首页 > 最新文献

Informacionnye Tehnologii最新文献

英文 中文
The Method for Implementing Test Constructors Using the Lualatex Publishing System 使用 Lualatex 出版系统实现测试构造函数的方法
Pub Date : 2024-01-19 DOI: 10.17587/it.30.50-55
Y. Polishuk, Ya. V. Goncharova
One of the key factors of successful learning is the control of mastering the material that has been passed, which can be implemented, including by performing control test tasks. The work is devoted to the use of the desktop publishing system LuaLaTeX to automate the process of forming test control papers. The control generated with its help includes a set number of randomly selected test tasks on the specified topics, followed by mixing both the questions themselves and their answer options. Each generated control work is personalized, i.e. generated directly for a specific student, and is a control work in the form of a PDF-document. To achieve the goal of the work, the capabilities of the LuaLaTeX publishing system are used, which include: the Lua scripting language, which is used to form a pool of control work tasks and personalize it; the TeX language is used to design the content of the control work being formed; the capabilities of the PDF format, including the JavaScript programming language, implement automated verification of control work, demonstration of correct answers to questions, preservation of the test result and provide additional security, which consists in the use of hashes instead of correct answers to tasks and a password. As a practical significance of the proposed solution, we can note an increase in the efficiency of the process of controlling the development of the material passed by students by minimizing the speed of preparation of test control works and their verification, as well as the use of a minimum software tools for its implementation.
成功学习的关键因素之一是控制对已通过教材的掌握,这可以通过执行控制测试任务等方式来实现。这项工作致力于使用桌面排版系统 LuaLaTeX 自动生成测试控制卷。在它的帮助下生成的控制卷包括一组随机选择的指定题目的测试任务,然后将问题本身和答案选项混合在一起。每份生成的控制作业都是个性化的,即直接为特定学生生成,是 PDF 文档形式的控制作业。为实现该作品的目标,使用了 LuaLaTeX 出版系统的功能,其中包括:Lua 脚本语言,用于形成控制作业任务库并对其进行个性化;TeX 语言,用于设计所形成的控制作业的内容;PDF 格式的功能,包括 JavaScript 编程语言,实现了控制作业的自动验证、问题正确答案的演示、测试结果的保存,并提供了额外的安全性,包括使用哈希值代替任务的正确答案和密码。作为建议解决方案的实际意义,我们可以注意到,通过最大限度地降低测试控制工程的准备和验证速度,以及使用最少的软件工具来实施,学生通过的材料开发控制过程的效率得到了提高。
{"title":"The Method for Implementing Test Constructors Using the Lualatex Publishing System","authors":"Y. Polishuk, Ya. V. Goncharova","doi":"10.17587/it.30.50-55","DOIUrl":"https://doi.org/10.17587/it.30.50-55","url":null,"abstract":"One of the key factors of successful learning is the control of mastering the material that has been passed, which can be implemented, including by performing control test tasks. The work is devoted to the use of the desktop publishing system LuaLaTeX to automate the process of forming test control papers. The control generated with its help includes a set number of randomly selected test tasks on the specified topics, followed by mixing both the questions themselves and their answer options. Each generated control work is personalized, i.e. generated directly for a specific student, and is a control work in the form of a PDF-document. To achieve the goal of the work, the capabilities of the LuaLaTeX publishing system are used, which include: the Lua scripting language, which is used to form a pool of control work tasks and personalize it; the TeX language is used to design the content of the control work being formed; the capabilities of the PDF format, including the JavaScript programming language, implement automated verification of control work, demonstration of correct answers to questions, preservation of the test result and provide additional security, which consists in the use of hashes instead of correct answers to tasks and a password. As a practical significance of the proposed solution, we can note an increase in the efficiency of the process of controlling the development of the material passed by students by minimizing the speed of preparation of test control works and their verification, as well as the use of a minimum software tools for its implementation.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"96 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139612440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation Modeling of QS with Hyper-Erlang and Erlang Distributions 采用超二郎分布和二郎分布的 QS 仿真建模
Pub Date : 2024-01-19 DOI: 10.17587/it.30.3-12
V. Tarasov, N. Bakhareva
The article is devoted to the construction of simulation models of customer delay in the queue in the form of a queuing system (QS) described by both ordinary and right-shifted hyper-Erlang and second-order Erlang distributions. This article is a logical continuation of previous works devoted to the construction of numerical-analytical QS models with shifted distribution laws. In the article, the Erlang distribution is considered as a special case of the more general Gamma distribution law, in contrast to the normalized Erlang distribution. These two forms of the Erlang distribution differ in numerical characteristics, except for the coefficient of variation. To solve the problem, the system of discrete-event modeling GPSS WORLD was used.
文章致力于以普通和右移超二郎分布及二阶二郎分布描述的队列系统(QS)形式构建队列中客户延迟的仿真模型。本文是以前致力于构建具有偏移分布规律的数值分析 QS 模型工作的逻辑延续。在文章中,二朗分布被视为更一般的伽马分布定律的特例,与归一化二朗分布形成对比。除了变异系数外,这两种形式的二朗分布在数值特征上有所不同。为了解决这个问题,我们使用了离散事件建模系统 GPSS WORLD。
{"title":"Simulation Modeling of QS with Hyper-Erlang and Erlang Distributions","authors":"V. Tarasov, N. Bakhareva","doi":"10.17587/it.30.3-12","DOIUrl":"https://doi.org/10.17587/it.30.3-12","url":null,"abstract":"The article is devoted to the construction of simulation models of customer delay in the queue in the form of a queuing system (QS) described by both ordinary and right-shifted hyper-Erlang and second-order Erlang distributions. This article is a logical continuation of previous works devoted to the construction of numerical-analytical QS models with shifted distribution laws. In the article, the Erlang distribution is considered as a special case of the more general Gamma distribution law, in contrast to the normalized Erlang distribution. These two forms of the Erlang distribution differ in numerical characteristics, except for the coefficient of variation. To solve the problem, the system of discrete-event modeling GPSS WORLD was used.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"84 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model of an Automated Electronic Document Management System Operating under Conditions of Probable Compromise of Signature Keys, Based on a Hierarchical Decomposition of Trusted Storage Environments 基于可信存储环境分层分解的签名密钥可能失密条件下运行的自动电子文档管理系统模型
Pub Date : 2024-01-19 DOI: 10.17587/it.30.13-22
N. N. Kramskoi, A. O. Roniashkevich, D. Tali, O. A. Finko
The results of an analysis of the functioning of the electronic document management system in the context of the development of methods and means of cryptanalysis and an avalanche increase in the number of processed documents are presented. A conceptual model and method for decomposing the storage subsystem into contours of operational and long-term storage of electronic documents are proposed. A mathematical model of hierarchical control of the integrity of electronic documents is presented, which takes into account the integrative properties of electronic documents, as well as requirements for storage periods and information security. The methodology and results of assessing the advantages of the developed technical solution based on the logical-probabilistic method are presented.
本文介绍了在密码分析方法和手段不断发展以及处理文件数量雪崩式增长的背景下,对电子文件管理系统的运行情况进行分析的结果。提出了将存储子系统分解为电子文件业务和长期存储轮廓的概念模型和方法。提出了分级控制电子文件完整性的数学模型,其中考虑到了电子文件的综合特性以及对存储期和信息安全的要求。介绍了评估基于逻辑概率方法开发的技术解决方案优势的方法和结果。
{"title":"A Model of an Automated Electronic Document Management System Operating under Conditions of Probable Compromise of Signature Keys, Based on a Hierarchical Decomposition of Trusted Storage Environments","authors":"N. N. Kramskoi, A. O. Roniashkevich, D. Tali, O. A. Finko","doi":"10.17587/it.30.13-22","DOIUrl":"https://doi.org/10.17587/it.30.13-22","url":null,"abstract":"The results of an analysis of the functioning of the electronic document management system in the context of the development of methods and means of cryptanalysis and an avalanche increase in the number of processed documents are presented. A conceptual model and method for decomposing the storage subsystem into contours of operational and long-term storage of electronic documents are proposed. A mathematical model of hierarchical control of the integrity of electronic documents is presented, which takes into account the integrative properties of electronic documents, as well as requirements for storage periods and information security. The methodology and results of assessing the advantages of the developed technical solution based on the logical-probabilistic method are presented.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"60 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Localization of Spatiotemporal Patterns on the Time Sequence of Biomedical Images 生物医学图像时间序列上时空模式的定位方法
Pub Date : 2024-01-19 DOI: 10.17587/it.30.42-49
I. Shcherban, V. S. Fedotova, N. E. Kirilenko, A. Matukhno, O. Shcherban, L. V. Lysenko
A method has been developed for localizing spatiotemporal patterns observed in sequentially recorded biomedical images of laser scanning microscopy and reflecting the dynamics of the biological structures under study. By means of interpolation by radial basis functions of each individual image, a compact mathematical model of the space-time dynamics of the brightness function on a sequence of images is obtained. The subsequent localization of the structures of the sought-for dynamic patterns is carried out by means of the mathematical apparatus of singular spectral analysis. The results of experiments on optical visualization of the activity patterns of the olfactory bulb of a macrosmatic (rat) confirmed the efficiency of the developed method for localizing the reaction to biomarkers of human oncological diseases.
我们开发了一种方法,用于定位在激光扫描显微镜连续记录的生物医学图像中观察到的时空模式,并反映所研究生物结构的动态。通过对每幅图像进行径向基函数插值,可获得图像序列上亮度函数时空动态的紧凑数学模型。随后,通过奇异光谱分析的数学装置对所需动态模式的结构进行定位。大鼠嗅球活动模式的光学可视化实验结果证实了所开发的方法在定位人类肿瘤疾病生物标志物反应方面的有效性。
{"title":"Method of Localization of Spatiotemporal Patterns on the Time Sequence of Biomedical Images","authors":"I. Shcherban, V. S. Fedotova, N. E. Kirilenko, A. Matukhno, O. Shcherban, L. V. Lysenko","doi":"10.17587/it.30.42-49","DOIUrl":"https://doi.org/10.17587/it.30.42-49","url":null,"abstract":"A method has been developed for localizing spatiotemporal patterns observed in sequentially recorded biomedical images of laser scanning microscopy and reflecting the dynamics of the biological structures under study. By means of interpolation by radial basis functions of each individual image, a compact mathematical model of the space-time dynamics of the brightness function on a sequence of images is obtained. The subsequent localization of the structures of the sought-for dynamic patterns is carried out by means of the mathematical apparatus of singular spectral analysis. The results of experiments on optical visualization of the activity patterns of the olfactory bulb of a macrosmatic (rat) confirmed the efficiency of the developed method for localizing the reaction to biomarkers of human oncological diseases.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"68 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Technique for Creating and Training an Artificial Neural Network to Detect Network Traffic Anomalies 创建和训练人工神经网络以检测网络流量异常的技术
Pub Date : 2024-01-19 DOI: 10.17587/it.30.32-41
S. O. Ivanov
The article presents a technique for creating and training an artificial neural network to recognize network traffic anomalies using relatively small samples of collected data to generate training data. Various data sources for machine learning and approaches to network traffic analysis are considered. There are data format and the method of generating them from the collected network traffic is described, as well as the steps of the methodology in detail. Using the technique, an artificial neural network was created and trained for the task of recognizing anomalies in the network traffic of the ICMP protocol. The results of testing and comparing various artificial neural network configurations and learning conditions for a given task are presented. The artificial neural network trained according to the method was tested on real network traffic. The presented technique can be applied without requiring changes to detect anomalies of various network protocols and network traffic using a suitable parameterizer and data markup.
文章介绍了一种创建和训练人工神经网络的技术,利用相对较小的采集数据样本生成训练数据,从而识别网络流量异常。文章考虑了机器学习的各种数据源和网络流量分析方法。详细介绍了数据格式和从收集的网络流量中生成数据的方法,以及该方法的步骤。利用该技术,创建并训练了一个人工神经网络,用于识别 ICMP 协议网络流量中的异常情况。本文介绍了针对特定任务测试和比较各种人工神经网络配置和学习条件的结果。根据该方法训练的人工神经网络在真实网络流量上进行了测试。使用合适的参数化器和数据标记,所介绍的技术无需更改即可用于检测各种网络协议和网络流量的异常情况。
{"title":"A Technique for Creating and Training an Artificial Neural Network to Detect Network Traffic Anomalies","authors":"S. O. Ivanov","doi":"10.17587/it.30.32-41","DOIUrl":"https://doi.org/10.17587/it.30.32-41","url":null,"abstract":"The article presents a technique for creating and training an artificial neural network to recognize network traffic anomalies using relatively small samples of collected data to generate training data. Various data sources for machine learning and approaches to network traffic analysis are considered. There are data format and the method of generating them from the collected network traffic is described, as well as the steps of the methodology in detail. Using the technique, an artificial neural network was created and trained for the task of recognizing anomalies in the network traffic of the ICMP protocol. The results of testing and comparing various artificial neural network configurations and learning conditions for a given task are presented. The artificial neural network trained according to the method was tested on real network traffic. The presented technique can be applied without requiring changes to detect anomalies of various network protocols and network traffic using a suitable parameterizer and data markup.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"4 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139524994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mathematical Model for Assessing the Stability of the Functioning of an Element of the Information Infrastructure of an Automated Control System Exposed to Threats to Information Security 评估受信息安全威胁的自动控制系统信息基础设施要素运行稳定性的数学模型
Pub Date : 2024-01-19 DOI: 10.17587/it.30.23-31
V. A. Voevodin
The problem of assessing the stability of an element of the information infrastructure of the automated control system to single impacts of threats to information security is considered. For the solution, it is proposed to reduce the problem of stability estimation to the problem of constructing the survivability function of the element under study and determining its extreme values. Functional analysis methods were used to solve the problem. The problem is solved subject to the adoption of exponential laws of distribution of random moments of exposure time and moments of recovery time of the element's function. Recommendations are given on the formation of initial data for modeling, the results of test modeling in the form of graphs of the survivability function. A computational experiment with a mathematical model was carried out, aimed at investigating the effectiveness of the proposed model. A mathematical model can be used to construct a survivability function with a single impact and restore the functionality of an element exposed to threats. The novelty of the result lies in the concretization of general and particular mathematical models designed to assess the stability of functioning under conditions of repeated exposure to threats, which makes it possible to significantly simplify the model with acceptable reliability of the result obtained.
本研究考虑的问题是评估自动控制系统信息基础设施的某一要素在信息安全威胁的单一影响下的稳定性。为了解决这个问题,建议将稳定性评估问题简化为构建所研究元素的生存能力函数并确定其极值的问题。该问题的解决采用了函数分析方法。在采用元素函数的暴露时间随机矩和恢复时间随机矩的指数分布规律的前提下,问题得以解决。对建模初始数据的形成、以存活率函数图形式表示的试验建模结果提出了建议。利用数学模型进行了计算实验,旨在研究建议模型的有效性。数学模型可用于构建具有单一冲击力的生存能力函数,并恢复受到威胁的元件的功能。该成果的新颖之处在于将旨在评估在反复受到威胁的条件下功能稳定性的一般和特殊数学模型具体化,从而有可能在所获得的结果具有可接受的可靠性的情况下大大简化模型。
{"title":"A Mathematical Model for Assessing the Stability of the Functioning of an Element of the Information Infrastructure of an Automated Control System Exposed to Threats to Information Security","authors":"V. A. Voevodin","doi":"10.17587/it.30.23-31","DOIUrl":"https://doi.org/10.17587/it.30.23-31","url":null,"abstract":"The problem of assessing the stability of an element of the information infrastructure of the automated control system to single impacts of threats to information security is considered. For the solution, it is proposed to reduce the problem of stability estimation to the problem of constructing the survivability function of the element under study and determining its extreme values. Functional analysis methods were used to solve the problem. The problem is solved subject to the adoption of exponential laws of distribution of random moments of exposure time and moments of recovery time of the element's function. Recommendations are given on the formation of initial data for modeling, the results of test modeling in the form of graphs of the survivability function. A computational experiment with a mathematical model was carried out, aimed at investigating the effectiveness of the proposed model. A mathematical model can be used to construct a survivability function with a single impact and restore the functionality of an element exposed to threats. The novelty of the result lies in the concretization of general and particular mathematical models designed to assess the stability of functioning under conditions of repeated exposure to threats, which makes it possible to significantly simplify the model with acceptable reliability of the result obtained.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"45 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139611866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating the Cardinality of Queries Based on a Sample from a Full Outer Join of Tables 根据表的全外连接样本估算查询的卡片数
Pub Date : 2023-12-20 DOI: 10.17587/it.29.650-663
U. A. Grigorev
Cardinality estimation (CardEst) plays an important role in creating high-quality query execution plans in the DBMS. In the last decade, a large number of methods have been developed: traditional methods (histograms, samples), machine learning methods based on queries or data. But all of them are based on different restrictions and assumptions, and the cardinality estimation with their help worsens with an increase in the number of joined tables. The article proposes two new methods based on the theory of approximate calculation of aggregates and allowing to remove most of the restrictions. Method 1 fetches blocks after executing the subqueries of the original query and does not require a preliminary analysis of the filter conditions. The condition for joining tables can be arbitrary (not necessarily the equality of attributes). Method 2 allows you to calculate the probabilities of reading blocks based on the metadata accumulated in the process of populating the database. Metadata takes up little memory, and the overhead of maintaining it is low. Method 2, in contrast to method 1, takes into account the true cardinality of the connection of neighboring blocks in the sample obtained from metadata. Therefore, the prospect opens up for a more accurate assessment of the cardinality of joining a large number of tables. Method 1 (EVACAR method) is implemented and compared with modern machine learning methods BayesCard, DeepDB, FLAT on a special STATS test. The results of the experiments confirmed the effectiveness of the EVACAR method. The EVACAR method is more accurate or its maximum q-error is comparable to machine learning methods for 75-88 % of evaluated queries (subplans). In the future, it is planned to implement the 2nd method for assessing the cardinality of queries.
在数据库管理系统中创建高质量的查询执行计划时,卡品质估计(CardEst)发挥着重要作用。近十年来,人们开发了大量方法:传统方法(直方图、样本)、基于查询或数据的机器学习方法。但是,所有这些方法都基于不同的限制和假设,而且在这些方法的帮助下,随着连接表数量的增加,万有性估计也会恶化。本文提出了两种基于近似计算聚合理论的新方法,可以消除大部分限制。方法 1 在执行原始查询的子查询后获取数据块,不需要对过滤条件进行初步分析。连接表的条件可以是任意的(不一定是属性相等)。方法 2 可以根据数据库填充过程中积累的元数据计算读取数据块的概率。元数据占用的内存很少,维护元数据的开销也很低。与方法 1 不同的是,方法 2 考虑到了从元数据中获得的样本中相邻区块连接的真实万有引力。因此,可以更准确地评估连接大量表的冗余度。方法 1(EVACAR 方法)已经实现,并在一个特殊的 STATS 测试中与现代机器学习方法 BayesCard、DeepDB、FLAT 进行了比较。实验结果证实了 EVACAR 方法的有效性。在 75-88 % 的评估查询(子计划)中,EVACAR 方法更准确,或其最大 q 误差与机器学习方法相当。今后,我们计划采用第二种方法来评估查询的卡带性。
{"title":"Estimating the Cardinality of Queries Based on a Sample from a Full Outer Join of Tables","authors":"U. A. Grigorev","doi":"10.17587/it.29.650-663","DOIUrl":"https://doi.org/10.17587/it.29.650-663","url":null,"abstract":"Cardinality estimation (CardEst) plays an important role in creating high-quality query execution plans in the DBMS. In the last decade, a large number of methods have been developed: traditional methods (histograms, samples), machine learning methods based on queries or data. But all of them are based on different restrictions and assumptions, and the cardinality estimation with their help worsens with an increase in the number of joined tables. The article proposes two new methods based on the theory of approximate calculation of aggregates and allowing to remove most of the restrictions. Method 1 fetches blocks after executing the subqueries of the original query and does not require a preliminary analysis of the filter conditions. The condition for joining tables can be arbitrary (not necessarily the equality of attributes). Method 2 allows you to calculate the probabilities of reading blocks based on the metadata accumulated in the process of populating the database. Metadata takes up little memory, and the overhead of maintaining it is low. Method 2, in contrast to method 1, takes into account the true cardinality of the connection of neighboring blocks in the sample obtained from metadata. Therefore, the prospect opens up for a more accurate assessment of the cardinality of joining a large number of tables. Method 1 (EVACAR method) is implemented and compared with modern machine learning methods BayesCard, DeepDB, FLAT on a special STATS test. The results of the experiments confirmed the effectiveness of the EVACAR method. The EVACAR method is more accurate or its maximum q-error is comparable to machine learning methods for 75-88 % of evaluated queries (subplans). In the future, it is planned to implement the 2nd method for assessing the cardinality of queries.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"24 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139168603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Multipath Routing in Software Defined Networks Based on Genetic Algorithm 基于遗传算法的软件定义网络中的神经网络多路径路由选择
Pub Date : 2023-12-20 DOI: 10.17587/it.29.622-629
D. A. Perepelkin, M. Ivanchikova, V. T. Nguyen
Currently, a wide demand for the implementation and use of various cloud solutions is a modern trend and the driving force behind the development of network technologies. The growth of cloud application services delivered through data centers with varying network traffic needs demonstrates the limitations of traditional routing and load balancing methods. The combination of the advantages of software defined networks (SDN) technology and artificial intelligence (AI) methods ensures efficient management and operation of computer network resources. The paper proposes an approach to neural network multipath routing in SDN based on a genetic algorithm. The architecture and model of an artificial neural network has been developed to solve the problem of multipath routing in the SDN, which is able to predict the shortest paths based on the metrics of communication links. To optimize the hyperparameters of the neural network model, it is proposed to use a modified genetic algorithm. A visual software system SDNLoadBalancer has been developed and an experimental SDN topology has been designed, which makes it possible to study in detail the processes of neural network multipath routing in SDN based on the proposed approach. The obtained results show that the proposed neural network model has the ability to predict routes with high accuracy in real time, which makes it possible to implement various load balancing schemes in order to increase performance of SDN.
目前,实施和使用各种云解决方案的广泛需求是现代趋势,也是网络技术发展的驱动力。通过数据中心提供的云应用服务不断增长,对网络流量的需求也各不相同,这表明传统路由和负载平衡方法存在局限性。软件定义网络(SDN)技术和人工智能(AI)方法的优势相结合,确保了计算机网络资源的高效管理和运行。本文提出了一种基于遗传算法的 SDN 神经网络多路径路由方法。为了解决 SDN 中的多路径路由问题,本文开发了人工神经网络的架构和模型,它能够根据通信链路的指标预测最短路径。为了优化神经网络模型的超参数,建议使用改进的遗传算法。开发了一个可视化软件系统 SDNLoadBalancer,并设计了一个试验性 SDN 拓扑,从而可以详细研究基于所提方法的 SDN 中神经网络多路径路由过程。研究结果表明,所提出的神经网络模型能够实时、高精度地预测路由,从而可以实施各种负载平衡方案,提高 SDN 的性能。
{"title":"Neural Network Multipath Routing in Software Defined Networks Based on Genetic Algorithm","authors":"D. A. Perepelkin, M. Ivanchikova, V. T. Nguyen","doi":"10.17587/it.29.622-629","DOIUrl":"https://doi.org/10.17587/it.29.622-629","url":null,"abstract":"Currently, a wide demand for the implementation and use of various cloud solutions is a modern trend and the driving force behind the development of network technologies. The growth of cloud application services delivered through data centers with varying network traffic needs demonstrates the limitations of traditional routing and load balancing methods. The combination of the advantages of software defined networks (SDN) technology and artificial intelligence (AI) methods ensures efficient management and operation of computer network resources. The paper proposes an approach to neural network multipath routing in SDN based on a genetic algorithm. The architecture and model of an artificial neural network has been developed to solve the problem of multipath routing in the SDN, which is able to predict the shortest paths based on the metrics of communication links. To optimize the hyperparameters of the neural network model, it is proposed to use a modified genetic algorithm. A visual software system SDNLoadBalancer has been developed and an experimental SDN topology has been designed, which makes it possible to study in detail the processes of neural network multipath routing in SDN based on the proposed approach. The obtained results show that the proposed neural network model has the ability to predict routes with high accuracy in real time, which makes it possible to implement various load balancing schemes in order to increase performance of SDN.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139169582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for Recognizing an Underwater Pipeline from Stereo Images 从立体图像识别水下管道的算法
Pub Date : 2023-12-20 DOI: 10.17587/it.29.639-649
V. Bobkov, M. A. Morozov, A. Shupikova
The problem of recognition of an underwater pipeline (UP) from stereo images using an autonomous underwater robot (AUV) is considered in relation to the initial position of tracking the UP, or to situations where the previous section of the UP is hidden by interference (submerged in the ground, hidden by algae, etc.). The final result of the identification of the UP section, visible by the stereo camera, is the calculation of its center line and the detection of the relative position of the AUV and UP in the camera coordinate system. The article proposes a recognition method based on the selection of visible UP boundaries (contours) on vectorized images of a stereopair. At the stage of vectorization, noise is eliminated, illumination is equalized, and the image is processed using the Canny method to obtain a binary image. The construction of UP contours is performed using the algorithm proposed by the authors, which is a modification of the Hough method. The main feature of the proposed algorithm is a relatively high performance due to a multiple reduction in the amount of information being processed. Reducing the volume of processed data is done by pre-sorting the line segments in the vectorized image, and by optimizing the computational scheme in the algorithm. The experiments also showed that the algorithm can detect the visible boundaries of the UP on blurry, non-contrasting images. The algorithmic basis of the method is described in detail, including: — search and construction of the most reliable UP boundaries using the method of the integral contribution of the line segments to the line formation; generation and selection of point features belonging to the surface of the UP (due to the constructed contours); calculation of the 3D direction of the center line; calculation of the center line of the visible section of UP; —calculation of the AUV position parameters relative to the UP required for the AUV control system. The centerline calculation is performed using the least squares method using point features belonging to the surface of the UP. The performed computational experiments on virtual scenes using the real texture of the seabed confirm the operability of the implemented approach and the possibility of its application for the inspection of underwater infrastructure.
利用自主水下机器人(AUV)从立体图像中识别水下管道(UP)的问题,与追踪水下管道的初始位置有关,或与水下管道的前一段被干扰(淹没在地下、被藻类等)隐藏的情况有关。识别立体摄像机所能看到的 UP 段的最终结果是计算其中心线,并检测 AUV 和 UP 在摄像机坐标系中的相对位置。文章提出了一种识别方法,该方法基于在立体图像的矢量化图像上选择可见的 UP 边界(轮廓线)。在矢量化阶段,消除噪声,均衡光照,并使用 Canny 方法处理图像,以获得二值图像。UP 轮廓的构建采用作者提出的算法,该算法是对 Hough 方法的修改。所提算法的主要特点是,由于处理的信息量成倍减少,因此性能相对较高。通过对矢量化图像中的线段进行预排序,以及优化算法中的计算方案,减少了处理的数据量。实验还表明,该算法可以在模糊、无对比度的图像上检测出 UP 的可见边界。本文详细介绍了该方法的算法基础,包括- 使用线段对线条形成的积分贡献法搜索和构建最可靠的 UP 边界;生成和选择属于 UP 表面的点特征(由于构建的轮廓);计算中心线的三维方向;计算 UP 可见部分的中心线;-计算 AUV 控制系统所需的相对于 UP 的 AUV 位置参数。中心线计算采用最小二乘法,利用 UP 表面的点特征进行计算。在使用真实海底纹理的虚拟场景上进行的计算实验证实了所实施方法的可操作性及其应用于水下基础设施检测的可能性。
{"title":"Algorithm for Recognizing an Underwater Pipeline from Stereo Images","authors":"V. Bobkov, M. A. Morozov, A. Shupikova","doi":"10.17587/it.29.639-649","DOIUrl":"https://doi.org/10.17587/it.29.639-649","url":null,"abstract":"The problem of recognition of an underwater pipeline (UP) from stereo images using an autonomous underwater robot (AUV) is considered in relation to the initial position of tracking the UP, or to situations where the previous section of the UP is hidden by interference (submerged in the ground, hidden by algae, etc.). The final result of the identification of the UP section, visible by the stereo camera, is the calculation of its center line and the detection of the relative position of the AUV and UP in the camera coordinate system. The article proposes a recognition method based on the selection of visible UP boundaries (contours) on vectorized images of a stereopair. At the stage of vectorization, noise is eliminated, illumination is equalized, and the image is processed using the Canny method to obtain a binary image. The construction of UP contours is performed using the algorithm proposed by the authors, which is a modification of the Hough method. The main feature of the proposed algorithm is a relatively high performance due to a multiple reduction in the amount of information being processed. Reducing the volume of processed data is done by pre-sorting the line segments in the vectorized image, and by optimizing the computational scheme in the algorithm. The experiments also showed that the algorithm can detect the visible boundaries of the UP on blurry, non-contrasting images. The algorithmic basis of the method is described in detail, including: — search and construction of the most reliable UP boundaries using the method of the integral contribution of the line segments to the line formation; generation and selection of point features belonging to the surface of the UP (due to the constructed contours); calculation of the 3D direction of the center line; calculation of the center line of the visible section of UP; —calculation of the AUV position parameters relative to the UP required for the AUV control system. The centerline calculation is performed using the least squares method using point features belonging to the surface of the UP. The performed computational experiments on virtual scenes using the real texture of the seabed confirm the operability of the implemented approach and the possibility of its application for the inspection of underwater infrastructure.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"301 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experience in Integrating Regional Research and Education Networks to the National Research Computer Network of Russia on the Example of the ROKSON Network 以 ROKSON 网络为例将地区研究和教育网络整合到俄罗斯国家研究计算机网络的经验
Pub Date : 2023-12-20 DOI: 10.17587/it.29.615-621
A. Abramov, A. Gonchar, A. V. Evseev, B. M. Shabanov
The paper is devoted to the issues of organizing the interaction of the new generation National Research Computer Network (NIKS) with individual Russian regional research and education telecommunications networks in the course of the development of NIKS within the framework of the national project "Science and Universities". A brief excursion into the history of the creation and development of academic networks within the territory of St. Petersburg is given. The main attention is paid to the organizational, methodological and technical aspects of the implementation of activities for the integration of the Regional Unified Computer Network for Education and Science of St. Petersburg (ROKSON) into NIKS.
本文专门讨论了在国家 "科学与大学 "项目框架内开发新一代国家研究计算机网络(NIKS)的过程中,如何组织新一代国家研究计算机网络(NIKS)与俄罗斯各地区研究和教育电信网络之间的互动问题。本文简要介绍了圣彼得堡学术网络的创建和发展历史。主要关注圣彼得堡地区教育和科学统一计算机网络(ROKSON)并入 NIKS 的组织、方法和技术方面的实施活动。
{"title":"Experience in Integrating Regional Research and Education Networks to the National Research Computer Network of Russia on the Example of the ROKSON Network","authors":"A. Abramov, A. Gonchar, A. V. Evseev, B. M. Shabanov","doi":"10.17587/it.29.615-621","DOIUrl":"https://doi.org/10.17587/it.29.615-621","url":null,"abstract":"The paper is devoted to the issues of organizing the interaction of the new generation National Research Computer Network (NIKS) with individual Russian regional research and education telecommunications networks in the course of the development of NIKS within the framework of the national project \"Science and Universities\". A brief excursion into the history of the creation and development of academic networks within the territory of St. Petersburg is given. The main attention is paid to the organizational, methodological and technical aspects of the implementation of activities for the integration of the Regional Unified Computer Network for Education and Science of St. Petersburg (ROKSON) into NIKS.","PeriodicalId":504905,"journal":{"name":"Informacionnye Tehnologii","volume":"20 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139168359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Informacionnye Tehnologii
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1