of the study are architectural add-ons and the meta-learning method which optimize resilience to adversarial attacks, fault injection, and task changes. \u0000Objective. Stated research goal is to develop an effective meta-learning method for optimizing the resilience of an artificial intelligence system to destructive disturbances. \u0000Method. The resilience optimization is implemented by combining the ideas and methods of adversarial learning, fault-tolerant learning, model-agnostic meta-learning, few-shot learning, gradient optimization methods, and probabilistic gradient approximation strategies. The choice of architectural add-ons is based on parameter-efficient knowledge transfer designed to save resources and avoid the problem of catastrophic forgetting. \u0000Results. A model-agnostic meta-learning method for optimizing the resilience of artificial intelligence systems based on gradient meta-updates or meta-updates using an evolutionary strategy has been developed. This method involves the use of tuner and metatuner blocks that perform parallel correction of the building blocks of a original deep neural network. The ability of the proposed approach to increase the efficiency of perturbation absorption and increase the integral resilience indicator of the artificial intelligence system is experimentally tested on the example of the image classification task. The experiments were conducted on a model with the ResNet-18 architecture, with an add-on in the form of tuners and meta-tuners with the Conv-Adapter architecture. In this case, CIFAR-10 is used as a base set on which the model was trained, and CIFAR-100 is used as a set for generating samples on which adaptation is performed using a few-shot learning scenarios. We compare the resilience of the artificial intelligence system after pre-training tuners and meta-tuners using the adversarial learning algorithm, the fault-tolerant learning algorithm, the conventional model-agnostic meta-learning algorithm, and the proposed meta-learning method for optimizing resilience. Also, the meta-learning algorithms with meta-gradient updating and meta-updating based on the evolutionary strategy are compared on the basis of the integral resilience indicator. \u0000Conclusions. It has been experimentally confirmed that the proposed method provides a better resilience to random bit-flip injection compared","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"2 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74372881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REMOVAL OF RAIN COMPONENTS FROM SINGLE IMAGES USING A RECURRENT NEURAL NETWORK 使用递归神经网络从单个图像中去除雨成分
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-30 DOI: 10.15588/1607-3274-2023-2-10
Удк, Видалення Компонентів, Дощу З Одиночних, З Зображень, Використанням Рекурентної, Нейронної Мережі
Context. Removing the undesirable consequences of rain effects from single images is an actual problem in many computer vision tasks, because rain streaks can significantly degrade the visual quality of images and seriously interfere with the operation of various intelligent systems, which are used for their processing and further analysis. Objective. The goal of the work is to develop a method for detecting and removing undesirable effects of the rain from single images, which is based on the using of a convolutional neural network with a recurrent structure. Method. The main component of the proposed method is a convolutional neural network, which has a recurrent multi-stage structure. A feature of this network architecture is the use of repeated blocks (layers), at the output of which you can get an intermediate result of «cleaning» the original image. Moreover at the output of each next layer of the network we get an image with less influence of rain components than on the previous one. Each network layer contains two independent sub-networks (branches) for parallel image processing. The main branch is designed to detect and remove the effect of rain from the image and the attention branch is used to improve and speed up the process of detecting undesirable rain components (for rain attention map formation). Results. An approach has been developed to automatically detect and remove the rain effect from single images. The process of “cleaning” the original image is based on the use of a convolutional neural network with a recurrent structure, which was trained on the Rain100H and Rain100L datasets. The results of computer experiments, which testifies to the effectiveness and expediency of using the proposed method for solving practical tasks of pre-processing “contaminated” images are presented. Conclusions. The advantage of the developed method for removing undesirable components of rain from images is that the recurrent multi-stage network architecture, on which it is based allows it to be potentially applied to solving tasks under conditions of limited computing resources. The proposed method can be successfully used in the development of intelligent systems for area monitoring with surveillance cameras, autonomous vehicles control, processing aerial photography results, etc. In the future, it should be considered the possibility of forming a separate sub-network to eliminate blurring in the image and train the network on datasets that contain image samples with different components of rain, which will make the method more «resistant» to different forms of the rain effect and increase the quality of image “cleaning”.
上下文。在许多计算机视觉任务中,从单个图像中去除雨水效应的不良后果是一个实际问题,因为雨水条纹会显著降低图像的视觉质量,并严重干扰用于图像处理和进一步分析的各种智能系统的运行。目标。这项工作的目标是开发一种方法,用于检测和消除单个图像中的雨的不良影响,该方法基于使用具有循环结构的卷积神经网络。方法。该方法的主要组成部分是一个具有循环多阶段结构的卷积神经网络。这种网络架构的一个特点是使用重复的块(层),在输出时,您可以获得“清理”原始图像的中间结果。此外,在网络的每一层的输出处,我们得到的图像受雨分量的影响比前一层小。每个网络层包含两个独立的子网络(分支),用于并行图像处理。主分支用于检测和去除图像中雨的影响,注意分支用于改进和加快检测不需要的雨成分的过程(用于雨注意图的形成)。结果。本文提出了一种从单幅图像中自动检测和去除雨效应的方法。“清洗”原始图像的过程是基于使用具有循环结构的卷积神经网络,该网络是在Rain100H和Rain100L数据集上训练的。计算机实验结果表明,本文提出的方法可以有效地解决“污染”图像预处理的实际问题。结论。所开发的从图像中去除不需要的雨成分的方法的优点是,它所基于的循环多阶段网络架构允许它潜在地应用于解决有限计算资源条件下的任务。所提出的方法可以成功地用于开发带有监控摄像头的区域监控、自动驾驶车辆控制、处理航空摄影结果等智能系统。在未来,应该考虑形成一个单独的子网络来消除图像中的模糊,并在包含不同雨成分的图像样本的数据集上训练网络,这将使该方法更“抵抗”不同形式的雨效应,提高图像“清洗”的质量。
{"title":"REMOVAL OF RAIN COMPONENTS FROM SINGLE IMAGES USING A RECURRENT NEURAL NETWORK","authors":"Удк, Видалення Компонентів, Дощу З Одиночних, З Зображень, Використанням Рекурентної, Нейронної Мережі","doi":"10.15588/1607-3274-2023-2-10","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-10","url":null,"abstract":"Context. Removing the undesirable consequences of rain effects from single images is an actual problem in many computer vision tasks, because rain streaks can significantly degrade the visual quality of images and seriously interfere with the operation of various intelligent systems, which are used for their processing and further analysis. \u0000Objective. The goal of the work is to develop a method for detecting and removing undesirable effects of the rain from single images, which is based on the using of a convolutional neural network with a recurrent structure. \u0000Method. The main component of the proposed method is a convolutional neural network, which has a recurrent multi-stage structure. A feature of this network architecture is the use of repeated blocks (layers), at the output of which you can get an intermediate result of «cleaning» the original image. Moreover at the output of each next layer of the network we get an image with less influence of rain components than on the previous one. Each network layer contains two independent sub-networks (branches) for parallel image processing. The main branch is designed to detect and remove the effect of rain from the image and the attention branch is used to improve and speed up the process of detecting undesirable rain components (for rain attention map formation). \u0000Results. An approach has been developed to automatically detect and remove the rain effect from single images. The process of “cleaning” the original image is based on the use of a convolutional neural network with a recurrent structure, which was trained on the Rain100H and Rain100L datasets. The results of computer experiments, which testifies to the effectiveness and expediency of using the proposed method for solving practical tasks of pre-processing “contaminated” images are presented. \u0000Conclusions. The advantage of the developed method for removing undesirable components of rain from images is that the recurrent multi-stage network architecture, on which it is based allows it to be potentially applied to solving tasks under conditions of limited computing resources. The proposed method can be successfully used in the development of intelligent systems for area monitoring with surveillance cameras, autonomous vehicles control, processing aerial photography results, etc. In the future, it should be considered the possibility of forming a separate sub-network to eliminate blurring in the image and train the network on datasets that contain image samples with different components of rain, which will make the method more «resistant» to different forms of the rain effect and increase the quality of image “cleaning”.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"10 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79079411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OBJECT DETECTION PERFORMANCE INDICATOR IN VIDEO SUVEILLANCE SYSTEMS 视频监控系统中的目标检测性能指标
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-30 DOI: 10.15588/1607-3274-2023-2-8
I. Katerynchuk, A. Babaryka, R. P. Khoptinskiy
Context. The probability of detecting the object by the operator of the video surveillance system depends on a number of parameters (geometric dimensions of the object of observation, distance to the object of observation, parameters of the video surveillance camera, monitor parameters, etc.). Objective. The purpose of the article is to develop an indicator of the effectiveness of detecting dynamic objects when evaluating the functioning of video surveillance systems. Method. An indicator of the effectiveness of object detection when evaluating the functioning of video surveillance systems is proposed. The proposed indicator is expressed in the probability of detection of the object of interest by the i-th operator thanks to the person’s own visual apparatus or with the help of a software algorithm. This indicator differs from the existing ones by taking into account the parameters of the optical system, the parameters of the information display device (monitor), the number of video surveillance cameras, etc. The developed indicator makes it possible to estimate the probability of detection of an object by a video surveillance system operator thanks to a person's own visual apparatus or with the help of a software algorithm, depending on the distance to such an object. Results. According to the results of experimental calculations, it has been proven that the effectiveness of the use of video surveillance systems with the use of video analytics functions (using the example of the dynamic object detection algorithm). Conclusions. The conducted experimental calculations confirmed the efficiency of the proposed mathematical apparatus and allow us to recommend it for use in practice when solving problems of evaluating the effectiveness of the functioning of video surveillance systems.
上下文。视频监控系统操作人员检测到目标的概率取决于多个参数(被观察对象的几何尺寸、到被观察对象的距离、视频监控摄像机的参数、监控参数等)。目标。本文的目的是在评估视频监控系统的功能时,开发一个检测动态对象有效性的指标。方法。在评价视频监控系统的功能时,提出了目标检测有效性的指标。所提出的指标表示为第i个操作员通过人自己的视觉设备或在软件算法的帮助下检测到感兴趣对象的概率。该指标与现有指标的不同之处在于考虑了光学系统的参数、信息显示设备(监视器)的参数、视频监控摄像机的数量等。所开发的指示器使视频监控系统操作员能够根据与该物体的距离,借助个人的视觉设备或借助软件算法来估计检测到该物体的概率。结果。根据实验计算结果,证明了在视频监控系统中使用视频分析功能的有效性(以动态目标检测算法为例)。结论。所进行的实验计算证实了所提出的数学装置的效率,并使我们能够在解决评估视频监控系统功能有效性的问题时推荐它在实践中使用。
{"title":"OBJECT DETECTION PERFORMANCE INDICATOR IN VIDEO SUVEILLANCE SYSTEMS","authors":"I. Katerynchuk, A. Babaryka, R. P. Khoptinskiy","doi":"10.15588/1607-3274-2023-2-8","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-8","url":null,"abstract":"Context. The probability of detecting the object by the operator of the video surveillance system depends on a number of parameters (geometric dimensions of the object of observation, distance to the object of observation, parameters of the video surveillance camera, monitor parameters, etc.). \u0000Objective. The purpose of the article is to develop an indicator of the effectiveness of detecting dynamic objects when evaluating the functioning of video surveillance systems. \u0000Method. An indicator of the effectiveness of object detection when evaluating the functioning of video surveillance systems is proposed. The proposed indicator is expressed in the probability of detection of the object of interest by the i-th operator thanks to the person’s own visual apparatus or with the help of a software algorithm. This indicator differs from the existing ones by taking into account the parameters of the optical system, the parameters of the information display device (monitor), the number of video surveillance cameras, etc. The developed indicator makes it possible to estimate the probability of detection of an object by a video surveillance system operator thanks to a person's own visual apparatus or with the help of a software algorithm, depending on the distance to such an object. \u0000Results. According to the results of experimental calculations, it has been proven that the effectiveness of the use of video surveillance systems with the use of video analytics functions (using the example of the dynamic object detection algorithm). \u0000Conclusions. The conducted experimental calculations confirmed the efficiency of the proposed mathematical apparatus and allow us to recommend it for use in practice when solving problems of evaluating the effectiveness of the functioning of video surveillance systems.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"49 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88491773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Radio Electronics Computer Science Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1