+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 1(97) 31 january 2022 year
Rubric: Models and methods
Authors: Borisov V. V., Kurilin S., Luferov V.

Купить статью

Download the first page

The effectiveness of fuzzy cognitive modeling methods for analyzing and predicting the state of complex technical systems (STS) is justified by the following reasons: significant interdependence, non-linear nature and incompleteness of information about the mutual influence of the analyzed parameters of the CTS; a variety of effects of internal and external factors on the CTS; complexity and cost of conducting experimental studies during the operation of these systems. The main limitations of fuzzy cognitive models for modeling STS dynamics are: the complexity of taking into account the mutual influence of parameters with their different time lags relative to each other; the need for their constant operational adjustment and training of component models for all parameters during the operation of the CTS. In this paper, Fuzzy Relational Cognitive Temporal Models (FRCTM) are developed. These models combine the advantages of various types of fuzzy cognitive models, and at the same time neutralize the main limitations of the analysis and prediction of the state of the CTS, which are inherent in the well- known fuzzy cognitive models. The paper also proposes models of system dynamics that take into account the specifics of the FRCTM. We have also developed an approach and implemented a method for calculating fuzzy dependencies in vector-matrix form for dynamic modeling of the CTS. The proposed method makes it possible to solve the problems of increasing the uncertainty of the results and the output of fuzzy values of the FRCTM concepts beyond the ranges of the base sets due to the execution of mass iterative computations. An example of modeling heterogeneous electromechanical systems based on FRCTM is given. The results obtained are the basis for solving a whole range of tasks of analysis, predictive evaluation, modeling of different scenarios of the functioning and development of heterogeneous electromechanical systems for various system factors, operating modes and external conditions. Continue...
№ 1(97) 31 january 2022 year
Rubric: Models and althorithms
The author: Tukmakov D.

Купить статью

Download the first page

This work is devoted to mathematical modeling of the dynamics of inhomogeneous electrically charged media. A dusty environment - solid particles suspended in a gas – was considered as an inhomogeneous medium. The mathematical model implemented a continuous approach to modeling the dynamics of inhomogeneous media. The complete hydrodynamic system of equations was solved for each component. The system of equations for the dynamics of each component included the equations of mass continuity, momentum components, and the energy conservation equation for the mixture component. Intercomponent interaction took into account momentum exchange and intercomponent heat transfer. The carrier medium was described as a viscous compressible heat-conducting gas. The flow was described as a flow with a two- dimensional geometry. The equations of the mathematical model were supplemented with initial and boundary conditions. The mathematical model took into account the wall viscosity in the channel. The system of equations of the mathematical model was integrated by McCormack's explicit finite-difference method. To obtain a monotonic grid function, a nonlinear scheme for correcting the numerical solution was used. The mathematical model was supplemented by the Poisson equation describing the electric field formed by charged dispersed particles. Poisson's equation was integrated by finite-difference methods on a gas-dynamic grid. Such a choice of the computational grid was necessary to calculate the concentration of particles required both for solving the electric field equation and for calculating the physical fields of the dynamics of inhomogeneous media. The reciprocal motion of a gas suspension caused by the movement of dispersed particles under the action of the Coulomb force was numerically investigated. The values of the surface and mass densities are determined, at which the models of the surface and mass densities of charges in the simulation of such a process are the same. It is revealed that the surface and mass models of charges are identical with respect to the volumetric content. Continue...
№ 1(97) 31 january 2022 year
Rubric: Algorithmic efficiency
Authors: Puchkov A., Kultygin O., Rysina (Lobaneva) E.

Купить статью

Download the first page

Within the framework of the concept of a circular economy, research in the field of creating technological systems for recycling waste from mining and processing plants occupies one of the key positions. This is connected, on the one hand, with significant volumes of such waste, reaching tens of millions of tons and posing a significant environmental hazard to air and water basins, human health, and, on the other hand, with their rich chemical and mineralogical composition, which makes it possible to call them accumulations of technogenic deposits. In this regard, the task of creating control systems for technological processes of processing such waste and their information support, including support for all stages of the passage of information processes, is urgent. The novelty of the presented research lies in the proposed structure of an intelligent control system for a complex chemical and energy technological system for processing apatite-nepheline ores, as well as in an algorithm for predicting technological parameters, which is part of the information support of the control system under consideration. The algorithm is based on the use of the apparatus of deep recurrent neural networks and Kalman filtering, which is used at the stage of data preprocessing to train the neural network. The paper describes the proposed algorithm for predicting multidimensional time series, adapted to the considered technological process, presents the software executed in the MatLab environment to demonstrate the efficiency of the specified combination of methods for processing technological parameters. In a model experiment, it has been shown that the use of filtering makes it possible to increase the accuracy of the forecast, which is especially noticeable at its large horizons. The practical significance of the research results is the proposed structure of an intelligent control system for the processing of apatite-nepheline ore waste and software for predicting its parameters, which can be used in various decision support systems. Continue...
№ 1(97) 31 january 2022 year
Rubric: Algorithmic efficiency
Authors: Sulavko A., Khramov A.

Купить статью

Download the first page

Open biometric images (fingerprint, iris, face) are "in sight" and therefore compromised in the natural environment. In this work, it is proposed to use data on the internal structure of the outer ear obtained using echography as biometric images. The individual characteristics of the ear canal of subjects are hidden from direct observation and cannot be copied by photographing. The proposed authentication method is based on cepstral analysis of echograms of the ear canal using neural network biometrics to code converters, trained in accordance with GOST R 52633.5. The neural network biometrics-code converter allows you to associate a user's cryptographic key or password with his biometric image. This is a shallow neural network of one or two layers of neurons, which is configured to generate a key specified during training when an image of a known user arrives, and when an unknown image arrives at its inputs, generate a random code with high entropy. At the entrance to this network, cepstral signs of echograms were received. To apply the method in practice, you need a special device that combines a headphone with a sound-proof housing and a microphone. The results obtained can be called optimistic EER = 0.031 (FAR = 0.001 at FRR = 0.23). The use of neural network converters biometrics-code showed a relatively higher percentage of errors in comparison with multilayer neural networks and the naive Bayes classification scheme, however, neural network biometrics to code converters allows you to implement authentication in a protected mode. This means that the subject's biometric data will be protected from compromise at the stages of storage, execution and transmission via communication channels. Continue...
№ 1(97) 31 january 2022 year
Rubric: Software engineering
Authors: Tumbinskaya M. V., Abzalov A.

Купить статью

Download the first page

Ensuring information security of automated process control systems (IACS) is a difficult task and its solution requires an integrated approach. Various computer threats need to be considered, which may be external, internal, accidental or deliberate. With the global growth of cybercrimes and the constant improvement of cyberattacks, it is necessary to increase the level of security of IACS, web resources, information systems, etc. Achieving the goal of increasing the level of security is possible by solving the problem of training users to respond to the facts of the implementation of computer threats during the operation of the IACS, i. e. information security incidents. The article describes software, the main task of which is to provide users of an industrial automated system with practical skills for an adequate response to incidents, which will increase the level of users' knowledge in the field of information security. The paper presents an analysis of the information security of an automated process control system, which showed that, on average, in 89.5% of cases, attackers use malicious software to gain access to information unauthorizedly, and on average, in 83% of cases, they use social engineering methods. An industrial automated system of a large enterprise in the machine- building industry of the Republic of Tatarstan was selected for the study. The results of the study and experimental data showed that as a result of training and after it, users more correctly and adequately respond to emerging information security incidents due to the fact that most situations were considered and analyzed during the training period using software. On average, the number of attacks in the analyzed periods as a whole decreased by 28%: the number of attacks carried out using social engineering methods decreased by 51.75%, the number of attacks using malicious software by 40.25%, the number of DoS-type attacks – by 11.75%, the number of credential brute-force attacks – by 7.5%. Continue...
№ 1(97) 31 january 2022 year
Rubric: Software engineering
Authors: Gadasina L., Ivanova M., Vedernikova A.

Купить статью

Download the first page

The geographical location and tourist features of St. Petersburg require a specialized web service for owners and tenants of river transport, aggregating all the information necessary for them. Currently, such information is available in various news sources, web portals and groups in social networks. The work presents a prototype of a service for small river transport users. Information needs and functional and requirements for it were identified during in-depth interviews with stakeholders of the project. The web service database is implemented in the PostgreSQL DBMS with the PostGIS extension. The work presents the structure of the service, which includes 10 pages, describes its main sections, such as current regulatory documents, news, interactive maps, reference information, as well as technical information about ships and restrictions on their movement due to technical characteristics. During its development, an analysis of existing solutions related to each section was carried out. During the "Maps" section development, an analysis of existing web tools for displaying interactive maps and the selection of the best solutions was carried out. Using the Google Maps designer, interactive maps were created for the web service being developed. The first of them is a map of the city's water bodies, containing such layers as: floating gas stations, lighthouses, customs, checkpoint and Ministry of Emergencies, private yacht clubs and marinas, berths and quayes, bridges, etc. The interactive weather map allows the user to get acquainted with the weather conditions, as well as their 5-day forecast. One of the priority functional requirements of the web service, called stakeholders, was the determination of water barriers and bridges that were inappropriate in the size of the vessel. The "Your Ship" section of the developed prototype web service offers a solution to meet this requirement. The developed web service is one of the favorable incentives for the development of the water tourism sphere and the use of river transport in St. Petersburg. Continue...