Preview

Russian Technological Journal

Advanced search
Vol 10, No 6 (2022)
View or download the full issue PDF (Russian) | PDF
https://doi.org/10.32362/2500-316X-2022-10-6

INFORMATION SYSTEMS. COMPUTER SCIENCES. ISSUES OF INFORMATION SECURITY

  • The aim of this work is to create methods for developing rational plans (schedules) for parallel program execution (PPE) and specialized software for implementing these methods.
  • The main method for developing PPE plans was the construction, analysis, and purposeful transformation of the stacked-parallel form of information graphs of algorithms.
  • The target consumers of the developed methods for generating schedules for parallel execution of programs are developers of translators and virtual machines, and researchers of the properties of algorithms.
7-19 675
Abstract

Objectives. The construction of rational plans (schedules) for parallel program execution (PPE) represents a challenging problem due to its ambiguity. The aim of this work is to create methods for developing such plans and specialized software for implementing these methods, which are based on the internal properties of algorithms, primarily on the property of internal (hidden) parallelism.
Methods. The main method for developing PPE plans was the construction, analysis, and purposeful transformation of the stacked-parallel form (SPF) of information graphs of algorithms (IGA). The SPF was transformed by transferring operators from tier to tier of the SPF (this event was taken as an elementary step in determining the computational complexity of scenario execution). As a transformation tool, a method for developing transformation scenarios in the scripting programming language Lua was used. Scenarios were created by a heuristic approach using a set of Application Programming Interface (API) functions of the developed software system. These functions formed the basis for a comprehensive study of the parameters of the IGA and its SPF representation for the subsequent construction of a PPE plan applying to a given field of parallel computers.
Results. Features of the internal properties of the algorithms that affect the efficiency of SPF transformations were identified during the course of computational experiments. Comparative indices of the computational complexity of obtaining PPE plans and other parameters (including code density, etc.) were obtained for various SPF transformation scenarios. An iterative approach to improving heuristic methods favors developing optimal schemes for solving the objective problem.
Conclusions. The developed software system confirmed its efficiency for studying the parameters of hidden parallelism in arbitrary algorithms and rational use in data processing. The approach of using a scripting language to develop heuristic methods (scenarios) for the purposeful transformation of IGA forms showed great flexibility and transparency for the researcher. The target consumers of the developed methods for generating schedules for parallel execution of programs are, first of all, developers of translators and virtual machines, and researchers of the properties of algorithms (for identifying and exploiting the potential of their hidden parallelism). The developed software and methods have been successfully used for a number of years for increasing student competence in data processing parallelization at Russian universities.

  • Using the achievements of artificial intelligence in the fight against attacks, the authors proposed a method based on a combination of the genetic programming support vector machine (GPSVM) model using an unbalanced CICIDS2017 dataset.
  • The combination of the GPSVM model with an unbalanced CICIDS2017 dataset to collect a sample increases the accuracy of intrusion detection to provide improved intrusion detection performance as compared to the SVM method.
20-27 474
Abstract

Objectives. The rapid penetration of wireless communication technologies into the activities of both humans and Internet of Things (IoT) devices along with their widespread use by information consumers represents an epochal phenomenon. However, this is accompanied by the growing intensity of successful information attacks, involving the use of bot attacks via IoT, which, along with network attacks, has reached a critical level. Under such circumstances, there is an increasing need for new technological approaches to developing intrusion detection systems based on the latest achievements of artificial intelligence. The most important requirement for such a system consists in its operation on various unbalanced sets of attack data, which use different intrusion techniques. The synthesis of such an intrusion detection system is a difficult task due to the lack of universal methods for detecting technologically different attacks; moreover, the consistent application of known methods is unacceptably long. The aim of the present work is to eliminate such a scientific gap.
Methods. Using the achievements of artificial intelligence in the fight against attacks, the authors proposed a method based on a combination of the genetic programming support vector machine (GPSVM) model using an unbalanced CICIDS2017 dataset.
Results. The presented technological intrusion detection system architecture offers the possibility to train a dataset for detecting attacks on CICIDS2017 and extracting detection objects. The architecture provides for the separation of the dataset into verifiable and not verifiable elements, with the latter being added to the training set by feedback. By training the model and improving GPSVM training set, better accuracy is ensured. The operability of the new flowchart of the GPSVM model is demonstrated in terms of the entry of input data and output of data after processing using the training set of the GPSVM model. Numerical analysis based on the results of model experiments on selected quality indicators showed an increase in the accuracy of the results as compared to the known SVM method.
Conclusions. Computer experiments have confirmed the methodological correctness of choosing a combination of the GPSVM model using an unbalanced CICIDS2017 dataset to increase the effectiveness of intrusion detection. A procedure for forming a training dataset based on feedback is proposed. The procedure involving the separation of datasets is shown to create conditions for improving the training of the model. The combination of the GPSVM model with an unbalanced CICIDS2017 dataset to collect a sample increases theaccuracy of intrusion detection to provide improved intrusion detection performance as compared to the SVM method.

MULTIPLE ROBOTS (ROBOTIC CENTERS) AND SYSTEMS. REMOTE SENSING AND NON-DESTRUCTIVE TESTING

  • The article substantiates the relevance of the creation and the prospects of application of multi-agent robotic systems for elimination of consequences of emergency situations.
  • The feasibility of the multi-agent robotic system is demonstrated by the development and integration of a number of information management and infrastructure subsystems.
28-41 816
Abstract

Objectives. The article substantiates the relevance of the creation and the prospects of application of multi-agent robotic systems for elimination of consequences of emergency situations. The purpose of this work was to test the practical feasibility of algorithms for controlling a group of autonomous robots when performing multi-stage missions.
Methods. The theses of the finite automata theory in planning actions of a multi-agent system, methods of automatic control in organizing a goal-directed movement of robots, and methods of computer vision in searching and analyzing debris geometry were used.
Results. The principles of development, architecture, and composition are described for the software and algorithms of a prototype of the multi-agent robotic system created at RTU MIREA as part of integrated research for the creation of tools and methods of group control of robots. The multi-stage task of searching and removing debris in the process of eliminating the consequences of emergency situations is analyzed. A proposed algorithm for planning the actions of robotic agents determines the time sequence of the mission stages. Tasks are allocated among the performing robots according to assessments of their suitability. The autonomous functioning of robotic agents is determined by commands coming from the group control level, as well as an a priori embedded knowledge base with scenario models of appropriate actions. Compensation of local environmental uncertainties in the process of robot movement is based on a comprehensive analysis of visual and navigation information. Along with the main elements of the multi-agent system, the developed infrastructure of hardware and software for visual navigation and wireless communication is described.
Conclusions. The results of the experimental studies demonstrated the efficiency of the developed approaches to the creation of intelligent technologies for group control of autonomous robots on the example of debris search and removal tasks. The feasibility of the multi-agent robotic system is demonstrated by the development and integration of a number of information management and infrastructure subsystems.

MODERN RADIO ENGINEERING AND TELECOMMUNICATION SYSTEMS

  • Five problems related to the multi-objective optimization of analog and digital filters, as well as multistep impedance-matching microwave transformers, are considered.
  • One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.
  • The GDE3 algorithm may be recommended as a basic method for solving the considered problems. Algorithms minimizing scalar objective function may be used to obtain several elements of the Pareto set.
42-51 691
Abstract

Objectives. The selection of a method for solving multi-objective optimization problems has many practical applications in diverse fields. The present work compares the results of applying different methods to the selected classes of problems by solution quality, time consumption, and various other criteria.
Methods. Five problems related to the multi-objective optimization of analog and digital filters, as well as multistep impedance-matching microwave transformers, are considered. One of the compared algorithms comprises the Third Evolution Step of Generalized Differential Evolution (GDE3) population-based algorithm for searching the full approximation of the Pareto set simultaneously, while the other three algorithms minimize the scalar objective function to find only one element of the Pareto set in a single search cycle: these comprise Multistart Pattern Search (MSPS), Multistart Sequential Quadratic Programming (MSSQP) method and Particle Swarm Optimization (PSO) algorithms.
Results. The computer experiments demonstrated the capability of GDE3 to solve all considered problems. MSPS and PSO showed significantly inferior results than to GDE3 for two problems. In one problem, MSSQP could not be used to reach acceptable decisions. In the other problems, MSPS, MSSQP, and PSO reached decisions comparable with GDE3. The time consumption of the MSPS and PSO algorithms was much greater than that of GDE3 and MSSQP.
Conclusions. The GDE3 algorithm may be recommended as a basic method for solving the considered problems. Algorithms minimizing scalar objective function may be used to obtain several elements of the Pareto set. It is necessary to investigate the impact of landscape features of individual quality indices and scalar objective functions on the extreme search process.

Examples of equipment for protecting against reverse voltage polarity are given along with circuit solutions based on discrete and integrated components.

52-59 467
Abstract

Objectives. Battery-powered devices (e.g., wireless sensors, pacemakers, watches and other wrist-worn devices, virtual reality glasses, unmanned aerial vehicles, robots, pyrometers, cars, DC/DC converters, etc.) are widely used today. For such devices, it is highly important to ensure safe primary power supply connection, including protection against reverse polarity. The conventional solution to the reverse polarity problem, involving the use of Schottky diodes during system redundancy or increasing power by combining two or more power supplies in the OR-ing circuit due to a large voltage drop, results in significant power losses at high currents, heat dissipation problems, and an increase in the mass and size of the equipment. For this reason, it becomes necessary to develop efficient batterypowered equipment protection against incorrect reverse polarity connection.
Methods. The problem is solved using circuit simulation in the Electronics Workbench environment.
Results. When protecting equipment against reverse voltage polarity, it is shown that the minimum level of losses and low voltage drop are provided by “ideal diode” circuit solutions based on discrete components and microcircuits of the “integrated diode” type with external and internal power metal–oxide–semiconductor field-effect transistors (MOSFETs). The circuit simulation of ideal diodes based on p- and n-channel transistors with superior technical parameters allows the characteristics and voltage and power losses in the protected circuits to be specified along with a presentation of the proposed technical solution simplicity. The contemporary component base of protection devices is discussed in terms of efficiency.
Conclusions. Examples of equipment for protecting against reverse voltage polarity are given along with circuit solutions based on discrete and integrated components. The simulation of the transfer characteristics of protection devices shows the limit for the minimum input voltage value of around 4 V using a MOSFET transistor.

MICRO- AND NANOELECTRONICS. CONDENSED MATTER PHYSICS

  • A technology was developed for the co-precipitation of triple barium–strontium–calcium carbonates from their nitrate salts. Under optimal precipitation conditions, this produces triple carbonate powders with nonequilibrium phase compositions.
  • Electron spectroscopy showed that the parameters of the electronic structure of the crystallites are significantly affected by doping impurities of calcium, strontium, and nickel in barium oxide crystallites formed by heat treatment of triple carbonates.
60-69 512
Abstract

Objectives. Triple barium–strontium–calcium carbonates of various grades are widely used for depositing oxide coatings on cathodes of electrovacuum devices. Of all types of cathodes used in electrovacuum devices, oxide cathodes are among the most common, due to combining efficiency, durability, operation at relatively low temperatures, and a relatively low cost. The aims of this work were to: create a technology for the synthesis of triple barium–strontium–calcium carbonates with nonequilibrium phase compositions that comprise the triple carbonate proper and a pure barium carbonate phase; develop a quality control procedure for such a carbonate for using it as a component of the cathode material for microwave devices; study how the electronic structure of barium oxide crystallites is affected by doping microimpurities from other phases of the cathode material.
Methods. The study used precision X-ray diffraction analysis and electron spectroscopy.
Results. A technology was developed for the co-precipitation of triple barium–strontium–calcium carbonates from their nitrate salts. Under optimal precipitation conditions, this produces triple carbonate powders with nonequilibrium phase compositions. Electron spectroscopy showed that the parameters of the electronic structure of the crystallites are significantly affected by doping impurities of calcium, strontium, and nickel in barium oxide crystallites formed by heat treatment of triple carbonates.
Conclusions. Calcium and strontium have a synergistic effect on the doping of barium oxide with the two other chemical elements. As well as efficiently controlling the quality of the nonequilibrium phase composition of triple carbonates, which is formed during the synthesis of triple carbonates by the titration method, precision X-ray diffraction analysis can be used to efficiently control the processes of agglomeration of nanoparticles or recrystallization of nanostructured phases formed during the synthesis of triple carbonates.

MATHEMATICAL MODELING

While systems of linear algebraic equations (SLAEs) using a non-uniform grid can be used to describe complex domain configurations, there are significant constraints on the dimensionality of described systems. When using a uniform grid, the dimensionality of SLAEs can be several orders of magnitude higher; however, in this case, it may be difficult to describe the complex configuration of the domain. Selection of the particular method depends on the specific problem and available computational resources. Thus, SLAEs on a non-uniform grid may be preferable for many two-dimensional problems, while systems on a uniform grid may be preferable for three-dimensional problems.

70-77 500
Abstract

Objectives. Integral equations have long been used in mathematical physics to demonstrate existence and uniqueness theorems for solving boundary value problems for differential equations. However, despite integral equations have a number of advantages in comparison with corresponding boundary value problems where boundary conditions are present in the kernels of equations, they are rarely used for obtaining numerical solutions of problems due to the presence of equations with dense matrices that arise that when discretizing integral equations, as opposed to sparse matrices in the case of differential equations. Recently, due to the development of computer technology and methods of computational mathematics, integral equations have been used for the numerical solution of specific problems. In the present work, two methods for numerical solution of two-dimensional and three-dimensional integral equations are proposed for describing several significant classes of problems in mathematical physics.
Methods. The method of collocation on non-uniform and uniform grids is used to discretize integral equations. To obtain a numerical solution of the resulting systems of linear algebraic equations (SLAEs), iterative methods are used. In the case of a uniform grid, an efficient method for multiplying the SLAE matrix by vector is created.
Results. Corresponding SLAEs describing the considered classes of problems are set up. Efficient solution algorithms using fast Fourier transforms are proposed for solving systems of equations obtained using a uniform grid.
Conclusions. While SLAEs using a non-uniform grid can be used to describe complex domain configurations, there are significant constraints on the dimensionality of described systems. When using a uniform grid, the dimensionality of SLAEs can be several orders of magnitude higher; however, in this case, it may be difficult to describe the complex configuration of the domain. Selection of the particular method depends on the specific problem and available computational resources. Thus, SLAEs on a non-uniform grid may be preferable for many two-dimensional problems, while systems on a uniform grid may be preferable for three-dimensional problems.

PHILOSOPHICAL FOUNDATIONS OF TECHNOLOGY AND SOCIETY

  • The presented general model for the formation and assessment of student digital competences in higher education programs consists of four interrelated steps, each integral to the process of formation and assessment of the student digital competences, none of which can be excluded without the risk of failing to achieving the specified goals.
  • The model developed in the paper is based on the existing extensive regulatory framework, as well as existing domestic and foreign practices. Relying on expert community opinion (employers, primarily), it accounts for sector- and region-specific features of universities along with specifics of training areas, as well as comprising a list of optimal organizational and methodological conditions for formation of digital competency.
78-90 740
Abstract

Objectives. The paper presents and analyzes a model for the formation and evaluation of digital competencies in students. The model is aimed at the implementation of higher education programs for training specialists not directly working in IT, but whose activities are directly related to using ready-made digital products. Digital competences imply an ability to confidently, effectively, and safely select and apply information and communication technologies in various life practices including researching and critically analyzing information, using digital devices and accessing social network functionality, conducting financial and trading transactions, as well as creating digital content. The formation of such digital competences is one of the results of completing higher education programs.
Methods. The study is based on a model of digital competence formation having the following four interconnected stages: basic digital competences; personal competences (soft skills); professional digital competences; digital culture.
Results. The presented general model for the formation and assessment of student digital competences in higher education programs consists of four interrelated steps, each integral to the process of formation and assessment of the student digital competences, none of which can be excluded without the risk of failing to achieving the specified goals.
Conclusions. The model developed in the paper is based on the existing extensive regulatory framework, as well as existing domestic and foreign practices. Relying on expert community opinion (employers, primarily), it accounts for sector- and region-specific features of universities along with specifics of training areas, as well as comprising a list of optimal organizational and methodological conditions for formation of digital competency.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2782-3210 (Print)
ISSN 2500-316X (Online)