
ABSTRACTS OF ARTICLES OF THE JOURNAL "INFORMATION TECHNOLOGIES".
No. 2. Vol. 23. 2017
To the contents
O. M. Poleshchuk, D. Sc., Professor, Professor of Higher Mathematics Department, olga.m.pol@yandex.ru, poleshchuk@mgul.ac.ru, Mytishchi Branch of the Moscow State Technical University named after N. E. Bauman
Using Fuzzy Logic Functions for Decision Making Based on the Rating Assessment
The complication of rating points obtaining is associated with the heterogeneity of characteristics, sustainability of results when used ordinal scales, as well as recognition of the results in order to develop control actions. Using the linguistic variables has allowed to determine the rating points for different characteristics and to avoid incorrect arithmetic operations in the traditional rating models. However, there are some gaps in the decision of ratings recognition problem. The reason for these gaps is the lack of a formalized approach that would enable experts to reduce the errors that arise due to incomplete or fuzzy information. In this connection the urgency of further research aimed at eliminating existing gaps. An approach based on fuzzy logic functions was developed in the paper for decision making based on the rating assessment. This approach allows to cluster the rating points. Each cluster corresponds to the control action aimed at the successful operation of objects in the future. The paper presents a practical example, which confirms the adequacy and viability of the developed approach.
Keywords: rating assessment, linguistic variables, fuzzy logic functions, decision making
P. 83–89
V. Ya. Tsvetkov, Professor, Deputy Head, email: cvj2@mail.ru,
Center fundamental and advanced research, Research and Design Institute of design information, automation and communication on railway transport, Moscow
Cognitive Technologies
The article analyzes the content of cognitive technologies. This article describes the relationship and the difference between information technology and models with cognitive technologies and models. This article describes the relationship and the difference between information technology and cognitive informationgathering techniques to collect information example of the reception of information. This article describes the relationship and differences between cognitive information structures and information structures. This article describes the information certainty parameters s and information underdetermined parameters. This article describes interpretation techniques based on cognitive technologies.
Keywords: cognitive science, information technology, cognitive technology, taxonomy, modeling, interpretation, cognitive design, information models, information certainty, information uncertainty, spot parameter values, interval settings, information reception
P. 90–96
G. E. Yakhyaeva, Associate Professor, email: gul_nara@mail.ru, A. A. Karmanova, Master Student, email: anast.karmy.aa@gmail.com, A. A. Ershov, Master Student, email: alaershov@gmail.com, N. P. Savin, Master Student, email: npsavin@rambler.ru,
Novosibirsk State University, Novosibirsk
QuestionAnswering System for Managing of the Information Risks Based on ModelTheoretic Formalization of the Object Domains
The work is devoted to describing the probabilistic questionanswer system QARiskPanel which let user to interactively analyze the various risks related to computer attacks. QARiskPanel is a knowledge based QAsystem. QARiskPanel system is using a constantly updated database of precedents of computer attacks that enables actualization of the risk prediction. The ontological approach to the formalization of the object domains allows the analysis of risks at various levels of specification/generalization.
The article is provided a modeltheory formalization of the knowledge base considered by object domain. The classification of types of questions is described. All types of questions have probabilistic specificity in this system. We present algorithms for finding the answers to the questions of all types.
Keywords: information security, computer attacks, case of the computer attack, knowledge base, questionanswering system, theory of the fuzzy models, generalized fuzzy model
P. 97–106
G. G. Bulychev, D. Sc., Professor, Moscow Technological University, Moscow
Method of Spatial Characteristics in Problems of a Mechanics of a Deformable Solid Body. Part 2*
By the method of numerical simulation on ÐÑ the research problem of destruction of the twostoreyed house is solved at seismic loading. As mathematical model of dynamics and dynamic destruction of the house the characteristic form of the corresponding equations is chosen and the method of spatial characteristics is used. All stages of eXecution of the project are resulted and results of modelling are analyzed. Programming eXecute in language FORTRAN FPS11/2012, thus was used PC with processor FX8350 and with operative memory of 8 Gb and the author's drawing.
Keywords: method of spatial characteristics, numerical modelling, dynamics and destruction of building constructions and designs
P. 107–112
* Part 1 was published in N. 1, 2017.
D. L. Kishlakov^{1}, Student, email: daniel_kish@outlook.com, P. V. Tarakanov^{1,2}, Postgraduate Student, email: pashabeetle@yandex.ru, G. V. Shashurin^{2}, Dean, email: shashuring@mail.ru, Yu. V. Berchun^{1}, Senior Lecturer, email: y_berchun@mail.ru
^{1}Bauman Moscow State Technical University,
^{2}Mechanical Engineering Research Institute of the Russian Academy of Sciences, Moscow
Cloud Computing Efficiency in Crack Growth Simulation in Hydrogenated Structure Components
The design of durable structure components requires durability analysis in CAE systems. Such analysis often requires batch processing of problem with twolevel tree data stream topology. The leaves of the tree are multiple sametype calculation routines and cloud computations use is a favorable choice for such a task.
To develop CAE durability modules analytical approach to different batch processing systems efficiency estimation is desirable. Such modules are designed for durability analysis of hydrogenated and loaded structure components with initial defects. Crack kinetics model was used to simulate fracture processes; crack length curves had been obtained.
An approach to parallel batch processing organization is described: a distributed cloud application, built on top of Microsoft Azure services, which engages multiple computational resources from a distant cloud server to perform parallel execution of simulations.
An efficiency criterion of parallel simulation tasks batch processing is suggested. The criterion can be applied to estimate efficiency taking modeling parameters into consideration. Based on the criterion a problem can be stated of finding such a subset in the modeling parameters domain, for which any given application will be efficient while processing simulation tasks.
The criterion was applied for efficiency analysis of the developed cloud application to find a subset of one modelling parameter in which the application is efficient being constrained in number of computational resources available and in the desirable level of performance.
Keywords: automated design, durability, computer simulation, embrittlement, parallel computing, cloud technologies, efficiency, task parallelism, webservices, service oriented architecture
P. 113–120
A. A. Ustinov, D. Sc., Professor, S. V. Dvornikov, D. Sc., Professor, email: practicdsv@yandex.ru, N. S. Ageeva, Postgraduate Student, Military Communications Academy, St. Petersburg
Adaptive Orthogonal Transformation of Video Image Method
In the article the important research and technology task of development and research methods and video data compression algorithms. In many social spheres of human activity means of objective remote control and monitoring are applied. Such means on the basis of analysis of data received in real time. The same social spheres the following aero video monitoring of traffic situation in big megalopolis, environmental resources, prevention and operational of emergency recovery, etc.
Generally, in such video monitoring systems video data image detecting data are transmitted to point data analysis by broadband heterogeneous networks. The heterogeneous is caused by resort employment of combination different communication technologies. This and broadband networking technology, which are used, for example, information transmission is provided from an unmanned aerial vehicles to a ground control station. Also batch highspeed communication systems, which are provided information transmission for subscribers of the terrestrial infrastructure. Accordingly an important aspect of similar systems is providing its highcapacity, minimum data loss during transmission and also providing minimum data garbling. In such a way the development task of adoptive data compression methods is the actual research and technology task. As well as quality requirement such video data are placed increased demands on video data quality from different user application. Besides, there is a need to parameter optimization of communication link by capacity and possible timing delay during compressed video data transfer.
The article includes synthesis of adaptive algorithm for video data compressed on the basis of discrete cosine transformation methods and wavelet transform. Analytical techniques is shown that proposed adaptive procedures video data compressed allow to reduce structural and parametric by communicated information about 25—50fold with no loss in quality. On the basis of existing methods and algorithms video data compressed by analytical approach is shown that appliance of existing methods is limited, in consequence of low datacompression ratio (2—4 fold), which methods and algorithms provide. Application of the offered procedures allows reducing such limitation. As received compression ratios are large in the same procedures in comparison with known methods. From the analysis of attained result by computational modeling research and technology results are received about the adoptive orthogonal transformation is most resistant to link errors recovery video data by the proposed method has not artifacts as blocks, which are typical for discrete cosine transform and artifacts as boundary detection which are typical for wavelet transform. In such away the developed method of adaptive orthogonal transformation has a number of adaptive before known methods by orthogonal transformation.
Keywords: adaptive orthogonal transformation, video image compression, lossless entropy coding
P. 121–129
A. S. Potekhin, Programmer, andrew.potekhin94@gmail.com, A. V. Strelnikov, Postgraduate Student, Lead Programmer, ArkadiyS@RDScience.com, ÎÎÎ "RDScience", Krasnoyarsk
The Method of Traffic Flow Estimation on the Crossroad by Video Control Data
The problem of traffic flow estimation on the crossroads with help video observation data is researched in this article. The purpose of this article is to show decision of formulated problem. This purpose is solved by couple of developed algorithms. The difference frames technique is used for the objects recognition. The intelligence associative search algorithm is used for objects path recovery. The developed algorithms are implemented as software modules. The statistical experiments results are shown. Based on these results we can conclude about the algorithms quality. The algorithm accuracy is 85—90 %. This quality makes developed algorithms competitive. Realized system successfully completes the task with set of complications: poor weather, obstacles on vision lines, camera position at an acute angle. Today the combined algorithm using background estimation is developed. It is necessary to achieve high recognition quality with conditions of the traffic Jams. Implemented software modules are part of transport system. The modules of traffic flow estimation allow fitting transport system parameters. For example, it can be used for fitting parameters of traffic lights. The collected statistics are updated every minute. It could be updated every second, but it is not necessary. Such discretization allows fitting transport system in real time. Also collected statistics could be used for solving other problems, such is evaluation of the wear resistance of the roadway and evaluation of the quantity of exhaust gas.
Keywords: computer vision, traffic flow, recognition, mobile objects, video stream, video process
P. 129–134
À. À. Kolyada, Associate Professor, Chief Researcher, email: razan@tut.by, N. À. Kolyada, Researcher, email: razan@tut.by, S. Yu. Protasenia, Junior Researcher, email: Estellita@mail.ru, E. V. Shabinskaya, Associate Professor, Senior Researcher, åmail: shabinskaya@rambler.ru, Research Establishment "Institute of Applied Physics Problems of À. N. Sevchenko" Belarusian State University, Minsk, Belarus
MultiplicativeSubtractive Method of Calculating of Denormalization Factor for the Cryptographic RSAtransformation in the Modular Code
Article is devoted to a problem of a denormalization of basic transformations in the RSA cryptosystem with minimum excess modular code organization. To solve this problem we propose a new method, based on the multiplicativesubtractive calculation circuit recursive. The theoretical base of the applied approach is made by the device of interval and modular forms of numbers and interval and index characteristics. The used tools allow to reach essential simplification of the not modular operations which are a part of the synthesized procedure of calculation of denormalization coefficient for cryptographic RSA transformations. These operations include the operations of multiplication on the modular base of the number system and bringing the accumulated works of the bases to the residue modulo cryptosystem. On the set of cryptographic modules 1024—2048 digit bit time the proposed procedure on the PC with the Intel Core i5 processor (frequency of 2,27 GHz) is in the second range.
Keywords: RSA cryptosystem, RSA cryptographic transform, residue number system, intervalindex characteristics, the minimum redundant modular arithmetic, Montgomery multiplication
P. 135–142
K. A. Shcheglov, Graduate Student, A. Yu. Shcheglov, Professor, email.ru: info@nppitb.spb.ru,
University ITMO, St. Petersburg, Russia
Threat Implementation Complexity and Intruder Mathematical Model
We did research potential intruder mathematical model creation problems to determine the probability values of real attack threats implementation and defining actual attack threats on protected informational system, including the quantitative assessment of their actuality. The suggested modeling solution doesn't need any expert assessments usage. We introduce such security characteristics: security threat implementation complexity, rela security threat implementation possibility by potential intruder, intruder danger level towards the informational system. While this threat implementation complexity characteristic which allows to assess the real implementation threat possibility (vulnerability threats and attack threats) is defined as a uncertainty measure of real threat existence in the system for potential intruder and calculated like a private entropy — a measure of real threat sudden appearance inside the system. We suggest the approach to build a mathematical model of potential intruder.
Keywords: attack threat, vulnerability threat, threat implementation complexity, math modeling, potential intruder, measure of uncertainty, private entropy
P. 142–150
G. V. Losik, D. Sc., General Researcher, email: georgelosik@yahoo.com, United Institute of Informatics Problems of the National Academy of Sciences of Belarus, Minsk
Anthropological Information about Variability Message
We consider the special case in the field of coding theory and decoding the message during its transfer from the transmitter to the receiver. It is a case when in the receiver there is additional information on the accepted message, but it is decoded not from the message, and from a physical structure of the receiver. This case is possible when the physical structure of the transmitter and receiver as the information carriers are identical. In other cases the appearance of this additional information a priori impossible.
Keywords: information, the object of variable shape, transmitter, receiver
P. 151–160
To the contents

