Category Archives: – All issues –

PARTICLE SWARM OPTIMIZATION WITH ADAPTIVE SOCIAL AND COGNITIVE COMPONENTS

UDC 519.6
DOI:10.26102/2310-6018/2019.26.3.006

B.S. Ermakov


Efficiency of solution finding by particle swarm optimization depends significantly on specific values of social and cognitive components used by a researcher. There is no known way currently to determine whether specific values of the components would provide maximal search efficiency in a particular case, or not. In order to eliminate this flaw, this article provides a modification of particle swarm optimization with adaptive social and cognitive components, which allows to fit particles movement to a particular problem during optimization process, thus removing the need of adjusting components manually. This adaption is based on genetic algorithms principles: it starts with a selection of the best performing particles, then crossover of their social and cognitive components with other particles, then mutation to provide some fluctuations of components. To evaluate algorithm’s performance a series of experiments on minimizing few test functions has been made. Minimums found by adaptive and canonical algorithms were averaged out and compared. Based on results, a statistical hypothesis that adaptive algorithm has better performance than canonical algorithm was confirmed. Provided research proves efficiency of adaptive particle swarm.

Keywords: mathematical optimization, particle swarm optimization, adaptation, genetic algorithms.

Full text:
Ermakov_3_19_1.pdf

MATHEMATICAL MODEL OF OPTIMIZATION OF THE NETWORK INFRASTRUCTURE OF A DISTRIBUTED ENTERPRISE SYSTEM ON A CLOUD, MISTY AND EDGE TECHNOLOGIES

UDC 004
DOI:10.26102/2310-6018/2019.26.3.004

S.N. Sukhov, O.A. Korelov


Management decision-making in the field of law enforcement requires a systematic analysis of both the state of the control object and the capabilities of the subject. To solve a number of management problems, the effective use of mathematical modeling methods that allow you to build, and subsequently explore the information model of socio-economic processes. In the study of the constructed model, identifying patterns in the data, possible subsequent forecasting, which is an important element in decision-making in the law enforcement sector, allows to determine the most optimal mechanisms of management influence. In determining the possible negative options for the development of events, the development of intervention scenarios in order to obtain a positive result. Building a model of information processes allows us to conduct an experiment to study the phenomenon of interest to us in conditions where the natural experiment is impossible, difficult or undesirable. In addition to the complexity of the model, an independent problem is the interpretation of the result, the understanding of the practical meaning of the solutions. It should be understood that the use of mathematical modeling for the development of management solutions in the field of law enforcement is just one of the tools with limited capabilities, which should be used only in conjunction with the results of research in other areas.

Keywords: information processes, model research, law enforcement, management.

Full text:
SukhovKorelov_3_19_1.pdf

3D FACIAL SCAN REGISTRATION WITH FACIAL EDGES DETECTION

UDC 004.932
DOI:10.26102/2310-6018/2019.26.3.005

K.V. Klimov


The relevance of this work is caused by need of high-fidelity non-rigid registration algorithm for facial scans. Despite the fact that over the past decade, a large number of various algorithms for 3d model registration were proposed, including models of a human face, the vast majority of them are unable to provide accurate face registration for lips and eyes. This work is intended to improve this situation by using a detector of facial boundaries based on deep learning, namely using convolutional neural networks. Usage of facial landmarks detectors (deep learning based or other algorithms) is not novel in the field of non-rigid registration. However such approach is not good enough for precise registration. Facial landmark annotation is ill posed problem in general case, due to ambiguity of landmarks position. For example, it is very difficult to put landmarks in the middle of the eye so that they are anatomically in the same place in different frames. In this work we propose an alternative method – facial edges detection for registration. Obtained results show the advantage of the proposed approach.

Keywords: non-rigid registration, 3d scanning, iterative closest point, facial edges detection, deep learning, convolutional neural networks.

Full text:
Klimov_3_19_1.pdf

MATHEMATICAL MODEL OF OPTIMIZATION OF THE NETWORK INFRASTRUCTURE OF A DISTRIBUTED ENTERPRISE SYSTEM ON A CLOUD, MISTY AND EDGE TECHNOLOGIES

UDC 004.75
DOI:10.26102/2310-6018/2019.26.3.003

S.P. Vorobyov


This article describes the formulation of a mathematical model to optimize the structure of the computer network of a distributed corporate information system based on a multi-level topology. Multi-level topological structure allows you to present the network structure, which includes a detailed description of the relationships between such network objects as active equipment, workstations and servers at different levels of the model, to show as a whole a variety of aspects of data transfer management with support for QoS protocols, technical and software implementation, information space and management. As a result, the design of the computing network of the corporate system can be performed as the development of a single network infrastructure of distributed software and hardware, which includes interconnected and interacting subsystems that solve functional tasks for the management and planning of the enterprise activities within a single approach to achieve the goal of obtaining an optimal architecture and meet the complex system and functional requirements for performance, bandwidth, reliability, etc. The paradigm of cloud, foggy and boundary calculations is used, which allows to build a modern network infrastructure within the framework of the industrial IoT concept. The most typical example of the use of this paradigm can be intelligent power supply networks, distributed monitoring systems for the transportation of gas or oil products, distributed systems of an industrial enterprise. To solve the problem, it is proposed to use an approach based on a modified genetic algorithm. The results of the experiments are presented.

Keywords: multi-level topological structure of distributed corporate system, computer network, cloud computing, fuzzy computing, edge computing, genetic algorithm.

Full text:
Vorobyov_3_19_1.pdf

GENERALIZED COMPUTATIONAL METHOD TO COMPARE THE ACCURACY OF QUANTITATIVE ESTIMATES OF SECURITY OF WIRELESS SECURITY SYSTEMS

UDC 004.05
DOI:10.26102/2310-6018/2019.26.3.002

A.A. Gavrishev


In this paper, the author for the purposes of comparative analysis of the accuracy of quantitative methods for assessing the security of wireless security systems, developed a generalized computational method for comparing the accuracy of quantitative assessments of the security of wireless security systems on the example of fire alarm systems. For this purpose, the known security assessments of wireless security systems are described. The numerical indicators of security assessments of the known technologies of protection of the radio channel of fire alarm systems from unauthorized by two security assessments are presented. The known approaches of the comparative analysis of the accuracy of quantitative estimates of protection are shown, their shortcomings are specified. As a perspective approach of the comparative analysis of the accuracy of quantitative estimates of security, free from the shortcomings of known approaches, the apparatus of mathematical statistics is indicated. The application of mathematical statistics to the comparative analysis of the accuracy of quantitative estimates of security of wireless security systems is shown. The developed generalized computational method of comparison of the accuracy of quantitative estimates of security of wireless security systems is described. Its advantages over known methods, as well as its limitations are indicated. Recommendations on its application to the comparative analysis of the accuracy of quantitative security assessments are given. It is also indicated that the developed computational method is generalized – its potential can be used for comparative evaluation of the same type of quantitative security assessments of a wide class of wireless security systems for the purposes of determining which of the security assessments has greater accuracy of security.

Keywords: security assessment, radio channel, security systems, computational method, mathematical statistics.

Full text:
Gavrishev_3_19_1.pdf

DEVELOPMENT OF SOFTWARE FOR MODELING A NETWORK WITH INHOMOGENEOUS LOAD

UDC 004.7:421
DOI:10.26102/2310-6018/2019.26.3.001

S.A. Laptik, F.N. Abu-Abed


This paper devoted to the development of software designed to simulate networks with heterogeneous load, with further determination of the characteristics of network traffic. Traffic pulsations, inhomogeneities of application flow form an uneven load in computer networks. The process of modeling networks before their direct design is of paramount importance, respectively, the development of software (tool) for modeling networks is an important task. The development of algorithmic and software tools for modeling network traffic greatly simplifies the process of researching computer networks and contributes to the development of recommendations for further redistribution of load between network nodes. Each model under development has its own limitations and the reliability of probabilistic simulation results, which depend on the chosen mathematical apparatus, depends on them. The apparatus of queuing theory allows analyzing the results obtained at the level of their average values, and simulation modeling allows monitoring changes in network traffic over the entire simulation period for a set model time. The developed software is based on the modification of the already existing classical algorithm for calculating the performance of computer networks with heterogeneous traffic. The algorithm allows to optimize the values of parameters aimed at improving the performance indicators of networks with heterogeneous load.

Keywords: modeling, computer networks, network traffic, networks with non-uniform load, performance.

Full text:
LaptikAbu-Abed_3_19_1.pdf

CALCULATION MODEL OF LEASING PAYMENTS OF THE RENTAL EQUIPMENT

UDC 004.942
DOI:10.26102/2310-6018/2019.25.2.031

A.A. Boyko, V.V. Kukartsev


This article presents a simulation-dynamic model for calculating leasing payments for leased equipment. The model was developed based on the system dynamics method using Powersim Studio tools. In the model shown, the calculations were carried out for financial leasing, regressive payment schedule and the method of minimum deductions. This article presents a simulation-dynamic model for calculating leasing payments for leased equipment. The model was developed based on the system dynamics method using Powersim Studio tools. In the model shown, the calculations were carried out for financial leasing, regressive payment schedule and the method of minimum deductions. As a result of experiments with options, various amounts of leasing payments (depreciation, credit (loan) payments, commissions, total leasing payments, etc.) were obtained. The study conducted allows us to conclude that the simulated-dynamic model constructed is quite universal and on its basis it is possible to conduct a variety of studies concerning various aspects of equipment leasing.

Keywords: leasing, equipment, depreciation, universality, economic and mathematical modeling.

Full text:
BoykoKukartsev_2_19_1.pdf

CREATION OF MAZE WITH MULTIPLE SOLUTIONS, SEARCH FOR ALL SOLUTIONS AND EDITING THEM

UDC 519.688
DOI:10.26102/2310-6018/2019.25.2.030

E.S.Simonyan, O.A.Medvedeva, S.N.Medvedev


This article considers the problem of creating a maze with multiple solutions, searching for all solutions and a possibility of editing them. First, we view two algorithms, which generate the most various mazes, and find their positive and negative sides. Then we choose the one most efficient and suitable for the problem. All maze creation algorithms, including two considered, are unable to reveal a definite number of solutions. Here we offer a modification of Wilson’s algorithm. Still we tend to think that all maze solving algorithms cannot find all possible solutions. Therefore, we develop a modification of Ant Colony algorithm. To edit mazes the two algorithms were developed: one by solutions lengths and another by similarity of solutions. The research was conducted in order to find dependencies between number of solutions and initial parameters. A computational experiment was made to find optimal number of ants within different initial parameters. Also there were evaluated efficiencies of two maze editing algorithms with different parameters.

Keywords: maze generation, Ant Colony algorithm, Wilson’s algorithm, computational experiment

Full text:
SimonyanSoavtori_2_19_1.pdf

THE USE OF MULTIVARIATE ANALYSIS TO ASSESS THE FUNCTIONALITY OF THE PROJECT MANAGEMENT SYSTEMS

UDC 004.9
DOI:10.26102/2310-6018/2019.25.2.029

E.S. Egorova, N.A. Popova


The relevance of the article is due to the existing complexity in the selection of software products that can effectively manage projects in various fields of activity. Therefore, for a full-fledged, diverse analysis of the systems represented on the industry market, it has been proposed to use a two-step method of formalized evaluation of the functionality of software and systems. As a result of the first stage, the results of a multivariate analysis of the software of automated project management systems currently on the market are presented. In the course of the criterion assessment, the functional and instrumental characteristics required for products of this type were selected. For each indicator, it has been proposed to use weights and ranking maps. The results of the analysis showed that the most important indicators for evaluating the automated project management software are: integration mechanisms with third-party systems, the possibility of networked multi-user interaction, technology for organizing business management processes in project management systems. At the second stage of the research, it was proposed, using functional and instrumental characteristics, to rank software products based on the opinion of experts in the field of design. For this, the method of verbal analysis of decisions was used. Thus, the evaluation of software products has allowed to conclude that in the market there are universal software that has its own advantages and disadvantages, but is not suitable for use in highly specialized areas. However, the method of verbal analysis of decisions based on the opinions of experts in the field of design allows you to choose the most effective tool for project management in a specific industry area.

Keywords: automated system, project management, software, project management, multivariate analysis, criterial assessment, ranking map,verbal analysis of solutions

Full text:
EgorovaPopova_2_19_1.pdf

ANALYSIS OF METHODS OF REGULATION REQUIREMENTS TRANSLATION INTO MACHINE-READABLE FORMAT FOR VERIFICATION OF BUILDING INFORMATION MODELS

UDC 004.94+721.021
DOI:10.26102/2310-6018/2019.25.2.028

E.V. Makisha


Currently, the project documentation is submitted for examination in the form of electronic documents that normally contain text and graphic information. Standards, which requirements the project documentation should meet during the examination, are published in electronic, but not machine-readable form. In recent years, specialists of the construction industry of Russian Federation fully realize the need of automated examination, which can be available if both sides of the process – design results and relevant standards – are presented in machine-readable form. This article reveals the results of existing approaches analysis how to transfer into the machine-readable form the regulation requirements for the building information model as a form of design results presentation for automated examination. The most promising of them is the language of knowledge representation based on the rules. There are criteria for machine readable presentation established and extended. The RuleML language is suggested as a solution, since it meets the criteria mentioned and is fixed in the regulation standards for information modeling. The RuleML based method of machine-readable requirements is acquired, which may in future be implemented within the transition to automated examination in the scope of Russia Federation and as a unified approach on the international level.

Keywords: construction, information modeling, construction system, construction cybernetics, verification of information modeling, automated check of information modeling, machine-readable standards

Full text:
Makisha_2_19_1.pdf