metadata of articles for the last 2 years
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

metadata of articles for the last 2 years

The forecast of cancer prevalence in the regions and municipalities of Russia based on a multivariate model

2023. T.11. № 1. id 1286
Stepanov V.S. 

DOI: 10.26102/2310-6018/2023.40.1.022

The article considers the issue of the relationship between the cancer prevalence in some Russian regions and age composition along with a set of environmental and hygienic variables. The presence of the relationship between the prevalence of this pathology in the territory and the lag values of the variables are shown. The complex of factor explanatory variables contains an indicator of atmospheric air pollution in the settlements of the territory, a qualitative variable according to the degree of its technogenic pollution, the specific volume of polluted wastewater discharge, the concentration of benzo(a)pyrene, and the age composition. On this basis, an econometric model has been built that has a high statistical quality: the coefficient of determination is above 95 %, the approximation error is less than 3%. One of the factors was of the ordinal type; therefore, the result was a linear regression model with a variable structure containing two dummy variables. The model parameters were estimated by the least squares method using panel data with Russian regions for 2017-18. These data included observations on the populations of people with oncologic pathologies in the regions and factor variables. The presence of lags in the latter makes it possible to predict the number of people suffering from tumors of any localization with a planning horizon of 1 year. Such forecasts were carried out both at the level of regions and in the context of municipalities. Based on the resulting equation, one can make evidence-based managerial decisions aimed at canсer prevention in specific regions of Russia as well as to build agent-type simulation models.

Keywords: regression model, atmospheric air pollution, sewage pollution, benz(a)pyrene, technogenic pollution of the territory, smoking, malignant neoplasm, region, municipality

Investigation of the influence of aggressive behavior of minors on their deviant activities based on the Buss-Durkee method by constructing a fuzzy logic production system

2023. T.11. № 1. id 1284
Gish A.Z.  Kovalenko A.V. 

DOI: 10.26102/2310-6018/2023.40.1.009

The problem of deviant behavior prevention in minors is particularly relevant at present since this age group belongs to the most socially vulnerable category. In order to identify the deviation in adolescents, it is necessary to analyze and identify manifestations of their aggressive behavior. This study is based on the identification of predisposition to the development of aggressive behavior based on the Buss-Durkee method. 10 factors identified by the authors of this technique have been considered. A five-level classifier for input and output factors of a fuzzy logic production system is proposed. The membership functions are selected by applying the method of expert assessments reflecting the competent opinion of a specialist regarding the affiliation of the elements with the term set. Fuzzy logic rules have been defined, in the capacity of which the data on the test results obtained by minors aged 14-15 years have been entered and supplemented with a view to ensuring the completeness of the system. To reduce the number of fuzzy logic rules and enable consistency in it, a hierarchical structure of input factors has been formed. As a result, an intelligent system, namely a fuzzy logic production model of deviant behavior of minors "Deviance level BD", has been created, which can be used to prevent deviant behavior in minors, as well as to analyze and identify manifestations of their aggressive behavior to prevent them from committing criminal acts.

Keywords: fuzzy logic production system, fuzzy logic model, deviant behavior, buss-Durkee method, five-level classifier, term-set, membership function, fuzzy logic rules

Smoke recognition model in an open area using a convolutional and recurrent neural network

2023. T.11. № 1. id 1282
Shestakov D.A.  Shagrova G.V.  Strukova V.G.  Doronin V.A. 

DOI: 10.26102/2310-6018/2023.40.1.027

Timely detection of the source of ignition is an important issue of protecting people, animals and vast territories from fires. The relevance of this study is due to the fact that the existing visual smoke detection systems have a number of disadvantages that do not allow them to be effectively applied in practice. The surveillance system must rely on visual characteristics and often mistakenly identifies fog and clouds as smoke. The aim of this study is to increase the efficiency of smoke detection by using an advanced smoke detector model based on the "You-Only-Look-Once" neural network and a classifier with long-term short-term memory (LSTM). The main objectives of the study are structural description of the proposed smoke detection model, mathematical description of the trained model and comparative analysis with existing neural network models. By changing the structure of the LSTM, a reduction in the number of layers and cells is achieved, and the performance of the original LSTM is maintained. The proposed method provides a reduction in the number of parameters by several times and a faster processing time on the data set used. The article presents the results of the performance of artificial intelligence systems for a comparative analysis of neural network candidates in the smoke recognition model.

Keywords: smoke detection, fire detection, object classification, neural networks, image processing

Situation-oriented databases: verifying electronic signatures of heterogeneous documents in a RESTful web service

2022. T.10. № 4. id 1281
Gusarenko A.S. 

DOI: 10.26102/2310-6018/2022.39.4.019

When focusing on modern conditions in the field of processing heterogeneous data based on a situation-oriented approach, the task of using information systems with implemented cryptographic technologies during operation arises. One of the examples of such implementation are services and microservices available via the Internet. They provide opportunities to employ their capabilities to verify the authenticity of document enhanced digital signature by means of the published API. Situation-oriented databases (SODB) do not have their own certification authority and encryption-related functionality, but there are opportunities to work with RESTful services by establishing a network connection, thus, there is a research interest in model-oriented processing of heterogeneous documents in cryptographic services and obtaining results from it. To use cryptographic web services in model states, it will be necessary to develop and modify the hierarchical situational model of the SODB in order to enhance it with the ability to work with such services, where authentication of authorization tokens and operating several entry points at the same time are required. The model should also be structured by using specialized elements and methods. The involvement of such services can solve the problem of checking heterogeneous documents: whether they were signed with an enhanced qualified electronic digital signature, the result will be a verification report, the so-called protocol, which is then saved in the database. Such a research objective has not previously been considered from a scientific and technical point of view as part of the SODB project. At the moment, there are opportunities to create tools and methods of the model to solve this problem; the current course design information system based on SODB also exists. By developing the proposed SODB tools, it becomes possible to create applications with the capability to verify heterogeneous documents in cryptographic web services and at the same time avoid laboriousness when creating such applications.

Keywords: situation-oriented database, built-in dynamic model, heterogeneous data sources, JSON, electronic digital signature, verification, RESTful-services

Automation of growing crops in a stationary compact greenhouse complex with a controlled microclimate based on a hydroponic system

2023. T.11. № 1. id 1280
Levonevskiy D.K.  Ryabinov A.V.  Zhukova N.A.  Kovalevsky V.E. 

DOI: 10.26102/2310-6018/2023.40.1.029

Automation processes are currently being implemented in agriculture. Solutions in the field of agricultural automation and smart agriculture can reduce time expenditure and cost of crop production and lessen the impact of the human factor, i.e. mistakes that can lead to the death of crops and cause significant damage to the enterprise. This article deals with the issue of automation and modeling of technological processes of growing crops in stationary compact greenhouse complexes with a controlled microclimate based on a hydroponic system. A diagram and a model of the behavior of such complex is presented in the article. The complex helps to perform cyclic cultivation by periodic irrigation with a nutrient solution cleaned with a biofilter. To model the behavior of a mini-greenhouse, UML state diagrams were used. The problem of evaluating the performance of such modules and recording disruptions of cultivation process drawing on the collected data was considered. Machine learning methods were employed to estimate and predict climatic parameters in the greenhouse. The application of these methods allows performing proactive control of technological processes in the greenhouse, ensure strict adherence to production regulations and rational use of resources. Further research involves creating a method for proactive control of compliance with technological processes based on the formal models of these processes.

Keywords: smart agriculture, cyber-physical systems, smart greenhouse, behavior modeling, automated process control systems

Modeling and visualization of thermohydraulic processes under the influence of external dynamic forces

2023. T.11. № 1. id 1275
Sataev A.A.  Andreev V.V. 

DOI: 10.26102/2310-6018/2023.40.1.004

The article deals with the relevant issue related to accounting for the impact of external dynamic forces on thermal-hydraulic processes. These include processes of natural circulation, mixing of the coolant in the equipment of nuclear power plants, steam separation processes, operating modes of heating systems for high-viscosity media, operation of absorption refrigeration devices installed on small and large sea vessels. The principal approach to researching this problem is the experimental method which makes it possible to comprehensively consider these processes on small-scale models. For this, an experimental stand of an original design was developed. The parameters obtained during the operation were visualized and converted into graphic images, which were analyzed using the open-source computer vision library OpenCV. A new method for visualization of mixing processes of non-isothermal flows is proposed, the implementation of which resulted in the integral and local characteristics of this process. It is evident from the findings that the modes of periodic rolling and static roll have a significant effect on the mixing processes of non-isothermal coolant flows. After analyzing the obtained graphic images, areas of uneven mixing were identified, which are in direct correlation with the conditions of external dynamic influences. The techniques tested in the study of mixing processes of non-isothermal flows can be used in other applications to solve similar problems.

Keywords: visualization, thermohydraulic processes, external dynamic forces, rolling, experimental modeling, nuclear power plant, openCV, mixing

Algorithmization of the multivariate structuring process in digitalized organizational systems

2023. T.11. № 1. id 1274
Ryndin N.A. 

DOI: 10.26102/2310-6018/2023.40.1.005

The relevance of the study is due to the problem of improving management efficiency in organizational systems that employ a digital environment for storing and processing information about the parameters and characteristics of such systems. The article deals with the issues of algorithmization of multivariate structuring process in digitalized organizational systems of two types: multi-object and autonomous. The main characteristics of the multivariant structuring process are given; optimization models are formulated for solving the problems of the multivariant structuring main stages. It is shown that the performance indicators of the organizational system depend on the selected implementations of the components of the developing digital environment. At the same time, the presence of extremal and boundary requirements leads to the problems of single-objective or multi-objective optimization with restrictions. Optimization models for the distribution of resource support for maintaining the functionality and development of the components of the digital environment are being built. The main algorithmic procedures for searching the optimal solutions are formulated and an assessment of the variant compatibility of the environment structures is given. The implementation sequence of the multivariant structuring stages is given in the form of a block diagram of the interaction of these stages. The specifications of using the apparatus of multivariate structuring to optimize the characteristics of digitalized systems are demonstrated through the example of the organizational system of an agro-industrial enterprise. Algorithmization of the multivariate structuring process makes it possible to implement this apparatus in the information management system and ensure the fulfillment of the specified requirements for the system.

Keywords: organizational systems, digital environment, management, multivariate structuring, optimization, agricultural enterprises

Intelligent support for detecting information security incidents

2023. T.11. № 1. id 1271
Tokarev V.L.  Sychugov A.A. 

DOI: 10.26102/2310-6018/2023.40.1.006

The relevance of the study is due to the need to automate the processes of detecting and identifying information security incidents for the timely launch of response processes, which, in turn, will reduce the impact of both intentional and accidental information security incidents on information security in automated systems for various purposes. The suggested solutions are based on artificial intelligence methods, and as a built-in means of intellectual support for the detection of information security incidents, a decision support system is employed. The article proposes models, mathematical dependencies and methods for solving problems of automatic detection, identification of information security incidents as well as their localization, for which, among other things, fuzzy set theory is used. Possible strategies for localizing information security incidents are considered. Procedures for responding to information security incidents as well as their elimination are formulated, which, in turn, allows building intelligent support systems for solving the problem of prompt detection of information security incidents. Examples of events are given. The materials of the article are of practical value for building systems of preventive information protection, which is currently one of the promising areas of theory and practice of ensuring information protection

Keywords: information security incidents, preventive information protection, artificial intelligence systems, mathematical logic, automated systems

Modeling the conditions of regular сompliance with recommendations for cardiological patients at the outpatient stage using decision trees

2022. T.10. № 4. id 1270
Gafanovich E.Y.  Sokolov I.M.  Konobeeva E.V.  Kashirina I.L.  Firyulina M.A. 

DOI: 10.26102/2310-6018/2022.39.4.011

The paper is concerned with the use of decision trees with a view to designing the model of regular сompliance with recommendations for cardiological patients. Machine learning of feature significance in a tree-like structure was conducted based on the statistical sampling gathered after examining 69 patients that had received treatment in a cardiological department and who had been being observed for 6 months after discharge. To build a decision tree, input data was employed: age, gender, social status, reasons for hospitalization, description of previous illnesses, treatment strategy, reasons for missed doses, adherence to recommendations. As output data, regular / irregular compliance with the recommendations during 6 months after discharge was used. The decision tree that reflects the conditions influencing the compliance with medication intake after discharge has been built. Analysis of factor scaling influence at branching points will provide the means for defining the regularity of compliance with the prescribed medical treatment in the form of their conjunctions at each branch of the decision tree. Significance of the features associated with the factors of influence was evaluated according to Gini index value. This intelligent technology identified the factors that determine the outcome: providing patients with clear recommendations, missed doses due to forgetfulness, patient’s general state, social status, changes in therapy, patients’ age, duration of arterial hypertension.

Keywords: modeling, classification, decision tree, gini index, regular medication intake

Determination of the stabilization rate of the solution to one initial problem for the heat equation

2022. T.10. № 4. id 1268
Ryabenko A.S.  Tran D. 

DOI: 10.26102/2310-6018/2022.39.4.014

Differential equations are intensively used as models for a wide range of natural science problems. For most differential equations, it is not possible to obtain solutions in quadratures expressed in terms of elementary or special functions, and if it is possible, then the representations of these solutions are often very cumbersome, which makes their practical application difficult. Therefore, the question of finding simple formulas that describe with a sufficient degree of accuracy the qualitative behavior of solutions to differential equations on a certain interval of variation of the independent variable is very acute. Asymptotic methods are employed to determine the qualitative behavior of solutions to differential equations on a certain interval of change of the independent variable. Asymptotic methods are more preferable than numerical methods when one needs to know the behavior of the solution to a differential equation considered on an unbounded interval. This is explained by the fact that the discrepancy of the solution to a differential equation (the modulus of the difference between the true solution and the numerical solution) is usually estimated from above through a value proportional to the length of the interval on which the numerical method is applied. The paper considers the one-dimensional Cauchy problem for an inhomogeneous heat equation with a homogeneous initial condition. Using an explicit representation of the solution to the Cauchy problem, an exact uniform estimate and an exact pointwise estimate of the stabilization rate of the solution to the Cauchy problem to zero for a long time were constructed.

Keywords: heat distribution, solution stabilization, time behavior, time asymptotics, heat equation, time estimate, asymptotics at infinity

Hybrid intrusion detection system with the use of a classifiers committee

2022. T.10. № 4. id 1267
Vasilyev V.I.  Vulfin A.M.  Gvozdev V.E.  Shamsutdinov R.R. 

DOI: 10.26102/2310-6018/2022.39.4.020

The issues of detecting network attacks to Industrial Internet of Things (IIoT) systems are analyzed. Existing approaches for detecting such attacks based on the use of artificial intelligence methods are considered. The high interest to integration of machine learning and artificial intelligence methods as a part of hybrid systems is emphasized. Such integration makes it possible to compensate the shortcomings of some algorithms due to the advantages of others. The goal of this research is to improve the efficiency of network attacks detection. The paper proposes the implementation of a multi-level hybrid attack detection system on the basis of combining several classifiers in the committee including the artificial immune system, the multilayer perceptron, and the random forest algorithm. The choice of these classifiers is due to their high classification efficiency and the ability of artificial immune system to detect unknown network attacks. The decision is made on the basis of the conclusion of each expert (classifiers) with the use of voting mechanism. Such approach provides more accurate result in accordance with the Condorcet's jury theorem. To carry out computational experiments for assessing the effectiveness of the proposed system, the NSL-KDD network traffic data set was employed. The results of experiments carried out demonstrate the high efficiency of the proposed hybrid attack detection system based on use of classifiers committee.

Keywords: information security, industrial Internet of Things, intrusion detection system, network attack, NSL-KDD dataset

System analysis of a model for obtaining performance characteristics of an integrated security system

2023. T.11. № 1. id 1266
Lubentsov A.V. 

DOI: 10.26102/2310-6018/2023.40.1.030

The study regards the system analysis of the issues related to the synthesis of complex security systems. The analysis of the approaches to evaluating the efficiency of security systems is presented. Main efficiency criteria and the parameters of complex system operation are discussed; their system analysis is proposed. The result of the performance specification analysis and the analysis of security system efficiency objectives are presented. The key objective functions of complex security systems are defined. The concept of technical and economic efficiency is substantiated. The functions are evaluated by the predefined parameters. System analysis of the notion of ‘efficiency’ in regulation documents is given. An argument for the optimality of using analytic hierarchy process is presented. It has been proved that analytic hierarchy process tends to be subjective, and its reduction is suggested. The original method consists of two parts: the first one is subjective (selection of the criteria and the solutions along with ranking); the second one is objective (calculation of impact parameters and matrix elements) which is not affected by the decisions of a human being. When implementing the first part, the results depend heavily on the decision-maker. The modified (cascaded) analytic hierarchy process is proposed, the calculation model is described. In this instance, three groups of experts are developed: independent experts, facility managers and users (specialists who operate the facility after its implementation). They jointly select the list of solutions (modification) and the list of criteria, but the ranking is carried out by each group individually and the matrices are built by each group at their own discretion. The rationale for the preferred use of the cascaded hierarchy analysis process is provided. The generalizations concerning the characteristics being considered are given.

Keywords: security, risk, efficiency characteristics, hierarchy analysis process, objective function of a security system

On the approach to ensuring the property transitivity in web ontologies

2022. T.10. № 4. id 1265
Shulga T.E.  Sytnik A.A. 

DOI: 10.26102/2310-6018/2022.39.4.009

The article focuses on the issues of knowledge representation in the form of web ontologies. The relevance of the study is due to the two factors. On the one hand, a large number of OWL ontologies and RDF datasets have been created as part of semantic web concept development in recent years. On the other hand, the OWL language has a number of limitations that do not always allow adequate representation of domain knowledge. For example, SPARQL queries that use the transitive properties of the OWL language can create some kind of "loops" and return incorrect information. This article demonstrates that in some cases it is preferable not to use the transitivity of properties in the ontology. The algorithm for traversing related entities, which enables solving the problem of “loops”, is proposed. To illustrate the issue, we use "Higher educational programs of Russian Federation" web application. This application is developed on the basis of the RDF dataset which contains information about scientific specialties, bachelor’s, master’s and postgraduate programs obtained from publicly available official documents of the Ministry of Science and Higher Education of the Russian Federation since 2001. To set up a correspondence between the fields of studies that have existed over the years in the Russian Federation, equalsTo transitive property is employed in the RDF dataset. Although the developed algorithm is formulated and used in terms of a specific domain to solve the problem of a particular application, it is quite universal and can be applied by web developers to solve the problem of transitivity in RDF datasets of other domains.

Keywords: transitivity of OWL properties, web ontology, OWL ontology, RDF dataset, semantic Web, recursive algorithm, linked fields of study

Identification of technological complementarity of enterprises based on the analysis of the patent database

2022. T.10. № 4. id 1264
Korobkin D.M.  Fomenkov S.A.  Kolesnikov S.  Bezruchenko A.Y. 

DOI: 10.26102/2310-6018/2022.39.4.010

Technological complementarity plays an increasingly important role in making strategic decisions regarding the choice of partners to work with as well as for expanding the diversity of innovation activities through the creation of alliances or mergers. Modern quantitative measurements of technology complementarity are largely based on research founded on patent classification codes. However, this approach ignores specific technologies in a particular field and, therefore, the results obtained are only general pointers. It is proposed to develop an approach to the quantitative measurement of the complementarity of enterprise technologies in reliance on statistical machine analysis of the patent array. The aim of the study is to develop a technology for clustering USPTO patent documents and identifying technological complementarity of enterprises based on the comparison of cluster information. The theoretical value lies in the following: the developed algorithms for patent parsing; clustering of the patent array based on the hLDA method; formation of "Enterprises – Clusters (Topics)" matrix; visualization of enterprise connections in a clustered patent space. The practical significance of the research lies in the developed software for identifying technological complementarity of enterprises, the effectiveness of which has been tested on a number of test examples.

Keywords: patent, USPTO, technological сomplementarity, clustering, hLDA

Solving system-problems of WEB application development by means of the MODx-concept

2023. T.11. № 1. id 1257
Gutovskii D.I.  Dobrynin V.N.  Minzov A.S.  Podgorny S.A. 

DOI: 10.26102/2310-6018/2023.40.1.013

Current CMS, regardless of their complexity and orientation, can be divided into two groups: one follows the MODx-concept, the other does not. The article describes the problems of building and development of WEB applications that are typical for standard CMS. The problems regarded in this article are relevant for all participants of WEB development. The problem of drastic changes to the interface is that it has to be constantly edited when the functionality is modified even if it is not related to this part of interface. This changing requires significant costs on the part of WEB developers and users. The problem of API continuity absence in standard systems is associated with the absence of atomic entity principle. The absence of API continuity leads to significant costs for CMS developing. The problem of connection between the different applications is due to the strong relationship between CMS components, which, in turn, does not make it possible to flexibly adjust the system to generate the content with the specific properties which are needed for joint applications. The problem of WEB application module conflicts is connected with unsystematic dependencies between CMS components. The inability to redefine the client part and the inflexible file hierarchy of standard CMS play an essential role in the problem of WEB application security. The scalability problem is primarily associated with the nonindependence of addresses on the site filesystem for standard CMS. The authors provide justifications for the application of the MODx-concept by a team of developers at the stages of WEB application design and operation to solve these problems.

Keywords: CMS, MODx, template, layout, setup, MODx-concept, site, content, WEB-site, WEB

Hidden Markov model of a GI/G/2/0 queuing system with losses

2022. T.10. № 4. id 1256
Sidorov S.М.  Obzherin Y.E. 

DOI: 10.26102/2310-6018/2022.39.4.012

Semi-Markov processes are widely used to model queuing systems. The relevance of the study is due to the increase in the capabilities for analysis and performance of queuing systems for which semi-Markov models are constructed. The application of the hidden Markov model theory to them also underscores the importance of this research. In this regard, this article discusses the application of the apparatus of the hidden Markov models theory to a lossy queuing system described by a semi-Markov process with a general phase state space. This makes it possible not only to move beyond the exponential law of the distribution of service times and the flow of applications when describing the system, but also to solve the problems of forecasting and evaluating states and signals, correcting the model while the system is in operation. For transition to a discrete set of states of the Semi-Markov model, the algorithm of stationary phase enlargement is employed. As an illustrative example, a merged semi-Markov model of the GI/G/2/0 queuing system with losses is constructed. Based on it, a hidden Markov model is developed for which the problems of analyzing dynamics and predicting states are solved. The parameters of the hidden Markov model are refined by means of the Baum-Welsh algorithm; the most probable sequence of changing states of the system is determined by the received signal vector.

Keywords: hidden Markov model, queuing system, GI/G/2/0 with losses, merged semi-Markov model, state forecasting

Method of IT services availability calculation and analysis in event-driven umbrella monitoring systems

2022. T.10. № 4. id 1255
Kamenev A.S.  Sakharov Y.S. 

DOI: 10.26102/2310-6018/2022.39.4.015

The article explores the problem of defining and further interpreting a key indicator in the management of information services: the availability of IT services. The relevance of the study is due to the growing digital transformation of all sectors of the economy and human life in general, which has resulted in a direct dependence of the performance of enterprises and organizations on the quality of IT services. At the same time, industry standards for managing information services are often of a framework nature because of constant technological changes. In this regard, this article aims to explain further the definition of IT service availability: the paper formulates the principles for compiling accessibility metrics avoiding the negative ‘watermelon’ effect and also proposes a method developed on their basis for calculating and analyzing the availability of IT services adapted for use in event-driven umbrella monitoring systems. It is concluded that the suggested method can be employed not only to assess availability, but also to search for the root causes of incidents, as well as in the development and implementation of decision support systems for managing information services. The materials of the article are of practical value both for engineers servicing the modern complex IT infrastructure of large enterprises and for the management of such organizations. The described method is utilized in the reporting module of a commercial software product: MONQ software platform for collecting, analyzing and managing processes implemented by a number of large Russian enterprises and government organizations.

Keywords: ITSM, availability, monitoring system, IT service, resource-service model, service management system, ITIL

An approach to managing a virtual computer lab based on the conceptual model of operational risks

2023. T.11. № 1. id 1254
Zhivetyev A.V.  Podgorny S.A.  Tokareva N.A.  Cheremisina E.N.  Belov M.A. 

DOI: 10.26102/2310-6018/2023.40.1.001

The article presents the results of a research on improving the management system of Virtual Computer Lab educational data center based on the conceptual model of operational risks. Virtual Computer Lab is an integrated assembly of virtualization and containerization hardware and software tools in the form of cloud services with an integrated knowledge management system. Virtual Computer Lab is used to master multicomponent information systems for developing students’ complex knowledge, skills and abilities in the field of IT in a classroom context and as part of independent learning. The knowledge management system and the principles of self-organization, which are the integral parts of Virtual Computer Laboratory, make it possible to create a homogeneous educational environment. For the reliability and durability of using the Virtual Computer Laboratory with a minimal downtime, an analysis of the impact of risks on its operation was carried out, and an approach to designing a risk management system was proposed. The approach considered in the article enables better assessment of performance bottlenecks of the Virtual Computer Lab as well as its key problems in a comprehensive manner, increase service uptime, enhance performance quality and reduce the number of failures by means of preventive mechanisms, successfully identify the risks that significantly affect its output and develop an effective system of measures to minimize them. The article discusses in detail such elements of risk management as risk identification and assessment, strategic risk management, risk monitoring and analysis, security and change management.

Keywords: education, information technology, virtual Computer Lab, risk management, operational risks, management of sociotechnical systems based on a risk model, digital transformation, cloud data center, modern management methods, digital learning

Implementation of the adaptive beamforming algorithm on FPGA

2023. T.11. № 1. id 1253
Boyko I.A.  Kazmin O.Y.  Glushankov E.I.  Kirik D.I.  Korovin K.O.  Tsarik I.V. 

DOI: 10.26102/2310-6018/2023.40.1.025

The paper regards the field-programmable gate array (FPGA) implementation of a beamforming algorithm in adaptive antenna arrays. The relevance of the research is due to the need to improve the noise robustness of signal reception in radio engineering systems. The gradient algorithm was chosen as a beamforming algorithm by the criterion of the normalized least mean square error criterion (NLMS), which has the lowest computational complexity, and its use of a variable adaptation step helps to ensure the convergence of the algorithm in terms of a priori unknown power of the input signal. This paper gives a mathematical description of the adaptive signal processing procedures and formulas for calculating the optimal weight vector that provide the best approximation of the input signal to the reference signal. Approximate methods that provide a practical realization of the optimal signal processing based on iterative algorithms in the form of the normalized minimum mean square error algorithm are considered. Examples of the antenna array directional diagram synthesis facilitating adaptive signal processing, implemented on FPGA, under different signal-interference conditions are presented. An acceptable agreement between theoretical and experimental data was obtained for all implementation cases.

Keywords: adaptive antenna array, radiation pattern, MSE adaptive algorithm, FPGA

The integrated decision support model for the implementation of the project to introduce an innovative product "flow battery stack"

2023. T.11. № 1. id 1251
Pakhomov A.V.  Voropay A.N.  Pakhomova E.A. 

DOI: 10.26102/2310-6018/2023.40.1.012

A systematic interdisciplinary comprehensive study is presented. The object is the process of preparation and decision-making related to the implementation of the project to introduce an innovative product “vanadium flow redox battery stack”. The subject is a combination of methods of system analysis along with economic and mathematical methods to support the adoption of such a decision. The goal is the financial and economic support for the conditions of the project to introduce new products. For these purposes, a number of objectives were accomplished. A comprehensive model based on the product life cycle model has been developed, which enables the pre-project and project stages of project implementation with consideration to the model of product life cycle, distributed cash flow, calculation of the break-even point regardless of the time factor. The simulation results were compared, and the model verification and validation were evaluated. An algorithm has been developed, and calculations have been carried out for each stage of the model. In terms of practical significance, the obtained integrated result is a developed operational, adaptive, low-cost human-machine decision support system for choosing optimal options through simulation modeling. This system can be used as a template for both educational and production purposes, including formulating the requirements for technical and economic calculations as well as substantiation of objectives for the development of project materials. The scientific (academic) significance of the presented research is seen in the development of the author's original direction – the instrumental and methodological approach to the adaptation of the triple helix model in the context of Russia – at the meso-/micro-levels (in the sectoral / regional) cross-section.

Keywords: flow battery stack, system approach, system analysis, algorithm, human-machine system, simulation, life cycle, distributed cash flow, inflation, break-even point

Criteria and models of integrated assessment of the sustainability of the region's development

2023. T.11. № 1. id 1250
Shamaeva E.F.  Pryakhin V.N.  Glaz R.A. 

DOI: 10.26102/2310-6018/2023.40.1.015

The relevance of the study is due to the growing popularity of the sustainability issue over the past few decades. As a result of increasing consumption and production, the issue of environmental protection becomes particularly acute. Another consequence of this growth is that the stratification between the super-rich and the poor is deepening more and more leading to social problems. Limited resources pose new challenges to economic science. To solve the problems of sustainable development, it is necessary to design a system of integrated assessments of the state of sustainability or, in other words, methods of integral assessment of the state of sustainable development. In this regard, the article is devoted to the analysis of existing methods of system analysis and assessment of territorial sustainability of development. The evaluation criteria are analyzed in detail, their relevance to the task of assessing the state of sustainability, and the criteria for an effective integrated assessment of the sustainability of the region's development are formed on their basis. The methods of system analysis used in integral assessments as well as their methodological review are considered. As a result of the conducted research, methodological requirements for the design of an integrated assessment of the sustainability of development, as well as the necessary methods for conducting such an assessment, are formulated. The results of this study can give a grounding for the design of an integrated assessment of sustainability, sustainability of development, resource potential, as well as papers in the field of interdisciplinary research, including methods of system analysis, ecology, economics, sociology.

Keywords: integral criteria, complex models, development, sustainability, integral assessment, indicators of sustainable development

Use of fuzzy logic to create an adaptive individual learning path based on dynamic course complexity management

2022. T.10. № 4. id 1249
Belov M.A.  Grishko S.I.  Zhivetyev A.V.  Podgorny S.A.  Tokareva N.A. 

DOI: 10.26102/2310-6018/2022.39.4.018

The article presents a model for creating an adaptive individual learning path based on dynamic control of the course complexity using fuzzy logic methods. The model helps to individually manage the complexity of the training course for each student and to formalize the process of solving practical tasks and feedback from students motivating them to study productively taking into account personal characteristics and preferences. Implementation of such models and corresponding systems in the training process enables teachers to choose the most appropriate tasks for each student with due regard for individual characteristics and personality. The approach allows teachers to allocate more time for scientific, methodological and creative work, especially with the option to distribute educational materials in the form of microlearning, where a large number of students, usually studying online, is invited to perform many small practical tasks. Also, adaptive learning paths are designed to promote the development of adaptive thinking and adaptive strategies for students behavior. The individual learning path is an important element of online learning management system in the cloud environment of "Virtual Computer Lab" educational data center created by M.A. Belov (https://belov.global) in 2007 at the Institute of System Analysis and Control of Dubna State University, the hallmark of which are the principles of self-organization.

Keywords: IT education methodology, distance learning, individual learning path, digital transformation, microlearning, fuzzy logic, virtual computer lab

The model of the measuring unit with consideration for the influence of external factors on the change in the total error of the measurement channel

2022. T.10. № 4. id 1248
Romantsova N.V.  Suloeva E.S. 

DOI: 10.26102/2310-6018/2022.39.4.013

A necessary task for metrological synthesis is to develop mathematical and algorithmic software that will allow creating models of measuring channels and automating the calculation of the total error, which will accelerate the process of developing measuring devices. The article proposes a model of a measuring unit that takes into account the change in the transformation characteristic due to the influence of environmental parameters, the type of functional dependence of the transformation characteristic on the influencing argument, the number of influencing parameters and the pattern of the influence. It is important to describe each measuring unit according to this model; concurrently, the measuring channel consists of sequentially connected units. The mathematical model is based on the method of nonlinear transformation, the inverse of the distribution function, as well as on the methods of describing signals, the theory of mathematical statistics and the theory of probability. Following on from the analytical calculations, the authors conducted a metrological analysis and compared the parameters of a random value at the output of the measuring channel accounting for the influence of external factors on the characteristics of the measuring unit conversion with the results obtained without regard for the influence of external factors. Examples of calculations confirm the need to minimize the total error of the measuring channel as a whole and not separately for each measuring unit.

Keywords: measurement channel, conversion characteristic, measurement result error, metrological synthesis, metrological analysis, measuring unit model

Situation-oriented databases: processing heterogeneous documents of microservices in a document-based storage

2022. T.10. № 4. id 1247
Gusarenko A.S. 

DOI: 10.26102/2310-6018/2022.39.4.003

The research is focused on a situation-oriented approach to the processing of heterogeneous data obtained from microservices that are widespread due to the implementation of the microservice architecture underlying many information systems. Such information systems are sources of heterogeneous data provided to the user upon request via the Internet. Data in the form of documents is provided by services included in the information system. The volume of such data can be large, and its processing requires specialized technologies available in document-oriented big data storages (SODB). As part of a situationally oriented database, a microservice is implemented that provides data in JSON format through its programming interface. There is a problem of loading and processing large amounts of data in the storage where specialized statistical functions of Map-Reduce are implemented. The manual method of loading and obtaining results for SODB is laborious because it requires the implementation of routine operations for loading data, applying functions to the loaded data, creating functions inside the storage and obtaining results. This task was not considered within the scope of the project on creating situation-oriented databases, and the possibilities for developing specialized elements and methods for processing large-scale heterogeneous data in a hierarchical situational model with the required equipment were not studied. The developed models for processing documents make processing heterogeneous data less laborious and help to create data-driven applications by means of situation-oriented databases in the framework of the introduced data processing model as part of a hierarchical situational model with the involvement of big data processing technologies of specialized document-oriented storages. The proposed tools are examined by the example of the SODB application for solving the problems of course design in the educational process using the developed microservice saturated with heterogeneous data collected while designing a course remotely.

Keywords: situation-oriented database, built-in dynamic model, heterogeneous data sources, JSON, document storage, microservices, RESTful-services

Extraction of morphological features of technical systems from Russian patents using dependency tree analysis

2022. T.10. № 4. id 1246
Vasiliev S.S.  Korobkin D.M.  Fomenkov S.A. 

DOI: 10.26102/2310-6018/2022.39.4.006

The article presents a methodology for extracting morphological features of technical systems in the form of device components and connections between them. The main section of Russian patents claims is chosen as the subject of the study for data extraction. Information about device components is the most fundamental and important part. It can be used in many tasks of computer-aided patent analysis, while the search for effective approaches to extracting such information is still in progress. In the present inquiry, computer-aided development of inventions is considered as a range of applications for such data. The aim of the study was to explore the quality of data extraction using dependency tree analysis for Russian language. The dependency tree is the result of markup by natural language processing tools. Several parsers were chosen for the comparison: UdPipe, Stanza, DeepPavlov and spaCy. The output data are presented in the form of semantic SAO (Subject-Action-Object) structures. The quality of data extraction has been evaluated using precision, recall and F1 metrics. For this purpose, 20 patent claims with 252 SAO structures were manually marked. Under the current methodological constraints, we were able to extract from the dataset 79 % of the SAO structures at best according to the recall metric with a non-strict data evaluation, i.e. without accounting for the completeness of noun groups. The value of F1-measure is lower and ranges from 48 % to 66 % depending on the evaluation type. Conclusions are drawn about the current level of the syntactic analyzer performance within the field of application under review. The results can be useful for developing efficient approaches to extracting structured data from Russian patent arrays.

Keywords: patent, data extraction, device components, dependency trees, SAO

Management of geographically connected systems of an industry cluster based on spatial and temporal information

2022. T.10. № 3. id 1245
Goryachko V.V.  Borzova A.S.  Choporov O.N. 

DOI: 10.26102/2310-6018/2022.38.3.029

One of the urgent problems of modern management theory in organizational systems is the development of effective algorithmic procedures for managing geographically related organizational systems in which the effectiveness of geographically distributed objects operation of the main organizational system depends on the extent to which the results of their activities influence the objects of the organizational system associated with the main one. As part of this study, the authors propose problem oriented procedures for the analysis and management of geographically connected systems of an industry cluster based on spatial and temporal information including cartographic visualization of the results of a GIS-based monitoring assessment of the operation of the objects within the main and associated systems and an expert analysis of object effective interaction intensity based on GIS-oriented spatial and temporal information with consideration to long-term planning of volumetric indicators. Selection of the option that best ensures the interaction of the main and related systems within the industry cluster as well as distribution of volume indicators of a variant between objects within an industry cluster are also suggested. The article presents the results of employing the proposed methodology in the practice of managing the effective interaction of geographically related systems included in the civil aviation cluster where the branch system of higher and vocational education is the main and the geographically connected system is the system of airports of the Russian Federation. The findings confirmed the effectiveness of the proposed approach which makes it possible to recommend it for the use in the practice of managing territorial connected organizational systems of various industry clusters.

Keywords: organizational systems, management of geographically connected systems, optimization, decision making support, industry cluster, education system, civil aviation, spatial and temporal information

Optimizing the adaptation process in the organization of personnel team activities in the context of management digitalization of a multicomponent organizational system

2022. T.10. № 4. id 1244
Lvovich K.I.  Preobrazhenskiy A.P. 

DOI: 10.26102/2310-6018/2022.39.4.002

The paper deals with the optimization approach to the team adaptation of personnel in the implementation of digital management in a multicomponent organizational system. It is shown that the effectiveness of the adaptation process is influenced by the content and resource components. At the same time, the first element is a set of content components that determine the development of innovative competencies in personnel and the fulfillment of new work obligations; the second is the time and financial resources provided to arrange the process of personnel adaptation. The structuring of content components is carried out with a focus on certain sets of competencies and work obligations that are most characteristic of digital management in multicomponent organizational systems. Primary structuring is an expert one and partially performs a reduction function. The final reduction of expert sets of components is undertaken by optimizing their significance and mutual influence taking into consideration the planned duration of the adaptation process. Optimization aimed at improving the efficiency of personnel team adaptation is based on expert assessments of time cycle impact on the degree of content component mastery in three modes: intensive, inertial, accelerated. This accounts for the planned duration of the adaptation process and the order of components precedence when they are mastered by the team.

Keywords: multi-component organizational system, personnel adaptation, digital management, expert assessment, optimization

Algorithms and software tools for human-machine processing of digital watermarks in video sequences

2022. T.10. № 3. id 1243
Morkovin S.V. 

DOI: 10.26102/2310-6018/2022.38.3.024

The global informatization of modern society and continuous scientific and technological progress contribute to a rapid increase in the volume of video content in the global computer network. In some cases, the tasks of unambiguous identification of the source and content authentication arise when distributing unique author's multimedia information. One of the main approaches to solving this problem is to mark a digital graphic image with a digital watermark. In order to minimize the distortion of the original graphic data as well as to hide the presence of any protection of multimedia information, an invisible digital watermark is used. Digital steganography is one of the solutions that provide the means for embedding invisible robust graphic labels in digital images. In this context of application, the purpose of steganography changes – the hidden information becomes a "watermark" whereby it is possible to identify the author or owner of the labeled content. A widespread method of introducing a digital watermark is the procedure of successive transformations in the spectral region of the image followed by the introduction of a digital watermark to the Fourier spectrum. At the same time, it is obvious that any modifications of the data in the frequency spectrum lead to the distortion of the original image and the appearance of unmasking features in the form of artifacts. The article discusses algorithms and software tools for human-machine processing of digital watermarks in a video sequence, which is characterized by continuous change in the coordinates and rotation angle of the digital watermark being implemented.

Keywords: digital watermark, video data, robustness, video stream, multimedia container, digital graphic image

Developing an algorithm for approximation query pipeline processing in a relational database management system

2022. T.10. № 3. id 1242
Filimonov A.V. 

DOI: 10.26102/2310-6018/2022.38.3.027

The article considers an algorithm for approximate query processing in relational database management systems. The described algorithm makes it possible to obtain approximate results of queries with aggregation and grouping, which helps to apply it for the purposes of analytical query processing in order to reduce the response time when processing queries. The presented algorithms implement the method of random cluster sampling and employ software that provides means for obtaining an optimized distribution of the sample space using a sample quality metric. The coefficient of variation is chosen as such metric. The article also proposes a model of the analytical query pipeline given in the form of a directed acyclic graph. The approximate query processing algorithm is extended for the conditions of its application in a query flow, which enables the estimation of the confidence interval along with the result of processing the query pipeline. This algorithm can be utilized in the development of special database processor software that implements the architecture of approximate query processing in relational databases. This approach finds a place in the field of research on the synthesis of the structure of hybrid data warehouses that implement transactional-analytical data processing. Further research is expected to obtain an experimental evaluation of the presented approach.

Keywords: approximate query processing, query processing algorithms, query pipeline, cluster sampling, data warehouse, hybrid transactional-analytical data processing

Joint application of artificial immune system mechanisms in the integrated system for detecting attacks on Industrial Internet of Things

2022. T.10. № 4. id 1240
Vasilyev V.I.  Vulfin A.M.  Gvozdev V.E.  Shamsutdinov R.R. 

DOI: 10.26102/2310-6018/2022.39.4.001

The article considers the issue of detecting network attacks on the Industrial Internet of Things (IIoT) systems. The widespread use of such systems causes an increase in the vulnerability of corporate networks due to the low security of smart devices, the distributed architecture of IIoT networks, and the heterogeneous nature of IIoT devices. The article proposes to employ an advanced artificial immune system aimed at intrusion detection in the IIoT network. The main concepts and mechanisms of artificial immunity currently utilized to solve various kinds of information security and data mining problems are analyzed. Such algorithms as algorithms of negative selection, clonal selection, automatic updating of detectors, danger theory, dendritic cells and idiopathic immune network theory are examined. The features of each approach are regarded; the advantages of their joint application in integrated intrusion detection system are demonstrated. For the purposes of training and evaluating the efficiency of the given system, a set of testing data on the network interaction of Internet of things devices (Bot-IoT) was used. The results of the computational experiments verify the high efficiency of the suggested approach.

Keywords: information security, network attack, dataset Bot-IoT, internet of Things, industrial Internet of Things, artificial immune system, negative selection, clonal selection, dendritic cells, idiopathic immune network