+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№4(106) July-august 2023 year

Content:

Teacher’s portfolio

Models and methods

The problem of unreliable information is currently the most critical in the field of information dissemination in the Internet environment. The global transition of information sources to the Internet has led to the fact that information is distributed too quickly, and it is quite difficult to verify the accuracy of the information. This topic is raised when talking about the media, social networks, blogs, and other sources of information. The transmission of information has ceased to be a matter only for the media. Any Internet user can be a source of information. The development of free sources of information and the digitalization of sources have led to a loss of confidence in the official media. The consequence of this is the development of methods for automatically detecting false information. The objectives of this work are to study the possibility of building a model for automatically determining the level of trust in a message in a social network in Russian language and determine the most influential parameters. The considered method is aimed at a multi-sided analysis of the post, including parameters obtained from the text of the message, user data and the distribution of the message on the social network. To work with machine learning methods, a data sample was collected and marked up, on which machine learning models were trained. The data sample underwent a balancing process to obtain stable results. After training the models, five models were obtained trained on both balanced and conventional data samples. The results were obtained for models with a restriction on parameters to identify the most influential parameters. The results were machine learning models with high readings of metric values on test data and the most influential parameters were identified, which included parameters unique to the Russian language.

IT and education

Training IT specialists

The work is devoted to the development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach. The relevance of the work is determined by the need to timely update the requirements for professional competencies of a cybersecurity specialist in the context of the development of methods and tools for information warfare and the lack of a theoretical apparatus that allows automating this process. The purpose of this work is to develop models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach, which allow analyzing information about the actions of a cybersecurity violator and, based on this information, determining the current set of professional competencies of a cybersecurity specialist. The task of developing models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach is to develop a model of actions of a cybersecurity violator and an associated model of a countermeasure system that determines the actual set of competencies of a cybersecurity specialist. In contrast to existing expert approaches to determining the professional competence model of a cybersecurity specialist, this paper uses a scenario approach that allows describing scenarios of actions of a cybersecurity violator at a formalized level, integrating the data obtained into the appropriate graph model and forming an activity professional model of a cybersecurity specialist based on optimizing the structure of the system counteraction. The set of developed models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach takes into account many factors of information confrontation, such as: techniques and tactics of cybersecurity offenders, their corresponding methods and tools of counteraction. The proposed approach of structuring the countermeasure system in the form of a set of interrelated modules based on the results of the analysis of attack scenarios, techniques and corresponding tactics used by the violator of cybersecurity allows taking into account the features of attacks that are most often implemented, forming a set of professional actions of a cybersecurity specialist based on the use of appropriate methods and tools to counter these techniques grouped by functional modules. Analysis of the results of the conducted computer experiment showed the operability of the proposed models for the automated formation of competencies of a cybersecurity specialist based on the scenario approach.

Software engineering

Algorithmic efficiency

The article deals with the cutting and packing problems of irregular shape objects, which consist in finding the most compact way to place a given set of objects of arbitrary geometry inside a certain limited space. These problems belong to the class of ­NP-hard discrete optimization problems for which there are no methods of polynomial complexity to obtain exact solutions, so in practice they are most often solved approximately using heuristic and metaheuristic optimization methods. When placing objects of irregular shape, it is additionally necessary to take into account the geometry of objects to determine the correctness of their placement relative to each other. Existing methods of analyzing the geometry of objects and the formed placement scheme, based on the use of phi-functions and the construction of a hodograph of a vector function of dense placement, theoretically provide the possibility of obtaining an accurate solution, but require the use of time-consuming methods of nonlinear optimization. Therefore, in order to increase the speed of packing a large number of irregular-shaped objects, their shape is transformed by voxelization, followed by combining the resulting set of voxels into orthogonal polyhedra. To improve the quality of the solutions obtained, the paper proposes a greedy heuristic for the placement of orthogonal polyhedra, which implements the choice of the best orientation option for the object being placed, in which the formed packing will be the densest in comparison with other available orientation options for this object. The analysis of the effectiveness of this greedy heuristic on the problems of irregular cutting and packing of three-dimensional objects is carried out. Computational experiments have shown that the proposed greedy heuristic provides very fast high-quality solutions. Additionally, the results of testing the greedy placement heuristics using a genetic algorithm to optimize solutions to the packing problem are presented.

The relevance of the task of modeling human behavior posed in the article is associated with the need for active development of the economy, ensuring the involvement of an increasing proportion of the young population with higher and secondary specialized education. As a result of state incentives for business, more and more people are ready to receive higher education or continue to study at the next levels. When studying the processes of managing the social behavior of subjects, the “system of systems” (SoS) approach was used, within which various methods of modeling, simulation and analysis are developed and studied. The simulation is based on the multi-agent principle, the mechanism of which allows analyzing the behavior of the self-organization of an intelligent agent (social subject) and, if necessary, changing its behavior. The ideal approach for implementing the modeling of a multi-agent system (MAS) of the behavior of an agent is the evolutionary simulation methodology (ESM), which allows developing a set of interconnected optimization simulation models that implements the property of self-organization of intelligent agents. The basic principles of self-organization control are formulated, which is based on the theory of equilibrium random processes (RSP), which provides the possibility of influencing any available parameters and in any combination of them using ESM. The ways of adapting ESM in relation to modeling the process of social self-organization of a young person are considered, and a graphical interpretation of social development is proposed, two parameters are used as phase coordinates: social status and income level. Models of indirect methods of management, choice of the direction of development of a person’s career growth in the production management system based on dynamic programming have been developed. Examples of ESM implementation are given.

In the last decade, the introduction of artificial intelligence methods in industry has been accelerating. The development of deep learning algorithms and the emergence of the ability to store and process large amounts of information make it possible to quickly and efficiently automate tasks that previously could only be solved by people – employees of enterprises, and the results obtained not only correspond to human cognitive abilities, but often surpass them. An interesting example of a routine task that can be automated using computer vision methods is the task of segmenting stones on conveyors and warehouses of mining enterprises to ensure quality control of raw materials and finished products. The purpose of this work is to develop an algorithm for segmenting stones on conveyors and warehouses. To achieve this goal, a brief historical review of approaches to solving the described problem was carried out, and a study was made of the application of the Mask R-­CNN architecture to solving the problem of stone segmentation. The training dataset included 1000 augmented images from 100 crushed stone photos taken on a mining conveyor belt. The results obtained in the IoU metric exceeded 83 %, and in the Accuracy metric – 89 %, which provides high-quality automatic continuous visual quality control of raw materials or finished products. The resulting segmentation maps can serve as a good basis for determining granulometric characteristics, quality categories that are important in the mining industry, timely detecting flakiness on conveyors and segregation in finished product warehouses in real time.

Network Technologies

The creation of native information systems for mobile devices in healthcare facilities is becoming increasingly important in light of the need for remote monitoring of patients» condition. This need is due to the necessity for medical staff to constantly monitor patient condition in order to make quick decisions in the case of an emergency. In this regard the article is devoted to the technical aspects of developing a mobile application for remote interaction with an electrical impedance tomography device. Unlike well-known solutions, which use Bluetooth technology for information transfer, this article focuses on the study of the features of working with ­TCP sockets, which are an integral part of data transfer between the electrical impedance tomography machine and a mobile device. Also, the use of ­TCP sockets is due to the existing implementation of this technology in an electrical impedance tomography device made for its integration with a lung ventilator. The article discusses the main aspects of developing a system for remote interaction with medical equipment using the example of an electrical impedance tomography device. An application prototype developed for the i­OS operating system to test the applicability of the proposed approach is described. The authors of the article describe methods for receiving graphic data, and also discuss possible problems and solutions related to working with ­TCP sockets in a mobile application.

Laboratory

Researching of processes and systems

Currently, digitalization processes are actively developing. Digital tools make it possible to strengthen a systematic approach to monitoring, analyzing and forecasting socio-economic indicators. The introduction of information and analytical systems (IAS) for the study of socio-economic processes improves the decision-making process in public administration and it is an urgent task. This paper outlines the principles and approaches to the analysis and forecast of socio-economic processes, implemented in the construction of an information-analytical system. The structure of the IAS includes a database of statistical data, an analytical subsystem and a subsystem for visualizing the results. The database is developed in the MS SQL Server program and it uses official statistical data posted on the websites of state statistics, the Federal Treasury of the Russian Federation, ministries and departments. It contains information on the total population and in the division by groups, on the population density in the distribution by age of inhabitants; fertility, mortality, natural population growth, migration; statistical data on human and production resources, gross regional product. The analytical subsystem of the IAS is developed in the Microsoft Visual Studio environment and implemented in the high-level C# programming language. It contains algorithms for analysis, modeling and forecasting indicators of regional socio-economic processes based on the integrated use of dynamic models of various types. Visualization and display of the results of the work of the IAS is given in the form of tables, graphs, diagrams, cartograms according to official statistical data of one of the regions of the Russian Federation – the Udmurt Republic. The developed IAS, unlike other information systems, analyzes not only indicators characterizing the state and dynamics of the socio-economic system, but also examines the structure of ongoing processes in terms of time, territory, and age of the objects under study. This system allows to quickly track changes in the dynamics and structure of socio-economic indicators and provide it to decision makers in a timely manner.

The lack of an effective system of raw material quality assessment during acceptance in the field is the reason for writing this article. The article describes important scientific and practical tasks related to this problem, such as the development of methods of raw material quality control, creation of algorithms of intellectual support for fast and accurate assessment of raw material quality in real time. The authors have analyzed domestic and foreign scientific papers describing approaches and methods for raw material quality control and concluded that the YOLOv5 algorithm and visual transformer are the most suitable for the present study, their combination has not been previously used in the literature. The paper presents the problem statement for the development of an intelligent raw material quality system, description of object detection algorithms, their comparative characterization. The description of the working principle of the one-stage algorithm of object detection in the image YOLOv5 and its advantage over the existing analogs of deep learning methods, which are widely used for object detection, is given. Also presented are the results of neural networks, the task of which is to identify defective raw materials from the total amount stored in a particular railcar and belonging to a particular supplier. An intelligent system for analyzing the quality of bulk raw materials includes cameras located above and to the side of railcars. The quality of raw materials is determined by transferring images from the loading cameras to a neural network for further processing. YOLOv5 algorithm is used to detect the railcar number, which provides accurate detection of railcar number. To determine the percentage of rejected cargo, in the first step, YOLOv5 approach is used to select the image region with cargo and then visualization is applied to detect the percentage of rejected cargo. Implementation of the proposed intelligent system will allow more efficient production management, reduce costs and improve the quality of delivered bulk raw materials.

Theoretical approach

The article sets the task of analyzing existing research related to the information support of decision-making processes carried out by different authors in different periods of informatics and other information sciences’ development. The reviewed studies were initiated by various reasons and were carried out almost independently from each other. The authors of the article hope that the combination of these studies in one article will lead to the effect of emergence and will allow to set the task of creating a unified general-disciplinary science of information. The origins of the term “informatics” are considered, which have been arising independently; including F. E. Temnikov’s informatics as a complex science of information elements, information processes and information systems; informatics of A. I. Mikhailov – A. I. Сhernyj – R. S. Gilyarevskij as a science of scientific and technical information; informatics for secondary education of A. P. Ershov and its development into a type of informatics, called computing science in foreign works. It is stated that at present the original term introduced into the scientific literature by F. E. Temnikov has turned into the name of science of technical means and technologies for working with information, and while information is the basis for understanding and predicting the development of all spheres of human life and society, the theory of automated information and control systems and complexes’ design as well as the theory of scientific and technical information have been developing; there are studies focused on the formation of information science as a general discipline (e. g., Informetriya (Informetrics) of V. I. Gor’kova, Systemantics proposed by Yu. I. Shemakin). The conclusion is drawn about the need to rethink the essence and role of informatics, perhaps introducing a new term (for example, “applied informatics” which was preferred by the founder of the journal “Applied Informatics” A. A. Emelyanov). It could also be useful to consider the definition of informatics introduced by F. E. Temnikov, who divided the informatics into three strata “information elements – information processes – information systems”. In such a stratified structure, it will be possible to find a place for various concepts and types of informatics. It is also useful to rethink the concept of F. E. Temnikov that includes “systematics”, “informatics” and “intellectics”; F. E. Temnikov introduced the idea of the informatics’ development as the basis for intellectual processes and systems. The realization of this idea can be facilitated by the information theory of A. A. Denisov. An important contribution to the creation of the foundations for integrated information science was made by A. A. Emelyanov, who was one of the first to connect informatics with systems theory and computer simulation, developed the Actor Pilgrim simulation system, created the journal “Applied Informatics”, which discusses the problems of computing science development. The analysis of different publications allows the authors of this article to make a conclusion that the integral interdisciplinary science of information can be called “applied informatics”.