main| new issue| archive| editorial board| for the authors| publishing house|
Πσρρκθι
Main page
New issue
Archive of articles
Editorial board
For the authors
Publishing house

 

 


ABSTRACTS OF ARTICLES OF THE JOURNAL "INFORMATION TECHNOLOGIES".
No. 7. Vol. 22. 2016

To the contents

V. V. Fedosov, Moscow, A. V. Fedosova, Universidad Nacional de Colombia, Bogota, Colombia

Parameterization of the Mesh Algorithms Semi-Infinite Optimization for the Problems of Industrial Ecology

The industrial ecology are typical management tasks pollution emission sources, the territory of the group. If you set the standards of environmental safety territory (scalar, vector, or function), the optimization should detect the redundancy of such emissions.
The task is complicated potential functions multiextremal general pollution of the territory as a result of imposition of emission sources, as well as the presence of the infinite parameter — the number of points of the territory, which leads to an infinite number of constraints.
Algorithms for semi-infinite optimization (SIP, Semi-Infinite Programming) reduces the initial formulation of the problem with an infinite number of constraints to the sequence of approximating problems with a finite number of critical constraints. Critical limits are maximizing function limitation from the start, the corresponding point of the next constraint violation. To search for violations of applied stochastic procedure. Approximating the final task it is usual formulation of nonlinear mathematical programming.
However, a theoretical departure from the infinity does not negate choice discrete grid area. The numerical experiment with parameterization by a discrete grid. Range Resolution made by [400 x 200] to [3200 x 1600].
A significant and sustainable impact on the approximation of the discrete nature of the results. Changes in grid discrete nature do not lead to a loss of convergence of approximations. Increase grid discreteness leads to better quality (distributed on most items) approximations.
Introduced and analyzed several surrogate grid discrete nature (approximation dirt overlay function, the objective function weighted approximations). The logic of their trend is well aligned with the variable grid increments.
Selecting an area must first demonstrate sufficient quality (to describe) the characteristics of the overall pollution of functions, but it remains a heuristic procedure.
Keywords: discrete grid, semi-infinite optimization, approximation, nonlinear programming, emission sources, pollution standards for areas

P. 483—489


G. V. Zelenko, Professor, Moscow State University of Information Technologies, Radio Engineering and Electronics, A. D. Ivannikov, Deputy Director for Research of the Institute for Design Problems in Microelectronics of Russian Academy of Sciences, D. Yu. Kogan, Chief Engineer of "Elitex" LLC, A. V. Roshchin, Professor, e-mail: aleksey_roschin@mail.ru, Moscow State University of Information Technologies, Radio Engineering and Electronics

Problems of Functional Stability in Sensor Network

The paper proposes the criterion for evaluating the functional stability of the sensor network, based on the reachability of any network node from any other. The existing papers of the systems' functional stability research were analyzed.
It is shown that cited papers did not propose suitable constructive criteria of functional stability. Functional stability criteria are considered for the sensor network with symmetrical and asymmetrical attached matrix of the network graph. It is shown that for an objective evaluation of functional stability and attainability of real sensor network, one must identify its structure as a result of real work. To do this, an analysis of all packets sent over a certain period of time is required. The analysis period should be sufficient for the development of all possible routes of the network packets. Since the transmission of packets in a sensor network can create loops, the special measures are provided to avoid those loops. An algorithm for the identification of the sensor network as a result of the passage of real or test messages is proposed.
Keywords: sensor network, reachability, functional stability

P. 489—493


Ju. A. Holopov1, Leader Engineer, Le Ba Chung2, Graduate Student, Nguyen Thanh Trung2, Graduate student, Tran Van Khanh1, PhD
1Lebedev Institute of Precision Mechanics and Computer Engineering
2Moscow Institute of Physics and Technology (State University), E-mail: chungbaumanvietnam@gmail.com

Features of Implementation of Distributed Control Systems Based on Hardware Network Solutions

The article discusses aspects of the implementation of network technology in distributed control systems. The described various approaches of hardware support for network solutions provide higher throughput capacity in the information environment by: exclusion of arbitration procedures, elimination of control information from the data packages, the organization of exchange between the CPU and peripherals based on a unified packages of state and control. The proposed technology, implemented on FPGA, allows to achieve minimal and stable delay of transfer data in on-board networks.
Keywords: distributed control system, network interfaces, switch, converter, recorder, CAN, Ethernet

P. 494—498


A. Yu. Romanov, Senior Lecturer, e-mail: a.romanov@hse.ru, National Research University Higer School of Economics, Moscow

The Research of Network-on-Chip with Mesh Topology by Using NoCTweak Model

This article gives an analysis of the effect of geometric shape of the topology and "hot spots" placement on the effectiveness of networks-on-chip. For this reason, a review of the main approaches to the modeling of networks-on-chip was made and the approach for networks-on-chip modeling by using SystemC NoCTweak networks-on-chip simulator was chosen. The analysis of the simulation results makes it possible to formulate the following conclusion: the high sensitivity of mesh network topology to its geometric proportions is found; the use of topologies which are close to the square form allows to increase the network capacity up to 24,7 %, and the central location of "hot spots" allows up to 9 % reduction in the delay of packets, up to 15,2 % — in energy consumption for each packet transmission and up to 19,5 % increase of the network capacity.
Keywords: network-on-chip, system-on-chip, network-on-chip regular topology, networks-on-chip design, SystemC programming language, network-on-chip model, mesh topology, "hot spots"

P. 498—503


B. G. Kukharenko, Leading Research Scientist, e-mail: kukharenkobg@gmail.com, Blagonravov Mechanical Engineering Research Institute of the RAS, M. O. Solntseva-Chalei, e-mail: solnceva.chalei@gmail.com, Post-Graduate Student, Moscow Institute of Physics and Technology (SU)

Use of Salient Region Detecting Methods after Telemetric Image Segmentation for Object Group Identification

In this paper we describe how to accelerate object group identification and tracking in real time. It is in need to remove non informational part of image backward and to detect highly salient objects. The salient objects are detected by mean-shift segmentation in image pixel feature high dimensional space and by determining the segmented image salience map. The frequency-tuned salient region detection method is in use, which produces segmented image full resolution saliency map displaying salient object boundaries. The method preserves the object boundaries by retaining main frequency content from the segmented image and exploits features of color and luminance. Since salient object detection is not a pure low-level process, next a unified model is in use to incorporate the image low-level features with higher-level knowledge. In the model, a special image matrix in the feature space is decomposed as a low-rank matrix representing background plus sparse matrix indicating the salient regions. To ensure the model validity, a linear transform of the image feature space has to be learned. Next, the higher-level knowledge is fused to compose a prior map, and is treated as a prior term in the objective function. The approach efficiency is demonstrated on sample image with salient objects
Keywords: image analysis, segmentation, mean-shift, salient map

P. 504—509


A. M. Giatsintov, Researcher, e-mail: algts@inbox.ru, K. A. Mamrosenko, Head of Department, e-mail: kirillam@ya.ru, The center of visualization and satellite information technologies, SRISA RAS

Methods of 3D Objects Visualization with Deferred Rendering

Article depicts a method of deferred rendering utilized on modern hardware platforms. The use of deferred rendering methods can significantly reduce the amount of required calculations when there are more than eight lights in 3d scene. In contrast with traditional forward rendering methods, deferred rendering also discards pixels that would not complement to the final image. The phases of image drawing, required with the use of deferred rendering, are determined. A method of antialiasing, based on edge detection and implemented as a post-process effect, is described. Article presents a developed method of visualizing semi-transparent 3d objects with deferred rendering.
Keywords: training simulation system, visualization subsystem, rendering, trainer, lighting, transparency, deferred rendering

P. 510—514


A. L. Stempkovskiy, Academician, Director, D. V. Telpukhov, Ph. D., Head of the Department, R. A. Solovyev, Ph. D., Chief Researcher, ZF-Turbo@yandex.ru, Institute for Design Problems in Microelectronics, Moscow (IPPM RAS)

Enchancing Reliability of Logic Circuits with Partial Resynthesis Method

A number of diverse factors in the area of microelectronics industry significantly actualized the developments in the field of fault-tolerant combinational circuits design recently. Currently in modern CAD systems there are no means to assess and improve logic masking effects in combinational circuits. In this paper, an attempt was made to create a methodology for the implementation of such software. This paper proposes re-synthesis design flow, providing a logical masking capability for the combinational circuits resistance to a single event upsets without the introduction of substantial redundancy. The details of the method including the development of reliability metrics, the selection of vulnerable sub-schemes, as well as methods of generating reliable circuits are presented. Computational experiments were conducted to demonstrate the high efficiency of the proposed method.
Keywords: combinational circuit, gate observability, sensitivity factor, resynthesis

P. 515—522


R. E. Asratian, Leading Researcher, rea@ipu.ru, V. N. Lebedev, Head of Laboratory, lebvini@ipu.ru, V. L. Orlov, Leading Researcher, ovl@ipu.ru, Institute of Control science RAS

Efficiency of a Secure Communication Channels Based on the Use of the HTTPS in Proxy Servers

The article is devoted to experimental study of characteristics of the new method of secure interactions organization in multi-network environment. The method is based on the use of HTTPS protocol and proxy server technology. The essence of approach consists in the organization of the protected HTTPS connections between proxy servers for safe transfer of information queries from one private local network in another through a global network while client and server components of distributed system are released from of information protection functions. In this approach client and server programs use HTTP protocol and proxy servers have additional functions of "HTTP - > HTTPS" and "HTTPS - > HTTP" gateways. The main advantage of approach over known (for example, VPN) consists in providing "high-level" means of HTTP queries routing and filtration the based on headers of HTTP queries, but not on separate IP packages. The application of approach is limited to situations in which private local networks can be considered as "a trust zone", and the only source of threats is the global network. The experimental study of efficiency of the offered approach in terms of influence of protection gateways on the speed of electronic services calls processing is conducted. This research showed that the area of effective application of the approach is made by electronic services with performance time over 1—2 s.
Keywords: distributed systems, Internet technologies, network protocols, proxy servers, remote interactions, data security, web-services

P. 523—527


V. V. Gribova, Research Deputy Director, e-mail: gribova@iacp.dvo.ru, A. V. Ivanova, e-mail: 2395146@gmail.com, PhD Student, Institute of Automation and Control Processes for Eastern Branch of the Russian Academy of Sciences

Software for Security Control of Information Systems

This article reviewed modern approaches to the creation of information security systems, the advantages and disadvantages of these approaches. The motivation to create a software that incorporates heterogeneous information security systems into an integrated system is explained. The basic requirements, principles and architecture of software including two subsystems are described. These subsystems are: a subsystem for control of information resources and a client subsystem for security control of an information system. The subsystem for control of information resources is implemented on the cloud platform IACPaaS. The cloud platform is an Internet software for development, control and usage of intelligent services. The client subsystem is intended for monitoring the state of installed systems, as well as for determine the security requirements for the client information system and a security configuration tool in accordance with requirements. By now data and knowledge bases are realized, development of software components is in progress.
Keywords: security system, intelligent system, databases, ontologies, knowledge bases, data protection, information systems, data security solution

P. 527—534


V. V. Podbelskiy, Professor, of School of Software Engineering, vpodbelskiy@hse.ru, O. V. Maksimenkova, Junior Research Fellow, International Laboratory for Intelligent Systems and Structural Analysis, omaksimenkova@hse.ru, K. S. Babich, Student, Faculty of Computer Science National Research University Higher School of Economics, Moscow

On Educational Testing Software Interoperability Support

Nowadays the computer adaptive testing plays the main role in massive educational testing. This partly causes the growing interest to computerized forms of testing. In its turn, data transfer between item banks and test systems has become the topic of high actuality this last few years. This paper address questions about the interoperability of educational testing systems. The most popular text and XML-formats of the test questions (including rapidly developed QTI/APIP) were studied. The review of existing converters demonstrated that there is no freely accessed converter, which supports several questions' types, has adequate Russian interface or allows internationalization, and offers authoring tools for the questions of different types. Consequently, the architectural and functional software requirements on test questions' converter were determined and listed. As a result, the paper presents the web-API prototype, which was design and implemented according to collected requirements.
Keywords: computer-based testing, test questions formats, test items converter, QTI/APIP compatibility

P. 535—541


V. B. Vyatkin, PhD, vbvvbv@yandex.ru

Integrative-Code Interrelation of Combinatorial, Probabilistic and Synergistic Approaches to Determining the Amount of Information

Joint analysis of combinatorial, probabilistic and synergistic approaches to determining the amount of information on the basis of the consideration of integrative codes of discrete system elements, divided into parts according to the values of arbitrary sign, have been carried out in this article. (Integrative code is an individual description for each element of the system and presents a sequence of symbols of any alphabet, the length of which is a function of the total number of elements.) It is shown that, in general, integrative codes are divided into a group and system parts. The group part of code is specified by a set of elements which have identical value of attribute, system part is superstructure over group part and it is result of summing of sets having different characteristic into integrated system.
It was found that information measures of combinatorial, probabilistic and synergistic approaches to determining the amount of information are exactly expressed through the weighted average of the group and system parts of an integrative code. Moreover, if the measures of synergetic approach are expressed through the weighted average of the group and system parts of a code, the measures of combinatorial and probabilistic approaches are functionally linked only with the weighted average of the system parts. Following conclusions are made on this basis. First of all information measures of combinatorial, probabilistic and synergistic approaches are essentially the quantitative characteristics of the structural features of the integrative codes of an elements of a discrete systems. Secondly, the information appearing in a synergetic approach (information about a finite set, as a single entity), is genetically primary in relation to the information measured in combinatorial and probabilistic approaches (removed uncertainty of selection one of the many opportunities).
Keywords: amount of information, integrative code, syntropy, entropy, finite set, discrete system

P. 542—548


A. I. Galuskin, e-mail: neurocomputer@yandex.ru, Head of the Neural Network Technology Centre in International Centre of Informatics and Electronics (ICIE)

New Microelectronics Technology and the Development of Advanced Neurocomputers

The article describes main problems and difficulties that are currently available and are likely to be present in the future in the field of development and introduction of new microelectronic technologies in the advanced neuro-computers.
This structure of works represents the operation procedure and composition of the work on introduction of new microelectronics technology in high-performance neurocomputers proposed by the author. Both the operation procedure and scope of work may vary depending on the type of technology, with required, or at least desirable, justification for the exclusion of certain stages of work presented below in this article:
• about classical possible approaches to task solutions;
• work structure for the design and implementation of neural network based algorithms for problem solving;
• the description of spiking neurak network algorithms;
• development of neurochips and neuromorphic computers with use of memristor.
Keywords: neural network technology, new technology of microelectronics, spiking neural networks and neurochips, memristors

P. 550—555


Dam Van Nhich, Graduate Student, e-mail: damvan.nhich@gmail.com, Department IIST FREC of Moscow Institute of Physics & Technology

Automatic Digital Modulation Recognition of Radio Signals Using Multilayer Neural Network with Cumulant Features

The article solves the problem of digital modulation recognition of radio signals based on the using multilayer neural network with cumulant features. Recognition is performed with the basic types of digital modulation 2-PSK, 4-PSK, 8-PSK, 2-FSK, 8-QAM, 16-QAM, 64-QAM. Features for the entrance of the neural network are cumulants C2,0, C4,0, C3,1, C2,2, C6,0, C5,1, C4,2, C3,3, C8,0. MATLAB R2013b used to generate the data and perform the simulation, the article studied the Gaussian noise. The best result was shown using 9 features and 40 neurons in the hidden layer. These results are good enough, but recognition result of 16-QAM and 64-QAM is not very high, especially at low SNR. Increase of recognition results of 16-QAM, 64-QAM is a work in further studies.
Keywords: modulation, modulation recognition, IQ signals, moments, cumulants, Gaussian noise, signal to noise ratio (SNR), neural network, learning algorithm, Neural Network Toolbox

P. 555—560


To the contents