首页 > 最新文献

SPIIRAS Proceedings最新文献

英文 中文
Applied Aspects of Ranking Algorithms for Oriented Weighted Graphs (on The Example of Social Network Graphs) 面向加权图排序算法的应用(以社交网络图为例)
Q3 Mathematics Pub Date : 2018-12-01 DOI: 10.15622/SP.61.4
Виталий Владимирович Печенкин, Михаил Сергеевич Королёв, Любомир Ванков Димитров
The article deals with the applied aspects of the preliminary vertices ranking for oriented weighted graph. In this paper, the authors observed the widespread use of this technique in developing heuristic discrete optimization algorithms. The ranking problem is directly related to the problem of social networks centrality and large real world data sets but as shown in the article ranking is explicitly or implicitly used in the development of algorithms as the initial stage of obtaining a solution for solving applied problems. Examples of such ranking application are given. The examples demonstrate the increase of efficiency for solving some optimization applied problems, which are widely used in mathematical methods of optimization, decision-making not only from the theoretical development point of view but also their applications. The article describes the structure of the first phase of the computational experiment, which is associated with the procedure of obtaining test data sets. The obtained data are presented by weighted graphs that correspond to several groups of the social network Vkontakte with the number of participants in the range from 9000 to 24 thousand. It is shown that the structural characteristics of the obtained graphs differ significantly in the number of connectivity components. Characteristics of centrality (degree's sequences), as shown, have exponential distribution. The main attention is given to the analysis of three approaches to graph vertices ranking. We propose analysis and comparison of the obtained set of ranks by the nature of their distribution. The definition of convergence for graph vertex ranking algorithms is introduced and the differences of their use in considering the data of large dimension and the need to build a solution in the presence of local changes are discussed.
本文讨论了面向加权图的初步顶点排序的应用。在本文中,作者观察到这种技术在开发启发式离散优化算法中的广泛使用。排名问题与社交网络中心性和大型现实世界数据集的问题直接相关,但正如文章所示,排名在算法开发中或明或暗地被用作获得解决应用问题的解决方案的初始阶段。给出了这种排序应用的实例。实例表明,求解一些优化应用问题提高了效率,不仅从理论发展的角度,而且从应用的角度来看,这些问题在优化决策的数学方法中得到了广泛的应用。本文描述了计算实验第一阶段的结构,该阶段与获得测试数据集的过程有关。获得的数据通过加权图表示,这些加权图对应于社交网络Vkontakte的几个组,参与者的数量在9000到24000之间。结果表明,所得图的结构特征在连通性分量的数量上有显著差异。中心性的特征(度的序列)如图所示,呈指数分布。重点分析了图顶点排序的三种方法。我们建议对得到的秩集根据其分布的性质进行分析和比较。介绍了图顶点排序算法收敛性的定义,讨论了它们在考虑大维数据和需要在局部变化情况下建立解决方案时的区别。
{"title":"Applied Aspects of Ranking Algorithms for Oriented Weighted Graphs (on The Example of Social Network Graphs)","authors":"Виталий Владимирович Печенкин, Михаил Сергеевич Королёв, Любомир Ванков Димитров","doi":"10.15622/SP.61.4","DOIUrl":"https://doi.org/10.15622/SP.61.4","url":null,"abstract":"The article deals with the applied aspects of the preliminary vertices ranking for oriented weighted graph. In this paper, the authors observed the widespread use of this technique in developing heuristic discrete optimization algorithms. The ranking problem is directly related to the problem of social networks centrality and large real world data sets but as shown in the article ranking is explicitly or implicitly used in the development of algorithms as the initial stage of obtaining a solution for solving applied problems. Examples of such ranking application are given. The examples demonstrate the increase of efficiency for solving some optimization applied problems, which are widely used in mathematical methods of optimization, decision-making not only from the theoretical development point of view but also their applications. The article describes the structure of the first phase of the computational experiment, which is associated with the procedure of obtaining test data sets. The obtained data are presented by weighted graphs that correspond to several groups of the social network Vkontakte with the number of participants in the range from 9000 to 24 thousand. It is shown that the structural characteristics of the obtained graphs differ significantly in the number of connectivity components. Characteristics of centrality (degree's sequences), as shown, have exponential distribution. The main attention is given to the analysis of three approaches to graph vertices ranking. We propose analysis and comparison of the obtained set of ranks by the nature of their distribution. The definition of convergence for graph vertex ranking algorithms is introduced and the differences of their use in considering the data of large dimension and the need to build a solution in the presence of local changes are discussed.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"59 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72403360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Indirect Control of Oscillations: Elements of Theory 振荡的间接控制:理论要素
Q3 Mathematics Pub Date : 2018-12-01 DOI: 10.15622/SP.18.1.148-175
V. Chernyshev, L. Savin, O. Fominova
A brief review of the main research areas in the field of controlled vibration protection systems is given. It is shown that Vibration systems with indirect control processes of oscillations allow with a minimum expenditure of energy to ensure programmable switching parameters and structures, in which the dissipative restoring and inertial forces generated on the basis of active impact. Within synthesis of indirect control the chains of new auxiliary mathematical constructs for finding optimal synthesizing functions of the elastic-damping units parameters control are obtained. It enabled to separate a base model with intermittent damping and base model with impulse trap. As a result of the study, based on the harmonic balance method, the dynamic properties of the basic model with intermittent damping, calculation formulas are obtained for determining the parameters of the compensation effect and calculating the dynamic coefficient. It is established that, with an optimal sequence of damping switching, the resonant phenomena are eliminated, and the transient processes decay within one period of the kinematic perturbation. The basic model with a pulse trap imitates the limiting variant of intermittent damping and realizes the process of superimposing constraining bonds, the sequence and duration of which are new variables essentially increasing controllability. And for indirect pulse control, there exicts a certain minimum of power consumption independent of the achieved effect of vibration protection. A regulated increase in the duration of the application of the restraining coupling in the low-frequency region and a decrease in this duration in the high-frequency region provides a monotonically decreasing dependence on the dynamic coefficients over the entire frequency range. An example of a solution to the optimization problem of controlling the damping process for a basic model of a vibration isolation system is considered. It is established that intermittent damping is an indispensable feature of the optimality of the vibration isolation system: the damper switches on when the sign of the object's speed has changed and turns off when the object's displacement sign has changed.
简要介绍了可控振动保护系统的主要研究领域。研究表明,具有间接控制过程的振动系统可以以最小的能量消耗来保证可编程的开关参数和结构,其中在主动冲击的基础上产生耗散恢复力和惯性力。在间接控制的综合中,得到了寻找弹性阻尼单元最优综合函数的新的辅助数学构造链。它可以将具有间歇阻尼的基本模型与具有脉冲陷阱的基本模型分离开来。研究结果表明,基于谐波平衡法,得到了具有间歇阻尼的基本模型的动力特性,确定了补偿效果参数和计算动力系数的计算公式。结果表明,采用最优的阻尼切换顺序可以消除谐振现象,且瞬态过程在运动扰动的一个周期内衰减。带脉冲陷阱的基本模型模拟了间歇性阻尼的极限变化,实现了约束键的叠加过程,约束键的顺序和持续时间是增加可控性的新变量。对于间接脉冲控制,存在一定的与振动保护效果无关的最小功耗。抑制耦合在低频区应用的持续时间的有规律的增加和在高频区应用的持续时间的减少,在整个频率范围内提供了对动态系数单调递减的依赖。考虑了隔振系统基本模型阻尼过程控制优化问题的一个求解实例。建立了间歇阻尼是隔振系统最优性不可缺少的特征:当物体的速度符号发生变化时,阻尼器打开,当物体的位移符号发生变化时,阻尼器关闭。
{"title":"Indirect Control of Oscillations: Elements of Theory","authors":"V. Chernyshev, L. Savin, O. Fominova","doi":"10.15622/SP.18.1.148-175","DOIUrl":"https://doi.org/10.15622/SP.18.1.148-175","url":null,"abstract":"A brief review of the main research areas in the field of controlled vibration protection systems is given. It is shown that Vibration systems with indirect control processes of oscillations allow with a minimum expenditure of energy to ensure programmable switching parameters and structures, in which the dissipative restoring and inertial forces generated on the basis of active impact. Within synthesis of indirect control the chains of new auxiliary mathematical constructs for finding optimal synthesizing functions of the elastic-damping units parameters control are obtained. It enabled to separate a base model with intermittent damping and base model with impulse trap. As a result of the study, based on the harmonic balance method, the dynamic properties of the basic model with intermittent damping, calculation formulas are obtained for determining the parameters of the compensation effect and calculating the dynamic coefficient. It is established that, with an optimal sequence of damping switching, the resonant phenomena are eliminated, and the transient processes decay within one period of the kinematic perturbation. The basic model with a pulse trap imitates the limiting variant of intermittent damping and realizes the process of superimposing constraining bonds, the sequence and duration of which are new variables essentially increasing controllability. And for indirect pulse control, there exicts a certain minimum of power consumption independent of the achieved effect of vibration protection. A regulated increase in the duration of the application of the restraining coupling in the low-frequency region and a decrease in this duration in the high-frequency region provides a monotonically decreasing dependence on the dynamic coefficients over the entire frequency range. An example of a solution to the optimization problem of controlling the damping process for a basic model of a vibration isolation system is considered. It is established that intermittent damping is an indispensable feature of the optimality of the vibration isolation system: the damper switches on when the sign of the object's speed has changed and turns off when the object's displacement sign has changed.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83623193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
One of the main functions of an information security system is the identification of any access subject to be able to investigate information security incidents. During executing procedures of scanning and vulnerability exploitation, qualified adversaries 信息安全系统的主要功能之一是识别任何访问对象,以便能够调查信息安全事件。在执行扫描和漏洞利用过程中,合格的攻击者
Q3 Mathematics Pub Date : 2018-12-01 DOI: 10.15622/sp.61.6
A. Iskhakov, A. Iskhakova, R. Meshcheryakov, Reda Bendraou, O. Melekhova
One of the main functions of an information security system is the identification of any access subject to be able to investigate information security incidents. During executing procedures of scanning and vulnerability exploitation, qualified adversaries regularly change identifying features. Such operations can not only obfuscate logging the data in subsystems, thus, complicating the restoring of events chronology for an information security expert but also call into question the irrefutability of the evidence of participation of particular adversary to particular illegal operations. In the paper analyses of application of modern approaches of adversary identification in web resources, which does not require authentification of main part of users, is given (fingerprinting, analysis of behavioral features). Along with widely used in web analytics “thermal maps”, user adapted profile and computer model of dynamics of “user-mouse” system, authors offer to identify the subjects of information security incident in readily available informational resources of the Internet. The main idea of the prospective approach consists of the following: when a thermal map is built, not only the density of data layout should be considered but also statistical parameters should be defined by an expert (the distance of intensity gradient, distance overlap, etc.). The authors also offer to consider the dynamics of user operations (e.g. calculation of the average duration of data entry into interactive elements). A description of each step of an appropriate technique and also information on its practical implementation are given. Robustness of the given approach is confirmed by a practical experiment. The offered technique is not a universal instrument of adversary identification . Only manual targeted attacks are considered, the cURL tools etc. used by adversaries are not taken into account. Therefore, it is recommended to use this technique exclusively in addition to working protective systems (WAF, IPS, IDS).
信息安全系统的主要功能之一是识别任何访问对象,以便能够调查信息安全事件。在执行扫描和漏洞利用过程中,符合条件的攻击者会定期更改识别特征。这样的操作不仅会混淆子系统中的数据记录,从而使信息安全专家恢复事件时间顺序变得复杂,而且还会对特定对手参与特定非法操作的证据的不可辩驳性提出质疑。本文分析了不需要对主要用户进行身份验证的现代攻击者识别方法(指纹识别、行为特征分析)在网络资源中的应用。结合在网络分析中广泛应用的“热力图”、用户自适应的“用户-鼠标”系统动态模型和计算机模型,提出了在互联网现有信息资源中识别信息安全事件主体的方法。前瞻性方法的主要思想是:在建立热图时,不仅要考虑数据布局的密度,还要由专家定义统计参数(强度梯度的距离、距离重叠等)。作者还提出考虑用户操作的动态(例如,计算交互元素中数据输入的平均持续时间)。给出了适当技术的每个步骤的描述以及其实际实现的信息。通过实际实验验证了该方法的鲁棒性。所提供的技术并不是识别对手的通用工具。只考虑手动目标攻击,不考虑对手使用的cURL工具等。因此,除了工作保护系统(WAF, IPS, IDS)外,建议专门使用该技术。
{"title":"One of the main functions of an information security system is the identification of any access subject to be able to investigate information security incidents. During executing procedures of scanning and vulnerability exploitation, qualified adversaries","authors":"A. Iskhakov, A. Iskhakova, R. Meshcheryakov, Reda Bendraou, O. Melekhova","doi":"10.15622/sp.61.6","DOIUrl":"https://doi.org/10.15622/sp.61.6","url":null,"abstract":"One of the main functions of an information security system is the identification of any access subject to be able to investigate information security incidents. During executing procedures of scanning and vulnerability exploitation, qualified adversaries regularly change identifying features. Such operations can not only obfuscate logging the data in subsystems, thus, complicating the restoring of events chronology for an information security expert but also call into question the irrefutability of the evidence of participation of particular adversary to particular illegal operations. \u0000In the paper analyses of application of modern approaches of adversary identification in web resources, which does not require authentification of main part of users, is given (fingerprinting, analysis of behavioral features). \u0000Along with widely used in web analytics “thermal maps”, user adapted profile and computer model of dynamics of “user-mouse” system, authors offer to identify the subjects of information security incident in readily available informational resources of the Internet. The main idea of the prospective approach consists of the following: when a thermal map is built, not only the density of data layout should be considered but also statistical parameters should be defined by an expert (the distance of intensity gradient, distance overlap, etc.). The authors also offer to consider the dynamics of user operations (e.g. calculation of the average duration of data entry into interactive elements). A description of each step of an appropriate technique and also information on its practical implementation are given. Robustness of the given approach is confirmed by a practical experiment. The offered technique is not a universal instrument of adversary identification . Only manual targeted attacks are considered, the cURL tools etc. used by adversaries are not taken into account. Therefore, it is recommended to use this technique exclusively in addition to working protective systems (WAF, IPS, IDS).","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88331384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key 基于共享密钥的伪概率加密方法与算法
Q3 Mathematics Pub Date : 2018-12-01 DOI: 10.15622/sp.61.5
A. Moldovyan, N. Moldovyan
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable encryption. The lasts are divided on the following types: 1) schemes with public key, 2) schemes with shares secret key, and 3) no-key schemes. There are introduced pseudo-probabilistic symmetric ciphers that represent a particular variant of implementing deniable encryption algorithms. It is discussed application of the pseudo-probabilistic encryption for constructing special mechanisms of the information protection including steganographic channels hidden in ciphertexts. There are considered methods for designing stream and block pseudo-probabilistic encryption algorithms that implement simultaneous ciphering fake and secret messages so that the generated ciphertext is computationally indistinguishable from the ciphertext obtained as output of the probabilistic encryption of the fake message. The requirement of the ciphertext indistinguishability from the probabilistic encryption has been used as one of the design criteria. To implement this criterion in the construction scheme of the pseudo-probabilistic ciphers it is included step of bijective mapping pairs of intermediate ciphertext blocks of the fake and secret messages into a single expanded block of the output ciphertext. Implementations of the pseudo-probabilistic block ciphers in which algorithms for recovering the fake and secret messages coincide completely are also considered. There are proposed general approaches to constructing no-key encryption protocols and randomized pseudo-probabilistic block ciphers. Concrete implementations of the cryptoschemes of such types are presented.
作为在潜在的强制攻击情况下通过公共通道发送的消息提供安全的一种方法,已经提出了可否认加密的算法和协议。最后分为以下几种类型:1)具有公钥的方案,2)具有共享密钥的方案,以及3)无密钥方案。引入了伪概率对称密码,表示实现可否认加密算法的特定变体。讨论了伪概率加密在构建包含隐藏在密文中的隐写信道的特殊信息保护机制中的应用。有一些设计流和块伪概率加密算法的考虑方法,这些算法可以同时对假消息和秘密消息进行加密,从而使生成的密文与作为假消息概率加密的输出而获得的密文在计算上无法区分。密文与概率加密的不可区分性被作为设计标准之一。为了在伪概率密码的构造方案中实现这一准则,将假消息和秘密消息的中间密文块双射映射到输出密文的单个扩展块中。本文还考虑了恢复假消息和秘密消息的算法完全一致的伪概率分组密码的实现。提出了构造无密钥加密协议和随机伪概率分组密码的一般方法。给出了这类密码方案的具体实现。
{"title":"Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key","authors":"A. Moldovyan, N. Moldovyan","doi":"10.15622/sp.61.5","DOIUrl":"https://doi.org/10.15622/sp.61.5","url":null,"abstract":"As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable encryption. The lasts are divided on the following types: 1) schemes with public key, 2) schemes with shares secret key, and 3) no-key schemes. There are introduced pseudo-probabilistic symmetric ciphers that represent a particular variant of implementing deniable encryption algorithms. It is discussed application of the pseudo-probabilistic encryption for constructing special mechanisms of the information protection including steganographic channels hidden in ciphertexts. There are considered methods for designing stream and block pseudo-probabilistic encryption algorithms that implement simultaneous ciphering fake and secret messages so that the generated ciphertext is computationally indistinguishable from the ciphertext obtained as output of the probabilistic encryption of the fake message. The requirement of the ciphertext indistinguishability from the probabilistic encryption has been used as one of the design criteria. To implement this criterion in the construction scheme of the pseudo-probabilistic ciphers it is included step of bijective mapping pairs of intermediate ciphertext blocks of the fake and secret messages into a single expanded block of the output ciphertext. Implementations of the pseudo-probabilistic block ciphers in which algorithms for recovering the fake and secret messages coincide completely are also considered. There are proposed general approaches to constructing no-key encryption protocols and randomized pseudo-probabilistic block ciphers. Concrete implementations of the cryptoschemes of such types are presented.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"111 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81200777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differential Ranging Method of Locating Satellite Communication System Earth Stations using Repeater on an Unmanned Aerial Vehicle 无人机中继器定位卫星通信系统地面站的差分测距方法
Q3 Mathematics Pub Date : 2018-12-01 DOI: 10.15622/sp.18.1.176-201
K. Ovcharenko, I. Eremeev, K. Sazonov, Sergej Semenjuk, A. Abakumov
The article presents the differential ranging method of locating modern earth stations with narrow radiation patterns. Earth station position data is proposed to be calculated using maximum-likelihood procedure system solution from three differential equations using one of numerical methods. In this case supplementary assessment parameter of location, calculated by measuring a mutual signal delay of an earth station, relayed through a spacecraft on geostationary orbit and a mobile repeater on the unmanned aerial vehicle, can improve the accuracy of coordinate estimation earth station. For the developed method the analytical expressions of potential accuracy of calculation of coordinates of the earth station on the basis of the Cramer–Rao lower bound are developed. To measure the positioning accuracy of located emitters it is suggested to use the errors ellipsoid corresponding to the provision of a source of a radio emission in space. The analysis of standard routes of the movement of a repeater on the unmanned aerial vehicle is carried out and the conclusion is drawn that the best accuracy and the shortest route simultaneously are achieved, if the unmanned aerial vehicle follows a circular trajectory along the control area. Calculation of potential accuracy of positioning of the terrestrial station for the area of 50 by 50 km is executed.It is shown that the error of the estimates, received as a result of statistical tests, doesn’t surpass the size of a big half shaft of the error ellipsoid calculated with application of analytical expressions. The application of the developed method is possible in the implementation of the software of electronic control systems to counteract illegitimate use of frequency resource of space vehicles-satellite repeaters communication system.
本文介绍了窄辐射方向图现代地面站的差分测距方法。提出了用最大似然程序求解三个微分方程的地面站位置数据,并采用其中一种数值方法求解。在这种情况下,通过地球静止轨道上的航天器和无人机上的移动中继器中继地球站的相互信号延迟,通过测量地球站的相互信号延迟来计算补充位置评估参数,可以提高地球站坐标估计的精度。针对所提出的方法,给出了基于Cramer-Rao下界的地面站坐标计算潜在精度的解析表达式。为了测量定位发射器的定位精度,建议使用与空间射电辐射源提供相对应的误差椭球。对无人机上中继器运动的标准航路进行了分析,得出了当无人机沿控制区域沿圆形轨迹飞行时,可同时获得最佳精度和最短航路。对50 × 50 km范围内地面站的潜在定位精度进行了计算。结果表明,经统计检验得到的估计误差不超过用解析表达式计算的误差椭球的大半轴的尺寸。该方法可应用于电子控制系统软件的实现中,以对抗星载中继器通信系统频率资源的非法利用。
{"title":"Differential Ranging Method of Locating Satellite Communication System Earth Stations using Repeater on an Unmanned Aerial Vehicle","authors":"K. Ovcharenko, I. Eremeev, K. Sazonov, Sergej Semenjuk, A. Abakumov","doi":"10.15622/sp.18.1.176-201","DOIUrl":"https://doi.org/10.15622/sp.18.1.176-201","url":null,"abstract":"The article presents the differential ranging method of locating modern earth stations with narrow radiation patterns. Earth station position data is proposed to be calculated using maximum-likelihood procedure system solution from three differential equations using one of numerical methods. In this case supplementary assessment parameter of location, calculated by measuring a mutual signal delay of an earth station, relayed through a spacecraft on geostationary orbit and a mobile repeater on the unmanned aerial vehicle, can improve the accuracy of coordinate estimation earth station. \u0000For the developed method the analytical expressions of potential accuracy of calculation of coordinates of the earth station on the basis of the Cramer–Rao lower bound are developed. \u0000To measure the positioning accuracy of located emitters it is suggested to use the errors ellipsoid corresponding to the provision of a source of a radio emission in space. \u0000The analysis of standard routes of the movement of a repeater on the unmanned aerial vehicle is carried out and the conclusion is drawn that the best accuracy and the shortest route simultaneously are achieved, if the unmanned aerial vehicle follows a circular trajectory along the control area. \u0000Calculation of potential accuracy of positioning of the terrestrial station for the area of 50 by 50 km is executed.It is shown that the error of the estimates, received as a result of statistical tests, doesn’t surpass the size of a big half shaft of the error ellipsoid calculated with application of analytical expressions. \u0000The application of the developed method is possible in the implementation of the software of electronic control systems to counteract illegitimate use of frequency resource of space vehicles-satellite repeaters communication system.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81988140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
System Functioning Efficiency and Other System Operational Properties: Research Problems, Evaluation Method 系统运作效率与其他系统运作特性:研究问题与评估方法
Q3 Mathematics Pub Date : 2018-10-01 DOI: 10.15622/sp.60.9
A. Ashimov, Alexander Sergeevich Geida, I. Lysenko, R. Yusupov
{"title":"System Functioning Efficiency and Other System Operational Properties: Research Problems, Evaluation Method","authors":"A. Ashimov, Alexander Sergeevich Geida, I. Lysenko, R. Yusupov","doi":"10.15622/sp.60.9","DOIUrl":"https://doi.org/10.15622/sp.60.9","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77667148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Method of Multiobjective Optimization of Controlled Systems with Distributed Parameters 分布参数控制系统的多目标优化方法
Q3 Mathematics Pub Date : 2018-10-01 DOI: 10.15622/SP.60.3
Эдгар Яковлевич Рапопорт, Юлия Эдгаровна Плешивцева
The constructive method for multicriteria optimization of control processes of deterministic and not fully defined controlled systems with distributed parameters, described by linear multidimensional parabolic partial differential equations with internal and boundary control actions, is proposed. The optimization problem is considered when an uniform approximation accuracy of object’s final state to the required spatial distribution of controlled function is given. The suggested approach is based on the one-criterion option in the form of minimax convolution of the normalized quality criteria and the subsequent transition to the equivalent form of a typical variational problem with constraints. It is applied to the deterministic model of an object described by an infinite system of differential equations with respect to time-dependent modes of the controlled quantity expansion in a series of eigenfunctions of the initial-boundary value problem. Further procedures for the preliminary parametrization of control actions, based on analytical optimum conditions and reduction to semi-infinite programming problems, allow one to find the desired extremals using their Chebyshev properties and fundamental laws of the domain in typical application conditions of estimating the accuracy of approaching the object’s final state to the required one in a uniform metric. The obtained results are extended to the tasks of program control on the principle of guaranteed result by ensembles of object trajectories under conditions of interval uncertainty of the parametric characteristics of the distributed system and multiple external disturbances. A demonstrated example of a multicriteria optimization of an innovation technology of metal induction heating prior a hot forming is of special interest. The typical optimization criteria such as energy consumption, metal loss due to scale formation, and heating accuracy are considered as components of vector optimization criterion.
提出了具有内部和边界控制作用的线性多维抛物型偏微分方程描述的具有分布参数的确定性和非完全定义被控系统控制过程多准则优化的构造方法。当给定目标最终状态对所要求的被控函数空间分布的均匀逼近精度时,就考虑了优化问题。建议的方法是基于标准化质量标准的极大极小卷积形式的单准则选项,并随后过渡到具有约束的典型变分问题的等效形式。将该方法应用于由无限微分方程组描述的对象的确定性模型,该模型相对于初始边值问题的一系列特征函数中控制量展开的时变模。控制动作的初步参数化的进一步程序,基于解析最优条件和简化到半无限规划问题,允许一个人找到所需的极值使用他们的切比雪夫性质和领域的基本定律,在典型的应用条件下,估计接近目标的最终状态的精度,以一个统一的度量所需的一个。将所得结果推广到分布式系统参数特性区间不确定和多重外部干扰条件下,基于目标轨迹集成保证结果原则的程序控制任务。一个示范的多标准优化的创新技术的金属感应加热前热成形特别感兴趣的例子。将能量消耗、金属结垢损失、加热精度等典型优化准则作为矢量优化准则的组成部分。
{"title":"Method of Multiobjective Optimization of Controlled Systems with Distributed Parameters","authors":"Эдгар Яковлевич Рапопорт, Юлия Эдгаровна Плешивцева","doi":"10.15622/SP.60.3","DOIUrl":"https://doi.org/10.15622/SP.60.3","url":null,"abstract":"The constructive method for multicriteria optimization of control processes of deterministic and not fully defined controlled systems with distributed parameters, described by linear multidimensional parabolic partial differential equations with internal and boundary control actions, is proposed. The optimization problem is considered when an uniform approximation accuracy of object’s final state to the required spatial distribution of controlled function is given. The suggested approach is based on the one-criterion option in the form of minimax convolution of the normalized quality criteria and the subsequent transition to the equivalent form of a typical variational problem with constraints. It is applied to the deterministic model of an object described by an infinite system of differential equations with respect to time-dependent modes of the controlled quantity expansion in a series of eigenfunctions of the initial-boundary value problem. Further procedures for the preliminary parametrization of control actions, based on analytical optimum conditions and reduction to semi-infinite programming problems, allow one to find the desired extremals using their Chebyshev properties and fundamental laws of the domain in typical application conditions of estimating the accuracy of approaching the object’s final state to the required one in a uniform metric. The obtained results are extended to the tasks of program control on the principle of guaranteed result by ensembles of object trajectories under conditions of interval uncertainty of the parametric characteristics of the distributed system and multiple external disturbances. A demonstrated example of a multicriteria optimization of an innovation technology of metal induction heating prior a hot forming is of special interest. The typical optimization criteria such as energy consumption, metal loss due to scale formation, and heating accuracy are considered as components of vector optimization criterion.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80661088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Motion-Planning System for a Domestic Service Robot 家用服务机器人的运动规划系统
Q3 Mathematics Pub Date : 2018-10-01 DOI: 10.15622/sp.60.1
Marco Negrete, J. Savage, Luis Angel Contreras-Toledo
Negrete M., Savage J., Contreras L. AMotion-Planning System for a Domestic Service Robot. Abstract. Service robots are intended to help humans in non-industrial environments such as houses or offices. To accomplish their goal, service robots must have several skills such as object recognition and manipulation, face detection and recognition, speech recognition and synthesis, task planning and, one of the most important, navigation in dynamic environments. This paper describes a fully implemented motion-planning system which comprehends from motion and path planning algorithms to spatial representation and behavior-based active navigation. The proposed system is implemented in Justina, a domestic service robot whose design is based on the ViRBot, an architecture to operate virtual and real robots that encompasses several layers of abstraction, from low-level control to symbolic planning. We evaluated our proposal both in simulated and real environments and compared it to classical implementations. For the tests, we used maps obtained from real environments (the Biorobotics Laboratory and the Robocup@Home arena) and maps generated from obstacles with random positions and shapes. Several parameters were used for comparison: the total traveled distance, the number of collisions, the number of reached goal points and the average execution speed. Our proposal performed significantly better both in real and simulated tests. Finally, we show our results in the context of the RoboCup@Home competition, where the system was successfully tested.
李建军,刘建军,李建军。一种基于运动规划的家政服务机器人。摘要服务型机器人旨在帮助人类在非工业环境中工作,如家庭或办公室。为了实现他们的目标,服务机器人必须具备多种技能,如物体识别和操作,人脸检测和识别,语音识别和合成,任务规划,以及最重要的,在动态环境中的导航。本文描述了一个完整实现的运动规划系统,它涵盖了从运动和路径规划算法到空间表示和基于行为的主动导航。所提出的系统在Justina中实现,这是一个基于ViRBot设计的家庭服务机器人,ViRBot是一种操作虚拟和真实机器人的架构,包含从低级控制到符号规划的几个抽象层。我们在模拟和真实环境中评估了我们的建议,并将其与经典实现进行了比较。在测试中,我们使用了从真实环境(生物机器人实验室和Robocup@Home竞技场)获得的地图,以及从具有随机位置和形状的障碍物生成的地图。使用几个参数进行比较:总行进距离、碰撞次数、到达目标点的次数和平均执行速度。我们的建议在真实和模拟测试中都表现得更好。最后,我们在RoboCup@Home竞赛中展示了我们的结果,在该竞赛中,系统成功地进行了测试。
{"title":"A Motion-Planning System for a Domestic Service Robot","authors":"Marco Negrete, J. Savage, Luis Angel Contreras-Toledo","doi":"10.15622/sp.60.1","DOIUrl":"https://doi.org/10.15622/sp.60.1","url":null,"abstract":"Negrete M., Savage J., Contreras L. AMotion-Planning System for a Domestic Service Robot. Abstract. Service robots are intended to help humans in non-industrial environments such as houses or offices. To accomplish their goal, service robots must have several skills such as object recognition and manipulation, face detection and recognition, speech recognition and synthesis, task planning and, one of the most important, navigation in dynamic environments. This paper describes a fully implemented motion-planning system which comprehends from motion and path planning algorithms to spatial representation and behavior-based active navigation. The proposed system is implemented in Justina, a domestic service robot whose design is based on the ViRBot, an architecture to operate virtual and real robots that encompasses several layers of abstraction, from low-level control to symbolic planning. We evaluated our proposal both in simulated and real environments and compared it to classical implementations. For the tests, we used maps obtained from real environments (the Biorobotics Laboratory and the Robocup@Home arena) and maps generated from obstacles with random positions and shapes. Several parameters were used for comparison: the total traveled distance, the number of collisions, the number of reached goal points and the average execution speed. Our proposal performed significantly better both in real and simulated tests. Finally, we show our results in the context of the RoboCup@Home competition, where the system was successfully tested.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90411281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Group control of autonomous robots motion in uncertain environment via unstable modes 基于不稳定模式的不确定环境下自主机器人运动群体控制
Q3 Mathematics Pub Date : 2018-10-01 DOI: 10.15622/sp.60.2
Viacheslav Khasanovich Pshikhopov, Mikhail Yurievich Medvedev
{"title":"Group control of autonomous robots motion in uncertain environment via unstable modes","authors":"Viacheslav Khasanovich Pshikhopov, Mikhail Yurievich Medvedev","doi":"10.15622/sp.60.2","DOIUrl":"https://doi.org/10.15622/sp.60.2","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"351 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80040568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Analysis of Transformation Trends in Enterprise Management Principles in the Era of Industry 4.0 Technology 工业4.0技术时代企业管理原则转型趋势分析
Q3 Mathematics Pub Date : 2018-10-01 DOI: 10.15622/sp.60.4
D. Ivanov, Marina Ivanova, B. V. Sokolov
This study is devoted to the existing and future information technology that forms a base for concepts of Industry 4.0 and cyber-physical systems using examples of firms that apply this technology. Examples include manufacturing and transportation companies. The objective of this paper is to analyse the impact of intelligent information technologies in Industry 4.0 and cyber-physical systems on the enterprise management principles in near future. The transformation trends are illustrated on case-study examples. The literature and case-study analysis shows that enterprise management in manufacturing and transportation lacks understanding of Industry 4.0 and cyber-physical systems in terms of application to concrete business models. The reviews cases lead to the conclusion that the Industry 4.0 and cyber-physical technology applications are rather contextual and engineering-oriented. The implementation of the main principle of the Industry 4.0 and cyber-physical technology , i.e., the self-organisation and self-adaption of dynamic networked structures along the entire product lifecycle to ensure the flexible individual manufacturing at the mass production costs, has been yet applied very restrictively and mostly in research projects. The paper presents an original interpretation of the service-oriented approach to modeling and solution of the information technology assessment and selection problems to facilitate a broader application in firms. This approach is based on the structural dynamics control theory developed by the authors.
{"title":"Analysis of Transformation Trends in Enterprise Management Principles in the Era of Industry 4.0 Technology","authors":"D. Ivanov, Marina Ivanova, B. V. Sokolov","doi":"10.15622/sp.60.4","DOIUrl":"https://doi.org/10.15622/sp.60.4","url":null,"abstract":"This study is devoted to the existing and future information technology that forms a base for concepts of Industry 4.0 and cyber-physical systems using examples of firms that apply this technology. Examples include manufacturing and transportation companies. The objective of this paper is to analyse the impact of intelligent information technologies in Industry 4.0 and cyber-physical systems on the enterprise management principles in near future. The transformation trends are illustrated on case-study examples. The literature and case-study analysis shows that enterprise management in manufacturing and transportation lacks understanding of Industry 4.0 and cyber-physical systems in terms of application to concrete business models. The reviews cases lead to the conclusion that the Industry 4.0 and cyber-physical technology applications are rather contextual and engineering-oriented. The implementation of the main principle of the Industry 4.0 and cyber-physical technology , i.e., the self-organisation and self-adaption of dynamic networked structures along the entire product lifecycle to ensure the flexible individual manufacturing at the mass production costs, has been yet applied very restrictively and mostly in research projects. The paper presents an original interpretation of the service-oriented approach to modeling and solution of the information technology assessment and selection problems to facilitate a broader application in firms. This approach is based on the structural dynamics control theory developed by the authors.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75018070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
SPIIRAS Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1