V. Volkov, Kulvits Kulvits, A. Kovalenko, Vladimir Salukhov
The paper deals with issues related to optimizing the ballistic structure of a satellite system for remote sensing of the Earth. Approaches to the ballistic design of the satellite system, previously developed by specialists from various scientific schools, were focused on maintaining the structural stability of the system by deploying groupings with the same geometry and with the same inclinations, which ensured the same age-old departures of elements from all the orbits. At the same time, there is a whole range of tasks that require the formation of a satellite system in different orbits. To achieve the required level of stability of a new cluster of orbital structures we provide an approach, including: heuristic formation of many target different height orbits; identifying some basic near-circular orbit; selection of possible variants of iterative quasi-synchronous orbits; coordination of the composition of the vector of characteristics of traffic conditions and final calculation of an acceptable option that provides the specified accuracy of the route closure cycle. Testing of the proposed approach is carried out on the example of determining the parameters of orbits that ensures equality of effective days in a given range of heights. The method of selecting the degree of consideration of various physical factors of the space environment, which ensures the achievement of identical deviations of the forecast trajectory from the reference one, is presented. The characteristics of the mathematical model of quasi-synchronous orbit motion used in forecasting are calculated from the condition of stability at a given time interval. To get the appropriate estimates, we use corrections to the orbit parameters given from the Greenwich coordinate system. A detailed algorithm is described that provides the possibility of unambiguously determining the characteristics of a stable structure, in the implementation of which the transition from the solution of a normal system of equations to the solution of two triangular systems is performed. The analysis of the subject area has shown that the proposed approach is new, and the solved scientific problem belongs to the class of inverse problems of space cybernetics.
{"title":"Applied Aspects of Optimization of Orbital Structures of Satellite Systems by Specifying Parameters of Orbital Motion","authors":"V. Volkov, Kulvits Kulvits, A. Kovalenko, Vladimir Salukhov","doi":"10.15622/sp.2020.19.4.1","DOIUrl":"https://doi.org/10.15622/sp.2020.19.4.1","url":null,"abstract":"The paper deals with issues related to optimizing the ballistic structure of a satellite system for remote sensing of the Earth. Approaches to the ballistic design of the satellite system, previously developed by specialists from various scientific schools, were focused on maintaining the structural stability of the system by deploying groupings with the same geometry and with the same inclinations, which ensured the same age-old departures of elements from all the orbits. At the same time, there is a whole range of tasks that require the formation of a satellite system in different orbits. To achieve the required level of stability of a new cluster of orbital structures we provide an approach, including: heuristic formation of many target different height orbits; identifying some basic near-circular orbit; selection of possible variants of iterative quasi-synchronous orbits; coordination of the composition of the vector of characteristics of traffic conditions and final calculation of an acceptable option that provides the specified accuracy of the route closure cycle. \u0000Testing of the proposed approach is carried out on the example of determining the parameters of orbits that ensures equality of effective days in a given range of heights. The method of selecting the degree of consideration of various physical factors of the space environment, which ensures the achievement of identical deviations of the forecast trajectory from the reference one, is presented. The characteristics of the mathematical model of quasi-synchronous orbit motion used in forecasting are calculated from the condition of stability at a given time interval. To get the appropriate estimates, we use corrections to the orbit parameters given from the Greenwich coordinate system. \u0000A detailed algorithm is described that provides the possibility of unambiguously determining the characteristics of a stable structure, in the implementation of which the transition from the solution of a normal system of equations to the solution of two triangular systems is performed. \u0000The analysis of the subject area has shown that the proposed approach is new, and the solved scientific problem belongs to the class of inverse problems of space cybernetics.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88100114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reliability, survivability, and stability analysis tasks are typical not only for telecommunications, but also for systems whose components are subject to one or more types of failures, such as transport, power, mechanical systems, integrated circuits, and even software. The logical approach involves the decomposition of the system into a number of small functional elements, and within telecommunications networks they are usually separate network devices (switches, routers, terminals, etc.), as well as communication lines between them (copper-core, fiber-optic, coaxial cables, wireless media, and other transmission media). Functional relationships also define logical relationships between the failures of individual elements and the failure of the network as a whole. The assumption is also used that device failures are relatively less likely than communication line failures, which implies using the assumption of absolute stability (reliability, survivability) of these devices. Model of a telecommunication network in the form of the generalized model of Erdos–Renyi is presented. In the context of the stability of the telecommunications network, the analyzed property is understood as the connectivity of the network in one form or another. Based on the concept of stochastic connectivity of a network, as the correspondence of a random graph of the connectivity property between a given set of vertices, three connectivity measures are traditionally distinguished: two-pole, multi-pole, and all-pole. The procedures for forming an arbitrary structure of sets of paths and trees for networks are presented, as well as their generalization of multipolar trees. It is noted that multipolar trees are the most common concept of relatively simple chains and spanning trees. Solving such problems will allow us to proceed to calculating the probability of connectivity of graphs for various connectivity measures.
{"title":"Methods for Formation of Telecommunication Network States Sets for Different Measures of Connectivity","authors":"A. Batenkov, K. Batenkov, A. Fokin","doi":"10.15622/sp.2020.19.3.7","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.7","url":null,"abstract":"Reliability, survivability, and stability analysis tasks are typical not only for telecommunications, but also for systems whose components are subject to one or more types of failures, such as transport, power, mechanical systems, integrated circuits, and even software. The logical approach involves the decomposition of the system into a number of small functional elements, and within telecommunications networks they are usually separate network devices (switches, routers, terminals, etc.), as well as communication lines between them (copper-core, fiber-optic, coaxial cables, wireless media, and other transmission media). Functional relationships also define logical relationships between the failures of individual elements and the failure of the network as a whole. The assumption is also used that device failures are relatively less likely than communication line failures, which implies using the assumption of absolute stability (reliability, survivability) of these devices. Model of a telecommunication network in the form of the generalized model of Erdos–Renyi is presented. In the context of the stability of the telecommunications network, the analyzed property is understood as the connectivity of the network in one form or another. Based on the concept of stochastic connectivity of a network, as the correspondence of a random graph of the connectivity property between a given set of vertices, three connectivity measures are traditionally distinguished: two-pole, multi-pole, and all-pole. The procedures for forming an arbitrary structure of sets of paths and trees for networks are presented, as well as their generalization of multipolar trees. It is noted that multipolar trees are the most common concept of relatively simple chains and spanning trees. Solving such problems will allow us to proceed to calculating the probability of connectivity of graphs for various connectivity measures.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89607095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper considers the problems of developing recommendations in the area of fiscal and trade policies to counter economic sanctions at the level of both individual countries subject to such sanctions and at the level of economic union including such countries. Research study has been carried out based on the developed dynamic multi-sectoral and multi-country computable general equilibrium model, which describes the functioning of the economies of nine regions of the planet, including five countries of the Eurasian Economic Union (EAEU). The initial data of the model contain built sets of consistent social account matrices (SAMs) for the historical and forecast periods based on data from the Global Trade Analysis Project (GTAP) database, national input-output tables, international trade and IMF data (including forecast) for the main macroeconomic regions indicators. Results of the impact on macroeconomic and sectoral indicators of the EAEU countries and other regions of a hypothetical scenario providing the imposition of additional economic sanctions since 2019 against Russia from some regions were obtained. An approach to solving problems to counter the sanctions policy based on the parametric control theory by setting and solving a number of dynamic optimization problems to determine optimal values of the corresponding fiscal and trade policy instruments at the level of individual EAEU countries and the EAEU as a whole was proposed. The results of the model-based calculations were tested for the possibility of practical application using three approaches, including evaluation mappings’ stability of the exogenous parameters’ values of a calibrated model to the values of its endogenous variables. The results demonstrate greater efficiency for each EAEU country using a coordinated economic policy to counter sanctions, compared with the implementation of such policy separately at the level of each country.
{"title":"Mathematical Modeling of Optimal Measures to Counter Economic Sanctions","authors":"A. Ashimov, Y. Borovskiy, M. Onalbekov","doi":"10.15622/sp.2020.19.3.2","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.2","url":null,"abstract":"The paper considers the problems of developing recommendations in the area of fiscal and trade policies to counter economic sanctions at the level of both individual countries subject to such sanctions and at the level of economic union including such countries. Research study has been carried out based on the developed dynamic multi-sectoral and multi-country computable general equilibrium model, which describes the functioning of the economies of nine regions of the planet, including five countries of the Eurasian Economic Union (EAEU). The initial data of the model contain built sets of consistent social account matrices (SAMs) for the historical and forecast periods based on data from the Global Trade Analysis Project (GTAP) database, national input-output tables, international trade and IMF data (including forecast) for the main macroeconomic regions indicators. Results of the impact on macroeconomic and sectoral indicators of the EAEU countries and other regions of a hypothetical scenario providing the imposition of additional economic sanctions since 2019 against Russia from some regions were obtained. An approach to solving problems to counter the sanctions policy based on the parametric control theory by setting and solving a number of dynamic optimization problems to determine optimal values of the corresponding fiscal and trade policy instruments at the level of individual EAEU countries and the EAEU as a whole was proposed. \u0000The results of the model-based calculations were tested for the possibility of practical application using three approaches, including evaluation mappings’ stability of the exogenous parameters’ values of a calibrated model to the values of its endogenous variables. The results demonstrate greater efficiency for each EAEU country using a coordinated economic policy to counter sanctions, compared with the implementation of such policy separately at the level of each country.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"935 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77061437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background. It is convenient to describe such systems using state-transition models utilizing special language tools, both graphical and textual. Methodology for automated development of systems with complex behavior using the designed CIAO language (Cooperative Interaction of Automata Objects), which allows formally specifying the required behavior based on an informal description of the reacting system, is presented. An informal description of a reacting system can be provided verbally in a natural language or in another way adopted in a specific domain. Further, according to this specification in the CIAO language, a software system for interacting automata in the C++ programming language is generated with a special system. The generated program implements a behavior guaranteed to correspond to a given specification and original informal description. CIAO provides both graphical and textual notation. Graphic notation is based on an extended notation of state machine diagrams and component diagrams of the unified modeling language UML, which are well established in describing the behavior of event-driven systems. The text syntax of the CIAO language is described by context-free grammar in regular form. Automatically generated C++ code allows using of both library and any external functions written manually. At the same time, the evident correspondence of the formal specification and the generated code is preserved on conditions that the external functions conform to their specifications. As an example, an original solution to D. Knut's problem of a responsive elevator control system is proposed. The effectiveness of the proposed methodology is demonstrated, since the automaton-converter generating the C++ code is presented as a responsive system, is specified in the CIAO language and implemented by the bootstrapping. The proposed methodology is compared with other well-known formal methods for describing systems with complex behavior.
{"title":"Methodology for Development of Event-driven Software Systems using CIAO Specification Language","authors":"I. Afanasieva, F. Novikov, L. Fedorchenko","doi":"10.15622/sp.2020.19.3.1","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.1","url":null,"abstract":"Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background. \u0000It is convenient to describe such systems using state-transition models utilizing special language tools, both graphical and textual. Methodology for automated development of systems with complex behavior using the designed CIAO language (Cooperative Interaction of Automata Objects), which allows formally specifying the required behavior based on an informal description of the reacting system, is presented. \u0000An informal description of a reacting system can be provided verbally in a natural language or in another way adopted in a specific domain. Further, according to this specification in the CIAO language, a software system for interacting automata in the C++ programming language is generated with a special system. \u0000The generated program implements a behavior guaranteed to correspond to a given specification and original informal description. CIAO provides both graphical and textual notation. Graphic notation is based on an extended notation of state machine diagrams and component diagrams of the unified modeling language UML, which are well established in describing the behavior of event-driven systems. \u0000The text syntax of the CIAO language is described by context-free grammar in regular form. Automatically generated C++ code allows using of both library and any external functions written manually. \u0000At the same time, the evident correspondence of the formal specification and the generated code is preserved on conditions that the external functions conform to their specifications. \u0000As an example, an original solution to D. Knut's problem of a responsive elevator control system is proposed. The effectiveness of the proposed methodology is demonstrated, since the automaton-converter generating the C++ code is presented as a responsive system, is specified in the CIAO language and implemented by the bootstrapping. The proposed methodology is compared with other well-known formal methods for describing systems with complex behavior.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81238145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Property security management is a crucial problem in keeping tangible and intangible assets safe. Its solution using technical means and mobile detention groups ensures assets preservation and reduces security activities risk. Classical definition of a risk, which relates the probability of damage to the protected object to the amount of damage, is proposed to use. For determining the probability, an assumption, where only arrival time of the detention group at secured facility is recorded by the alarm signal, is introduced. In order to minimize the total risk of security activities the task of finding the location of the detention group on the ground with dispersed objects is formulated. As a solution to the formulated problem, a search for the location of the detention groups which takes into account the magnitude of the damage and the current coordinates of the object on the plane is proposed. Examples of calculating locations of detention groups on the plane are presented. An objective function Ф of the effectiveness of security activities implementation, linking the financial and economic indicators of security organization with the value of security activities risk is introduced and substantiated. The analysis of function Φ behavior with a change in the number of detention groups is shown, the presence of function extremum is shown, the interval of finding the extremum is determined. It is proposed to calculate the distances between objects on a map and to use it to determine the coordinates in a new auxiliary plane. Coordinates are calculated using Gram matrices. A computational example is presented. A step-by-step algorithm for secured facility allocation between detention groups with minimization of the total risk of security activities is developed; an example of its use is presented. A search procedure for the location of the detention group on the ground by the determined coordinates on the plane is defined; a search process is illustrated. A general location search algorithm is proposed and the results are presented.
{"title":"Automated Search for Locations of Detention Groups to Reduce Security Activity Risk","authors":"O. Pyankov, Dmitry O. Smyshnikov","doi":"10.15622/sp.2020.19.3.5","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.5","url":null,"abstract":"Property security management is a crucial problem in keeping tangible and intangible assets safe. Its solution using technical means and mobile detention groups ensures assets preservation and reduces security activities risk. Classical definition of a risk, which relates the probability of damage to the protected object to the amount of damage, is proposed to use. For determining the probability, an assumption, where only arrival time of the detention group at secured facility is recorded by the alarm signal, is introduced. \u0000In order to minimize the total risk of security activities the task of finding the location of the detention group on the ground with dispersed objects is formulated. As a solution to the formulated problem, a search for the location of the detention groups which takes into account the magnitude of the damage and the current coordinates of the object on the plane is proposed. Examples of calculating locations of detention groups on the plane are presented. \u0000An objective function Ф of the effectiveness of security activities implementation, linking the financial and economic indicators of security organization with the value of security activities risk is introduced and substantiated. The analysis of function Φ behavior with a change in the number of detention groups is shown, the presence of function extremum is shown, the interval of finding the extremum is determined. \u0000It is proposed to calculate the distances between objects on a map and to use it to determine the coordinates in a new auxiliary plane. Coordinates are calculated using Gram matrices. A computational example is presented. \u0000A step-by-step algorithm for secured facility allocation between detention groups with minimization of the total risk of security activities is developed; an example of its use is presented. \u0000A search procedure for the location of the detention group on the ground by the determined coordinates on the plane is defined; a search process is illustrated. A general location search algorithm is proposed and the results are presented.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"147 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87101803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle. The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique. Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.
{"title":"Complex of Models for Network Security Assessment of Industrial Automated Control Systems","authors":"R. Fatkieva","doi":"10.15622/sp.2020.19.3.6","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.6","url":null,"abstract":"The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle. \u0000The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique. \u0000Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81921971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Sazonov, M. Tatarka, A. Tsyganov, Vitaliy Bessolcev
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
{"title":"Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems","authors":"K. Sazonov, M. Tatarka, A. Tsyganov, Vitaliy Bessolcev","doi":"10.15622/sp.2020.19.2.8","DOIUrl":"https://doi.org/10.15622/sp.2020.19.2.8","url":null,"abstract":"One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. \u0000The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. \u0000The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. \u0000The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. \u0000Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. \u0000In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. \u0000Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72965382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered. An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services. A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.
{"title":"Method for Evaluating Security of Cloud IT-Components based on Estandards Criteria","authors":"I. Livshitz","doi":"10.15622/sp.2020.19.2.6","DOIUrl":"https://doi.org/10.15622/sp.2020.19.2.6","url":null,"abstract":"The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered. \u0000An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services. \u0000A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73575581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents an approach to the analysis of the modulation spectrum of a voice signal, in which the primary acoustic analysis is performed in bands of unequal width. Nonuniform analysis corresponds to the psychoacoustic laws of human perception of sound information. In the context of the analysis of the modulation spectrum, the considered approach can significantly reduce the resulting number of parameters, which greatly simplifies the task of detecting pathological changes in the voice signal based on the analysis of the parameters of the modulation spectrum. For frequency decomposition of a signal into bands of unequal width, two methods are considered: 1) DFT with channel combination and 2) the use of an nonuniform filter bank. The first method is characterized by a fixed time window for the analysis of all frequency components, while in the second method the time-frequency analysis plan is consistent with the critical frequency scale of the barks. For each method, a practical signal analysis circuit has been developed and described. The paper presents the experimental data on the application of the developed schemes for the analysis of the modulation spectrum to the problem of detecting pathology in a speech signal. The parameters of the modulation spectrum acted as information signs for a classifier built on the basis of linear discriminant analysis. Three different voice bases were used in the experiment (in two cases, the pathology was neurological ALS disease (amyotrophic lateral sclerosis), and in the third case, diseases of the larynx). The parameters of the modulation spectrum obtained in the DFT-based scheme with channel combining turned out to be more preferable for classification with a small number of features, however, greater accuracy (with an increase in the number of features) made it possible to obtain the parameters obtainedin the scheme based on an unequal filter bank. In all cases, the obtained classifiers were highly accurate (more than 97%). The obtained results show that the use of nonuniform time-frequency representation is preferable in the case when the analyzed signal is a sustained vowel phonation, since it provides higher accuracy of pathology detection using fewer modulation parameters
{"title":"Voice Pathology Detection based on Analysis of Modulation Spectrum in Critical Bands","authors":"M. Vashkevich, I. Azarov","doi":"10.15622/sp.2020.19.2.1","DOIUrl":"https://doi.org/10.15622/sp.2020.19.2.1","url":null,"abstract":"The paper presents an approach to the analysis of the modulation spectrum of a voice signal, in which the primary acoustic analysis is performed in bands of unequal width. Nonuniform analysis corresponds to the psychoacoustic laws of human perception of sound information. In the context of the analysis of the modulation spectrum, the considered approach can significantly reduce the resulting number of parameters, which greatly simplifies the task of detecting pathological changes in the voice signal based on the analysis of the parameters of the modulation spectrum. For frequency decomposition of a signal into bands of unequal width, two methods are considered: 1) DFT with channel combination and 2) the use of an nonuniform filter bank. The first method is characterized by a fixed time window for the analysis of all frequency components, while in the second method the time-frequency analysis plan is consistent with the critical frequency scale of the barks. For each method, a practical signal analysis circuit has been developed and described. The paper presents the experimental data on the application of the developed schemes for the analysis of the modulation spectrum to the problem of detecting pathology in a speech signal. The parameters of the modulation spectrum acted as information signs for a classifier built on the basis of linear discriminant analysis. Three different voice bases were used in the experiment (in two cases, the pathology was neurological ALS disease (amyotrophic lateral sclerosis), and in the third case, diseases of the larynx). The parameters of the modulation spectrum obtained in the DFT-based scheme with channel combining turned out to be more preferable for classification with a small number of features, however, greater accuracy (with an increase in the number of features) made it possible to obtain the parameters obtainedin the scheme based on an unequal filter bank. In all cases, the obtained classifiers were highly accurate (more than 97%). The obtained results show that the use of nonuniform time-frequency representation is preferable in the case when the analyzed signal is a sustained vowel phonation, since it provides higher accuracy of pathology detection using fewer modulation parameters","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"84 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90641551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-13DOI: 10.15622/10.15622/sp.2020.19.1.2
M. Medvedev, V. Kostjukov, V. Pshikhopov
The paper considers the problem of planning a mobile robot movement in a conflict environment, which is characterized by the presence of areas that impede the robot to complete the tasks. The main results of path planning in the conflict environment are considered. Special attention is paid to the approaches based on the risk functions and probabilistic methods. The conflict areas, which are formed by point sources that create in the general case asymmetric fields of a continuous type, are observed. A probabilistic description of such fields is proposed, examples of which are the probability of detection or defeat of a mobile robot. As a field description, the concept of characteristic probability function of the source is introduced; which allows us to optimize the movement of the robot in the conflict environment. The connection between the characteristic probability function of the source and the risk function, which can be used to formulate and solve simplified optimization problems, is demonstrated. The algorithm for mobile robot path planning that ensures the given probability of passing the conflict environment is being developed. An upper bound for the probability of the given environment passing under fixed boundary conditions is obtained. A procedure for optimizing the robot path in the conflict environment is proposed, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. A procedure is proposed for optimizing the robot path in the conflict environment, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. The proposed algorithms are implemented in the form of a software simulator for a group of ground-based robots and are studied by numerical simulation methods.
{"title":"Optimization of mobile robot movement on a plane with finite number of repeller sources","authors":"M. Medvedev, V. Kostjukov, V. Pshikhopov","doi":"10.15622/10.15622/sp.2020.19.1.2","DOIUrl":"https://doi.org/10.15622/10.15622/sp.2020.19.1.2","url":null,"abstract":"The paper considers the problem of planning a mobile robot movement in a conflict environment, which is characterized by the presence of areas that impede the robot to complete the tasks. The main results of path planning in the conflict environment are considered. Special attention is paid to the approaches based on the risk functions and probabilistic methods. The conflict areas, which are formed by point sources that create in the general case asymmetric fields of a continuous type, are observed. A probabilistic description of such fields is proposed, examples of which are the probability of detection or defeat of a mobile robot. As a field description, the concept of characteristic probability function of the source is introduced; which allows us to optimize the movement of the robot in the conflict environment. The connection between the characteristic probability function of the source and the risk function, which can be used to formulate and solve simplified optimization problems, is demonstrated. The algorithm for mobile robot path planning that ensures the given probability of passing the conflict environment is being developed. An upper bound for the probability of the given environment passing under fixed boundary conditions is obtained. A procedure for optimizing the robot path in the conflict environment is proposed, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. A procedure is proposed for optimizing the robot path in the conflict environment, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. The proposed algorithms are implemented in the form of a software simulator for a group of ground-based robots and are studied by numerical simulation methods.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85656580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}