首页 > 最新文献

SPIIRAS Proceedings最新文献

英文 中文
Evaluation of Efficiency of Random Multiple Access to ALOHA Type Environment with Voice Connections, Transfer of Service Commands, Text Messages and Multimedia Files in Destructive Impact Conditions 破坏性冲击条件下具有语音连接、业务命令、文本消息和多媒体文件传输的ALOHA型随机多址环境的效率评价
Q3 Mathematics Pub Date : 2019-07-18 DOI: 10.15622/SP.2019.18.4.887-911
M. Peregudov, I. Semchenko
Assessing the security of digital radio networks in destructive impact conditions is an important task. However, such an assessment for random multiple access to the ALOHA-type environment in digital radio networks was not carried out. The paper presents an analytical model of random multiple access for the environment of digital radio networks of the ALOHA type in destructive impact conditions. In this model, acomplex measure, including the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file, the degree of filling and the degree of overflow of digital radio network data packets, serves as the resultant indicator for evaluating the effectiveness of random multiple media access. The new complex indicator of the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file takes into account the known probabilities of successful delivery of data packets, creation of a collision and a free channel, as well as new average transmission times for a sequence of data packets and a collision formed during such transmission. New indicators are the degree of filling and the degree of overflow of digital radio communications network data packets. They determine in saturated and supersaturated data networks of such a network how close (far) to maximum is the probability value of a successful voice connection, transmission of a service command, test message or multimedia file. The model takes into account the potential destructive effects of the attacker by refining the analytical expressions for the known probabilistic and new temporal characteristics. First, a quantitative relationship between the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file and the average duration of a data channel collisions is established./ Secondly, for guaranteed disabling a digital radio network with random multiple access to the medium ALOHA type attacker must constantly carry out a destructive impact. The results are applied in design of digital radio communications networks operating under destructive impacts, as well as in development of automatic systems for optimizing the operation of digital radio communications networks and protecting them from such impacts.
在破坏性冲击条件下评估数字无线网络的安全性是一项重要任务。然而,没有对数字无线电网络中aloha型环境的随机多址接入进行这样的评估。提出了一种ALOHA型数字无线网络在破坏性冲击条件下的随机多址分析模型。在该模型中,一个复杂的度量,包括语音连接成功的概率、业务命令、文本消息或多媒体文件的传输、数字无线网络数据包的填充程度和溢出程度,作为评估随机多媒体访问有效性的结果指标。语音连接、服务命令、文本消息或多媒体文件传输成功概率的新复杂指标考虑了数据包成功交付的已知概率、碰撞和自由通道的创建,以及在传输过程中形成的数据包序列和碰撞的新平均传输时间。新的指标是数字无线电通信网数据包的填充程度和溢出程度。它们确定在这种网络的饱和和过饱和数据网络中,成功的语音连接、服务命令、测试消息或多媒体文件传输的概率值离最大值有多近(多远)。该模型通过改进已知概率特征和新的时间特征的解析表达式,考虑了攻击者的潜在破坏性影响。首先,建立了语音连接、业务命令、文本消息或多媒体文件传输成功概率与数据通道冲突平均持续时间之间的定量关系。/其次,为了保证禁用具有随机多址访问的数字无线网络,ALOHA类型的攻击者必须不断地进行破坏性影响。研究结果可用于在破坏性冲击下运行的数字无线电通信网的设计,以及用于优化数字无线电通信网运行和保护其免受此类影响的自动系统的开发。
{"title":"Evaluation of Efficiency of Random Multiple Access to ALOHA Type Environment with Voice Connections, Transfer of Service Commands, Text Messages and Multimedia Files in Destructive Impact Conditions","authors":"M. Peregudov, I. Semchenko","doi":"10.15622/SP.2019.18.4.887-911","DOIUrl":"https://doi.org/10.15622/SP.2019.18.4.887-911","url":null,"abstract":"Assessing the security of digital radio networks in destructive impact conditions is an important task. However, such an assessment for random multiple access to the ALOHA-type environment in digital radio networks was not carried out. The paper presents an analytical model of random multiple access for the environment of digital radio networks of the ALOHA type in destructive impact conditions. In this model, acomplex measure, including the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file, the degree of filling and the degree of overflow of digital radio network data packets, serves as the resultant indicator for evaluating the effectiveness of random multiple media access. The new complex indicator of the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file takes into account the known probabilities of successful delivery of data packets, creation of a collision and a free channel, as well as new average transmission times for a sequence of data packets and a collision formed during such transmission. New indicators are the degree of filling and the degree of overflow of digital radio communications network data packets. They determine in saturated and supersaturated data networks of such a network how close (far) to maximum is the probability value of a successful voice connection, transmission of a service command, test message or multimedia file. The model takes into account the potential destructive effects of the attacker by refining the analytical expressions for the known probabilistic and new temporal characteristics. First, a quantitative relationship between the probability of a successful voice connection, the transfer of a service command, a text message or a multimedia file and the average duration of a data channel collisions is established./ Secondly, for guaranteed disabling a digital radio network with random multiple access to the medium ALOHA type attacker must constantly carry out a destructive impact. The results are applied in design of digital radio communications networks operating under destructive impacts, as well as in development of automatic systems for optimizing the operation of digital radio communications networks and protecting them from such impacts.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87453686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing Targeted Digital Signage: Possible Solutions 提供有针对性的数字标牌:可能的解决方案
Q3 Mathematics Pub Date : 2019-07-18 DOI: 10.15622/SP.2019.18.4.831-857
K. Sandkuhl, A. Smirnov, N. Shilov
Presenting information to a wide audience through digital signage has now become a very popular way in both public areas (shopping centers, exhibitions) and areas accessible by limited groups of people (condominiums, office buildings). This method of information delivery can be used both for advertising and for non-commercial information. Although targeted information delivery to one person (for example, banner ads on web pages) is already very well developed, the design of digital signage systems that provide targeted information has not been paid enough attention. The paper proposes an approach to providing information through targeted digital signage. The research method used in this work is based on the design science research (DSR) approach. This is an approach to problem solving, motivated and initiated by a specific business problem and trying to solve this problem by creating and verifying information technology artifacts, such as prototypes, models, methods, or architectures. Based on this method, the problem was refined, in particular, from the point of view of the housing industry, which led to the development of a new solution to support business processes of stakeholder groups in the industry. Verification of the draft decision showed that additional technological solutions are needed, such as user identification support, search for common preferences for a group of users, ensuring confidentiality of interests and preferences of individual users. The paper also proposes technologies for user identification and finding common interests and preferences.
通过数字标牌向广大受众展示信息已经成为一种非常流行的方式,无论是在公共区域(购物中心、展览中心)还是在少数人可以进入的区域(公寓、办公楼)。这种信息传递方法既可以用于广告,也可以用于非商业信息。虽然有针对性地向一个人传递信息(例如,网页上的横幅广告)已经非常发达,但提供有针对性信息的数字标牌系统的设计还没有得到足够的重视。本文提出了一种通过有针对性的数字标牌提供信息的方法。本研究采用的研究方法是基于设计科学研究(DSR)的方法。这是一种解决问题的方法,由特定的业务问题激发和发起,并试图通过创建和验证信息技术工件(如原型、模型、方法或体系结构)来解决该问题。在此方法的基础上,对问题进行了细化,特别是从住房行业的角度出发,从而开发了一种新的解决方案,以支持行业中利益相关者群体的业务流程。验证草案的决定表明,需要额外的技术解决方案,如用户识别支持,寻找共同的偏好的用户组,确保保密个人用户的利益和偏好。本文还提出了用户识别和寻找共同兴趣和偏好的技术。
{"title":"Providing Targeted Digital Signage: Possible Solutions","authors":"K. Sandkuhl, A. Smirnov, N. Shilov","doi":"10.15622/SP.2019.18.4.831-857","DOIUrl":"https://doi.org/10.15622/SP.2019.18.4.831-857","url":null,"abstract":"Presenting information to a wide audience through digital signage has now become a very popular way in both public areas (shopping centers, exhibitions) and areas accessible by limited groups of people (condominiums, office buildings). This method of information delivery can be used both for advertising and for non-commercial information. Although targeted information delivery to one person (for example, banner ads on web pages) is already very well developed, the design of digital signage systems that provide targeted information has not been paid enough attention. The paper proposes an approach to providing information through targeted digital signage. The research method used in this work is based on the design science research (DSR) approach. This is an approach to problem solving, motivated and initiated by a specific business problem and trying to solve this problem by creating and verifying information technology artifacts, such as prototypes, models, methods, or architectures. Based on this method, the problem was refined, in particular, from the point of view of the housing industry, which led to the development of a new solution to support business processes of stakeholder groups in the industry. Verification of the draft decision showed that additional technological solutions are needed, such as user identification support, search for common preferences for a group of users, ensuring confidentiality of interests and preferences of individual users. The paper also proposes technologies for user identification and finding common interests and preferences.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88611116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigation of Reliability of Combinatorial-Metric Algorithm for Recognition of N-Dimensional Group Point Object in Hierarchy Features Space 层次特征空间中n维群点目标识别的组合度量算法可靠性研究
Q3 Mathematics Pub Date : 2019-07-18 DOI: 10.15622/SP.2019.18.4.976-1009
A. Korotin, G. Kozyrev, A. Nazarov, Evgeniy Blagodyrenko
The scientific research of reliability of combinatorial-metric algorithm for multi-dimensional group point objects recognition in hierarchically organized features space is considered in the paper. The nature of reliability indicator change is examined, as an example, using multilevel descriptions of simulated and real objects under the condition that recognition results obtained at one hierarchy level are used as input data at  next level. A priori uncertainty of a view angle, composition incompleteness and coordinate noise of objects determine the combinatorial procedures of quantifiable estimation of proximity of multidimensional GPO, presenting the object of recognition to a particular class. The stability of the recognition algorithm is achieved by the possibility of changing  strategy of making a classification decision. For this purpose, we use the representation of a group point object at the lowest level of the hierarchy in the form of: sample, composition of sample elements or a complex a priori indicator. In order to increase the recognition accuracy, it was proposed to use the search of recognition results at  low levels of the hierarchy. The experimental dependences of a priori and a posteriori reliability indicators for various conditions for measurements and states of recognition objects are provided in the paper.
本文对分层组织特征空间中多维群点目标识别的组合度量算法的可靠性进行了科学研究。以仿真对象和真实对象的多级描述为例,在将某一层次的识别结果作为下一层次的输入数据的条件下,研究了可靠性指标变化的性质。视角的先验不确定性、物体的组成不完备性和坐标噪声决定了多维GPO可量化接近估计的组合过程,将识别对象呈现给特定的类别。通过改变分类决策策略的可能性来实现识别算法的稳定性。为此,我们使用层次结构最底层的组点对象的表示形式为:样本、样本元素的组成或复杂的先验指标。为了提高识别精度,提出了对低层次的识别结果进行搜索。本文给出了各种测量条件和识别对象状态下先验和后验信度指标的实验依赖关系。
{"title":"Investigation of Reliability of Combinatorial-Metric Algorithm for Recognition of N-Dimensional Group Point Object in Hierarchy Features Space","authors":"A. Korotin, G. Kozyrev, A. Nazarov, Evgeniy Blagodyrenko","doi":"10.15622/SP.2019.18.4.976-1009","DOIUrl":"https://doi.org/10.15622/SP.2019.18.4.976-1009","url":null,"abstract":"The scientific research of reliability of combinatorial-metric algorithm for multi-dimensional group point objects recognition in hierarchically organized features space is considered in the paper. The nature of reliability indicator change is examined, as an example, using multilevel descriptions of simulated and real objects under the condition that recognition results obtained at one hierarchy level are used as input data at  next level. \u0000A priori uncertainty of a view angle, composition incompleteness and coordinate noise of objects determine the combinatorial procedures of quantifiable estimation of proximity of multidimensional GPO, presenting the object of recognition to a particular class. \u0000The stability of the recognition algorithm is achieved by the possibility of changing  strategy of making a classification decision. For this purpose, we use the representation of a group point object at the lowest level of the hierarchy in the form of: sample, composition of sample elements or a complex a priori indicator. In order to increase the recognition accuracy, it was proposed to use the search of recognition results at  low levels of the hierarchy. The experimental dependences of a priori and a posteriori reliability indicators for various conditions for measurements and states of recognition objects are provided in the paper.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89612512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Design of Quasilinear Gurvits Control Systems 拟线性曲线控制系统设计研究
Q3 Mathematics Pub Date : 2019-06-05 DOI: 10.15622/SP.2019.18.3.677-704
A. Gaiduk
The design problem of control systems for nonlinear plants with differentiated nonlinearity is considered. The urgency of this problem is caused by the big difficulties of practical design of nonlinear control systems with the help of the majority of known methods. In many cases, even provision by these methods of just stability of equilibrium point of a designing system represents a big challenge. Distinctive feature of the method of nonlinear control systems design considered below is the use of the nonlinear plants models represented in a quasilinear form. This form of the nonlinear differential equations exists, if nonlinearities in their right parts are differentiated across all arguments. The quasilinear model of the controlled plant allows reducing the design problem to the solution of an algebraic equations system, which has the unique solution if the plant is controlled according to the controllability condition provided in the article. This condition is similar to the controllability condition of the Kalman’s criterion. Procedure of the nonlinear control systems design on a basis of the plant’s quasilinear models is very simple. Practically, it is close to the known polynomial method of the linear control systems design. The equations of the nonlinear systems designed with application of the plant’s quasilinear models also can be represented in the quasilinear form. The basic result of this article is the proof of the theorem and the corollary from it about conditions of the asymptotical stability at whole of the equilibrium point of the nonlinear control systems designed on a basis of the plant’s quasilinear models. For the proof of the theorem and consequence, the properties of simple matrixes and known theorems of stability of the indignant systems of the differential equations are used. A way of the stability research of the equilibrium point of the quasilinear control systems based on the proved theorem is illustrated by numerical examples. Computer simulation of these systems verifies correctness of the hypoyhesis of the proved theorem. Obtained results allow applying the method of nonlinear systems design on a basis of the quasilinear models for creation of various control systems for plants in power, aviation, space, robotechnical and other industries.
研究具有微分非线性的非线性对象控制系统的设计问题。这一问题的紧迫性是由于利用大多数已知方法进行非线性控制系统的实际设计存在很大困难。在许多情况下,即使用这些方法来提供设计系统平衡点的稳定性,也是一个很大的挑战。下面考虑的非线性控制系统设计方法的显著特征是使用拟线性形式表示的非线性对象模型。这种形式的非线性微分方程存在,如果在其右部分的非线性在所有参数上被微分。被控对象的拟线性模型允许将设计问题简化为一个代数方程组的解,当被控对象按照文中提供的可控性条件进行控制时,该代数方程组具有唯一解。这个条件类似于卡尔曼准则的可控性条件。基于拟线性模型的非线性控制系统设计过程非常简单。实际上,它与已知的线性控制系统设计的多项式方法接近。应用拟线性模型设计的非线性系统的方程也可以用拟线性形式表示。本文的基本结果是证明了基于拟线性模型设计的非线性控制系统平衡点整体渐近稳定条件的定理及其推论。为了证明该定理和结论,利用了简单矩阵的性质和已知的微分方程组的稳定性定理。通过数值算例说明了基于已证明定理的拟线性控制系统平衡点稳定性研究的一种方法。这些系统的计算机模拟验证了所证明定理的假设的正确性。所获得的结果允许在拟线性模型的基础上应用非线性系统设计方法来创建电力、航空、航天、机器人技术和其他工业中的各种控制系统。
{"title":"Towards Design of Quasilinear Gurvits Control Systems","authors":"A. Gaiduk","doi":"10.15622/SP.2019.18.3.677-704","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.677-704","url":null,"abstract":"The design problem of control systems for nonlinear plants with differentiated nonlinearity is considered. The urgency of this problem is caused by the big difficulties of practical design of nonlinear control systems with the help of the majority of known methods. In many cases, even provision by these methods of just stability of equilibrium point of a designing system represents a big challenge. Distinctive feature of the method of nonlinear control systems design considered below is the use of the nonlinear plants models represented in a quasilinear form. This form of the nonlinear differential equations exists, if nonlinearities in their right parts are differentiated across all arguments. The quasilinear model of the controlled plant allows reducing the design problem to the solution of an algebraic equations system, which has the unique solution if the plant is controlled according to the controllability condition provided in the article. This condition is similar to the controllability condition of the Kalman’s criterion. Procedure of the nonlinear control systems design on a basis of the plant’s quasilinear models is very simple. Practically, it is close to the known polynomial method of the linear control systems design. The equations of the nonlinear systems designed with application of the plant’s quasilinear models also can be represented in the quasilinear form. \u0000The basic result of this article is the proof of the theorem and the corollary from it about conditions of the asymptotical stability at whole of the equilibrium point of the nonlinear control systems designed on a basis of the plant’s quasilinear models. For the proof of the theorem and consequence, the properties of simple matrixes and known theorems of stability of the indignant systems of the differential equations are used. A way of the stability research of the equilibrium point of the quasilinear control systems based on the proved theorem is illustrated by numerical examples. Computer simulation of these systems verifies correctness of the hypoyhesis of the proved theorem. \u0000Obtained results allow applying the method of nonlinear systems design on a basis of the quasilinear models for creation of various control systems for plants in power, aviation, space, robotechnical and other industries.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"C-35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84453093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Method for Reliable Shortest Path Determination in Stochastic Networks using Parametrically Defined Stable Probability Distributions 基于参数定义稳定概率分布的随机网络可靠最短路径确定方法
Q3 Mathematics Pub Date : 2019-06-05 DOI: 10.15622/SP.2019.18.3.557-581
A. Agafonov, V. Myasnikov
An increase in the number of vehicles, especially in large cities, and inability of the existing road infrastructure to distribute transport flows, leads to a higher congestion level in transport networks. This problem makes the solution to navigational problems more and more important. Despite the popularity of these tasks, many existing commercial systems find a route in deterministic networks, not taking into account the time-dependent and stochastic properties of traffic flows, i.e. travel time of road links is considered as constant. This paper addresses the reliable routing problem in stochastic networks using actual information of the traffic flow parameters. We consider the following optimality criterion: maximization of the probability of arriving on time at a destination given a departure time and a time budget. The reliable shortest path takes into account the variance of the travel time of the road network segments, which makes it more applicable for solving routing problems in transport networks compared to standard shortest path search algorithms that take into account only the average travel time of network segments. To describe the travel time of the road network segments, it is proposed to use parametrically defined stable Levy probability distributions. The use of stable distributions allows replacing the operation of calculating convolution to determine the reliability of the path to recalculating the parameters of the distributions density, which significantly reduces the computational time of the algorithm. The proposed method gives a solution in the form of a decision, i.e. the route proposed in the solution is not fixed in advance, but adaptively changes depending on changes in the real state of the network. An experimental analysis of the algorithm carried out on a large-scale transport network of Samara, Russia, showed that the presented algorithm can significantly reduce the computational time of the reliable shortest path algorithm with a slight increase in travel time.
车辆数量的增加,特别是在大城市,以及现有道路基础设施无法分配运输流量,导致运输网络的更严重拥堵。这一问题使得导航问题的解决变得越来越重要。尽管这些任务很受欢迎,但许多现有的商业系统在确定性网络中寻找路线,而没有考虑交通流的时间依赖性和随机性,即道路连接的旅行时间被认为是恒定的。本文利用交通流参数的实际信息,研究了随机网络中的可靠路由问题。我们考虑以下最优性准则:给定出发时间和时间预算,准时到达目的地的概率最大化。可靠最短路径算法考虑了路网段行驶时间的方差,与仅考虑路网段平均行驶时间的标准最短路径搜索算法相比,更适用于求解交通网络中的路由问题。为了描述路网段的行驶时间,提出使用参数定义的稳定Levy概率分布。利用稳定分布,可以代替计算卷积确定路径可靠性的操作,重新计算分布密度的参数,大大减少了算法的计算时间。该方法以决策的形式给出解决方案,即解决方案中提出的路由不是预先固定的,而是根据网络实际状态的变化自适应地变化。在俄罗斯Samara的大型交通网络上进行的实验分析表明,该算法可以显著减少可靠最短路径算法的计算时间,而行程时间略有增加。
{"title":"Method for Reliable Shortest Path Determination in Stochastic Networks using Parametrically Defined Stable Probability Distributions","authors":"A. Agafonov, V. Myasnikov","doi":"10.15622/SP.2019.18.3.557-581","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.557-581","url":null,"abstract":"An increase in the number of vehicles, especially in large cities, and inability of the existing road infrastructure to distribute transport flows, leads to a higher congestion level in transport networks. This problem makes the solution to navigational problems more and more important. Despite the popularity of these tasks, many existing commercial systems find a route in deterministic networks, not taking into account the time-dependent and stochastic properties of traffic flows, i.e. travel time of road links is considered as constant. This paper addresses the reliable routing problem in stochastic networks using actual information of the traffic flow parameters. We consider the following optimality criterion: maximization of the probability of arriving on time at a destination given a departure time and a time budget. The reliable shortest path takes into account the variance of the travel time of the road network segments, which makes it more applicable for solving routing problems in transport networks compared to standard shortest path search algorithms that take into account only the average travel time of network segments. To describe the travel time of the road network segments, it is proposed to use parametrically defined stable Levy probability distributions. The use of stable distributions allows replacing the operation of calculating convolution to determine the reliability of the path to recalculating the parameters of the distributions density, which significantly reduces the computational time of the algorithm. The proposed method gives a solution in the form of a decision, i.e. the route proposed in the solution is not fixed in advance, but adaptively changes depending on changes in the real state of the network. An experimental analysis of the algorithm carried out on a large-scale transport network of Samara, Russia, showed that the presented algorithm can significantly reduce the computational time of the reliable shortest path algorithm with a slight increase in travel time.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72476501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Analysis of Scientific Journals Collections 科技期刊馆藏的比较分析
Q3 Mathematics Pub Date : 2019-06-05 DOI: 10.15622/SP.2019.18.3.766-792
F. Krasnov, M. Shvartsman, A. Dimentov
The authors developed an approach to comparative analysis of scientific journals collections  based on the analysis of co-authors graph and the text model. The use of time series of co-authorship graphs metrics allowed the authors to analyze trends in the development of journal authors. The text model was built using machine learning techniques. The journals content was classified to determine the authenticity  degree of various journals and different  issues of a single journal via a text model. The authors developed a metric of Content Authenticity Ratio, which allows quantifying the authenticity of journal collections in comparison. Comparative thematic analysis of journals collections was carried out using the thematic model with additive regularization.  Based on the created thematic model, the authors constructed thematic profiles of the journals archives in a single thematic basis. The approach developed by the authors was applied to archives of two journals on the Rheumatology for the period 2000–2018. As a benchmark  for comparing the co-author’s metrics,  public  data sets from the SNAP research laboratory  at Stanford University were used. As a result,  the authors adapted the existing examples of the effective functioning of the authors collaborations  in order to improve the work of journals editorial staff. Quantitative comparison of large volumes of texts and metadata of scientific articles was carried out. As a result of the experiment conducted using the developed methods, it was shown that the content authenticity of the selected journals is 89%, co-authorships in one of the journals have a pronounced centrality,  which is a distinctive  feature of the policy editor. The clarity and consistency of the results confirm the effectiveness of the approach proposed by the authors. The code developed in the course of the experiment in the Python programming  language can be used for comparative analysis of other collections of journals in the Russian language.
作者提出了一种基于共同作者图分析和文本模型的科学期刊文集比较分析方法。使用时间序列的共同作者图表指标允许作者分析期刊作者的发展趋势。文本模型是使用机器学习技术构建的。对期刊内容进行分类,通过文本模型确定各类期刊和单一期刊不同期的真实性程度。作者开发了内容真实性比率的度量,它允许量化比较期刊收藏的真实性。采用加性正则化专题模型对期刊馆藏进行专题比较分析。在建立专题模型的基础上,以单一专题为基础,构建了期刊档案的专题概况。作者开发的方法应用于2000-2018年期间两本风湿病学期刊的档案。作为比较合著者指标的基准,使用了斯坦福大学SNAP研究实验室的公共数据集。因此,作者借鉴了现有的作者合作有效运作的实例,以提高期刊编辑人员的工作水平。对大量科学文章的文本和元数据进行了定量比较。使用开发的方法进行的实验结果表明,所选期刊的内容真实性为89%,其中一种期刊的共同作者具有明显的中心性,这是政策编辑的显著特征。结果的清晰性和一致性证实了作者提出的方法的有效性。实验过程中使用Python编程语言开发的代码可用于对其他俄语期刊集进行比较分析。
{"title":"Comparative Analysis of Scientific Journals Collections","authors":"F. Krasnov, M. Shvartsman, A. Dimentov","doi":"10.15622/SP.2019.18.3.766-792","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.766-792","url":null,"abstract":"The authors developed an approach to comparative analysis of scientific journals collections  based on the analysis of co-authors graph and the text model. The use of time series of co-authorship graphs metrics allowed the authors to analyze trends in the development of journal authors. The text model was built using machine learning techniques. The journals content was classified to determine the authenticity  degree of various journals and different  issues of a single journal via a text model. The authors developed a metric of Content Authenticity Ratio, which allows quantifying the authenticity of journal collections in comparison. Comparative thematic analysis of journals collections was carried out using the thematic model with additive regularization.  Based on the created thematic model, the authors constructed thematic profiles of the journals archives in a single thematic basis. The approach developed by the authors was applied to archives of two journals on the Rheumatology for the period 2000–2018. As a benchmark  for comparing the co-author’s metrics,  public  data sets from the SNAP research laboratory  at Stanford University were used. As a result,  the authors adapted the existing examples of the effective functioning of the authors collaborations  in order to improve the work of journals editorial staff. Quantitative comparison of large volumes of texts and metadata of scientific articles was carried out. As a result of the experiment conducted using the developed methods, it was shown that the content authenticity of the selected journals is 89%, co-authorships in one of the journals have a pronounced centrality,  which is a distinctive  feature of the policy editor. The clarity and consistency of the results confirm the effectiveness of the approach proposed by the authors. The code developed in the course of the experiment in the Python programming  language can be used for comparative analysis of other collections of journals in the Russian language.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80918013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Plans Sustainability of Active Moving Objects Control Systems Application 主动运动目标控制系统计划可持续性应用研究
Q3 Mathematics Pub Date : 2019-06-05 DOI: 10.15622/SP.2019.18.3.614-644
V. Sugak, V. Volkov, Vladimir Salukhov, Aleksey Karaychev
The paper considers research of the sustainability plans of active moving objects (AMOs) control system application. AMOs are material objects moving in space and carrying out informational, material and energetic interaction with objects, control points and other AMOs. Use of AMOs is usually regulated by strict requirements, so any time delay or incomplete achievement of target effect are unacceptable. The reason of failing to perform a  purpose task can be the development  of control using incorrect plans, so that realization of the plan is unstable due to random factors or targeted effects of the environment and other systems. The paper deals with problematic issues of complex research of active moving objects control application stability plans .  Quantitative and qualitative assessment methods of stability plans , ways and means of ensuring required levels of stability  are proposed by the authors. In this case planning task is considered dynamic, which provides plan correction by means of organizational, structural and program-algorithmic measures to ensure stability. The most adequate model of plan implementation is appropriate system of differential equations. Notion of stability probability is defined  to account stochastic character of disturbance effect . The expression for stability criterion is obtained. It allows to establish the fact of sustainability and unsustainability based on analysis of properties of a purposefully  built Lyapunov function and disturbances characteristics. 
本文研究了主动运动目标(AMOs)控制系统可持续性规划的应用。AMOs是在空间中移动的物质物体,与物体、控制点和其他AMOs进行信息、物质和能量的相互作用。AMOs的使用通常有严格的要求,因此任何时间延迟或不完全达到目标效果都是不可接受的。未能执行目标任务的原因可能是使用不正确的计划制定控制,由于随机因素或环境和其他系统的目标效应,使计划的实现不稳定。本文讨论了主动运动目标控制应用稳定性方案的复杂研究问题。提出了稳定方案的定量和定性评价方法,以及保证所需稳定水平的途径和手段。在这种情况下,规划任务被认为是动态的,它通过组织、结构和方案算法措施提供计划纠正,以确保稳定性。最恰当的计划执行模型是适当的微分方程组。为了考虑扰动效应的随机特性,定义了稳定概率的概念。得到了稳定性判据的表达式。通过分析有目的地构建的Lyapunov函数的性质和扰动特征,可以确定可持续性和不可持续性的事实。
{"title":"Study of Plans Sustainability of Active Moving Objects Control Systems Application","authors":"V. Sugak, V. Volkov, Vladimir Salukhov, Aleksey Karaychev","doi":"10.15622/SP.2019.18.3.614-644","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.614-644","url":null,"abstract":"The paper considers research of the sustainability plans of active moving objects (AMOs) control system application. AMOs are material objects moving in space and carrying out informational, material and energetic interaction with objects, control points and other AMOs. \u0000Use of AMOs is usually regulated by strict requirements, so any time delay or incomplete achievement of target effect are unacceptable. The reason of failing to perform a  purpose task can be the development  of control using incorrect plans, so that realization of the plan is unstable due to random factors or targeted effects of the environment and other systems. The paper deals with problematic issues of complex research of active moving objects control application stability plans . \u0000 Quantitative and qualitative assessment methods of stability plans , ways and means of ensuring required levels of stability  are proposed by the authors. In this case planning task is considered dynamic, which provides plan correction by means of organizational, structural and program-algorithmic measures to ensure stability. The most adequate model of plan implementation is appropriate system of differential equations. Notion of stability probability is defined  to account stochastic character of disturbance effect . The expression for stability criterion is obtained. It allows to establish the fact of sustainability and unsustainability based on analysis of properties of a purposefully  built Lyapunov function and disturbances characteristics. ","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73417258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication of Keys Distributed by the Diffie-Hellman Method for Mobile Devices based on Authentication Codes and Magnetometric Data 基于认证码和磁测数据的移动设备Diffie-Hellman方法密钥认证
Q3 Mathematics Pub Date : 2019-06-05 DOI: 10.15622/SP.2019.18.3.705-740
V. Yakovlev
The wide distribution of mobile wireless devices (smartphones, tablets, etc.) warrants cryptographic protection of information transmitted by these devices, which requires supplying these devices with keys and providing their authentication. Recently, research on key authentication methods within scenarios of pairing mobile devices, has been increasingly relevant. In these conditions, mobile devices are located close to each other, up to the physical contact, and an additional key sharing authenticated channel protected from interception is established for purposes of key authentication. The analysis of additional channel versions: visual, acoustic, vibration, tactile, and magnetometric shows advantages of the latter one in terms of speed and reliability of authentication, as well as easer se of this channel compared to other methods. A magnetometer channel forms if there are magnetometers in mobile devices that measure the Earth’s magnetic field. Random fluctuations of the magnetic field at the measurement point allow to generate in a pair of mobile devices random sequences that coincide with a high probability and which can be used to authenticate session keys. The “Magparing” protocol of mobile devices keys authentication, which are distributed by Diffie-Hellman method is studied. his protocol is based on the magnetometer data measuring. We demonstrate that the protocol is succeptible to “man-in-the-middle” attack. This fact is confirmed also by software AVISPA simulation. A new key authentication method based on the use of authenticating code (A-code) is proposed. Authenticators for Diffie-Hellman values are generated based on A-code blocks and random sequences obtained by the reading of magnetometer’s values. An approach for A-code parameters optimization, that conforms to the requirements for authentication key length and both to the probabilities of false key removal and false key deception, is investigated. We present an example  of code parameters for key authentication with the length of 256 bits, providing the probability of a false key agreement of not greater than 10-9 and a probability of false rejection of a true key equal to –10–6, which shows viability of the proposed authentication method.
移动无线设备(智能手机、平板电脑等)的广泛分布要求对这些设备传输的信息进行加密保护,这就需要为这些设备提供密钥并提供其认证。近年来,对移动设备配对场景下的密钥认证方法的研究越来越有意义。在这些条件下,移动设备彼此靠近,直到物理接触,并且为了密钥身份验证的目的,建立了一个防止被拦截的额外密钥共享身份验证通道。通过对其他通道版本:视觉、声学、振动、触觉和磁测的分析,显示了后者在认证速度和可靠性方面的优势,并且与其他方法相比,该通道更容易被看到。如果在测量地球磁场的移动设备中有磁力计,则形成磁力计通道。测量点磁场的随机波动允许在一对移动设备中产生高概率重合的随机序列,并可用于验证会话密钥。研究了采用Diffie-Hellman方法分发的移动设备密钥认证的“Magparing”协议。他的方案是基于磁力计的数据测量。我们证明了该协议容易受到“中间人”攻击。AVISPA软件仿真也证实了这一事实。提出了一种基于认证码(A码)的密钥认证方法。Diffie-Hellman值的验证器是根据读取磁力计值获得的a码块和随机序列生成的。研究了一种既符合认证密钥长度要求,又符合假密钥去除概率和假密钥欺骗概率的a码参数优化方法。我们给出了一个长度为256位的密钥认证代码参数示例,提供了不大于10-9的假密钥协议概率和等于-10-6的假拒绝真密钥的概率,这表明了所提出的认证方法的可行性。
{"title":"Authentication of Keys Distributed by the Diffie-Hellman Method for Mobile Devices based on Authentication Codes and Magnetometric Data","authors":"V. Yakovlev","doi":"10.15622/SP.2019.18.3.705-740","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.705-740","url":null,"abstract":"The wide distribution of mobile wireless devices (smartphones, tablets, etc.) warrants cryptographic protection of information transmitted by these devices, which requires supplying these devices with keys and providing their authentication. Recently, research on key authentication methods within scenarios of pairing mobile devices, has been increasingly relevant. In these conditions, mobile devices are located close to each other, up to the physical contact, and an additional key sharing authenticated channel protected from interception is established for purposes of key authentication. \u0000The analysis of additional channel versions: visual, acoustic, vibration, tactile, and magnetometric shows advantages of the latter one in terms of speed and reliability of authentication, as well as easer se of this channel compared to other methods. A magnetometer channel forms if there are magnetometers in mobile devices that measure the Earth’s magnetic field. Random fluctuations of the magnetic field at the measurement point allow to generate in a pair of mobile devices random sequences that coincide with a high probability and which can be used to authenticate session keys. \u0000The “Magparing” protocol of mobile devices keys authentication, which are distributed by Diffie-Hellman method is studied. his protocol is based on the magnetometer data measuring. We demonstrate that the protocol is succeptible to “man-in-the-middle” attack. This fact is confirmed also by software AVISPA simulation. \u0000A new key authentication method based on the use of authenticating code (A-code) is proposed. Authenticators for Diffie-Hellman values are generated based on A-code blocks and random sequences obtained by the reading of magnetometer’s values. An approach for A-code parameters optimization, that conforms to the requirements for authentication key length and both to the probabilities of false key removal and false key deception, is investigated. We present an example  of code parameters for key authentication with the length of 256 bits, providing the probability of a false key agreement of not greater than 10-9 and a probability of false rejection of a true key equal to –10–6, which shows viability of the proposed authentication method.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91085624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context-Based Rider Assistant System for Two Wheeled Self-Balancing Vehicles 基于情境的两轮自平衡车辆乘员辅助系统
Q3 Mathematics Pub Date : 2019-06-04 DOI: 10.15622/SP.2019.18.3.582-613
Jeyeon Kim, Kenta Sato, N. Hashimoto, A. Kashevnik, K. Tomita, Seiichi Miyakoshi, Yusuke Takinami, O. Matsumoto, Ali Boyali
Personal mobility devises become more and more popular last years. Gyroscooters, two wheeled self-balancing vehicles, wheelchair, bikes, and scooters help people to solve the first and last mile problems in big cities. To help people with navigation and to increase their safety the intelligent rider assistant systems can be utilized that are used the rider personal smartphone to form the context and provide the rider with the recommendations. We understand the context as any information that characterize current situation. So, the context represents the model of current situation. We assume that rider mounts personal smartphone that allows it to track the rider face using the front-facing camera. Modern smartphones allow to track current situation using such sensors as: GPS / GLONASS, accelerometer, gyroscope, magnetometer, microphone, and video cameras. The proposed rider assistant system uses these sensors to capture the context information about the rider and the vehicle and generates context-oriented recommendations. The proposed system is aimed at dangerous situation detection for the rider, we are considering two dangerous situations: drowsiness and distraction. Using the computer vision methods, we determine parameters of the rider face (eyes, nose, mouth, head pith and rotation angles) and based on analysis of this parameters detect the dangerous situations. The paper presents a comprehensive related work analysis in the topic of intelligent driver assistant systems and recommendation generation, an approach to dangerous situation detection and recommendation generation is proposed, and evaluation of the distraction dangerous state determination for personal mobility device riders.
去年个人移动设备变得越来越流行。gyroscooter,两轮自平衡车,轮椅,自行车和滑板车帮助人们解决大城市的第一英里和最后一英里问题。为了帮助人们导航并提高他们的安全,可以使用智能骑手辅助系统,该系统使用骑手的个人智能手机来形成上下文并为骑手提供建议。我们将上下文理解为描述当前情况的任何信息。因此,上下文代表了当前情况的模型。我们假设骑手安装个人智能手机,允许它跟踪骑手的脸使用前置摄像头。现代智能手机允许使用诸如GPS / GLONASS,加速度计,陀螺仪,磁力计,麦克风和摄像机等传感器跟踪当前情况。建议的乘客辅助系统使用这些传感器来捕获有关乘客和车辆的上下文信息,并生成面向上下文的建议。我们提出的系统旨在为骑行者检测危险情况,我们考虑了两种危险情况:困倦和分心。利用计算机视觉方法确定骑手面部的参数(眼、鼻、口、髓和旋转角度),并通过对这些参数的分析来检测危险情况。本文综合分析了智能驾驶辅助系统和推荐生成的相关工作,提出了一种危险态势检测和推荐生成方法,并对个人移动设备乘客的分心危险状态判定进行了评估。
{"title":"Context-Based Rider Assistant System for Two Wheeled Self-Balancing Vehicles","authors":"Jeyeon Kim, Kenta Sato, N. Hashimoto, A. Kashevnik, K. Tomita, Seiichi Miyakoshi, Yusuke Takinami, O. Matsumoto, Ali Boyali","doi":"10.15622/SP.2019.18.3.582-613","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.582-613","url":null,"abstract":"Personal mobility devises become more and more popular last years. Gyroscooters, two wheeled self-balancing vehicles, wheelchair, bikes, and scooters help people to solve the first and last mile problems in big cities. To help people with navigation and to increase their safety the intelligent rider assistant systems can be utilized that are used the rider personal smartphone to form the context and provide the rider with the recommendations. We understand the context as any information that characterize current situation. So, the context represents the model of current situation. We assume that rider mounts personal smartphone that allows it to track the rider face using the front-facing camera. Modern smartphones allow to track current situation using such sensors as: GPS / GLONASS, accelerometer, gyroscope, magnetometer, microphone, and video cameras. The proposed rider assistant system uses these sensors to capture the context information about the rider and the vehicle and generates context-oriented recommendations. The proposed system is aimed at dangerous situation detection for the rider, we are considering two dangerous situations: drowsiness and distraction. Using the computer vision methods, we determine parameters of the rider face (eyes, nose, mouth, head pith and rotation angles) and based on analysis of this parameters detect the dangerous situations. The paper presents a comprehensive related work analysis in the topic of intelligent driver assistant systems and recommendation generation, an approach to dangerous situation detection and recommendation generation is proposed, and evaluation of the distraction dangerous state determination for personal mobility device riders.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77762977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identification Author of Source Code by Machine Learning Methods 通过机器学习方法识别源代码的作者
Q3 Mathematics Pub Date : 2019-06-04 DOI: 10.15622/SP.2019.18.3.741-765
A. Kurtukova, A. Romanov
The paper is devoted to the analysis of the problem of determining the source code author , which is of interest to researchers in the field of information security, computer forensics, assessment of the quality of the educational process, protection of intellectual property. The paper presents a detailed analysis of modern solutions to the problem. The authors suggest two new identification techniques based on machine learning algorithms: support vector machine, fast correlation filter and informative features; the technique based on hybrid convolutional recurrent neural network. The experimental database includes samples of source codes written in Java, C ++, Python, PHP, JavaScript, C, C # and Ruby. The data was obtained using a web service for hosting IT-projects – Github. The total number of source codes exceeds 150 thousand samples. The average length of each of them is 850 characters. The case size is 542 authors. The experiments were conducted with source codes written in the most popular programming languages. Accuracy of the developed techniques for different numbers of authors was assessed using 10-fold cross-validation. An additional series of experiments was conducted with the number of authors from 2 to 50 for the most popular Java programming language. The graphs of the relationship between identification accuracy and case size are plotted. The analysis of result showed that the method based on hybrid neural network gives 97% accuracy, and it’s at the present time the best-known result. The technique based on the support vector machine made it possible to achieve 96% accuracy. The difference between the results of the hybrid neural network and the support vector machine was approximately 5%.
本文致力于分析确定源代码作者的问题,对信息安全、计算机取证、教育过程质量评估、知识产权保护等领域的研究人员有一定的参考价值。本文详细分析了解决这一问题的现代方法。作者提出了两种新的基于机器学习算法的识别技术:支持向量机、快速相关滤波和信息特征;该技术基于混合卷积递归神经网络。实验数据库包括用Java、c++、Python、PHP、JavaScript、C、c#和Ruby编写的源代码样本。这些数据是通过托管it项目的web服务Github获得的。源代码总数超过15万个样本。平均长度为850个字符。案例大小为542位作者。实验是用最流行的编程语言编写的源代码进行的。采用10倍交叉验证对不同数量的作者所开发的技术的准确性进行评估。对最流行的Java编程语言进行了一系列额外的实验,作者从2人到50人不等。绘制了识别精度与箱体尺寸的关系图。结果分析表明,基于混合神经网络的方法准确率达到97%,是目前最知名的结果。基于支持向量机的技术使其准确率达到96%。混合神经网络的结果与支持向量机的结果相差约5%。
{"title":"Identification Author of Source Code by Machine Learning Methods","authors":"A. Kurtukova, A. Romanov","doi":"10.15622/SP.2019.18.3.741-765","DOIUrl":"https://doi.org/10.15622/SP.2019.18.3.741-765","url":null,"abstract":"The paper is devoted to the analysis of the problem of determining the source code author , which is of interest to researchers in the field of information security, computer forensics, assessment of the quality of the educational process, protection of intellectual property. \u0000The paper presents a detailed analysis of modern solutions to the problem. The authors suggest two new identification techniques based on machine learning algorithms: support vector machine, fast correlation filter and informative features; the technique based on hybrid convolutional recurrent neural network. \u0000The experimental database includes samples of source codes written in Java, C ++, Python, PHP, JavaScript, C, C # and Ruby. The data was obtained using a web service for hosting IT-projects – Github. The total number of source codes exceeds 150 thousand samples. The average length of each of them is 850 characters. The case size is 542 authors. \u0000The experiments were conducted with source codes written in the most popular programming languages. Accuracy of the developed techniques for different numbers of authors was assessed using 10-fold cross-validation. An additional series of experiments was conducted with the number of authors from 2 to 50 for the most popular Java programming language. The graphs of the relationship between identification accuracy and case size are plotted. The analysis of result showed that the method based on hybrid neural network gives 97% accuracy, and it’s at the present time the best-known result. The technique based on the support vector machine made it possible to achieve 96% accuracy. The difference between the results of the hybrid neural network and the support vector machine was approximately 5%.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81753039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
SPIIRAS Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1