首页 > 最新文献

Informatika i avtomatizaciâ最新文献

英文 中文
Анализ рисков информационной безопасности в пищевой промышленности с использованием системы нечеткого вывода 通过模糊输出系统分析食品工业信息安全风险
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.5
Amanuel Asfha, Abhishek Vaish
Recently, different attempts have been made to characterize information security threats, particularly in the industrial sector. Yet, there have been a number of mysterious threats that could jeopardize the safety of food processing industry data, information, and resources. This research paper aims to increase the efficiency of information security risk analysis in food processing industrial information systems, and the participants in this study were experts in executive management, regular staff, technical and asset operators, third-party consultancy companies, and risk management professionals from the food processing sector in Sub-Saharan Africa. A questionnaire and interview with a variety of questions using qualitative and quantitative risk analysis approaches were used to gather the risk identifications, and the fuzzy inference system method was also applied to analyze the risk factor in this paper. The findings revealed that among information security concerns, electronic data in a data theft threat has a high-risk outcome of 75.67%, and human resource management (HRM) in a social engineering threat has a low-risk impact of 26.67%. Thus, the high-probability risk factors need quick action, and the risk components with a high probability call for rapid corrective action. Finally, the root causes of such threats should be identified and controlled before experiencing detrimental effects. It's also important to note that primary interests and worldwide policies must be taken into consideration while examining information security in food processing industrial information systems.
最近,人们进行了不同的尝试来描述信息安全威胁,特别是在工业部门。然而,有一些神秘的威胁可能危及食品加工行业的数据、信息和资源的安全。本研究旨在提高食品加工工业信息系统信息安全风险分析的效率,研究对象为撒哈拉以南非洲地区食品加工行业的行政管理专家、普通员工、技术和资产运营者、第三方咨询公司和风险管理专业人士。本文运用定性和定量风险分析方法,通过问卷调查和访谈等多种问题收集风险识别信息,并运用模糊推理系统方法对风险因素进行分析。研究结果显示,在信息安全问题中,数据盗窃威胁中的电子数据具有75.67%的高风险后果,而社会工程威胁中的人力资源管理(HRM)具有26.67%的低风险影响。因此,高概率的风险因素需要快速采取行动,高概率的风险成分需要快速采取纠正措施。最后,应在产生有害影响之前查明和控制这些威胁的根源。同样重要的是要注意,在检查食品加工工业信息系统的信息安全时,必须考虑到主要利益和国际政策。
{"title":"Анализ рисков информационной безопасности в пищевой промышленности с использованием системы нечеткого вывода","authors":"Amanuel Asfha, Abhishek Vaish","doi":"10.15622/ia.22.5.5","DOIUrl":"https://doi.org/10.15622/ia.22.5.5","url":null,"abstract":"Recently, different attempts have been made to characterize information security threats, particularly in the industrial sector. Yet, there have been a number of mysterious threats that could jeopardize the safety of food processing industry data, information, and resources. This research paper aims to increase the efficiency of information security risk analysis in food processing industrial information systems, and the participants in this study were experts in executive management, regular staff, technical and asset operators, third-party consultancy companies, and risk management professionals from the food processing sector in Sub-Saharan Africa. A questionnaire and interview with a variety of questions using qualitative and quantitative risk analysis approaches were used to gather the risk identifications, and the fuzzy inference system method was also applied to analyze the risk factor in this paper. The findings revealed that among information security concerns, electronic data in a data theft threat has a high-risk outcome of 75.67%, and human resource management (HRM) in a social engineering threat has a low-risk impact of 26.67%. Thus, the high-probability risk factors need quick action, and the risk components with a high probability call for rapid corrective action. Finally, the root causes of such threats should be identified and controlled before experiencing detrimental effects. It's also important to note that primary interests and worldwide policies must be taken into consideration while examining information security in food processing industrial information systems.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Цветовая кодировка кубитных состояний 立方状态颜色编码
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.9
Ilya Surov
Difficulties in algorithmic simulation of natural thinking point to the inadequacy of information encodings used to this end. The promising approach to this problem represents information by the qubit states of quantum theory, structurally aligned with major theories of cognitive semantics. The paper develops this idea by linking qubit states with color as fundamental carrier of affective meaning. The approach builds on geometric affinity of Hilbert space of qubit states and color solids, used to establish precise one-to-one mapping between them. This is enabled by original decomposition of qubit in three non-orthogonal basis vectors corresponding to red, green, and blue colors. Real-valued coefficients of such decomposition are identical to the tomograms of the qubit state in the corresponding directions, related to ordinary Stokes parameters by rotational transform. Classical compositions of black, white and six main colors (red, green, blue, yellow, magenta and cyan) are then mapped to analogous superposition of the qubit states. Pure and mixed colors intuitively map to pure and mixed qubit states on the surface and in the volume of the Bloch ball, while grayscale is mapped to the diameter of the Bloch sphere. Herewith, the lightness of color corresponds to the probability of the qubit’s basis state «1», while saturation and hue encode coherence and phase of the qubit, respectively. The developed code identifies color as a bridge between quantum-theoretic formalism and qualitative regularities of the natural mind. This opens prospects for deeper integration of quantum informatics in semantic analysis of data, image processing, and the development of nature-like computational architectures.
算法模拟自然思维的困难,表明了用于此目的的信息编码的不足。解决这个问题的有希望的方法是通过量子理论的量子比特状态来表示信息,在结构上与认知语义学的主要理论保持一致。本文通过将量子比特状态与颜色联系起来作为情感意义的基本载体来发展这一思想。该方法建立在量子比特状态和彩色固体的希尔伯特空间的几何亲和力上,用于在它们之间建立精确的一对一映射。这是通过将量子比特原始分解为三个非正交的基向量,分别对应于红、绿、蓝三种颜色来实现的。这种分解的实值系数与量子比特态在相应方向上的层析图相同,通过旋转变换与普通Stokes参数相关。黑色、白色和六种主要颜色(红、绿、蓝、黄、品红和青色)的经典组合然后被映射到量子比特状态的类似叠加。纯色和混合色直观地映射到布洛赫球表面和体积上的纯和混合量子比特状态,而灰度映射到布洛赫球的直径。其中,颜色的亮度对应于量子比特基态“1”的概率,而饱和度和色调分别编码量子比特的相干性和相位。开发的代码将颜色确定为量子理论形式主义和自然思维的定性规律之间的桥梁。这为量子信息学在数据语义分析、图像处理和类自然计算架构的发展方面的更深层次整合开辟了前景。
{"title":"Цветовая кодировка кубитных состояний","authors":"Ilya Surov","doi":"10.15622/ia.22.5.9","DOIUrl":"https://doi.org/10.15622/ia.22.5.9","url":null,"abstract":"Difficulties in algorithmic simulation of natural thinking point to the inadequacy of information encodings used to this end. The promising approach to this problem represents information by the qubit states of quantum theory, structurally aligned with major theories of cognitive semantics. The paper develops this idea by linking qubit states with color as fundamental carrier of affective meaning. The approach builds on geometric affinity of Hilbert space of qubit states and color solids, used to establish precise one-to-one mapping between them. This is enabled by original decomposition of qubit in three non-orthogonal basis vectors corresponding to red, green, and blue colors. Real-valued coefficients of such decomposition are identical to the tomograms of the qubit state in the corresponding directions, related to ordinary Stokes parameters by rotational transform. Classical compositions of black, white and six main colors (red, green, blue, yellow, magenta and cyan) are then mapped to analogous superposition of the qubit states. Pure and mixed colors intuitively map to pure and mixed qubit states on the surface and in the volume of the Bloch ball, while grayscale is mapped to the diameter of the Bloch sphere. Herewith, the lightness of color corresponds to the probability of the qubit’s basis state «1», while saturation and hue encode coherence and phase of the qubit, respectively. The developed code identifies color as a bridge between quantum-theoretic formalism and qualitative regularities of the natural mind. This opens prospects for deeper integration of quantum informatics in semantic analysis of data, image processing, and the development of nature-like computational architectures.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Stochastic Optimization for Smartphone CPU Energy Consumption Decrease 智能手机CPU能耗随机优化研究
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.3
Makar Pelogeiko, Stanislav Sartasov, Oleg Granichin
Extending smartphone working time is an ongoing endeavour becoming more and more important with each passing year. It could be achieved by more advanced hardware or by introducing energy-aware practices to software, and the latter is a more accessible approach. As the CPU is one of the most power-hungry smartphone devices, Dynamic Voltage Frequency Scaling (DVFS) is a technique to adjust CPU frequency to the current computational needs, and different algorithms were already developed, both energy-aware and energy-agnostic kinds. Following our previous work on the subject, we propose a novel DVFS approach to use simultaneous perturbation stochastic approximation (SPSA) with two noisy observations for tracking the optimal frequency and implementing several algorithms based on it. Moreover, we also address an issue of hardware lag between a signal for the CPU to change frequency and its actual update. As Android OS could use a default task scheduler or an energy-aware one, which is capable of taking advantage of heterogeneous mobile CPU architectures such as ARM big.LITTLE, we also explore an integration scheme between the proposed algorithms and OS schedulers. A model-based testing methodology to compare the developed algorithms against existing ones is presented, and a test suite reflecting real-world use case scenarios is outlined. Our experiments show that the SPSA-based algorithm works well with EAS with a simplified integration scheme, showing CPU performance comparable to other energy-aware DVFS algorithms and a decreased energy consumption.
随着时间的推移,延长智能手机的工作时间是一项持续的努力,变得越来越重要。它可以通过更先进的硬件或通过向软件引入能源意识实践来实现,后者是一种更容易实现的方法。由于CPU是最耗电的智能手机设备之一,动态电压频率缩放(DVFS)是一种调整CPU频率以适应当前计算需求的技术,并且已经开发了不同的算法,包括能量感知和能量不可知类型。根据我们之前的研究,我们提出了一种新的DVFS方法,使用同时摄动随机逼近(SPSA)和两个噪声观测来跟踪最优频率,并在此基础上实现几种算法。此外,我们还解决了CPU改变频率的信号与实际更新之间的硬件滞后问题。因为Android操作系统可以使用默认的任务调度程序或能量感知的任务调度程序,这能够利用异构的移动CPU架构,如ARM big。此外,我们还探讨了所提出的算法与操作系统调度程序之间的集成方案。本文提出了一种基于模型的测试方法,用于将开发的算法与现有的算法进行比较,并概述了反映真实用例场景的测试套件。我们的实验表明,基于spsa的算法通过简化的集成方案可以很好地与EAS结合,显示出与其他能量感知DVFS算法相当的CPU性能,并且降低了能耗。
{"title":"On Stochastic Optimization for Smartphone CPU Energy Consumption Decrease","authors":"Makar Pelogeiko, Stanislav Sartasov, Oleg Granichin","doi":"10.15622/ia.22.5.3","DOIUrl":"https://doi.org/10.15622/ia.22.5.3","url":null,"abstract":"Extending smartphone working time is an ongoing endeavour becoming more and more important with each passing year. It could be achieved by more advanced hardware or by introducing energy-aware practices to software, and the latter is a more accessible approach. As the CPU is one of the most power-hungry smartphone devices, Dynamic Voltage Frequency Scaling (DVFS) is a technique to adjust CPU frequency to the current computational needs, and different algorithms were already developed, both energy-aware and energy-agnostic kinds. Following our previous work on the subject, we propose a novel DVFS approach to use simultaneous perturbation stochastic approximation (SPSA) with two noisy observations for tracking the optimal frequency and implementing several algorithms based on it. Moreover, we also address an issue of hardware lag between a signal for the CPU to change frequency and its actual update. As Android OS could use a default task scheduler or an energy-aware one, which is capable of taking advantage of heterogeneous mobile CPU architectures such as ARM big.LITTLE, we also explore an integration scheme between the proposed algorithms and OS schedulers. A model-based testing methodology to compare the developed algorithms against existing ones is presented, and a test suite reflecting real-world use case scenarios is outlined. Our experiments show that the SPSA-based algorithm works well with EAS with a simplified integration scheme, showing CPU performance comparable to other energy-aware DVFS algorithms and a decreased energy consumption.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135865018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Аналитический обзор подходов к обнаружению вторжений, основанных на федеративном обучении: преимущества использования и открытые задачи 基于联邦培训的入侵检测方法分析分析:使用优势和开放目标
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.4
Evgenia Novikova, Elena Fedorchenko, Igor Kotenko, Ivan Kholod
To provide an accurate and timely response to different types of attacks, intrusion detection systems collect and analyze a large amount of data, which may include information with limited access, such as personal data or trade secrets. Consequently, such systems can be seen as an additional source of risks associated with handling sensitive information and breaching its security. Applying the federated learning paradigm to build analytical models for attack and anomaly detection can significantly reduce such risks because locally generated data is not transmitted to any third party, and model training is done locally - on the data sources. Using federated training for intrusion detection solves the problem of training on data that belongs to different organizations, and which, due to the need to protect commercial or other secrets, cannot be placed in the public domain. Thus, this approach also allows us to expand and diversify the set of data on which machine learning models are trained, thereby increasing the level of detectability of heterogeneous attacks. Due to the fact that this approach can overcome the aforementioned problems, it is actively used to design new approaches for intrusion and anomaly detection. The authors systematically explore existing solutions for intrusion and anomaly detection based on federated learning, study their advantages, and formulate open challenges associated with its application in practice. Particular attention is paid to the architecture of the proposed systems, the intrusion detection methods and models used, and approaches for modeling interactions between multiple system users and distributing data among them are discussed. The authors conclude by formulating open problems that need to be solved in order to apply federated learning-based intrusion detection systems in practice.
入侵检测系统需要收集和分析大量数据,以准确和及时地应对不同类型的攻击,这些数据可能包括个人资料或商业机密等访问受限的信息。因此,此类系统可被视为处理敏感信息和破坏其安全性相关的额外风险来源。应用联邦学习范式来构建攻击和异常检测的分析模型可以显著降低此类风险,因为本地生成的数据不会传输到任何第三方,模型训练是在本地数据源上完成的。使用联邦训练进行入侵检测解决了对属于不同组织的数据进行训练的问题,由于需要保护商业或其他秘密,这些数据不能放在公共领域。因此,这种方法还允许我们扩展和多样化训练机器学习模型的数据集,从而提高异构攻击的可检测性水平。由于该方法可以克服上述问题,因此被积极用于设计新的入侵和异常检测方法。作者系统地探索了基于联邦学习的入侵和异常检测的现有解决方案,研究了它们的优势,并提出了与其在实践中的应用相关的开放挑战。特别关注所提出系统的体系结构,所使用的入侵检测方法和模型,以及对多个系统用户之间的交互建模和在其中分发数据的方法进行了讨论。为了在实践中应用基于联邦学习的入侵检测系统,作者提出了需要解决的开放性问题。
{"title":"Аналитический обзор подходов к обнаружению вторжений, основанных на федеративном обучении: преимущества использования и открытые задачи","authors":"Evgenia Novikova, Elena Fedorchenko, Igor Kotenko, Ivan Kholod","doi":"10.15622/ia.22.5.4","DOIUrl":"https://doi.org/10.15622/ia.22.5.4","url":null,"abstract":"To provide an accurate and timely response to different types of attacks, intrusion detection systems collect and analyze a large amount of data, which may include information with limited access, such as personal data or trade secrets. Consequently, such systems can be seen as an additional source of risks associated with handling sensitive information and breaching its security. Applying the federated learning paradigm to build analytical models for attack and anomaly detection can significantly reduce such risks because locally generated data is not transmitted to any third party, and model training is done locally - on the data sources. Using federated training for intrusion detection solves the problem of training on data that belongs to different organizations, and which, due to the need to protect commercial or other secrets, cannot be placed in the public domain. Thus, this approach also allows us to expand and diversify the set of data on which machine learning models are trained, thereby increasing the level of detectability of heterogeneous attacks. Due to the fact that this approach can overcome the aforementioned problems, it is actively used to design new approaches for intrusion and anomaly detection. The authors systematically explore existing solutions for intrusion and anomaly detection based on federated learning, study their advantages, and formulate open challenges associated with its application in practice. Particular attention is paid to the architecture of the proposed systems, the intrusion detection methods and models used, and approaches for modeling interactions between multiple system users and distributing data among them are discussed. The authors conclude by formulating open problems that need to be solved in order to apply federated learning-based intrusion detection systems in practice.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Оценка методов скелетизации двумерных бинарных изображений 二维二进制图像骨架化方法评估
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.7
Shadi Abudalfa
In the realm of modern image processing, the emphasis often lies on engineering-based approaches rather than scientific solutions to address diverse practical problems. One prevalent task within this domain involves the skeletonization of binary images. Skeletonization is a powerful process for extracting the skeleton of objects located in digital binary images. This process is widely employed for automating many tasks in numerous fields such as pattern recognition, robot vision, animation, and image analysis. The existing skeletonization techniques are mainly based on three approaches: boundary erosion, distance coding, and Voronoi diagram for identifying an approximate skeleton. In this work, we present an empirical evaluation of a set of well-known techniques and report our findings. We specifically deal with computing skeletons in 2d binary images by selecting different approaches and evaluating their effectiveness. Visual evaluation is the primary method used to showcase the performance of selected skeletonization algorithms. Due to the absence of a definitive definition for the "true" skeleton of a digital object, accurately assessing the effectiveness of skeletonization algorithms poses a significant research challenge. Although researchers have attempted quantitative assessments, these measures are typically customized for specific domains and may not be suitable for our current work. The experimental results shown in this work illustrate the performance of the three main approaches in applying skeletonization with respect to different perspectives.
在现代图像处理领域,重点往往在于基于工程的方法,而不是科学的解决方案,以解决各种实际问题。这个领域中一个普遍的任务涉及二值图像的骨架化。骨架化是一种强大的提取数字二值图像中物体骨架的方法。该过程被广泛应用于模式识别、机器人视觉、动画和图像分析等许多领域的自动化任务。现有的骨架化技术主要基于边界侵蚀、距离编码和Voronoi图三种方法来识别近似骨架。在这项工作中,我们提出了一套众所周知的技术的实证评估,并报告了我们的发现。我们通过选择不同的方法并评估其有效性来具体处理二维二值图像中的计算骨架。视觉评价是用来展示所选骨架化算法性能的主要方法。由于缺乏对数字对象的“真实”骨架的明确定义,准确评估骨架化算法的有效性构成了一个重大的研究挑战。尽管研究人员已经尝试了定量评估,但这些措施通常是针对特定领域定制的,可能不适合我们当前的工作。在这项工作中显示的实验结果说明了三种主要方法的性能在应用骨化相对于不同的观点。
{"title":"Оценка методов скелетизации двумерных бинарных изображений","authors":"Shadi Abudalfa","doi":"10.15622/ia.22.5.7","DOIUrl":"https://doi.org/10.15622/ia.22.5.7","url":null,"abstract":"In the realm of modern image processing, the emphasis often lies on engineering-based approaches rather than scientific solutions to address diverse practical problems. One prevalent task within this domain involves the skeletonization of binary images. Skeletonization is a powerful process for extracting the skeleton of objects located in digital binary images. This process is widely employed for automating many tasks in numerous fields such as pattern recognition, robot vision, animation, and image analysis. The existing skeletonization techniques are mainly based on three approaches: boundary erosion, distance coding, and Voronoi diagram for identifying an approximate skeleton. In this work, we present an empirical evaluation of a set of well-known techniques and report our findings. We specifically deal with computing skeletons in 2d binary images by selecting different approaches and evaluating their effectiveness. Visual evaluation is the primary method used to showcase the performance of selected skeletonization algorithms. Due to the absence of a definitive definition for the \"true\" skeleton of a digital object, accurately assessing the effectiveness of skeletonization algorithms poses a significant research challenge. Although researchers have attempted quantitative assessments, these measures are typically customized for specific domains and may not be suitable for our current work. The experimental results shown in this work illustrate the performance of the three main approaches in applying skeletonization with respect to different perspectives.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Программное обеспечение для автоматизированного распознавания и оцифровки архивных данных оптических наблюдений полярных сияний 自动识别和数字化极光档案光学观测数据的软件
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.8
Andrei Vorobev, Alexander Lapin, Gulnara Vorobeva
One of the main tools for recording auroras is the optical observation of the sky in automatic mode using all-sky cameras. The results of observations are recorded in special mnemonic tables, ascaplots. Ascaplots provide daily information on the presence or absence of cloud cover and auroras in various parts of the sky and are traditionally used to study the daily distribution of auroras in a given spatial region, as well as to calculate the probability of their observation in other regions in accordance with the level of geomagnetic activity. At the same time, the processing of ascaplots is currently carried out manually, which is associated with significant time costs and a high proportion of errors due to the human factor. To increase the efficiency of ascaplot processing, we propose an approach that automates the recognition and digitization of data from optical observations of auroras. A formalization of the ascaplot structure is proposed, which is used to process the ascaplot image, extract the corresponding observation results, and form the resulting data set. The approach involves the use of machine vision algorithms and the use of a specialized mask - a debug image for digitization, which is a color image in which the general position of the ascaplot cells is specified. The proposed approach and the corresponding algorithms are implemented in the form of software that provides recognition and digitization of archival data from optical observations of auroras. The solution is a single-user desktop software that allows the user to convert ascaplot images into tables in batch mode, available for further processing and analysis. The results of the computational experiments have shown that the use of the proposed software will make it possible to avoid errors in the digitization of ascaplots, on the one hand, and significantly increase the speed of the corresponding computational operations, on the other. Taken together, this will improve the efficiency of processing ascaplots and conducting research in the relevant area.
记录极光的主要工具之一是使用全天候相机在自动模式下对天空进行光学观测。观察结果记录在特殊的助记表中。阿斯卡图提供天空中不同部分的云层和极光有无的每日资料,传统上用于研究某一空间区域内极光的每日分布,以及根据地磁活动水平计算在其他区域观测到极光的概率。同时,ascaplot的处理目前是手工进行的,这与大量的时间成本和由于人为因素而导致的高比例错误相关。为了提高天文图像处理的效率,我们提出了一种自动识别和数字化极光光学观测数据的方法。提出了一种ascaplot结构的形式化方法,用于对ascaplot图像进行处理,提取相应的观测结果,形成结果数据集。该方法涉及使用机器视觉算法和使用专用掩码-用于数字化的调试图像,这是一个彩色图像,其中指定了ascaplot细胞的一般位置。提出的方法和相应的算法以软件的形式实现,该软件提供了对极光光学观测档案数据的识别和数字化。该解决方案是一个单用户桌面软件,允许用户以批处理模式将ascaplot图像转换为表,以供进一步处理和分析。计算实验结果表明,使用该软件,一方面可以避免天际线数字化过程中的错误,另一方面可以显著提高相应的计算运算速度。总的来说,这将提高处理ascaplot和进行相关领域研究的效率。
{"title":"Программное обеспечение для автоматизированного распознавания и оцифровки архивных данных оптических наблюдений полярных сияний","authors":"Andrei Vorobev, Alexander Lapin, Gulnara Vorobeva","doi":"10.15622/ia.22.5.8","DOIUrl":"https://doi.org/10.15622/ia.22.5.8","url":null,"abstract":"One of the main tools for recording auroras is the optical observation of the sky in automatic mode using all-sky cameras. The results of observations are recorded in special mnemonic tables, ascaplots. Ascaplots provide daily information on the presence or absence of cloud cover and auroras in various parts of the sky and are traditionally used to study the daily distribution of auroras in a given spatial region, as well as to calculate the probability of their observation in other regions in accordance with the level of geomagnetic activity. At the same time, the processing of ascaplots is currently carried out manually, which is associated with significant time costs and a high proportion of errors due to the human factor. To increase the efficiency of ascaplot processing, we propose an approach that automates the recognition and digitization of data from optical observations of auroras. A formalization of the ascaplot structure is proposed, which is used to process the ascaplot image, extract the corresponding observation results, and form the resulting data set. The approach involves the use of machine vision algorithms and the use of a specialized mask - a debug image for digitization, which is a color image in which the general position of the ascaplot cells is specified. The proposed approach and the corresponding algorithms are implemented in the form of software that provides recognition and digitization of archival data from optical observations of auroras. The solution is a single-user desktop software that allows the user to convert ascaplot images into tables in batch mode, available for further processing and analysis. The results of the computational experiments have shown that the use of the proposed software will make it possible to avoid errors in the digitization of ascaplots, on the one hand, and significantly increase the speed of the corresponding computational operations, on the other. Taken together, this will improve the efficiency of processing ascaplots and conducting research in the relevant area.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From the History of Mathematical Modeling Military Operations in Russia (1900-1917) 俄国军事行动的数学建模史(1900-1917)
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.1
Rafael Yusupov, Vladimir Ivanov
The article is devoted to the original mathematical models of combat operations developed in Russia at the beginning of the XX century. One of the first works in which approaches to mathematical modeling of military operations were outlined can be considered an article by Y. Karpov «Tactics of fortress artillery», published in 1906. It considered the task of defending the fortress from attacking enemy infantry chains. Based on the idea of the attackers overcoming the line of defense, mathematical relations were obtained linking the parameters of the shot of the shrapnel charge with the movements of the infantryman. Similarly, the task of using a machine gun for the defense of the fortress was considered. After analyzing the obtained ratios, Y. Karpov came to the conclusion that all means of defense of the fortress can be correlated through the length of the area defended by this means. P. Nikitin developed Y. Karpov's ideas. He considered a wide range of means of destruction. Based on the results of the research, the author made recommendations on the distribution of forces and means in the defense of fortresses. M. Osipov in 1915 published vivid and original models of two-way combat operations, a year earlier than the well-known Lanchester theory. Summing up the numbers of the fighting sides at infinitesimal intervals of time, and then moving to the limits, he obtains linear and quadratic laws of the influence of the ratio of the number of the fighting sides on their losses, and explores heterogeneous means of destruction. All this is verified by the practice of various battles. M. Osipov showed that the coefficients in the laws of losses depend on the training of personnel, terrain, the presence of fortifications, the moral and psychological state of the troops, etc. Based on the results of mathematical modeling, M. Osipov for the first time substantiated a number of provisions of the art of war. He showed that neither linear nor quadratic laws of losses in general do not correspond to the practice of the battles conducted. For ease of use at that level of computer technology development and to obtain a more reliable result, M. Osipov proposed using the degree of "three second" in the laws of losses, although he himself understood its approximate nature. Much attention is paid to the problem of authorship, the search for a prototype of the creator of the first two-sided model of combat operations, and the application of theory to solve modern applied problems.
这篇文章专门介绍了20世纪初在俄罗斯开发的作战行动的原始数学模型。最早提出军事行动数学建模方法的著作之一,可以看作是Y.卡尔波夫在1906年发表的一篇文章《堡垒炮兵战术》。它考虑的任务是保护堡垒免受敌人步兵链的攻击。基于攻击者突破防线的思想,建立了弹片炮弹射击参数与步兵动作的数学关系。同样,使用机枪防御堡垒的任务也被考虑过。在分析了得到的比值后,Y. Karpov得出结论:堡垒的所有防御手段都可以通过这种手段所防御的区域的长度来进行关联。尼基丁发展了卡尔波夫的想法。他考虑了各种各样的破坏手段。在研究的基础上,对堡垒防御的力量和手段的分配提出了建议。奥西波夫在1915年发表了生动而新颖的双向作战模型,比著名的兰彻斯特理论早了一年。他在无穷小的时间间隔内总结战斗双方的数量,然后移动到极限,得到了战斗双方数量比例对其损失影响的线性和二次定律,并探索了异质的破坏手段。这一切都为各种战役的实践所证实。奥西波夫先生指出,损失规律的系数取决于人员的训练、地形、防御工事的存在、部队的道德和心理状态等。根据数学建模的结果,奥西波夫先生第一次证实了战争艺术的一些规定。他指出,不论是线性的还是二次的损失规律,一般来说都不符合战斗的实际情况。为了便于在当时的计算机技术发展水平上使用,并获得更可靠的结果,奥西波夫建议在损失定律中使用“三秒”度,尽管他自己也知道它的近似性质。作者问题,寻找第一个双面作战模型的创造者的原型,以及理论在解决现代应用问题中的应用,受到了很多关注。
{"title":"From the History of Mathematical Modeling Military Operations in Russia (1900-1917)","authors":"Rafael Yusupov, Vladimir Ivanov","doi":"10.15622/ia.22.5.1","DOIUrl":"https://doi.org/10.15622/ia.22.5.1","url":null,"abstract":"The article is devoted to the original mathematical models of combat operations developed in Russia at the beginning of the XX century. One of the first works in which approaches to mathematical modeling of military operations were outlined can be considered an article by Y. Karpov «Tactics of fortress artillery», published in 1906. It considered the task of defending the fortress from attacking enemy infantry chains. Based on the idea of the attackers overcoming the line of defense, mathematical relations were obtained linking the parameters of the shot of the shrapnel charge with the movements of the infantryman. Similarly, the task of using a machine gun for the defense of the fortress was considered. After analyzing the obtained ratios, Y. Karpov came to the conclusion that all means of defense of the fortress can be correlated through the length of the area defended by this means. P. Nikitin developed Y. Karpov's ideas. He considered a wide range of means of destruction. Based on the results of the research, the author made recommendations on the distribution of forces and means in the defense of fortresses. M. Osipov in 1915 published vivid and original models of two-way combat operations, a year earlier than the well-known Lanchester theory. Summing up the numbers of the fighting sides at infinitesimal intervals of time, and then moving to the limits, he obtains linear and quadratic laws of the influence of the ratio of the number of the fighting sides on their losses, and explores heterogeneous means of destruction. All this is verified by the practice of various battles. M. Osipov showed that the coefficients in the laws of losses depend on the training of personnel, terrain, the presence of fortifications, the moral and psychological state of the troops, etc. Based on the results of mathematical modeling, M. Osipov for the first time substantiated a number of provisions of the art of war. He showed that neither linear nor quadratic laws of losses in general do not correspond to the practice of the battles conducted. For ease of use at that level of computer technology development and to obtain a more reliable result, M. Osipov proposed using the degree of \"three second\" in the laws of losses, although he himself understood its approximate nature. Much attention is paid to the problem of authorship, the search for a prototype of the creator of the first two-sided model of combat operations, and the application of theory to solve modern applied problems.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Walk-through towards Network Steganography Techniques 网络隐写技术概览
Pub Date : 2023-09-25 DOI: 10.15622/ia.22.5.6
Urmila Pilania, Manoj Kumar, Tanwar Rohit, Neha Nandal
2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Steganography plays an important role in providing security to the data in communication. Changing the type of cover file from digital multimedia files to protocols improve the security of the communication system. Protocols are an integral part of the communication system and these protocols can also be used to hide secret data resulting in low chances of detection. This paper is intended to help improve existing network steganography techniques by enhancing bandwidth and decreasing detection rates through reviewing previous related work. Recent papers of the last 21 years on network steganography techniques have been studied, analyzed, and summarized. This review can help researchers to understand the existing trends in network steganography techniques to pursue further work in this area for algorithms’ improvement. The paper is divided according to the layers of the OSI model.
2D和3D数字多媒体文件提供了许多优点,如优秀的质量,压缩,编辑,可靠的复制等。另一方面,多媒体文件的这些特性是恐惧的原因,包括在通信过程中访问数据的恐惧。隐写技术在保证通信数据的安全性方面起着重要的作用。将覆盖文件的类型从数字多媒体文件转换为协议文件,提高了通信系统的安全性。协议是通信系统不可分割的一部分,这些协议也可以用来隐藏秘密数据,从而降低被发现的机会。本文旨在通过对以往相关工作的回顾,帮助改进现有的网络隐写技术,提高带宽,降低检出率。本文对近21年来有关网络隐写技术的论文进行了研究、分析和总结。本文综述可以帮助研究人员了解网络隐写技术的现有趋势,以进一步开展该领域的工作,以改进算法。本文按照OSI模型的层次进行了划分。
{"title":"A Walk-through towards Network Steganography Techniques","authors":"Urmila Pilania, Manoj Kumar, Tanwar Rohit, Neha Nandal","doi":"10.15622/ia.22.5.6","DOIUrl":"https://doi.org/10.15622/ia.22.5.6","url":null,"abstract":"2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data during communication. Steganography plays an important role in providing security to the data in communication. Changing the type of cover file from digital multimedia files to protocols improve the security of the communication system. Protocols are an integral part of the communication system and these protocols can also be used to hide secret data resulting in low chances of detection. This paper is intended to help improve existing network steganography techniques by enhancing bandwidth and decreasing detection rates through reviewing previous related work. Recent papers of the last 21 years on network steganography techniques have been studied, analyzed, and summarized. This review can help researchers to understand the existing trends in network steganography techniques to pursue further work in this area for algorithms’ improvement. The paper is divided according to the layers of the OSI model.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135864883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Control of Traffic Signals and Vehicle Trajectories 交通信号与车辆轨迹的协同控制
Pub Date : 2023-01-27 DOI: 10.15622/ia.22.1.1
Anton Agafonov, Alexander Yumaganov
The transportation system is one of the most important parts of the country's economy. At the same time, the growth in road traffic has a significant negative impact on the economic performance of the industry. One of the ways to increase the efficiency of using the transportation infrastructure is to manage traffic flows, incl. by controlling traffic signals at signalized intersections. One of the trends in the development of intelligent transportation systems is the creation of vehicular ad hoc networks that allow the exchange of information between vehicles and infrastructure, as well as the development of autonomous vehicles. As a result, it becomes possible to formulate the problem of cooperative control of vehicle trajectories and traffic signals to increase the capacity of intersections and reduce fuel consumption and travel time. This paper presents a method for managing traffic flow at an intersection, which consists of the cooperative control of traffic signals and trajectories of connected/autonomous vehicles. The developed method combines an algorithm for the adaptive control of traffic signals based on a deterministic model for predicting the movement of vehicles and a two-stage algorithm for constructing the trajectory of vehicles. The objective optimization function used to construct the optimal trajectories takes into account fuel consumption, travel time on the road lane, and waiting time at the intersection. Experimental studies of the developed method were carried out in the microscopic traffic simulation package SUMO using three simulation scenarios, including two synthetic scenarios and a scenario in a real urban environment. The results of experimental studies confirm the effectiveness of the developed method in terms of fuel consumption, travel time, and waiting time in comparison with the adaptive traffic signal control algorithm.
交通运输系统是国家经济最重要的组成部分之一。与此同时,道路交通的增长对行业的经济绩效产生了显著的负面影响。提高交通基础设施使用效率的方法之一是管理交通流量,包括控制信号交叉口的交通信号。智能交通系统发展的趋势之一是创建车辆特设网络,允许车辆和基础设施之间的信息交换,以及自动驾驶汽车的发展。因此,可以制定车辆轨迹和交通信号的协同控制问题,以增加交叉口的通行能力,减少燃料消耗和旅行时间。本文提出了一种交叉口交通流管理方法,该方法由交通信号和联网/自动驾驶车辆轨迹的协同控制组成。该方法结合了一种基于确定性模型的交通信号自适应控制算法和一种两阶段算法,该算法用于预测车辆的运动轨迹。目标优化函数用于构建最优轨迹,考虑了油耗、车道行驶时间和交叉口等待时间。在微观交通仿真包SUMO中对所开发的方法进行了实验研究,使用了3种仿真场景,包括2种合成场景和1种真实城市环境场景。实验研究结果证实了该方法与自适应交通信号控制算法相比在油耗、行驶时间和等待时间方面的有效性。
{"title":"Cooperative Control of Traffic Signals and Vehicle Trajectories","authors":"Anton Agafonov, Alexander Yumaganov","doi":"10.15622/ia.22.1.1","DOIUrl":"https://doi.org/10.15622/ia.22.1.1","url":null,"abstract":"The transportation system is one of the most important parts of the country's economy. At the same time, the growth in road traffic has a significant negative impact on the economic performance of the industry. One of the ways to increase the efficiency of using the transportation infrastructure is to manage traffic flows, incl. by controlling traffic signals at signalized intersections. One of the trends in the development of intelligent transportation systems is the creation of vehicular ad hoc networks that allow the exchange of information between vehicles and infrastructure, as well as the development of autonomous vehicles. As a result, it becomes possible to formulate the problem of cooperative control of vehicle trajectories and traffic signals to increase the capacity of intersections and reduce fuel consumption and travel time. This paper presents a method for managing traffic flow at an intersection, which consists of the cooperative control of traffic signals and trajectories of connected/autonomous vehicles. The developed method combines an algorithm for the adaptive control of traffic signals based on a deterministic model for predicting the movement of vehicles and a two-stage algorithm for constructing the trajectory of vehicles. The objective optimization function used to construct the optimal trajectories takes into account fuel consumption, travel time on the road lane, and waiting time at the intersection. Experimental studies of the developed method were carried out in the microscopic traffic simulation package SUMO using three simulation scenarios, including two synthetic scenarios and a scenario in a real urban environment. The results of experimental studies confirm the effectiveness of the developed method in terms of fuel consumption, travel time, and waiting time in comparison with the adaptive traffic signal control algorithm.","PeriodicalId":491127,"journal":{"name":"Informatika i avtomatizaciâ","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135839519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Informatika i avtomatizaciâ
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1