|
||||||||||
|
Yu. A. Zack, Dokt.-Ing., Deutschland, Aachen, Deutschland E-mail: yuriy_zack@hotmail.com, ñàéò: www.optimorum.de Modified Genetic Algorithm for Solving Multiextremal Problems within the Constraints Proposed modifications of genetic algorithms for solving extremal problems in the constraints, which by simple formulas can be calculated by assessing the optimal solutions and the boundary values of the left sides of constraint functions of the problem. Permissible scope of the search of solutions is divided into several sub—areas significantly smaller dimension, in each of which implements an evolutionary strategy. Use of estimates of optimal solutions, with the exception of areas that do not contain admissible and optimal solutions, the use of projection operators on the constraints of the problem area can improve the efficiency of genetic algorithms for the considered classes of functions. P. 3—10 R. V. Voronov, Associate Professor, e-mail: rvoronov@sampo.ru, A. P. Moschevikin, Associate Professor, e-mail: alexmou@lab127.karelia.ru, Petrozavodsk State University Use of Conditional Entropy for Optimal Disposition of Base Stations in Local Positioning Systems The efficiency of local positioning systems depends on the number of used based stations. To increase the accuracy of localization, base stations should be deployed as dense as possible. However this practice overloads radio bandwidth and is not commercially attractive. This paper describes a solution for optimal disposition of base stations to improve the accuracy of localization of a mobile device in wireless networks. This solution is based on the concept of information entropy. The results of simulations are discussed. The best configuration of base stations corresponds to the minimum of the total entropy of the received signal levels for all zones within a territory. The described approach might be used in local positioning systems based on the fingerprinting technique (WiFi, ZigBee, Bluetooth); it was applied in the developed RealTrac technology utilizing nanoLOC radio standard. P. 11—16 A. N. Soloviev, Chief Research, A. L. Stempkovskij, Director for Design, e-mail: xxx@ippm.ru, Institute Problems in Microelectronics of Russian Academy Methods to Improve Noise Tolerance of the Control Equipment Microsystems by Structural Redundancy Introduction Noise tolerance increase is one of the key problems arising in the development of computing microsystems control military and civilian objects under harsh conditions of space, high levels of radiation and other extreme effects. However, at present, mainly used archaic methods of multiple overlapping, often leading to unjustified redundancy. This article focuses on how to improve noise tolerance of a key component of the microsystem — device management — through the introduction of controlled structural redundancy. To ensure the necessary level of noise tolerance (error detection with a given degree of multiplicity) as a convolution operation timing chart control device is proposed to use the operation of division by the generator polynomial in binary Galois field. The resulting control convolution provides detection and functional failures occurring errors. The article describes the synthesis of control circuitry that performs an operation of forming a control signature. At the same level of noise tolerance determined by the choice of degree forming primitive polynomial. As an example of implementation of the proposed approach is considered a microsystem, performing the convolution operation. P. 17—22 V. M. Amerbaev, Chief Researcher, R. A. Solovyev, Head of Department, D. V. Telpukhov, Research Associate, e-mail: nofrost@inbox.ru, Institute for Design Problems in Microelectronics Cyclic Convolution Calculation Method Based on FFT Using Proth Numbers Over a finite field a transformation similar to discrete Fourier transform can be defined that can be efficiently implemented using fast algorithms. This transformation can be used to calculate different types of convolutions of long integer sequences in finite fields. Cyclic convolution is often used for calculating regular convolution via so-called convolution theorem. Residue number system can serve as a basis for combining multiple finite field convolutions into full-scale integer convolution. In this paper a method of computing of two vectors convolution by means of residue number system arithmetic over Proth-type modulo finite field is considered. The device performing the operation of cyclic convolution based on the proposed method was implemented. Comparison to binary analogues was carried out and showed a 10—50 % growth of performance for the range of input data from 8 to 16 bit. P. 22—27 A. I. Pereguda, Professor, e-mail: pereguda@iate.obninsk.ru, Obninsk Institute of Nuclear Energetics NRNU MEPhI, Kaluga region Mathematical Model of Reliability of Information System, Consisting of Object Protection and n Security Systems The article describes the mathematical model of reliability informational system consisting of information protection object and security systems, which parrying possible unauthorized access. Failures information protection object and security subsystems are independent. Each of the security systems parries only one type of attacks on the security object. It is assumed that state of reliability of safety systems checked periodically and after failure detection performed it renewal. Mathematical model of reliability of the information system is a superposition of random renewal processes. The mathematical model takes into account the structure of each of N systems security, renewal their in state of operability after failure, and as well capabilities attacks in random times. Hence, the moments of closure renewal the security systems it is moments renewal of the information system. The mathematical model of reliability take into account of structural feature each out of N the systems security, recovery work after a failure, as well attacks in random times on information protection objects. Analysis of mathematical models of reliability information system allows us to calculate the expectation the random time to unauthorized access, as well as an asymptotic estimation of the probability unauthorized access to information system up the time t. As an example of calculating the reliability of the information system is considered, consisting of object information protection and security of the three systems, each of which consists of two subsystems. P. 28—35 M. M. Gourary, Senior Researcher, M. M. Zharov, Leading Researcher, S. G. Rusakov, Chief Researcher, S. L. Ulyanov, Head of Department Institute for Design Problems in Microelectronics RAS, Moscow Frequency Domain Simulation Methods of Periodic States of Oscillators The modern computational methods for determining periodic steady state and analyzing oscillators are considered. The methods are intended to be implemented in circuit simulators, enable to analyze arbitrary oscillators and provide the computation of characteristics under external excitation of arbitrary form. P. 36—43 K. S. Markelov, Graduate Student, e-mail: kosmar89@mail.ru, V. V. Nechaev, Dr. Head Chair, e-mail: nechaev@mirea.ru, The Moscow State Technical University of Radio Engineering, Electronics and Automatics Algorithm to Improve the Quality of Digital Images of Fingerprint Importation The issues of image processing in order to increase the resolution of the digital image based super resolution-method. The algorithm more informative digital image preprocessing which includes image transfer to grayscale, finding inter-frame motion by Lucas — Canada, and then averaged into a single frame and high-resolution digital image post-processing to eliminate blurring and sharpening. The proposed algorithm is invariant to specific problems and can be used in various fields, in particular — biometrics. P. 44—50 S. S. Sadykov1, Professor, e-mail: sadykovss@yandex.ru, Yu. A. Bulanova1, Graduate Student, E. E. Kanunova1, Associate Professor, E. A. Zaharova2, Radiologist Development of Concepts for Building Information Systems Diagnosis of Tumors on Mammograms This article analyzes the known information systems processing and analysis of mammograms, both foreign and Russian manufacturers. It set goals and requirements for the development of an information system diagnosis of tumors on mammograms. Presented and described in detail the structure of the developed system of processing and analysis of mammograms. EC comprises in its structure several software modules which are presented in the article in the form of a flowchart. Experimental studies involving expert (radiologist) and their results diagnosis of tumors by mammographic images using the system and interactively demonstrated the feasibility of the developed system for the diagnosis of tumors. The main advantages of the system: the high recognition accuracy tumors, a relatively small percentage of false positive results, the elimination of subjectivity in the diagnosis, taking into account individual characteristics of the structure of the mammary glands of patients. P. 51—56 N. T. Abdullaev1, Associate Professor, e-mail: a.namik49@mail.ru,
O. A. Dyshin2, Senior Researcher, G. E. Abdullaeva2, Magister Interval Bayesian Inference in the Differential Diagnosis of Neuromuscular Diseases In practice rather difficult to point estimates diagnostic features that affect the presence of à particular type of disease. Much easier with sufficient accuracy to indicate intervals containing the desired evaluation. This determines the usefulness of the Bayesian approach for cases with interval uncertainty. Based on thresholds priors considered neuro — muscular diseases with a large installed a confidence level of the lower and upper limits of their priors. Using found confidence intervals for the a priori probabilities are calculated diseases interval estimates of conditional probabilities diagnostic features. P. 56—64 À. Ì. Marchenko1, Sc. D., Professor, E. A. Popov1, Engineer, V. Yu. Savchenko2, Graduate Student, e-mail: valentine.savchenko@gmail.com Pattern Based Standard Cell Routing Standard cell methodology is widely used for designing digital application specific integrated circuits (ASIC). A standard cell is a group of interconnected transistors that provides a Boolean or storage function. Physical design is an important step in standard cell based design flow, during this step geometrical representation of ASIC (layout) is obtained from geometrical representation of standard cells. In this article some issues related to standard cell layout synthesis are considered. A routing algorithm for standard cells that considers I/O ports accessibility, vertical cell porosity, blockages on higher metallization layers and layout regularity is proposed. Routing models that takes constraints of 32 nm technology node into account are proposed as well. Presented algorithm was utilized in an industrial tool for standard cell library synthesis. It showed acceptable runtime and high coverage of cells. P. 65—72 V. Yu. Mikhaylov, Moscow Aviation Institute (National Research University), Moscow, V. N. Gridin, Center of Information Technologies in Design, Russian Academy of Sciences, Odintsovo, Moscow region, e-mail: info2@ditc.ras.ru, R. B. Mazepa, Moscow Aviation Institute (National Research University), Moscow Secure Information Interaction. Problems and Solutions Article is devoted to information exchange systems security. Attempt of the system analysis of the main problems of security, in particular, the reasons and sources of vulnerabilities, ways of penetration into system of malicious software and methods of fight against it becomes. Such approach allows to increase efficiency of the task solution in comparison with the traditional utilitarian style using separate, poorly connected receptions, methods and means of ensuring of information security. As the main objects of the analysis proposed and used logical channels, runtime (execution) environment and service of runtime (execution) environment. Special consideration is also the problem of using existing tools to fight against malicious software. Shown actuality of integrated tools development to fight against malicious software for the use of different qualifications, including for non-commercial use. P. 72—77 A. S. Dobrynin, Head of Laboratory, Senior Teacher, e-mail: serpentfly@mail.ru, R. S. Koynov, Head of Sector, Senior Teacher, e-mail: koynov_rs@mail.ru, Siberian State Industrial University (SibSIU) About an Algorithm for Construction of a Time-Schedule in Conditions of Timing Constraints Tasks of time-schedule construction (JSSP) in various fields of human activities have an important theoretical and practical significance. The main feature of these tasks is a timing requirement, describing allowed planning time periods and periods of downtime. This article describes implementation variations of the work scheduling algorithm under timing requirements for the tasks of industrial time — schedules construction, and service activities. P. 77—80 |