main| new issue| archive| editorial board| for the authors| publishing house|
Ðóññêèé
Main page
New issue
Archive of articles
Editorial board
For the authors
Publishing house

 

 


ABSTRACTS OF ARTICLES OF THE JOURNAL "INFORMATION TECHNOLOGIES".
No. 4. Vol. 21. 2015

To the contents

I. A. Mochalov, Professor, Bauman Moscow State Technical University, M. S. Khrisat, Graduate Student, e-mail: mohd.khrisat@fet.edu.jo, M. Ya. Shihab Eddin, Graduate Student, Russian Peoples' Friendship University

Fuzzy Differential Equations in Control. Part II

The initial value problem of Formulated fuzzy is obtained from a clear initial problem in which the parameters of the problem and the initial condition rely inaccurately given. This inaccuracy is modelled by fuzzy variables with triangular membership functions. Modelling by fuzzification parameters leads to fuzzy initial value problem. Depending on the type of fuzzy derivatives allocated fuzzy solutions SS (Seikkala-solution), PRS (Puri-Ralescu-solution), KFMS (Kandel-Fridman-Mingsolution) and BFS (Buckley-Feuring-solution). For the existence of BFS formulated appropriate conditions. Without proof a statement. If there SS, there BFS, however, if there BFS, it does not coincide with the SS.
An algorithm for solving fuzzy initial value problem is clear in the decision of the initial problem. Then checks the conditions of existence of SS and BFS, if there is a BFS, then by fuzzification parameters clear the initial problem and finding the minimum and maximum solutions generated fuzzy BFS. If the BFS does not exist, then the SS is the solution of the corresponding system of differential equations.
The examples of the simplest solutions of fuzzy initial value problems, fuzzier linear problem are solved. She appears in the calculation of fuzzy phase trajectory of a continuous system of automatic optimization remembering extremum property type nonlinearity-linearity.
Figures are given representation of fuzzy numbers in the form of triangular membership functions and the equivalent of the inverse mapping. We give a list of references containing 7 items. 4 of them are in English, the other in Russian.
Keywords: fuzzy system, fuzzy ordinary differential equations

P. 243—250


S. V. Belim, Head of Department of Information Security, e-mail: sbelim@mail.ru, S. A. Seliverstov, Graduate Student, e-mail: otrx@mail.ru, Omsk Dostoyevsky State University

Hierarchy Analysis Method as a Way to Detect Impulse Noise on Images

This article presents an algorithm for identifying broken pixels, that can appear in graphic files consequently to their transfer through noisy channel. The detection of broken pixels is carried through the sequential check of image file. The method of hierarchical analysis is used for each pixel in order to arrive at a decision about its impairment through the analysis of its environment. The decision is based on 3 kinds of criteria. A case of impulse noise — randomly situated pixels of different colors, is analyzed. The algorithm efficiency depending on the noise intensity is also investigated through a computed experiment. In the present article it is proved that with the help of parameter design the efficiency of detecting broken pixels can reach 96 %. The computer experiment helped to reveal the dependence of the proposed method efficiency against various parameters. The article also presents the investigation of false response percentage depending on selected parameters. It is shown that the effiency can amount up to 90 % whilst the 8 % of positive response.
Keywords: hierarchy analysis method, impulse noise, image filtering

P. 251—258


S. V. Dvornikov1, Professor, S. S. Manaenko1, Associate Professor, S. S. Dvornikov2, Student, e-mail: practicdsv@yandex.ru,
1Military Communications Academy, St. Petersburg
2
St. Petersburg State Polytechnical University

Parametric Mimicry Signals Modulated Oscillations Formed in Various Functional Basis

Information security issues associated with the use of cryptographic systems of protection. However, this approach gives information systems specific set of features that reveal the fact that the use of these measures. Therefore, finding ways to ensure information security remains an urgent and important task in the design and operation of data transmission systems.
Under the concept of stealth signals understand the properties that impede the effective implementation of the procedures for their detection and measurement in order to retrieve the embedded information.
Stealth signals are divided into energy, and structural information. Energy secrecy involves the creation of conditions under which the implementation of procedures for detecting the very fact of communication tools. Concealment information encoding methods based on messages as at the bit level and at the level semantics. Structural secrecy characterizes the ability of signals to resist measures aimed at identifying their parameters.
In the recent attention paid to ensuring the structural stealth. This is due to the fact that the technology implementation time and energy electromagnetic stealth impair the availability of correspondents, and informational signs stealth provoke the use of means jamming.
An approach to providing structural stealth signals by their synthesis in bases other than those used in systems analysis, offering unauthorized access. The advantage of these features is that formed on the basis of the signal is all external signs of the modulated oscillation synthesized harmonic basis.
Such an approach to structural stealth similar phenomenon of mimicry in nature, so stealth, which manifests itself in the wrong choice of the basis of analysis, defined as parametric mimicry. As oscillations with close temporal structure of the proposed fragments sinusoid and Gaussian wavelet of the first order, which represents the first derivative of the Gaussian function.
The signals thus generated in the time and frequency domains resemble harmonics. Visual and auditory analysis does not identify the signal as it is similar to the noisy harmonic signal.
Parametric mimicry increases with increasing ratio of the number of fragments to fragments harmonic wavelets. Practical interest such signals will be represented only if they developed to provide reliable demodulation techniques to extract information for the signal/noise ratio of the order of 15 dB.
Along with the traditional approaches, increasing structural stealth possible through the use of parametric stealth effect, which occurs when analyzing the signals generated from the vibrations of different functional bases, only one of the bases.
The authors suggest that this effect may be enhanced with the increase in the number of bases used.
Keywords: parametric stealth, Gauss wavelet first order, demodulation, phase shift keying

P. 259—263


A. V. Barabanov, Head of Department, e-mail: mail@inpo.ru, A. S. Markov, Associate Professor, e-mail: mail@cnpo.ru, V. L. Tsirlov, Executive Director, NPO Echelon, Moscow

The Conformity Assessment of Information Security Solutions According to the Common Criteria

The information security certification in accordance with the Common Evaluation Methodology and ISO 15408 is analyzed. The analysis of statistics in the field of domestic and international certification of information security solutions are done. The overview of the new package of regulatory guidance documents FSTEC Russia is done. The certification issues through the Common Criteria for developments and testing laboratories is shown. The ways to overcome the difficulties associated with the implementation of Common Criteria are suggested. The prospects for implementation of the Common Criteria in Russian and in the world are marked.
Keywords: information security, certification, information security tool, common criteria, common evaluation methodology, criteria for information technology security evaluation, ISO 15408, ISO 18045, conformity assessment

P. 264—270


V. I. Struchenkov, Professor, e-mail: strl942@mail.ru Moscow State University of Radio Engineering, Electronics and Automation, Moscow, Russia

New Algorithm for Perelement Calculation of Line Structures Routes

Under study is the problem of calculation of the Cartesian coordinates of points of the line structures routes: railways and roads, pipelines, etc. Plan and longitudinal profile of the route can contain straight-line segments, circles, parabolas, and spiral. A consistent per element calculation from a given starting point and the initial direction to the end point is proposed. Found that when calculating the coordinates of clothoid points, connecting two circular curves of nearby radii using the power series expansion at the point with zero curvature it is possible essential errors due to inaccurate representation of numbers in a computer. A new algorithm for the calculation with the power series expansion at the interface point between the circle and the clothoid is proposed. The algorithm provides the required accuracy of calculation when connecting circular curves have nearby radii.
Keywords: route, plan, longitudinal profile, clothoid, connection of circles, power series, calculation errors, Maclaurin

P. 271—276


L. E. Mistrov, Professor, FGBOU VPO central branch "Russian Academy of Justice", Voronezh

Method of Synthesis of Strategy of Management of the Conflict Stability of the Social and Economic Organizations

The method of synthesis of strategy of management by the social and economic organizations on the basis of methods of individual and group information influence for achievement of conflict stability of their functioning in the conditions of competitive active and/or information counteraction is offered. Use of methods of pogruppovy optimization, consecutive purpose of units of a resource, branches and borders is the basis for a method.
Keywords: the social and economic organization (system), the competition, the conflict, active and/or information influence, conflict stability, the management strategy, operating, executive and information providing element, methods and means of individual and group information influence

P. 277—285


M. H. Mammadova, Head of Department, Z. G. Jabrayilova, Head of Sector, F. R. Mammadzada, Thesis Defender, Institut of Information Technology of Azerbaijan National Academy of Science. e-mail: depart15@iit.ab.az, www.ikt.az

Management Methodology of Coordination of Demand and Supply at the Labor Market of Information Technologies Specialists

Modeling process of supply and demand interaction in the information technologies specialists (IT-specialists) labor market and management of their qualitative imbalance at macrolevel are considered. Types of supply and demand mismatch are allocated for IT specialists, evolution of approaches to identification of requirements for IT-personnel is shown, the main directions of supply and demand matching by IT specialists are defined. Methods of structural imbalance assessment on IT specialists labor market, degrees of IT specialists supply and demand mismatch on the basis of an fuzzy mismatch scale, algorithm of fuzzy classification of imbalance state are offered in the article.
Keywords: labor market of IT specialists, supply and demand matching, quantitative mismatch, fuzzy mismatch scale, fuzzy classification of imbalance state

P. 286—295


Yu. A. Zack, Dokt.-Ing. Deutschland, Aahen, Deutscheland e-mail: yuriy_zack@hotmail.com

Probabilistic Dynamic Models of the Analysis îf Functioning of Assembly Conveyorjines

Probabilistic dynamic models of the conveyor lines are considered for stochastically given times of the operations. The distribution and probabilistic characteristics of the machine cycle of the synchronous assembly lines are defined. Stochastic performance criteria are introduced. The problem of optimal allocation of technological operations of the assembly line with the maximal probability of the machine cycle time of the assembly line to be not higher than a given value or with the probability to be not less than a given minimal conveyor's cycle time is considered.
The mathematical models, technical and economic parameters of the efficiency and algorithms of the analysis of these types of industries are based on using discrete Markov chains assuming the partition of the technological process in several independent stages and the creation of intermediate storage of certain volumes. The criteria of the efficiency of production minimizing total losses are formulated.
Keywords: conveyor lines, minimization of machine cycle, probabilistic dynamic models, stochastic criteria of efficiency

P. 296—304


V. N. Griding, Prof., Doctor of Science, Director, V. I. Solodovnikov, Ph. D., Senior Researcher, I. A. Evdokimov, Junior Researcher Design information technologies Center Russian Academy of Sciences (DITC RAS) Russia, Moscow region, Odintsovo, st. Marshal Biryuzova 7a, tel.: (495) 596-02-19, e-mail: info@ditc.ras.ru

Neural Network Algorithm for Symmetric Encryption

Data is a valuable resource, with access which is necessary to be strictly monitored and regulated. Even the partial loss of such data can have dire consequences for the owner. One of the most popular approaches, used to prevent the possible threat of unauthorized access, is the cryptographic protection or encryption.
The article investigates the possibility of using neural network methods for the cryptographic protection of information. The proposed approach is based on the ability of some neural networks for restoration of distorted signals and recognition of objects having characteristics different from the references. The features of using multilayer perceptron and networks with RBF-neurons in the intermediate layer were considered. Algorithms of encryption, decoding and data preprocessing were proposed. The basic idea of the encryption algorithm is to generate a distorted code that can be recognized or restored by the network. The encryption and decoding key includes information about the selected neural network template and its structural characteristics (the number of neurons in layer, weights, activation functions, threshold values, etc.). The encryption key dependences on number of used clusters and the dimension of encryption space were considered.
Keywords: neural network, perceptron, RBF neural network, LVQ neural network paradigm, cryptographic protection, encryption, decoding

P. 306—311


Yu. N. Kulchin1, 2, Academician, Dr. Sc. (Phys.-Math), "Director of the IACP FEB RAS, e-mail: kulchin@iacp.dvo.ru, A. Yu. Kim1, Junior Researcher, e-mail: ayukim@mail.ru, B. S. Notkin1, 2, Cand. of Eng. Sci., Senior Researcher, e-mail: boris_notkin@mail.ru; A. B. Lyuhter3, Cand. of Eng. Sci., Adviser to the Rector's of the VlSU, e-mail: 369913 7@gmail.com
1Institute of Automation and Control Processes, FEB RAS, Vladivostok 690041, Russia
2Far Eastern Federal University, Vladivostok 690950, Russia
3Vladimir State University, 87 Gorky St., Vladimir 600000, Russia

Signal Processing System of DFMN Segmental Òóðå for Recognition of Dynamic Images Using Neural Networks

Methods, techniques and algorithms for signal processing of distributed fiber-optic measuring network (DFMN) segmental type and the formation of their models using images as a set of characteristic features or principal component collections for the states of moving object are considered. We have invited to receive sample examples for training and testing of neural networks using generated software modules (sensory data generator and data conversion module). Analysis of the results of research carried out for the development of intelligent distributed information-measuring system based on DFMN segmental type for recognition of dynamic images. During the numerical experiments we checked and proved the expediency and effectiveness of the proposed methods, as on generated data so on real data obtained from the layout DFMN perimeter protection. Revealed, that for each defined parameter, there is an optimal minimum number of ''features. The error of recognition is slightly different ( 1 %) of its value, which is obtained using a complete set of extracted features. It is also found that the system suitability criteria for the task reaches 0,91, and depends on the number of features.
Keywords: neural networks, intelligent information-measuring systems, expert systems, model images, recognition of dynamic images

P. 312—319


To the contents