Category Archives: Social and economic systems

RECOMMENDATION SYSTEM’S DEVELOPMENT FOR PLANNING TOURIST ROUTES BASED ON OPTIMIZATION MODELS


UDC 004.9
DOI:10.26102/2310-6018/2020.29.2.021

I.Y. Kotsyuba, A.E.Nazarenko

The article discusses the relevance of intelligent IT’ use in planning tourism activities for both individual and collective use. In this regard, this article is aimed at revealing a set of problems in the use of recommendation IT for generation of tourist routes based on optimization models. The process of describing information about tourist attractions and the process of generating a tourist route are presented in form of a formal model of linguistic descriptions for IT system and decision-making model. The methodology proposed by authors is based on methods of multicriteria optimization of discrete programming and methods of object-oriented programming. The article presents a functional model of developing a tourist route’ process as well as models of system and software architectures, a data model of developed software package. The presented methodological and software allows to reduce the complexity of tourist routes’ design, analyze expert opinions of various categories of experts. The specificity and results of experimental testing of development’s use for educational tourism are given.

Keywords:IT in tourism, educational tourism, multi-criteria optimization.

Full text:
KotsyubaNazarenko_2_20_1.pdf

QUANTITATIVE EVALUATION OF THE LIVING STANDARDS OF THE RUSSIAN FEDERATION REGIONS


UDC 519.237.8
DOI:10.26102/2310-6018/2020.29.2.014

N.A. Shchukina, A.V. Golub

The study is devoted to the issue of assessing the living standards and quality of the Russian Federation regions in 2010-2018. An integral indicator is formed on the basis of the values of 33 socio-economic indicators and acts as an indicator of assessing the living standards. Selected for the study indicators are combined into seven groups: the income level of the population, the level of development of the consumer market, the standard of housing and quality of housing conditions, level of development and availability of health and education, demographic indicators, employment and unemployment, as well as the environment. The information base of the study consists of official statistics for 2010-2018. Based on the results of the integral indicator calculations the distribution of Russian regions by the living standards is obtained. The changes dynamics in the average Russian integral indicator indicates a decrease in the living standards of over the period under review. To conduct a comparative analysis of changes in the living standard in the Russian Federation regions for each region, the total increments of the integral indicator and its components were obtained. These values formed a feature space for identifying homogeneous groups of regions by the total increment of each of the seven indicators using cluster analysis methods. As a result of the stable classification procedure, the Russian Federation regions were divided into three homogeneous groups and 13 atypical regions were identified. Atypical regions differ in subindex increments that are not typical for the selected groups. A significant disparity in the rate of change in the living standard was revealed. This characterizes the lack of effectiveness of state planning and implementation of social programs at the regional level.

Keywords: living standards, integral indicator, ranking, classification of regions, cluster analysis.

Full text:
ShchukinaGolub_2_20_1.pdf

SITUATION-ORIENTED DATABASES: THE FORMATION OF PERSONALIZED GRAPHIC DOCUMENTS FOR EDUCATIONAL DESIGN SUPPORT


UDC 004.65
DOI:10.26102/2310-6018/2020.29.2.013

V.V. Mironov, A.S. Gusarenko, G.A. Tuguzbaev

There is considered the task of creating personalized blanks for project documents in office graphics formats. Personalized blanks are understood as documents filled with specific design data in order to free the developer from routine actions during subsequent design. Two levels of graphic personalization complexity are noted: parametric and structural. The formation of personalized blanks is carried out in two stages: template development; template personalization. At the first stage, a blank template with preliminary marking of personalization points is manually developed in the environment of a graphical editor. At the second stage, software processing of the template is performed, in which personalization points are found in the template and personal data from the database is placed in them. Personalization based on situationally-oriented databases is discussed — an integrator of heterogeneous data based on an information processor controlled by a built-in highly abstract hierarchical situational model. Access to heterogeneous data is specified in the situational model in the form of virtual documents that are mapped onto heterogeneous real data. The features of mapping a virtual document to documents in VDX and FODG, as well as VSDX and ODG are considered. If in the first case, mapping to an XML file is required, then in the second to a ZIP archive, in the folders of which XML files are located. Fragments of situational models are considered that provide personalization based on: searching nodes containing identification tags in the XML document tree and replacing them with database data. Compared to the traditional approach, this gives a simpler task definition. The practical use of the results for information support of educational design in the discipline of “database” is discussed. There is a decrease in the complexity of the routine part of the project, an increase in the possibilities of creative activity in the process of educational design.

Keywords:personalized documents, situation-oriented database, hierarchical situational model, virtual document, VDX, VSDX, ODG, FODG.

Full text:
MironovSoavtors_2_20_1.pdf

SOFTWARE IMPLEMENTATION OF DIJKSTRA’S ALGORITHM IN GRAPH-STRUCTURAL MODELING OF SOCIO-ECONOMIC SYSTEMS USING METAGRAPHS


UDC 519.179
DOI:10.26102/2310-6018/2020.29.2.008

N.Y. Zhbanova, A.I. Miroshnikov

The developing of social networks, various data collection and storage systems and the accumulation of large amounts of information graph structures received another incentive for development. Since one of their main advantages is the ability to present compact and understandable models of complex systems. The graph-structural approach is especially productive in solving problems related to the analysis of various nature networks such as social networks, web graphs, traffic road networks and others. These objects are characterized by a large volume and complex structure so the question of using generalized graph structures to describe them is very relevant. A number of advantages can be distinguished as a justification: reducing the dimension of the source data without losing information, reducing the complexity of interpreting intermediate results, the ability to remodel tasks at several stages and others. The article is devoted to issues related to the development of the mathematical apparatus for constructing graphostructural models of complex systems. Generalizations of the concept of a graph such as undirected and oriented hypergraphs and metagraphs are considered. An example of a software implementation of a hierarchical system based on a metagraph is given. This approach allows to vary the degree of data detail without its modification.

Keywords:graph structures, metagraphs, socio-economic systems, graph-structural modeling, Dijkstra’s algorithm, graph condensation.

Full text:
ZhbanovaMiroshnikov_2_20_1.pdf

METHOD OF DETECTION OF HIDDEN DATA USING STEGANOGRAPHY METHOD KOCH-ZHAO


UDC 004.932.2
DOI:10.26102/2310-6018/2020.29.2.007

D.E. Vilkhovskiy

The article proposes an image analysis algorithm with a built-in message based on the Koch-Zhao steganographic method. The object of research is the image into which the Koch-Zhao embedding was carried out. The key idea is a comparative analysis of pairs of coefficients of a discrete cosine transform. For this, the dependence of the difference of the coefficients on the block number is constructed. Numerical differentiation of this dependence makes it possible to determine the boundaries of the embedded message. After that, the analysis of the initial dependence on the selected interval makes it possible to establish the applicable parameters of the Koch-Zhao method. Scientific novelty lies in the development of the steganographic analysis algorithm of the Koch-Zhao method, based on the analysis of discrete cosine transform coefficients, characterized in that it contains an automatic step search module that allows you to determine the embedding parameters and extract the message. Computer experiment completed. It is established that the proposed algorithm makes it possible to establish with absolute accuracy the size, content and location of the hidden message, in the case when it is embedded in a continuous sequence of blocks. The practical significance of the results lies in the fact that the developed software package allows stego analysis of images with data using the Koch-Zhao method with low filling of the stegocontainer (less than 40% of bits of the zero bit layer).

Keywords:analysis of DCT coefficients, identification of stego inserts, analysis of a stegocontainer, analysis of images with inserts, Koch-Zhao method.

Full text:
Vilkhovskiy_2_20_1.pdf

AN ALGORITHM FOR IDENTIFYING STEGANOGRAPHIC INSERTS OF THE LSB-REPLACEMENT TYPE BASED ON THE HIERARCHY
ANALYSIS


UDC 004.932.2
DOI:10.26102/2310-6018/2020.29.2.006

A.K. Guts, D.E. Vilkhovskiy

The article proposes an algorithm for identifying steganographic inserts implemented as a replacement of the least significant bits. The proposed algorithm is based on the hierarchy analysis method. The layers of the least significant bits of the blue component are considered. The embedding areas are determined using the taxonomy algorithm. A preprocessing algorithm is applied in order to increase efficiency in areas that contain gradient fill. The scientific novelty lies in the development of an algorithm for steganographic analysis of the LSB replacement method with low filling of the container, based on a comparative analysis of several image layers using the hierarchy analysis method, characterized in that the selected decision criteria provide the opportunity to take into account the structure of the original container image that is stored in higher bit layers and due to this it is possible to form a map of suspicious pixels, increasing efficiency embedded messages.A computer experiment was performed. For artificial images with gradient and uniform fill, the proposed algorithm makes it possible to determine on average 91% of the replaced bits, while false positives are no more than 1%. The position of the embedded bits can be determined by matching the decision matrix with the initial image.The proposed algorithm is effective for the small size of the embedded message, in contrast to the previously created algorithms.

Keywords:identification of stego inserts, analysis of images with inserts, analysis of stegocontainer, search for LSB inserts, embedding LSB.

Full text:
GutsVilkhovskiy_2_20_1.pdf

THE SYNTAX AND OPERATIONAL SEMANTICS OF THE TARGET LANGUAGE IN THE IMPLEMENTING THE «ASSUME AND ALLOW» TECHNOLOGY WHEN COMBINING LOOPS FOR PROGRAM VERIFICATION


UDC 004.7
DOI:10.26102/2310-6018/2020.29.1.005

D.V. Lysov

Loop Fusion – Converting a program to combine multiple consecutive loops into one – has been studied mainly for compiler optimization. The paper proposes a new strategy for combining loops, which can combine any loops even loops with data dependency. It is shown that this is useful for the verification program, because it can simplify cycle invariants. The essence of the merge cycle is as follows: if the state after the first cycle was known, two bodies of the cycle can be calculated simultaneously, regardless of the data by renaming the program variables. Loop Fusion creates a program that guesses an unknown state after the first cycle, non-deterministically executes a merged cycle in which variables are renamed, compares the guessed state and the state actually calculated by the merged loop, and, if they do not match, diverges. The last two steps of the comparison and the discrepancy are crucial for maintaining partial correctness. The «suppose and allow» approach is so named because, in addition to the first step (suppose), the last two steps can be expressed by the «allow» pseudo-instruction used in program verification.

Keywords:cycle transformation, program verification, cycle invariants, operational semantics, target language.

Full text:
Lysov_2_20_1.pdf

RESOLVING CONFLICTS OF INTEREST BETWEEN CONSTRUCTION PROJECT PARTICIPANTS BY OPTIMIZING RESOURCE ALLOCATION


UDC 681.3
DOI:10.26102/2310-6018/2020.29.2.004

S.I. Sigarev, V.A. Chertov, O.E. Shugay

The problem of resolving conflicts of interest between participants in construction projects by optimizing resource allocation is Considered. In contrast to the traditional optimization approach, which often does not provide a solution in conflict conditions, it is proposed to use a complex Nash-Pareto criterion. In this case, the conflict of interest is resolved, since it becomes unprofitable for project participants to overestimate their resource requirements, and their resource needs are met to the maximum extent possible. A mathematical formulation of this problem is given, and based on V.N. Burkov, D.A. Novikov and Y.B. Germeier, is her decision. We consider two types of models for Nash-balanced resource allocation between project participants: direct and reverse priority. In the first case, the resource is distributed according to the principle: “more you ask – more will be given”, in the second – “more you ask – less will be given”. For these models, their varieties are distinguished: simple, taking into account the resource utilization coefficient, with a fine and with an incentive. For all types of models and their modifications, formulas are written to determine the resource allocation plan. The article describes an algorithm for resolving conflicts of interest between participants in construction projects by optimizing resource allocation, based on the above models and the results of their analysis. A distinctive feature of the algorithm is that the settlement of the conflict of interests of participants is supported by the search for Pareto-optimal resource allocation plans. As a discussion of the results, we consider a task where several types of resources are distributed, rather than one. It is shown that taking into account the integration of supplies and interchangeability of resources of different types, such a problem can be reduced to solving a problem for one type of resource, and the conflict of interests can be resolved using the proposed algorithm.

Keywords:conflict, construction, project, resource, distribution, optimality, Nash equilibrium, Pareto optimality, algorithm. conflict, construction, project, resource, distribution, optimality, Nash equilibrium, algorithm.

Full text:
SigarevSoavtors_2_20_1.pdf

ALGORITHMIZATION OF MUTUAL INFORMATION CONSENT IN SYSTEMS WITH A DISTRIBUTED REGISTRY, BASED ON A BLOCK CHAIN


UDC 004.056.2
DOI:10.26102/2310-6018/2020.29.2.002

S.S.Eskov, O.J.Kravets

The object of research is distributed registry systems based on a chain of blocks. The subject of the research is mathematical and software for distributed data processing in solving the problem of achieving mutual information coordination in distributed registry systems based on a chain of blocks. The purpose of the work is to develop an algorithm for the functioning of a system node with the ability to implement non-standard functions, an algorithm for mutual information matching in a distributed registry system based on a chain of blocks, planning numerical experiments to evaluate the effectiveness of mathematical and software for mutual information matching in distributed registry systems based on a chain of blocks. The study of existing approaches has shown that most studies do not fully take into account the simultaneous implementation of non-standard functions by nodes and changes in the structural and parametric characteristics of the system due to the combination of nodes in groups. As a result, an algorithm for the functioning of the system node is proposed, which takes into account the possibility of implementing non-standard functions: the formation of a branch of the processed data and a temporary blocking attack. A generalized algorithm for the functioning of a distributed registry system based on a chain of blocks when performing an algorithm for mutual information coordination, taking into account the possibility of combining nodes into groups, is presented. The numerical experiment was planned.

Keywords:distributed ledger technology, formalization, algorithm, mutual information agreement, non-standard functions, centralization.

Full text:
EskovKravets_2_20_1.pdf

DESTRUCTIVE INFORMATIONAL AND PSYCHOLOGICAL INFLUENCE IN SOCIAL NETWORKS


UDC 004.942
DOI:10.26102/2310-6018/2020.28.1.043

V.P. Okhapkin, E.P. Okhapkina, A.O. Iskhakova, A.Y. Iskhakov

The article discusses the problem of the destructive information influence in social networks revealing. It is noted that the tasks that are associated with the rapid detection of destructive information influence are prerequisites for the development and improvement of methods and means for identifying such influences in social networks. To understand the social dynamics of social networks groups we consider: the communication model proposed by Theodore Newcomb, Kurt Levin’s “planar map”, and Fritz Haider’s theory of cognitive balance. UN documents on the counteraction of the use of the Internet for the extremist purposes and radicalization were analyzed. The role of the cognitive approach to the analysis of social network messages and the main scenarios implemented by influence actors in texts aimed at different audiences are considered. The study presents a systematic approach to the task of designing a multi-agent platform. Special attention is paid to the block of pattern analysis of user’s messages in social networks both from the position of mathematical modeling and social dynamics. The article describes the architecture and methods of the multi-agent system for the destructive information and humanitarian impact detection. The system consists of the administration interface, subsystems for the multi-agent system administration and agents management, clustering agents, network messages analysis and dispersion analysis. The description of the main blocks of agents and subsystems is given.

Keywords:multi-agent technologies, cluster analysis, information security, aggression, radicalization, machine learning, personality, information and psychological impact destructive informational impact, socio-cyberphysical system.

Full text:
OkhapkinSoavtors_1_20_1.pdf