|
||||||||||
|
V. V. Fedosov, Moscow, A. V. Fedosova, Universidad Nacional de Colombia, Bogota, Colombia Parameterization of the Mesh Algorithms Semi-Infinite Optimization for the Problems of Industrial Ecology The industrial ecology are typical management tasks pollution emission sources, the territory of the group. If you set the standards of environmental safety territory (scalar, vector, or function), the optimization should detect the redundancy of such emissions. P. 483489 G. V. Zelenko, Professor, Moscow State University of Information Technologies, Radio Engineering and Electronics, A. D. Ivannikov, Deputy Director for Research of the Institute for Design Problems in Microelectronics of Russian Academy of Sciences, D. Yu. Kogan, Chief Engineer of "Elitex" LLC, A. V. Roshchin, Professor, e-mail: aleksey_roschin@mail.ru, Moscow State University of Information Technologies, Radio Engineering and Electronics Problems of Functional Stability in Sensor Network The paper proposes the criterion for evaluating the functional stability of the sensor network, based on the reachability of any network node from any other. The existing papers of the systems' functional stability research were analyzed. P. 489493 Ju. A. Holopov1, Leader Engineer, Le Ba Chung2, Graduate Student, Nguyen Thanh Trung2, Graduate student, Tran Van Khanh1, PhD Features of Implementation of Distributed Control Systems Based on Hardware Network Solutions The article discusses aspects of the implementation of network technology in distributed control systems. The described various approaches of hardware support for network solutions provide higher throughput capacity in the information environment by: exclusion of arbitration procedures, elimination of control information from the data packages, the organization of exchange between the CPU and peripherals based on a unified packages of state and control. The proposed technology, implemented on FPGA, allows to achieve minimal and stable delay of transfer data in on-board networks. P. 494498 A. Yu. Romanov, Senior Lecturer, e-mail: a.romanov@hse.ru, National Research University Higer School of Economics, Moscow The Research of Network-on-Chip with Mesh Topology by Using NoCTweak Model This article gives an analysis of the effect of geometric shape of the topology and "hot spots" placement on the effectiveness of networks-on-chip. For this reason, a review of the main approaches to the modeling of networks-on-chip was made and the approach for networks-on-chip modeling by using SystemC NoCTweak networks-on-chip simulator was chosen. The analysis of the simulation results makes it possible to formulate the following conclusion: the high sensitivity of mesh network topology to its geometric proportions is found; the use of topologies which are close to the square form allows to increase the network capacity up to 24,7 %, and the central location of "hot spots" allows up to 9 % reduction in the delay of packets, up to 15,2 % in energy consumption for each packet transmission and up to 19,5 % increase of the network capacity. P. 498503 B. G. Kukharenko, Leading Research Scientist, e-mail: kukharenkobg@gmail.com, Blagonravov Mechanical Engineering Research Institute of the RAS, M. O. Solntseva-Chalei, e-mail: solnceva.chalei@gmail.com, Post-Graduate Student, Moscow Institute of Physics and Technology (SU) Use of Salient Region Detecting Methods after Telemetric Image Segmentation for Object Group Identification In this paper we describe how to accelerate object group identification and tracking in real time. It is in need to remove non informational part of image backward and to detect highly salient objects. The salient objects are detected by mean-shift segmentation in image pixel feature high dimensional space and by determining the segmented image salience map. The frequency-tuned salient region detection method is in use, which produces segmented image full resolution saliency map displaying salient object boundaries. The method preserves the object boundaries by retaining main frequency content from the segmented image and exploits features of color and luminance. Since salient object detection is not a pure low-level process, next a unified model is in use to incorporate the image low-level features with higher-level knowledge. In the model, a special image matrix in the feature space is decomposed as a low-rank matrix representing background plus sparse matrix indicating the salient regions. To ensure the model validity, a linear transform of the image feature space has to be learned. Next, the higher-level knowledge is fused to compose a prior map, and is treated as a prior term in the objective function. The approach efficiency is demonstrated on sample image with salient objects P. 504509 A. M. Giatsintov, Researcher, e-mail: algts@inbox.ru, K. A. Mamrosenko, Head of Department, e-mail: kirillam@ya.ru, The center of visualization and satellite information technologies, SRISA RAS Methods of 3D Objects Visualization with Deferred Rendering Article depicts a method of deferred rendering utilized on modern hardware platforms. The use of deferred rendering methods can significantly reduce the amount of required calculations when there are more than eight lights in 3d scene. In contrast with traditional forward rendering methods, deferred rendering also discards pixels that would not complement to the final image. The phases of image drawing, required with the use of deferred rendering, are determined. A method of antialiasing, based on edge detection and implemented as a post-process effect, is described. Article presents a developed method of visualizing semi-transparent 3d objects with deferred rendering. P. 510514 A. L. Stempkovskiy, Academician, Director, D. V. Telpukhov, Ph. D., Head of the Department, R. A. Solovyev, Ph. D., Chief Researcher, ZF-Turbo@yandex.ru, Institute for Design Problems in Microelectronics, Moscow (IPPM RAS) Enchancing Reliability of Logic Circuits with Partial Resynthesis Method A number of diverse factors in the area of microelectronics industry significantly actualized the developments in the field of fault-tolerant combinational circuits design recently. Currently in modern CAD systems there are no means to assess and improve logic masking effects in combinational circuits. In this paper, an attempt was made to create a methodology for the implementation of such software. This paper proposes re-synthesis design flow, providing a logical masking capability for the combinational circuits resistance to a single event upsets without the introduction of substantial redundancy. The details of the method including the development of reliability metrics, the selection of vulnerable sub-schemes, as well as methods of generating reliable circuits are presented. Computational experiments were conducted to demonstrate the high efficiency of the proposed method. P. 515522 R. E. Asratian, Leading Researcher, rea@ipu.ru, V. N. Lebedev, Head of Laboratory, lebvini@ipu.ru, V. L. Orlov, Leading Researcher, ovl@ipu.ru, Institute of Control science RAS Efficiency of a Secure Communication Channels Based on the Use of the HTTPS in Proxy Servers The article is devoted to experimental study of characteristics of the new method of secure interactions organization in multi-network environment. The method is based on the use of HTTPS protocol and proxy server technology. The essence of approach consists in the organization of the protected HTTPS connections between proxy servers for safe transfer of information queries from one private local network in another through a global network while client and server components of distributed system are released from of information protection functions. In this approach client and server programs use HTTP protocol and proxy servers have additional functions of "HTTP - > HTTPS" and "HTTPS - > HTTP" gateways. The main advantage of approach over known (for example, VPN) consists in providing "high-level" means of HTTP queries routing and filtration the based on headers of HTTP queries, but not on separate IP packages. The application of approach is limited to situations in which private local networks can be considered as "a trust zone", and the only source of threats is the global network. The experimental study of efficiency of the offered approach in terms of influence of protection gateways on the speed of electronic services calls processing is conducted. This research showed that the area of effective application of the approach is made by electronic services with performance time over 12 s. P. 523527 V. V. Gribova, Research Deputy Director, e-mail: gribova@iacp.dvo.ru, A. V. Ivanova, e-mail: 2395146@gmail.com, PhD Student, Institute of Automation and Control Processes for Eastern Branch of the Russian Academy of Sciences Software for Security Control of Information Systems This article reviewed modern approaches to the creation of information security systems, the advantages and disadvantages of these approaches. The motivation to create a software that incorporates heterogeneous information security systems into an integrated system is explained. The basic requirements, principles and architecture of software including two subsystems are described. These subsystems are: a subsystem for control of information resources and a client subsystem for security control of an information system. The subsystem for control of information resources is implemented on the cloud platform IACPaaS. The cloud platform is an Internet software for development, control and usage of intelligent services. The client subsystem is intended for monitoring the state of installed systems, as well as for determine the security requirements for the client information system and a security configuration tool in accordance with requirements. By now data and knowledge bases are realized, development of software components is in progress. P. 527534 V. V. Podbelskiy, Professor, of School of Software Engineering, vpodbelskiy@hse.ru, O. V. Maksimenkova, Junior Research Fellow, International Laboratory for Intelligent Systems and Structural Analysis, omaksimenkova@hse.ru, K. S. Babich, Student, Faculty of Computer Science National Research University Higher School of Economics, Moscow On Educational Testing Software Interoperability Support Nowadays the computer adaptive testing plays the main role in massive educational testing. This partly causes the growing interest to computerized forms of testing. In its turn, data transfer between item banks and test systems has become the topic of high actuality this last few years. This paper address questions about the interoperability of educational testing systems. The most popular text and XML-formats of the test questions (including rapidly developed QTI/APIP) were studied. The review of existing converters demonstrated that there is no freely accessed converter, which supports several questions' types, has adequate Russian interface or allows internationalization, and offers authoring tools for the questions of different types. Consequently, the architectural and functional software requirements on test questions' converter were determined and listed. As a result, the paper presents the web-API prototype, which was design and implemented according to collected requirements. P. 535541 V. B. Vyatkin, PhD, vbvvbv@yandex.ru Integrative-Code Interrelation of Combinatorial, Probabilistic and Synergistic Approaches to Determining the Amount of Information Joint analysis of combinatorial, probabilistic and synergistic approaches to determining the amount of information on the basis of the consideration of integrative codes of discrete system elements, divided into parts according to the values of arbitrary sign, have been carried out in this article. (Integrative code is an individual description for each element of the system and presents a sequence of symbols of any alphabet, the length of which is a function of the total number of elements.) It is shown that, in general, integrative codes are divided into a group and system parts. The group part of code is specified by a set of elements which have identical value of attribute, system part is superstructure over group part and it is result of summing of sets having different characteristic into integrated system. P. 542548 A. I. Galuskin, e-mail: neurocomputer@yandex.ru, Head of the Neural Network Technology Centre in International Centre of Informatics and Electronics (ICIE) New Microelectronics Technology and the Development of Advanced Neurocomputers The article describes main problems and difficulties that are currently available and are likely to be present in the future in the field of development and introduction of new microelectronic technologies in the advanced neuro-computers. P. 550555 Dam Van Nhich, Graduate Student, e-mail: damvan.nhich@gmail.com, Department IIST FREC of Moscow Institute of Physics & Technology Automatic Digital Modulation Recognition of Radio Signals Using Multilayer Neural Network with Cumulant Features The article solves the problem of digital modulation recognition of radio signals based on the using multilayer neural network with cumulant features. Recognition is performed with the basic types of digital modulation 2-PSK, 4-PSK, 8-PSK, 2-FSK, 8-QAM, 16-QAM, 64-QAM. Features for the entrance of the neural network are cumulants C2,0, C4,0, C3,1, C2,2, C6,0, C5,1, C4,2, C3,3, C8,0. MATLAB R2013b used to generate the data and perform the simulation, the article studied the Gaussian noise. The best result was shown using 9 features and 40 neurons in the hidden layer. These results are good enough, but recognition result of 16-QAM and 64-QAM is not very high, especially at low SNR. Increase of recognition results of 16-QAM, 64-QAM is a work in further studies. P. 555560
|