{"title":"Electrical complex of combined power supply on the base of renewables and hybrid correction device","authors":"B. Abramovich, Y. Sychev, V. Prokhorova","doi":"10.23919/FRUCT.2017.8071285","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071285","url":null,"abstract":"The main topic of presented article is the effective application of alternative and renewable energy sources with demanded level of power quality and electromagnetic compatibility. This decision is especially actual in conditions of industrial enterprises with continuous mode of technological process and responsible consumers. The configuration of electrical complex of combined power supply on the base of renewables and hybrid correction device is developed and proved in this article. Also the control algorithm of proposed electrical complex functioning is developed. The main functions of hybrid correction device, which is included in proposed electrical complex structure, are determined. The mathematical model of proposed electrical complex is developed. The results of mathematical modeling and computer simulation show the satisfactory level of power quality and electromagnetic compatibility in conditions of application of developed electrical complex.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of stegosystems using block ciphers for encryption of the embedded messages","authors":"V. Korzhik, I. Fedyanin, Cuong Nguyen","doi":"10.23919/FRUCT.2017.8071309","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071309","url":null,"abstract":"We consider firstly stegosystems in which the embedded messages are encrypted preliminary by any block cipher in a codebook mode. Detection of stegosystems presence is performed if the number of the repeated extracted blocks exceeds of some given threshold. Experiments demonstrate that if the embedding data are meaningful text and extraction algorithm is known for the attacker, then a distinguishing between stego and cover objects occur very reliable even for matrix embedding with very small rate. If the embedding data are known for attacker then it is used attack based on a calculation of mutual information between message and the encrypted data with application of k-nearest neighbor distance. Experiments show that for not very strong ciphers with block length at most 32 bits this attack is successful.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating long-term trading system rules using a genetic algorithm based on analyzing historical data","authors":"Dmitry Iskrich, D. Grigoriev","doi":"10.23919/FRUCT.2017.8071297","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071297","url":null,"abstract":"In current times, trading success depends on choosing a correct strategy. Algorithmic trading is often based on technical analysis — an approach where the values of one or several technical indicators are translated into buy or sell signals. Thus, every trader's main challenge is the choice and use of the most fitting trading rules. In our work, we suggest an evolutionary algorithm for generating and selecting the most fitting trading rules for interday trading, which are presented in the form of binary decision trees. A distinctive feature of this approach is the interpretation of the evaluation of the current state of technical indicators with the help of dynamic ranges that are recalculated on a daily basis. This allows to create long-term trading rules. We demonstrate the effectiveness of this system for the Top-5 stocks of the United States IT sector and discuss the ways to improve it.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the design of arterial blood pressure monitor","authors":"Alyona Skorobogatova, A. Sutyagina, A. Anisimov","doi":"10.23919/FRUCT.2017.8071341","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071341","url":null,"abstract":"This paper present the implementation of a blood pressure monitor which provides taking measurements during inflation of the arm cuff. Brief overview of functions of modern BPM is given. Methods of blood pressure measuring are shown. Block diagram of a device is pictured and the operation principle of blood pressure monitor is described. Signal filtering and amplification stage is suggested. Neural networks algorithm is presented. Using this algorithm for signal processing affords getting results with sufficient precision.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of person identification based on biometric characteristics of touch screen gestures","authors":"Kirill Lefyer, A. Spivak","doi":"10.23919/FRUCT.2017.8071315","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071315","url":null,"abstract":"Vast majority of modern smartphones is equipped with touch-sensitive screens. Being precise and accurate input devices, those screens can actually provide a lot of data from user input gestures to analyze. Having such a data, it is possible to find unique characteristics of user's input to identify smartpohe's user just by analyzing their input gestures. This article presents a study on possible approaches to identification a person by parameters of touch gestures he or she inputs on the screen of smartphone.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized configuration of immaterial products","authors":"T. Levashova, M. Pashkin","doi":"10.23919/FRUCT.2017.8071316","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071316","url":null,"abstract":"Product configuration deals with design of a new product from existing components. Recently, research on product configuration has shifted to the stage of conceptual modelling. Conceptual product models do not depend on the modelling purpose and therefore can be tailored to the current customer needs. The paper proposes an ontology-based scenario for configuration of immaterial products. The scenario suggests three product configuration operations: removal, supplement, and change. Product customization is supported by involvement of the customer in the process of configuration and by using information from the customer profile. The scenario execution is demonstrated by a particular case of configuration of a mobile operator product in the form of supplement this product with a service. An ontology for mobile product operator is proposed. OWL and SPARQL are used for ontology specification and querying.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134571830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The method of implementation of the numerical IT-Security metrics in management systems","authors":"I. Livshitz, P. Lontsikh, S. Eliseev","doi":"10.23919/FRUCT.2017.8071318","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071318","url":null,"abstract":"The relevance of the publication is called by the attention to the problem of formation of reliable measurement results (estimates) of the IT-Security management systems' (ISMS) effectiveness. Decision-makers must operate reliable results of carrying out the measurements of ISMS based on objective quantitative metrics of IT-Security. Known methods for evaluation of the safety systems are presented excluding the PDCA cycle requirements and apart from the general requirements directly to the ISMS. The study of the applicable standards (ISO, NIST, and GOST) and the current practice allowed us to propose an approach to the explanation of a technique of formation of IT-Security metrics, that numerically let us to assess the effectiveness of the ISMS. The results can find a practical application in the independent efficiency evaluation of the ISMS.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123494526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On design of secure E-Services for public authority in the russian federation","authors":"Anton Makarov, A. Shabunin","doi":"10.23919/FRUCT.2017.8071321","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071321","url":null,"abstract":"We analyze some foreign and Russian e-government development practices and propose the creation of the structured policy based on the PMI project management standards. We offer the IDEF0 standard as a methodology for public authority project management. Also, we suggest the workflow class notation for the lower levels. However, the current notation tools are not enough to reflect all the business processes of the e-services for public authorities. We propose a methodology for the project management development with some extra elements (objects and subjects) designed to describe the process types and the corresponding e-services more precisely. The additional task which was successfully solved thanks to the proposed e-services design technology is that the data security requirements were accomplished. We also describe how to use the offered approach to design the information systems and secure e-services for providing the citizens and the legal entities the land which is in the state possession.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114399319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous execution of system dynamics models on input data stream","authors":"I. Perl, Alexey Mulyukin, Tatyana Kossovich","doi":"10.23919/FRUCT.2017.8071336","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071336","url":null,"abstract":"This article describes a new approach for system dynamics models execution. In most cases when model execution is involved it is performed on a set of static and known data, which are sent to the model as an input. And it is expected, that on the model output modeler will get a set of other system or event characteristics, computed by the model based on the input parameters. This approach still has the widest usage, but it is not the only one scenario, which is demanded by different industries. With growing popularity of concepts such as Internet of Things, demand in modeling based solutions, which take as input continuous data streams, has grown significantly. In comparison with stand-alone client-side modeling systems, cloud-based solutions, such as sdCloud, became a reasonable answer to such industry request. Such systems can provide an ability of continuous execution of system dynamics models. In other words, these systems are ready to accept an incoming data stream and perform model execution that will result in streaming modeling results back to the end-user. Running system dynamics models in parallel with the process it is describing allows to perform predictive modeling of the system status in the future, and it also allows to find additional hidden external impacts to the model. For example, such approach can be a base for predictive maintenance of complicated technical systems, because it allows computing nearest maintenance time more efficient.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prosthesis control system of the upper limb","authors":"Daniil Tomashevich, Yulia Bobrova","doi":"10.23919/FRUCT.2017.8071348","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071348","url":null,"abstract":"This paper overviews developing process of a prosthesis control system using electromyographic signal. Corresponding hardware and software solutions are suggested. In a nutshell described significant achievements in the field of prosthetics and the main ways to control such devices. The complexity of the implementation of prosthetic devices based on these principles are considered.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}