An extremely simple and high-performance genome-wide association study (GWAS) algorithm for estimating the main and epistatic effects of markers or single nucleotide polymorphisms (SNPs) is proposed. The main idea underlying the algorithm is based on comparison of genotypes of pairs of individuals and comparison of the corresponding phenotype values. It is used the intuitive assumption that changes of alleles corresponding to important SNPs in a pair of individuals lead to a large difference of phenotype values of these individuals. In other words, the algorithm is based on considering pairs of individuals instead of SNPs or pairs of SNPs. The main advantage of the algorithm is that it weakly depends on the number of SNPs in a genotype matrix. It mainly depends on the number of individuals, which is typically very small in comparison with the number of SNPs. Another important advantage of the algorithm is that it can detect the epistatic effect viewed as gene-gene interaction without additional computations. The algorithm can also be used when the phenotype takes only two values (the case-control study). Moreover, it can be simply extended from the analysis of binary genotype matrices to the microarray gene expression data analysis. Numerical experiments with real data sets consisting of populations of double haploid lines of barley illustrate the outperformance of the proposed algorithm in comparison with standard GWAS algorithms from the computation point of view especially for detecting the gene-gene interactions. The ways for improving the proposed algorithm are discussed in the paper.
{"title":"A High-Performance Genome-Wide Association Study Algorithm based on Analysis of Pairs of Individuals","authors":"Лев Владимирович Уткин, Ирина Львовна Уткина","doi":"10.15622/SP.58.1","DOIUrl":"https://doi.org/10.15622/SP.58.1","url":null,"abstract":"An extremely simple and high-performance genome-wide association study (GWAS) algorithm for estimating the main and epistatic effects of markers or single nucleotide polymorphisms (SNPs) is proposed. The main idea underlying the algorithm is based on comparison of genotypes of pairs of individuals and comparison of the corresponding phenotype values. It is used the intuitive assumption that changes of alleles corresponding to important SNPs in a pair of individuals lead to a large difference of phenotype values of these individuals. In other words, the algorithm is based on considering pairs of individuals instead of SNPs or pairs of SNPs. The main advantage of the algorithm is that it weakly depends on the number of SNPs in a genotype matrix. It mainly depends on the number of individuals, which is typically very small in comparison with the number of SNPs. Another important advantage of the algorithm is that it can detect the epistatic effect viewed as gene-gene interaction without additional computations. The algorithm can also be used when the phenotype takes only two values (the case-control study). Moreover, it can be simply extended from the analysis of binary genotype matrices to the microarray gene expression data analysis. Numerical experiments with real data sets consisting of populations of double haploid lines of barley illustrate the outperformance of the proposed algorithm in comparison with standard GWAS algorithms from the computation point of view especially for detecting the gene-gene interactions. The ways for improving the proposed algorithm are discussed in the paper.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74609262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Parshutkin, D. Levin, S. Zaytsev, Aleksandr Valentinovich Egin
This work is devoted to the rational choice of formation parameters for the masking noise and structural interference and their combined use for the protection of confidential information against leaks in the stray electromagnetic radiations channel of the displaying units using the DVI standard. The work describes the simulation features of the influence of the interferences formed by the active jamming system on the quasioptimum receiver which serves as a tool for the interception. The principles of the pulse components formation in the stray electromagnetic radiations from displays based on the DVI standard-based video data transfer and specific pulse components of structural interference are presented. Noted that mode information output to the monitor screen have the broadband and repetitive stray electromagnetic radiations matching on frequency of the frame scan devices video path. The indicator is set for the estimation of effectiveness of structural interference in the solution of the data protection problem from leakage through the channel of stray electromagnetic radiations – variations of the wrong color recognition probability in the block of graphic information. A detailed description is given for the dependences of the effectiveness indicator of structural interference on a number of frames of an image, accumulated in the technical tool for the interception of stray electromagnetic radiations, as well as for signal/noise to amplitude relation at the input of the technical interception tool. On the basis of the simulation results we have evaluated the effectiveness of applying structural interference on active noise systems. Identified the feasibility of using structural interference with the protection of confidential information from leaking through the channel stray electromagnetic radiations means of information display the DVI standard. The advantages of decreased total output and power consumption by the active jamming devices are shown in comparison with the masking noise and traditional jamming methods.
{"title":"Application of Structural Interference for Data Protection from Information Leakage in the Stray Electromagnetic Radiations Channel","authors":"A. Parshutkin, D. Levin, S. Zaytsev, Aleksandr Valentinovich Egin","doi":"10.15622/sp.58.7","DOIUrl":"https://doi.org/10.15622/sp.58.7","url":null,"abstract":"This work is devoted to the rational choice of formation parameters for the masking noise and structural interference and their combined use for the protection of confidential information against leaks in the stray electromagnetic radiations channel of the displaying units using the DVI standard. \u0000The work describes the simulation features of the influence of the interferences formed by the active jamming system on the quasioptimum receiver which serves as a tool for the interception. The principles of the pulse components formation in the stray electromagnetic radiations from displays based on the DVI standard-based video data transfer and specific pulse components of structural interference are presented. Noted that mode information output to the monitor screen have the broadband and repetitive stray electromagnetic radiations matching on frequency of the frame scan devices video path. \u0000The indicator is set for the estimation of effectiveness of structural interference in the solution of the data protection problem from leakage through the channel of stray electromagnetic radiations – variations of the wrong color recognition probability in the block of graphic information. A detailed description is given for the dependences of the effectiveness indicator of structural interference on a number of frames of an image, accumulated in the technical tool for the interception of stray electromagnetic radiations, as well as for signal/noise to amplitude relation at the input of the technical interception tool. \u0000On the basis of the simulation results we have evaluated the effectiveness of applying structural interference on active noise systems. Identified the feasibility of using structural interference with the protection of confidential information from leaking through the channel stray electromagnetic radiations means of information display the DVI standard. The advantages of decreased total output and power consumption by the active jamming devices are shown in comparison with the masking noise and traditional jamming methods.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88205405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Oriented Competence Management in Expert Networks","authors":"Viktoriia Stepanenko, A. Kashevnik, A. Gurtov","doi":"10.15622/sp.59.7","DOIUrl":"https://doi.org/10.15622/sp.59.7","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80307605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When solving problems related to the analysis and synthesis of communication networks for stability, a special place is simple and easy to understand indicators, weakly linked to the classical concept of exit probability from a state of health. Such deterministic indicators of stability (connectedness, a couple of connections, linear functional connectivity, the number of spanning trees) allow, albeit very approximately, to solve a complex of tasks related to the assessment of the reliability and survivability complex networks. Due to the rather simple analytical form of a linear functional connectivity for the synthesis of structures, it is possible to use the analytical method presented in the work. In this general formulation for the synthesis of connected graphs is formulated as the maximization of the linear functional connec-tivity for all possible graphs with a given number of edges, vertices, and with fixed values of their weighting coefficients.
{"title":"Analysis and Synthesis of Communication Network Structures according to the Determined Stability Indicators","authors":"K. Batenkov, A. Batenkov","doi":"10.15622/SP.58.6","DOIUrl":"https://doi.org/10.15622/SP.58.6","url":null,"abstract":"When solving problems related to the analysis and synthesis of communication networks for stability, a special place is simple and easy to understand indicators, weakly linked to the classical concept of exit probability from a state of health. Such deterministic indicators of stability (connectedness, a couple of connections, linear functional connectivity, the number of spanning trees) allow, albeit very approximately, to solve a complex of tasks related to the assessment of the reliability and survivability complex networks. Due to the rather simple analytical form of a linear functional connectivity for the synthesis of structures, it is possible to use the analytical method presented in the work. In this general formulation for the synthesis of connected graphs is formulated as the maximization of the linear functional connec-tivity for all possible graphs with a given number of edges, vertices, and with fixed values of their weighting coefficients.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81235235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Galic, S. Jovicic, V. Delić, B. Markovic, D. Pavlovic, Đorđe Grozdić
{"title":"HMM-based Whisper Recognition using μ-law Frequency Warping","authors":"J. Galic, S. Jovicic, V. Delić, B. Markovic, D. Pavlovic, Đorđe Grozdić","doi":"10.15622/SP.58.2","DOIUrl":"https://doi.org/10.15622/SP.58.2","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82668294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvements in Serbian Speech Recognition Using Sequence-Trained Deep Neural Networks","authors":"E. Pakoci, B. Popović, D. Pekar","doi":"10.15622/sp.58.3","DOIUrl":"https://doi.org/10.15622/sp.58.3","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83554159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article deals with a tracking control system synthesis for a nonlinear plant functioning under bounded external disturbances which are not available for measurement. A proposed solution is a robust modification of the backstepping approach with the similar controller design structure. The main changes are based on plant model transformations that make it possible to use the only one filer in control system and, along with it, an auxiliary loop method usage to disturbances evaluation and compensation. High-gain observers are used for unknown signals measuring together with their derivatives. Tracking errors and observation errors convergence with the adjustable accuracy during the finite transient time is proved. Efficiency of the algorithm is demonstrated using computer modeling in comparison with an analogue.
{"title":"Output Control of Nonlinear Systems Using Modified Backstepping Algorithm with Disturbances Compensation","authors":"S. Vrazhevsky","doi":"10.15622/sp.58.8","DOIUrl":"https://doi.org/10.15622/sp.58.8","url":null,"abstract":"The article deals with a tracking control system synthesis for a nonlinear plant functioning under bounded external disturbances which are not available for measurement. A proposed solution is a robust modification of the backstepping approach with the similar controller design structure. The main changes are based on plant model transformations that make it possible to use the only one filer in control system and, along with it, an auxiliary loop method usage to disturbances evaluation and compensation. High-gain observers are used for unknown signals measuring together with their derivatives. Tracking errors and observation errors convergence with the adjustable accuracy during the finite transient time is proved. Efficiency of the algorithm is demonstrated using computer modeling in comparison with an analogue.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77288765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Efficiency of Entropy Coding Method in Modern Video Compression Standards","authors":"Van Truong Nguyen, Andrey Tropchenko","doi":"10.15622/sp.58.5","DOIUrl":"https://doi.org/10.15622/sp.58.5","url":null,"abstract":"","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"218 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75615541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Филипп Геннадьевич Нестерук, Игорь Витальевич Котенко, Андрей Владимирович Шоров
Nowadays more and more different bio-inspired approaches (based on a biological metaphor) for the computer and networks security systems are mentioned and advertised. Traditional computer-based systems and their functionality are often limited by different conditions. Due to frequent minor errors, these systems are subject of failure. They lack scalability, have low adaptation ability to changeable conditions of functioning and its goals. As opposed to traditional computer-based systems, biological systems are often quite reliable. They have great self-protection mechanisms, highly scalable, adaptable and able to self regeneration. These properties of biological systems can be used to construct technical systems (including information security systems). The paper considers different approaches to the protection of computer systems and networks, which are based on a biological metaphor.
{"title":"Анализ биоинспирированных подходов для защиты компьютерных систем и сетей","authors":"Филипп Геннадьевич Нестерук, Игорь Витальевич Котенко, Андрей Владимирович Шоров","doi":"10.15622/SP.18.2","DOIUrl":"https://doi.org/10.15622/SP.18.2","url":null,"abstract":"Nowadays more and more different bio-inspired approaches (based on a biological metaphor) for the computer and networks security systems are mentioned and advertised. Traditional computer-based systems and their functionality are often limited by different conditions. Due to frequent minor errors, these systems are subject of failure. They lack scalability, have low adaptation ability to changeable conditions of functioning and its goals. As opposed to traditional computer-based systems, biological systems are often quite reliable. They have great self-protection mechanisms, highly scalable, adaptable and able to self regeneration. These properties of biological systems can be used to construct technical systems (including information security systems). The paper considers different approaches to the protection of computer systems and networks, which are based on a biological metaphor.","PeriodicalId":53447,"journal":{"name":"SPIIRAS Proceedings","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87781320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}