首页 > 最新文献

SPIIRAS Proceedings最新文献

英文 中文
Applied Aspects of Optimization of Orbital Structures of Satellite Systems by Specifying Parameters of Orbital Motion 确定轨道运动参数优化卫星系统轨道结构的应用研究
Q3 Mathematics Pub Date : 2020-09-07 DOI: 10.15622/sp.2020.19.4.1
V. Volkov, Kulvits Kulvits, A. Kovalenko, Vladimir Salukhov
The paper deals with issues related to optimizing the ballistic structure of a satellite system for remote sensing of the Earth. Approaches to the ballistic design of the satellite system, previously developed by specialists from various scientific schools, were focused on maintaining the structural stability of the system by deploying groupings with the same geometry and with the same inclinations, which ensured the same age-old departures of elements from all the orbits. At the same time, there is a whole range of tasks that require the formation of a satellite system in different orbits. To achieve the required level of stability of a new cluster of orbital structures we provide an approach, including: heuristic formation of many target different height orbits; identifying some basic near-circular orbit; selection of possible variants of iterative quasi-synchronous orbits; coordination of the composition of the vector of characteristics of traffic conditions and final calculation of an acceptable option that provides the specified accuracy of the route closure cycle. Testing of the proposed approach is carried out on the example of determining the parameters of orbits that ensures equality of effective days in a given range of heights. The method of selecting the degree of consideration of various physical factors of the space environment, which ensures the achievement of identical deviations of the forecast trajectory from the reference one, is presented. The characteristics of the mathematical model of quasi-synchronous orbit motion used in forecasting are calculated from the condition of stability at a given time interval. To get the appropriate estimates, we use corrections to the orbit parameters given from the Greenwich coordinate system. A detailed algorithm is described that provides the possibility of unambiguously determining the characteristics of a stable structure, in the implementation of which the transition from the solution of a normal system of equations to the solution of two triangular systems is performed. The analysis of the subject area has shown that the proposed approach is new, and the solved scientific problem belongs to the class of inverse problems of space cybernetics.
本文研究了地球遥感卫星系统弹道结构的优化问题。卫星系统的弹道设计方法以前是由各个科学流派的专家开发的,其重点是通过部署具有相同几何形状和相同倾角的组合来保持系统的结构稳定性,从而确保所有轨道上的元素都保持相同的古老偏离。与此同时,还有一系列任务需要在不同轨道上形成卫星系统。为了达到新的轨道结构簇所需的稳定性水平,我们提供了一种方法,包括:启发式形成许多目标不同高度的轨道;确定一些基本的近圆轨道;迭代准同步轨道可能变型的选择协调交通状况特征向量的组成,并最终计算出可接受的选项,从而提供指定的路线关闭周期的准确性。以确定轨道参数以保证给定高度范围内有效天数相等为例,对所提出的方法进行了验证。提出了如何选择对空间环境各种物理因素的考虑程度,以保证预测轨迹与参考轨迹偏差一致的方法。从准同步轨道运动在给定时间间隔内的稳定性条件出发,计算了用于预报的准同步轨道运动数学模型的特性。为了得到适当的估计,我们对从格林尼治坐标系给出的轨道参数进行了修正。一种详细的算法被描述,提供了明确地确定稳定结构的特征的可能性,在实现中,从一个正常方程组的解过渡到两个三角形系统的解被执行。对学科领域的分析表明,所提出的方法是新颖的,所解决的科学问题属于空间控制论的逆问题。
{"title":"Applied Aspects of Optimization of Orbital Structures of Satellite Systems by Specifying Parameters of Orbital Motion","authors":"V. Volkov, Kulvits Kulvits, A. Kovalenko, Vladimir Salukhov","doi":"10.15622/sp.2020.19.4.1","DOIUrl":"https://doi.org/10.15622/sp.2020.19.4.1","url":null,"abstract":"The paper deals with issues related to optimizing the ballistic structure of a satellite system for remote sensing of the Earth. Approaches to the ballistic design of the satellite system, previously developed by specialists from various scientific schools, were focused on maintaining the structural stability of the system by deploying groupings with the same geometry and with the same inclinations, which ensured the same age-old departures of elements from all the orbits. At the same time, there is a whole range of tasks that require the formation of a satellite system in different orbits. To achieve the required level of stability of a new cluster of orbital structures we provide an approach, including: heuristic formation of many target different height orbits; identifying some basic near-circular orbit; selection of possible variants of iterative quasi-synchronous orbits; coordination of the composition of the vector of characteristics of traffic conditions and final calculation of an acceptable option that provides the specified accuracy of the route closure cycle. \u0000Testing of the proposed approach is carried out on the example of determining the parameters of orbits that ensures equality of effective days in a given range of heights. The method of selecting the degree of consideration of various physical factors of the space environment, which ensures the achievement of identical deviations of the forecast trajectory from the reference one, is presented. The characteristics of the mathematical model of quasi-synchronous orbit motion used in forecasting are calculated from the condition of stability at a given time interval. To get the appropriate estimates, we use corrections to the orbit parameters given from the Greenwich coordinate system. \u0000A detailed algorithm is described that provides the possibility of unambiguously determining the characteristics of a stable structure, in the implementation of which the transition from the solution of a normal system of equations to the solution of two triangular systems is performed. \u0000The analysis of the subject area has shown that the proposed approach is new, and the solved scientific problem belongs to the class of inverse problems of space cybernetics.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88100114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods for Formation of Telecommunication Network States Sets for Different Measures of Connectivity 不同连通性条件下电信网状态集的形成方法
Q3 Mathematics Pub Date : 2020-06-01 DOI: 10.15622/sp.2020.19.3.7
A. Batenkov, K. Batenkov, A. Fokin
Reliability, survivability, and stability analysis tasks are typical not only for telecommunications, but also for systems whose components are subject to one or more types of failures, such as transport, power, mechanical systems, integrated circuits, and even software. The logical approach involves the decomposition of the system into a number of small functional elements, and within telecommunications networks they are usually separate network devices (switches, routers, terminals, etc.), as well as communication lines between them (copper-core, fiber-optic, coaxial cables, wireless media, and other transmission media). Functional relationships also define logical relationships between the failures of individual elements and the failure of the network as a whole. The assumption is also used that device failures are relatively less likely than communication line failures, which implies using the assumption of absolute stability (reliability, survivability) of these devices. Model of a telecommunication network in the form of the generalized model of Erdos–Renyi is presented. In the context of the stability of the telecommunications network, the analyzed property is understood as the connectivity of the network in one form or another. Based on the concept of stochastic connectivity of a network, as the correspondence of a random graph of the connectivity property between a given set of vertices, three connectivity measures are traditionally distinguished: two-pole, multi-pole, and all-pole. The procedures for forming an arbitrary structure of sets of paths and trees for networks are presented, as well as their generalization of multipolar trees. It is noted that multipolar trees are the most common concept of relatively simple chains and spanning trees. Solving such problems will allow us to proceed to calculating the probability of connectivity of graphs for various connectivity measures.
可靠性、生存性和稳定性分析任务不仅适用于电信,而且适用于其组件受到一种或多种故障类型影响的系统,例如运输、电力、机械系统、集成电路,甚至软件。逻辑方法包括将系统分解为许多小的功能元素,在电信网络中,它们通常是独立的网络设备(交换机、路由器、终端等),以及它们之间的通信线路(铜芯、光纤、同轴电缆、无线媒体和其他传输媒体)。功能关系还定义了单个元素失效与整个网络失效之间的逻辑关系。还使用了这样的假设,即设备故障比通信线路故障的可能性相对较小,这意味着使用这些设备的绝对稳定性(可靠性、生存性)的假设。提出了一种基于Erdos-Renyi广义模型的电信网络模型。在电信网络稳定性的背景下,所分析的属性被理解为网络以一种或另一种形式的连通性。基于网络的随机连通性的概念,作为给定顶点集之间的连通性的随机图的对应关系,传统上区分了三种连通性度量:两极、多极和全极。给出了形成网络路径集和树的任意结构的步骤,以及它们对多极树的推广。值得注意的是,多极树是相对简单链和生成树的最常见概念。解决这些问题将使我们能够继续计算各种连通性度量图的连通性概率。
{"title":"Methods for Formation of Telecommunication Network States Sets for Different Measures of Connectivity","authors":"A. Batenkov, K. Batenkov, A. Fokin","doi":"10.15622/sp.2020.19.3.7","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.7","url":null,"abstract":"Reliability, survivability, and stability analysis tasks are typical not only for telecommunications, but also for systems whose components are subject to one or more types of failures, such as transport, power, mechanical systems, integrated circuits, and even software. The logical approach involves the decomposition of the system into a number of small functional elements, and within telecommunications networks they are usually separate network devices (switches, routers, terminals, etc.), as well as communication lines between them (copper-core, fiber-optic, coaxial cables, wireless media, and other transmission media). Functional relationships also define logical relationships between the failures of individual elements and the failure of the network as a whole. The assumption is also used that device failures are relatively less likely than communication line failures, which implies using the assumption of absolute stability (reliability, survivability) of these devices. Model of a telecommunication network in the form of the generalized model of Erdos–Renyi is presented. In the context of the stability of the telecommunications network, the analyzed property is understood as the connectivity of the network in one form or another. Based on the concept of stochastic connectivity of a network, as the correspondence of a random graph of the connectivity property between a given set of vertices, three connectivity measures are traditionally distinguished: two-pole, multi-pole, and all-pole. The procedures for forming an arbitrary structure of sets of paths and trees for networks are presented, as well as their generalization of multipolar trees. It is noted that multipolar trees are the most common concept of relatively simple chains and spanning trees. Solving such problems will allow us to proceed to calculating the probability of connectivity of graphs for various connectivity measures.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89607095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical Modeling of Optimal Measures to Counter Economic Sanctions 应对经济制裁最优措施的数学建模
Q3 Mathematics Pub Date : 2020-06-01 DOI: 10.15622/sp.2020.19.3.2
A. Ashimov, Y. Borovskiy, M. Onalbekov
The paper considers the problems of developing recommendations in the area of fiscal and trade policies to counter economic sanctions at the level of both individual countries subject to such sanctions and at the level of economic union including such countries. Research study has been carried out based on the developed dynamic multi-sectoral and multi-country computable general equilibrium model, which describes the functioning of the economies of nine regions of the planet, including five countries of the Eurasian Economic Union (EAEU). The initial data of the model contain built sets of consistent social account matrices (SAMs) for the historical and forecast periods based on data from the Global Trade Analysis Project (GTAP) database, national input-output tables, international trade and IMF data (including forecast) for the main macroeconomic regions indicators. Results of the impact on macroeconomic and sectoral indicators of the EAEU countries and other regions of a hypothetical scenario providing the imposition of additional economic sanctions since 2019 against Russia from some regions were obtained. An approach to solving problems to counter the sanctions policy based on the parametric control theory by setting and solving a number of dynamic optimization problems to determine optimal values of the corresponding fiscal and trade policy instruments at the level of individual EAEU countries and the EAEU as a whole was proposed. The results of the model-based calculations were tested for the possibility of practical application using three approaches, including evaluation mappings’ stability of the exogenous parameters’ values of a calibrated model to the values of its endogenous variables. The results demonstrate greater efficiency for each EAEU country using a coordinated economic policy to counter sanctions, compared with the implementation of such policy separately at the level of each country.
本文考虑了在财政和贸易政策领域制定建议的问题,以便在受这种制裁的个别国家一级和在包括这些国家在内的经济联盟一级对抗经济制裁。基于已开发的动态多部门和多国可计算一般均衡模型进行了研究,该模型描述了地球上九个地区的经济运作,其中包括欧亚经济联盟(EAEU)的五个国家。该模型的初始数据包含基于全球贸易分析项目(GTAP)数据库、国家投入产出表、国际贸易和国际货币基金组织数据(包括预测)的主要宏观经济区域指标的数据,为历史和预测期间建立的一致社会账户矩阵(sam)集。获得了假设自2019年以来一些地区对俄罗斯实施额外经济制裁的情景对欧亚经济联盟国家和其他地区宏观经济和部门指标的影响结果。提出了一种基于参数控制理论的反制裁问题的解决方法,通过设置和求解多个动态优化问题,在欧亚经济联盟成员国和欧亚经济联盟整体层面确定相应的财政和贸易政策工具的最优值。使用三种方法对基于模型的计算结果进行了实际应用的可能性测试,包括将校准模型的“外生参数的稳定性”值评估映射到其内生变量的值。结果表明,与在每个国家层面单独实施这种政策相比,每个欧亚经济联盟国家使用协调的经济政策来对抗制裁的效率更高。
{"title":"Mathematical Modeling of Optimal Measures to Counter Economic Sanctions","authors":"A. Ashimov, Y. Borovskiy, M. Onalbekov","doi":"10.15622/sp.2020.19.3.2","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.2","url":null,"abstract":"The paper considers the problems of developing recommendations in the area of fiscal and trade policies to counter economic sanctions at the level of both individual countries subject to such sanctions and at the level of economic union including such countries. Research study has been carried out based on the developed dynamic multi-sectoral and multi-country computable general equilibrium model, which describes the functioning of the economies of nine regions of the planet, including five countries of the Eurasian Economic Union (EAEU). The initial data of the model contain built sets of consistent social account matrices (SAMs) for the historical and forecast periods based on data from the Global Trade Analysis Project (GTAP) database, national input-output tables, international trade and IMF data (including forecast) for the main macroeconomic regions indicators. Results of the impact on macroeconomic and sectoral indicators of the EAEU countries and other regions of a hypothetical scenario providing the imposition of additional economic sanctions since 2019 against Russia from some regions were obtained. An approach to solving problems to counter the sanctions policy based on the parametric control theory by setting and solving a number of dynamic optimization problems to determine optimal values of the corresponding fiscal and trade policy instruments at the level of individual EAEU countries and the EAEU as a whole was proposed. \u0000The results of the model-based calculations were tested for the possibility of practical application using three approaches, including evaluation mappings’ stability of the exogenous parameters’ values of a calibrated model to the values of its endogenous variables. The results demonstrate greater efficiency for each EAEU country using a coordinated economic policy to counter sanctions, compared with the implementation of such policy separately at the level of each country.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"935 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77061437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for Development of Event-driven Software Systems using CIAO Specification Language 使用CIAO规范语言开发事件驱动软件系统的方法
Q3 Mathematics Pub Date : 2020-06-01 DOI: 10.15622/sp.2020.19.3.1
I. Afanasieva, F. Novikov, L. Fedorchenko
Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background. It is convenient to describe such systems using state-transition models utilizing special language tools, both graphical and textual. Methodology for automated development of systems with complex behavior using the designed CIAO language (Cooperative Interaction of Automata Objects), which allows formally specifying the required behavior based on an informal description of the reacting system, is presented. An informal description of a reacting system can be provided verbally in a natural language or in another way adopted in a specific domain. Further, according to this specification in the CIAO language, a software system for interacting automata in the C++ programming language is generated with a special system. The generated program implements a behavior guaranteed to correspond to a given specification and original informal description. CIAO provides both graphical and textual notation. Graphic notation is based on an extended notation of state machine diagrams and component diagrams of the unified modeling language UML, which are well established in describing the behavior of event-driven systems. The text syntax of the CIAO language is described by context-free grammar in regular form. Automatically generated C++ code allows using of both library and any external functions written manually. At the same time, the evident correspondence of the formal specification and the generated code is preserved on conditions that the external functions conform to their specifications. As an example, an original solution to D. Knut's problem of a responsive elevator control system is proposed. The effectiveness of the proposed methodology is demonstrated, since the automaton-converter generating the C++ code is presented as a responsive system, is specified in the CIAO language and implemented by the bootstrapping. The proposed methodology is compared with other well-known formal methods for describing systems with complex behavior.
事件驱动的软件系统,在科学文献中属于具有复杂行为的系统,是反应性系统,它们以不同的方式对相同的输入效果作出反应,这取决于它们的状态和背景。利用图形和文本两种特殊的语言工具,使用状态转换模型来描述这样的系统是方便的。提出了使用设计的CIAO语言(自动机对象的协同交互)对具有复杂行为的系统进行自动化开发的方法,该方法允许基于对反应系统的非正式描述正式指定所需的行为。反应系统的非正式描述可以用自然语言口头提供,也可以用特定领域采用的另一种方式提供。在此基础上,根据CIAO语言的规范,用c++编程语言生成了一个用于交互自动机的软件系统。生成的程序实现了保证与给定规范和原始非正式描述相对应的行为。CIAO提供图形和文本表示法。图形表示法是基于统一建模语言UML的状态机图和组件图的扩展表示法,它们在描述事件驱动系统的行为方面建立得很好。CIAO语言的文本语法由规则形式的上下文无关语法描述。自动生成的c++代码允许使用库和手动编写的任何外部函数。同时,在外部函数符合其规范的条件下,形式规范和生成代码的明显对应关系得以保留。作为实例,提出了响应式电梯控制系统D. Knut问题的一种原始解。由于生成c++代码的自动机转换器是一个响应系统,用CIAO语言指定,并通过自举实现,因此证明了所提出方法的有效性。将所提出的方法与其他已知的描述具有复杂行为的系统的形式化方法进行了比较。
{"title":"Methodology for Development of Event-driven Software Systems using CIAO Specification Language","authors":"I. Afanasieva, F. Novikov, L. Fedorchenko","doi":"10.15622/sp.2020.19.3.1","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.1","url":null,"abstract":"Event-driven software systems, belonging to the class of systems with complex behavior in the scientific literature, are reactive systems, which react to the same input effect in different ways depending on their state and background. \u0000It is convenient to describe such systems using state-transition models utilizing special language tools, both graphical and textual. Methodology for automated development of systems with complex behavior using the designed CIAO language (Cooperative Interaction of Automata Objects), which allows formally specifying the required behavior based on an informal description of the reacting system, is presented. \u0000An informal description of a reacting system can be provided verbally in a natural language or in another way adopted in a specific domain. Further, according to this specification in the CIAO language, a software system for interacting automata in the C++ programming language is generated with a special system. \u0000The generated program implements a behavior guaranteed to correspond to a given specification and original informal description. CIAO provides both graphical and textual notation. Graphic notation is based on an extended notation of state machine diagrams and component diagrams of the unified modeling language UML, which are well established in describing the behavior of event-driven systems. \u0000The text syntax of the CIAO language is described by context-free grammar in regular form. Automatically generated C++ code allows using of both library and any external functions written manually. \u0000At the same time, the evident correspondence of the formal specification and the generated code is preserved on conditions that the external functions conform to their specifications. \u0000As an example, an original solution to D. Knut's problem of a responsive elevator control system is proposed. The effectiveness of the proposed methodology is demonstrated, since the automaton-converter generating the C++ code is presented as a responsive system, is specified in the CIAO language and implemented by the bootstrapping. The proposed methodology is compared with other well-known formal methods for describing systems with complex behavior.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81238145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Search for Locations of Detention Groups to Reduce Security Activity Risk 自动搜寻拘留小组的地点,以减少安全活动的风险
Q3 Mathematics Pub Date : 2020-06-01 DOI: 10.15622/sp.2020.19.3.5
O. Pyankov, Dmitry O. Smyshnikov
Property security management is a crucial problem in keeping tangible and intangible assets safe. Its solution using technical means and mobile detention groups ensures assets preservation and reduces security activities risk. Classical definition of a risk, which relates the probability of damage to the protected object to the amount of damage, is proposed to use. For determining the probability, an assumption, where only arrival time of the detention group at secured facility is recorded by the alarm signal, is introduced. In order to minimize the total risk of security activities the task of finding the location of the detention group on the ground with dispersed objects is formulated. As a solution to the formulated problem, a search for the location of the detention groups which takes into account the magnitude of the damage and the current coordinates of the object on the plane is proposed. Examples of calculating locations of detention groups on the plane are presented. An objective function Ф of the effectiveness of security activities implementation, linking the financial and economic indicators of security organization with the value of security activities risk is introduced and substantiated. The analysis of function Φ behavior with a change in the number of detention groups is shown, the presence of function extremum is shown, the interval of finding the extremum is determined. It is proposed to calculate the distances between objects on a map and to use it to determine the coordinates in a new auxiliary plane. Coordinates are calculated using Gram matrices. A computational example is presented. A step-by-step algorithm for secured facility allocation between detention groups with minimization of the total risk of security activities is developed; an example of its use is presented. A search procedure for the location of the detention group on the ground by the determined coordinates on the plane is defined; a search process is illustrated. A general location search algorithm is proposed and the results are presented.
财产安全管理是保证有形资产和无形资产安全的关键问题。其解决方案采用技术手段和流动拘留小组,确保资产保全,降低安全活动风险。风险的经典定义是将受保护对象受到损害的概率与损害的数量联系起来。为了确定概率,引入了一个假设,即报警信号只记录拘留组到达安全设施的时间。为了最大限度地减少安全活动的总风险,制定了在物体分散的地面上寻找拘留组位置的任务。作为拟定问题的一种解决方案,提出了一种考虑破坏程度和物体在平面上的当前坐标的拘留群位置搜索方法。给出了飞机上拘留组位置的计算实例。引入并证实了安全活动实施有效性的目标函数Ф,将安全组织的财务和经济指标与安全活动风险的价值联系起来。给出了函数Φ随滞留组数变化的行为分析,给出了函数极值的存在,确定了求极值的区间。提出计算地图上物体之间的距离,并利用它来确定新的辅助平面上的坐标。坐标是用格拉姆矩阵计算的。给出了一个算例。制定了在拘留组之间分步分配安全设施的算法,以尽量减少安全活动的总风险;给出了一个使用实例。定义了根据确定的平面坐标搜索拘留组在地面位置的程序;给出了一个搜索过程。提出了一种通用的位置搜索算法,并给出了结果。
{"title":"Automated Search for Locations of Detention Groups to Reduce Security Activity Risk","authors":"O. Pyankov, Dmitry O. Smyshnikov","doi":"10.15622/sp.2020.19.3.5","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.5","url":null,"abstract":"Property security management is a crucial problem in keeping tangible and intangible assets safe. Its solution using technical means and mobile detention groups ensures assets preservation and reduces security activities risk. Classical definition of a risk, which relates the probability of damage to the protected object to the amount of damage, is proposed to use. For determining the probability, an assumption, where only arrival time of the detention group at secured facility is recorded by the alarm signal, is introduced. \u0000In order to minimize the total risk of security activities the task of finding the location of the detention group on the ground with dispersed objects is formulated. As a solution to the formulated problem, a search for the location of the detention groups which takes into account the magnitude of the damage and the current coordinates of the object on the plane is proposed. Examples of calculating locations of detention groups on the plane are presented. \u0000An objective function Ф of the effectiveness of security activities implementation, linking the financial and economic indicators of security organization with the value of security activities risk is introduced and substantiated. The analysis of function Φ behavior with a change in the number of detention groups is shown, the presence of function extremum is shown, the interval of finding the extremum is determined. \u0000It is proposed to calculate the distances between objects on a map and to use it to determine the coordinates in a new auxiliary plane. Coordinates are calculated using Gram matrices. A computational example is presented. \u0000A step-by-step algorithm for secured facility allocation between detention groups with minimization of the total risk of security activities is developed; an example of its use is presented. \u0000A search procedure for the location of the detention group on the ground by the determined coordinates on the plane is defined; a search process is illustrated. A general location search algorithm is proposed and the results are presented.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"147 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87101803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complex of Models for Network Security Assessment of Industrial Automated Control Systems 工业自动化控制系统网络安全评估模型综合体
Q3 Mathematics Pub Date : 2020-06-01 DOI: 10.15622/sp.2020.19.3.6
R. Fatkieva
The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle. The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique. Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.
现代企业将网络技术应用到自动化工业控制系统中。随着上述方法的优点,自动控制系统的网络攻击的风险显着增加。因此,迫切需要开发能够检测未经授权的访问并对其作出适当反应的自动监控手段。企业安防系统应考虑组件之间的相互作用,并在整个生命周期中涉及自我更新的能力。考虑企业不同层次的状态参数、网络威胁的实现、应对措施等因素,给出了信息威胁下企业自动化控制系统功能的局部模型。对于每个模型,都可以形成企业一部分的状态空间,并在一系列测试的基础上定义状态转换参数,从而使模型能够以标记图的形式表示。状态序列具有半马尔可夫过程的性质,因此可以使用半马尔可夫装置。利用Lagrange-Stieltjes技术对相应的积分方程组进行数值求解,可以计算出状态转移的概率。应用半马尔可夫装置检测网络扫描攻击下数据传输过程中的非授权活动,验证了上述方法的有效性。此外,它的应用产生了一套需要采取的安全保证措施。获得状态转移概率后,整体安全指标的制定成为可能,从而有助于企业绩效的提升。
{"title":"Complex of Models for Network Security Assessment of Industrial Automated Control Systems","authors":"R. Fatkieva","doi":"10.15622/sp.2020.19.3.6","DOIUrl":"https://doi.org/10.15622/sp.2020.19.3.6","url":null,"abstract":"The modern enterprises apply network technologies to their automated industrial control systems. Along with advantages of the above approach the risk of network attacks on automated control systems increases significantly. Hence there is an urgent need to develop automated monitoring means being capable of unauthorized access detection and of an adequate response to it. The enterprise security system should take into account components interaction and involve the ability of self-renewal throughout the entire life cycle. \u0000The partial models of functioning of automated control systems of an enterprise under information threats are offered taking into account parameters of states of the enterprise at its different levels, realization of network threats, counteraction measures, etc. For each model it is possible to form the state space of a part of an enterprise and on the basis of the series of tests to define state transition parameters thus enabling model representation in the form of a marked graph. The sequences of states possess the properties of semi-Markov processes so semi-Markov apparatus is applicable. Probabilities of state transitions could be computed as a result of numerical solution of the corresponding system of integral equations by Lagrange-Stieltjes technique. \u0000Application of Semi-Markov apparatus for the detection of non-authorized activities during data transfer under network scanning attack proved the validity of the above methods. In addition its application results in creation of a set of security assurance measures to be undertaken. Having obtained state transition probabilities the development of integral security indicator becomes possible thus contributing to the enterprise performance enhancement.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81921971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems 基于现代计算机系统图像形成模型的信息通信网络用户终端识别
Q3 Mathematics Pub Date : 2020-04-23 DOI: 10.15622/sp.2020.19.2.8
K. Sazonov, M. Tatarka, A. Tsyganov, Vitaliy Bessolcev
One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.
模式识别理论、信息安全理论等理论的重要任务之一是对信息通信网络的终端进行识别。本课题的相关性是由于需要研究识别计算机网络终端的方法,并根据所获得的知识构建信息安全系统。允许在网络中唯一标识用户终端的主要参数是地址交换信息,以及表征计算机系统的软件和硬件的一些参数。根据获取的参数,生成用户终端的数字指纹。用户终端用户使用匿名网络并阻断数字指纹参数生成和采集的方法,在某些情况下不能达到所要求的识别可靠性程度。基于现代计算机系统中数字图像形成的特点,许多变换参数对输出的图形原语产生影响,从而形成用户终端的数字指纹,这取决于采样在像素中的位置、像素影响程度的计算算法以及图形子系统中对图像进行平滑处理的程序。本文提出了一种基于用户终端web浏览器的图像生成模型,该模型可以在信息和电信网络用户匿名化的条件下提高识别的可靠性。论述了现代计算机系统图形子系统中数字图像形成的特点。这些特征允许在先验不确定性下对信息传递的模式和参数进行识别。
{"title":"Identification of Subscriber Terminals of Infocommunication Networks based on the Model of Forming Images in Modern Computer Systems","authors":"K. Sazonov, M. Tatarka, A. Tsyganov, Vitaliy Bessolcev","doi":"10.15622/sp.2020.19.2.8","DOIUrl":"https://doi.org/10.15622/sp.2020.19.2.8","url":null,"abstract":"One of the important tasks of such theories as theories of pattern recognition and the theory of information security, is the task of identifying terminals of information and telecommunication networks. \u0000The relevance of the topic is due to the need to study methods for identifying computer network terminals and build information security systems based on the knowledge gained. \u0000The main parameters that allow uniquely identifying subscriber terminals in the network are address-switching information, as well as a number of parameters characterizing the software and hardware of the computer system. Based on the obtained parameters, digital fingerprints of subscriber terminals are generated. \u0000The using anonymous networks by users of subscriber terminals and blocking of the methods of generating and collecting digital fingerprint parameters, does not allow to achieve the required degree of identification reliability in some cases. \u0000Based on the peculiarities of digital image formation in modern computer systems, many transformation parameters make impact on the output graphic primitive, thereby forming a digital fingerprint of the subscriber terminal, which depends on the placement of samples in a pixel, the algorithms used to calculate the degree of pixels influence, and also the procedures used of smoothing images in the graphics subsystem. \u0000In this paper an original model of image formation by means of a subscriber terminal web browser that allows to increase the degree of reliability of identification under conditions of anonymization of users of information and telecommunication networks is propesed. \u0000Features of the digital images formation in the graphic subsystems of modern computer systems are substantiated. These features allow identification under a priori uncertainty regarding the modes and parameters of information transfer.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72965382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for Evaluating Security of Cloud IT-Components based on Estandards Criteria 基于标准准则的云it组件安全评估方法
Q3 Mathematics Pub Date : 2020-04-23 DOI: 10.15622/sp.2020.19.2.6
I. Livshitz
The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered. An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services. A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.
分析了公认的确保it安全的方法,并考虑了评估it组件和云服务安全性的一般方法。本文试图从系统分析的角度,而不是从流行营销产品的商业角度来分析云服务。前面介绍的用于it组件评估的过程并不稳定,因为最终用户不能100%保证访问所有it组件,对远程和不受控制的云服务更是如此。许多评论指出,为创建安全的网络体系结构和持续监控偏离既定业务目标的能力而增加的努力。与零信任和零信任扩展模型(在现有it组件上叠加额外的安全功能)不同,本文提出将it组件集视为一个新的实体——信息处理系统。这将允许采用正式流程,在确保云服务安全性的同时,评估现有和未来it组件对标准标准的遵从程度。提出了一种新的评估方法,该方法基于先前开发的混合方法,使用基于两个标准系统的正式程序-管理系统合规性评估(基于ISO/IEC 27001系列)和功能安全要求评估(基于IEC 61508系列和ISO/IEC 15408系列)。该方法可对基于云计算的IT组件的安全风险进行可重复和客观的评估,并可提交给独立的评估小组进行验证。所得结果可应用于包括关键信息基础设施对象在内的独立评估。
{"title":"Method for Evaluating Security of Cloud IT-Components based on Estandards Criteria","authors":"I. Livshitz","doi":"10.15622/sp.2020.19.2.6","DOIUrl":"https://doi.org/10.15622/sp.2020.19.2.6","url":null,"abstract":"The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered. \u0000An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services. \u0000A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73575581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Voice Pathology Detection based on Analysis of Modulation Spectrum in Critical Bands 基于关键波段调制频谱分析的语音病理检测
Q3 Mathematics Pub Date : 2020-04-23 DOI: 10.15622/sp.2020.19.2.1
M. Vashkevich, I. Azarov
The paper presents an approach to the analysis of the modulation spectrum of a voice signal, in which the primary acoustic analysis is performed in bands of unequal width. Nonuniform analysis corresponds to the psychoacoustic laws of human perception of sound information. In the context of the analysis of the modulation spectrum, the considered approach can significantly reduce the resulting number of parameters, which greatly simplifies the task of detecting pathological changes in the voice signal based on the analysis of the parameters of the modulation spectrum. For frequency decomposition of a signal into bands of unequal width, two methods are considered: 1) DFT with channel combination and 2) the use of an nonuniform filter bank. The first method is characterized by a fixed time window for the analysis of all frequency components, while in the second method the time-frequency analysis plan is consistent with the critical frequency scale of the barks. For each method, a practical signal analysis circuit has been developed and described. The paper presents the experimental data on the application of the developed schemes for the analysis of the modulation spectrum to the problem of detecting pathology in a speech signal. The parameters of the modulation spectrum acted as information signs for a classifier built on the basis of linear discriminant analysis. Three different voice bases were used in the experiment (in two cases, the pathology was neurological ALS disease (amyotrophic lateral sclerosis), and in the third case, diseases of the larynx). The parameters of the modulation spectrum obtained in the DFT-based scheme with channel combining turned out to be more preferable for classification with a small number of features, however, greater accuracy (with an increase in the number of features) made it possible to obtain the parameters obtainedin the scheme based on an unequal filter bank. In all cases, the obtained classifiers were highly accurate (more than 97%). The obtained results show that the use of nonuniform time-frequency representation is preferable in the case when the analyzed signal is a sustained vowel phonation, since it provides higher accuracy of pathology detection using fewer modulation parameters
本文提出了一种分析话音信号调制频谱的方法,其中主要的声学分析是在不等宽的频带中进行的。非均匀分析符合人对声音信息感知的心理声学规律。在调制频谱分析的背景下,所考虑的方法可以显著减少得到的参数数量,从而大大简化了基于调制频谱参数分析检测语音信号病理变化的任务。为了将信号分解成不等宽的频带,考虑了两种方法:1)信道组合的DFT和2)使用非均匀滤波器组。第一种方法的特点是采用固定的时间窗对所有频率分量进行分析,而第二种方法的时频分析方案与叫声的临界频率尺度一致。对于每种方法,都开发并描述了一个实用的信号分析电路。本文给出了将所开发的调制频谱分析方案应用于语音信号病理检测的实验数据。在线性判别分析的基础上,将调制频谱的参数作为分类器的信息符号。实验中使用了三种不同的声音基础(其中两种情况下,病理是神经系统ALS疾病(肌萎缩侧索硬化症),第三种情况下,喉部疾病)。基于dft的合并信道方案得到的调制频谱参数对于特征数量较少的分类更有利,但是更高的精度(随着特征数量的增加)使得基于不等滤波器组的方案得到的参数成为可能。在所有情况下,获得的分类器都是高度准确的(超过97%)。结果表明,当分析的信号是一个持续的元音发声时,使用非均匀时频表示是可取的,因为它使用较少的调制参数提供了更高的病理检测精度
{"title":"Voice Pathology Detection based on Analysis of Modulation Spectrum in Critical Bands","authors":"M. Vashkevich, I. Azarov","doi":"10.15622/sp.2020.19.2.1","DOIUrl":"https://doi.org/10.15622/sp.2020.19.2.1","url":null,"abstract":"The paper presents an approach to the analysis of the modulation spectrum of a voice signal, in which the primary acoustic analysis is performed in bands of unequal width. Nonuniform analysis corresponds to the psychoacoustic laws of human perception of sound information. In the context of the analysis of the modulation spectrum, the considered approach can significantly reduce the resulting number of parameters, which greatly simplifies the task of detecting pathological changes in the voice signal based on the analysis of the parameters of the modulation spectrum. For frequency decomposition of a signal into bands of unequal width, two methods are considered: 1) DFT with channel combination and 2) the use of an nonuniform filter bank. The first method is characterized by a fixed time window for the analysis of all frequency components, while in the second method the time-frequency analysis plan is consistent with the critical frequency scale of the barks. For each method, a practical signal analysis circuit has been developed and described. The paper presents the experimental data on the application of the developed schemes for the analysis of the modulation spectrum to the problem of detecting pathology in a speech signal. The parameters of the modulation spectrum acted as information signs for a classifier built on the basis of linear discriminant analysis. Three different voice bases were used in the experiment (in two cases, the pathology was neurological ALS disease (amyotrophic lateral sclerosis), and in the third case, diseases of the larynx). The parameters of the modulation spectrum obtained in the DFT-based scheme with channel combining turned out to be more preferable for classification with a small number of features, however, greater accuracy (with an increase in the number of features) made it possible to obtain the parameters obtainedin the scheme based on an unequal filter bank. In all cases, the obtained classifiers were highly accurate (more than 97%). The obtained results show that the use of nonuniform time-frequency representation is preferable in the case when the analyzed signal is a sustained vowel phonation, since it provides higher accuracy of pathology detection using fewer modulation parameters","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"84 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90641551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of mobile robot movement on a plane with finite number of repeller sources 有限驱赶源平面上移动机器人运动的优化
Q3 Mathematics Pub Date : 2020-02-13 DOI: 10.15622/10.15622/sp.2020.19.1.2
M. Medvedev, V. Kostjukov, V. Pshikhopov
The paper considers the problem of planning a mobile robot movement in a conflict environment, which is characterized by the presence of areas that impede the robot to complete the tasks. The main results of path planning in the conflict environment are considered. Special attention is paid to the approaches based on the risk functions and probabilistic methods. The conflict areas, which are formed by point sources that create in the general case asymmetric fields of a continuous type, are observed. A probabilistic description of such fields is proposed, examples of which are the probability of detection or defeat of a mobile robot. As a field description, the concept of characteristic probability function of the source is introduced; which allows us to optimize the movement of the robot in the conflict environment. The connection between the characteristic probability function of the source and the risk function, which can be used to formulate and solve simplified optimization problems, is demonstrated. The algorithm for mobile robot path planning that ensures the given probability of passing the conflict environment is being developed. An upper bound for the probability of the given environment passing under fixed boundary conditions is obtained. A procedure for optimizing the robot path in the conflict environment is proposed, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. A procedure is proposed for optimizing the robot path in the conflict environment, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. The proposed algorithms are implemented in the form of a software simulator for a group of ground-based robots and are studied by numerical simulation methods.
本文研究了在冲突环境中移动机器人的运动规划问题,这种冲突环境的特点是存在阻碍机器人完成任务的区域。考虑了冲突环境下路径规划的主要结果。特别关注了基于风险函数和概率方法的方法。冲突区域是由点源形成的,点源在一般情况下产生连续型的不对称场。提出了这些领域的概率描述,其中的例子是移动机器人的检测或失败的概率。作为一种场描述,引入了源的特征概率函数的概念;这使我们能够优化机器人在冲突环境中的运动。论证了源的特征概率函数与风险函数之间的联系,可用于制定和求解简化的优化问题。研究了保证给定概率通过冲突环境的移动机器人路径规划算法。给出了给定环境在固定边界条件下通过的概率的上界。提出了一种冲突环境下机器人路径优化算法,该算法避免了对次优解寻找精确最优解,从而提高了计算效率。提出了一种冲突环境下机器人路径优化算法,该算法避免了对次优解寻找精确最优解,从而提高了计算效率。提出的算法以一组地面机器人的软件模拟器的形式实现,并通过数值模拟方法进行了研究。
{"title":"Optimization of mobile robot movement on a plane with finite number of repeller sources","authors":"M. Medvedev, V. Kostjukov, V. Pshikhopov","doi":"10.15622/10.15622/sp.2020.19.1.2","DOIUrl":"https://doi.org/10.15622/10.15622/sp.2020.19.1.2","url":null,"abstract":"The paper considers the problem of planning a mobile robot movement in a conflict environment, which is characterized by the presence of areas that impede the robot to complete the tasks. The main results of path planning in the conflict environment are considered. Special attention is paid to the approaches based on the risk functions and probabilistic methods. The conflict areas, which are formed by point sources that create in the general case asymmetric fields of a continuous type, are observed. A probabilistic description of such fields is proposed, examples of which are the probability of detection or defeat of a mobile robot. As a field description, the concept of characteristic probability function of the source is introduced; which allows us to optimize the movement of the robot in the conflict environment. The connection between the characteristic probability function of the source and the risk function, which can be used to formulate and solve simplified optimization problems, is demonstrated. The algorithm for mobile robot path planning that ensures the given probability of passing the conflict environment is being developed. An upper bound for the probability of the given environment passing under fixed boundary conditions is obtained. A procedure for optimizing the robot path in the conflict environment is proposed, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. A procedure is proposed for optimizing the robot path in the conflict environment, which is characterized by higher computational efficiency achieved by avoiding the search for an exact optimal solution to a suboptimal one. The proposed algorithms are implemented in the form of a software simulator for a group of ground-based robots and are studied by numerical simulation methods.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85656580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
SPIIRAS Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1