{"title":"Building a predictive model for diagnostics and treatment of infertility","authors":"V. Belov, V. Vostrikov, Anastasia A. Ardaeva","doi":"10.17212/2782-2230-2021-2-32-48","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-32-48","url":null,"abstract":"In this work, the tasks of creating a method for clinical prediction of diagnosis and treatment of infertility are formulated and solved. The existing forecasting models for overcoming infertility are considered. Their advantages and disadvantages are determined. The latter are both in the complexity of accounting and forecasting the individual possibilities for conception of the estimated married couples, and in the conservatism of the medical and applied computing technologies used, which reduces the quality and efficiency of forecasts. The structure of infertility is shown after a comprehensive examination of patients over a long period. Five groups of patients were identified, taking into account the characteristics, duration and other causes of infertility. The concepts of the coefficient of reproductive activity (CRA), the indicator of reproductive health (RPH) and the indicator of reproductive readiness (PRH) are introduced, a variant of the calculation of these values is proposed, and the ranges of their possible values are indicated. The PRG was proposed as a key characteristic for clinical prediction in overcoming infertility. Its values can be projected into four groups of outcomes in the diagnosis and treatment of infertility, three of which involve direct referral to a specialized medical institution. The article presents a generalized algorithm for the use of PRG in the predictive activity of doctor Practical recommendations for the use of the PRG by the patient are given. In addition, a computational experiment was carried out to calculate the values of PRG for several patients with further analysis of the results obtained.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compiler from El programing language: improvement and development","authors":"N. Zelenchuk, Ekaterina Pristavka, A. Maliavko","doi":"10.17212/2782-2230-2021-2-9-19","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-9-19","url":null,"abstract":"The implementation of the new multi-paradigm (functionally- imperative) programming language El, developed at the Department of Computer Science of the Novosibirsk State Technical University, in the form of a compiler is associated with the need to find ways to solve a number of complex problems. The current version of the compiler does implement only partially functionality of the language and generates far from optimal executable codes. In this paper, we consider the problem of an efficient compilation of an El-program, taking into account the need to implement new high-level data structures (two-sided lists, vectors with special forms of access, and a number of others) and control structures of the language, which make it possible to uniformly define cyclic and branching computational processes, as well as those laid down in the language a mechanism for explicitly controlling the mutability of variables. The tasks of improving and developing a compiler organized according to the classical multi-platform scheme are briefly considered, in which the front-end (lexical, syntactic, and semantic analyzers) converts the program to be translated into pseudocode of a single format, and used efficient infrastructure for building LLVM compilers as a back-end that turns pseudocode into executable code for different platforms. Execution of all possible operations on elements of high-level data structures (lists, tuples, vectors), as well as on arbitrary-precision numbers, has been moved to the runtime support library and, accordingly, can be deeply optimized. For this structure, the outlined ways of solving the problem of developing and improving the compiler by deep reforming and optimization of the chain of transformations of the translated program implemented by the front-end are formulated. At the initial stage, it is planned to implement a new compiler for two platforms: Linux and Windows.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dmitrii D. Piotrovskii, Alexander Kukolev, S. Podgornyi
{"title":"Sine waves frequency identification system modeling based on artificial network operation","authors":"Dmitrii D. Piotrovskii, Alexander Kukolev, S. Podgornyi","doi":"10.17212/2782-2230-2021-2-20-31","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-20-31","url":null,"abstract":"Sine wave contribution can be observed in many casual periodic processes- starting with nature and finishing with complex hand-made processes like social, economic, technical and biological. This sphere of science have been staying under strict society attention thus having promoted and developed different theories, based on discrete Fourier transform, least squares methods and so on. Technical problem in question can be represented by the list of different processes of wave nature, e.g. sound and light occurrence, wave motion of different mediums. One of the most actual problems in question examples is marine sine wave impact identification for the marine ship main engine speed of rotation adjustment– the process, where control object inevitably is subject to load impact fluctuations. Especially evident this object can be concerned for the Northern Sea Route area, where climate severity is next to the states freights turnover increase desire. In this case marine main engine speed of rotation adjustment without specific control algorithm can be considered to be ineffective because of efficiency drops, increased parts and facilities run-outs. That is why, due to neural networks integration trend into industry processes, we tried to attempt building a separate neural network for defining the frequency of a noisy low-frequency sine wave. The obtained results [1] proved sine waves frequency identification possibility with the help of artificial network, however accuracy was found to be unacceptable because of sketchy algorithm elaboration and small learning array size.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115042381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Socially significant activity: algorithmic provision of its quality assessment","authors":"D. Kosov","doi":"10.17212/2782-2230-2021-2-85-96","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-85-96","url":null,"abstract":"Any type of activity acquires social significance if it meets the requirements imposed on it. The main condition for the origin (emergence) of socially significant activity should be considered the high demand for the results of this type of professional work. The demand, especially the higher, is a complex indicator that includes not only frequency quantitative statistical characteristics (for example, the frequency of applying to any type of socially significant activity, namely to its specialists for the results of this activity that affect the processes of life activity of both an individual and society as a whole), but also characteristics that determine the quality of procedures performed at each step of the \"algorithm\" (technological cycle) of a specific, significant type of activity, and hence the results of its implementation. Strict compliance with the technological cycle within the framework of various socially significant professional branches of production can be considered as a guarantee of the quality of the results obtained in them, as a guarantee that consumers of products and services (the population of the state) will form a stable positive attitude to this type of activity. In the proposed article, based on many years of research, the author proposes and considers two components of an integrated approach to assessing the quality of socially significant activities – an algorithm for selecting experts to assess the quality of socially significant activities and the actual algorithm for evaluating the quality of this activity. Each of the proposed algorithms has both general steps for performing actions and individual ones, which ensure its novelty and differences from existing similar algorithmic schemes. Fuzzy logic was chosen as a mathematical tool for the implementation of these algorithms.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127642500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of the monitoring system for user's actions in the informational system","authors":"N. Karpova, A. Emelina","doi":"10.17212/2782-2230-2021-2-136-153","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-136-153","url":null,"abstract":"Currently, there are a large number of mechanisms for protecting computer systems, one of the directions is the creation of systems that respond to possible threats to the information security of the enterprise. Since according to statistics, a large number of information-related crimes are committed by employees of enterprises, monitoring of user actions in the information environment is a particularly important and relevant issue. The main advantages of such monitoring systems are the ability to represent arbitrary parameter values in the form of analytics of specified values, the ability to take into account a large number of development scenarios, the ability to use this system when making decisions, when describing schemes for analyzing information flows, and also to track a large number of computer parameters. In order to respond to information security incidents in a timely manner, it is important to develop a system that also takes into account the interrelationship of user actions. The authors of this paper hypothesized that the user's actions in a computer system are interrelated with each other, that is, if a user performs suspicious actions in a separate monitored parameter, then with a greater degree of confidence, we can say that this user will perform suspicious actions in another monitored parameter. Correlation analysis is necessary for possible reduction of the number of iterations during the program operation, which in the future allows to speed up the analysis of user actions in the information environment. In order to study the statistical relationship of the parameters, the authors found a mathematical measure of correlation - the correlation coefficient (Pearson correlation coefficient) for the studied parameters. Based on the analysis, fuzzy rules were formulated, on the basis of which a system for monitoring user actions in the information environment is built. In this development, a term such as reference user behavior is introduced. Any deviation from this \"standard\" is considered as a suspicious action and requires a timely response to a possible incident.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"25 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120869986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of artificial intelligence technologies in human resources management in Russian companies","authors":"Yuri Petrunin, A. Pugacheva","doi":"10.17212/2782-2230-2021-2-97-121","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-97-121","url":null,"abstract":"The article examines the problems and prospects of the introduction of artificial intelligence technologies in the selection of personnel in commercial companies in Russia. In recent years, both the number of applications and the number of scientific articles on the use of artificial intelligence technologies in personnel management processes both in our country and abroad have been growing. However, at present, there is a certain gap in the issues of evaluating the effectiveness of the use of these technologies, identifying the most promising areas for the use of artificial intelligence in the selection of personnel, and determining the factors that affect the results of such implementations in relation to Russian conditions. The survey of experts and practitioners in the field of working with artificial intelligence technologies in the field of personnel management of leading Russian companies allowed us to partially answer the relevant questions. The analysis of the respondents ' responses showed that these technologies favorably affect the selection of employees, improve the quality of selection, increase its speed, unload employees, save money resources and help eliminate bias towards candidates. The factors that increase the efficiency and effectiveness of the implementation of artificial intelligence technologies in the selection of personnel were identified: the category of selected employees, the scale of selection, and the possibility of integration with existing software. The difficulties of using artificial intelligence technologies in the selection of personnel include the presence of atypical positions for selection, the dependence of the results on the quality and volume of the training data set, and the possible reluctance of candidates to communicate with the robot. According to the results of the study, we can make a reasonable conclusion that artificial intelligence in the field of personnel selection, despite the presence of certain problems, has many advantages, as well as great prospects for development.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134548007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The task of organizing telemedicine consultations in emergency situations for hospitals remote from the clinics of the city center","authors":"Vladimir Voroszheykin, A. Baranov","doi":"10.17212/2782-2230-2021-2-49-66","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-49-66","url":null,"abstract":"The use of telemedicine consultations has become particularly popular and relevant in 2020 in the face of restrictive measures due to the COVID-19 pandemic. However, the use of means of communication for the transmission of medical indications began at the beginning of the XX century: the first transmission of electrocardiography signals by telephone was carried out in 1906. And in 1959, the first television consultation was held in the United States. To date, most telemedicine consultations are scheduled. Doctors submit applications and the necessary set of documents, after which the applications are considered, and the date of the consultation is set. For emergency situations, this procedure is not suitable, because the number of requests may not correspond to the system bandwidth. The paper considers the problem of using telemedicine consultations in emergency situations. Technological accidents, severe epidemics do not allow to send the victims to the city center and require. This problem is related to the solution of the following tasks: construction of a telemedicine consultation management system; development of a mathematical model for the distribution of telemedicine consultations between hospitals that significantly exceed the number of clinics; development of algorithms for optimal management (time criterion) of the execution of telemedicine consultation requests in real time; consideration of issues related to the information security of the system. As a result, an approach to the construction of a system for organizing telemedicine consultations with the use of dispatching and medical centers was proposed. The mathematical formulation of the problem is formulated. An algorithm for the distribution and operation of the system, including hospitals, dispatching and medical centers and clinics, has been developed. The algorithm uses a mathematical model that implements the problem under consideration. For the developed system, software and hardware support for information security is proposed.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model of the \"biometry-code\" converter based on artificial neural networks for analysis of facial thermograms","authors":"P. Lozhnikov, S. Zhumazhanova","doi":"10.17212/2782-2230-2021-2-154-165","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-154-165","url":null,"abstract":"Existing asymmetric encryption algorithms involve the storage of a secret private key, authorized access to which, as a rule, is carried out upon presentation of a password. Passwords are vulnerable to social engineering and human factors. Combining biometric security techniques with cryptography is seen as a possible solution to this problem, but any biometric cryptosystem should be able to overcome the small differences that exist between two different implementations of the same biometric parameter. This is especially true for dynamic biometrics, when differences can be caused by a change in the psychophysiological state of the subject. The solution to the problems is the use of a system based on the \"biometrics-code\" converter, which is configured to issue a user key after presentation of his/her biometric image. In this case, the key is generated in advance in accordance with accepted standards without the use of biometric images. The work presents results on using thermal images of a user for reliable biometric authentication based on a neural network \"biometrics-code\" converter. Thermal images have recently been used as a new approach in biometric identification systems and are a special type of biometric images that allow us to solve the problem of both the authentication of the subject and the identification of his psychophysiological state. The advantages of thermal imaging are that this technology is now becoming available and mobile, allowing the user to be identified and authenticated in a non-contact and continuous manner. In this paper, an experiment was conducted to verify the images of thermograms of 84 subjects and the following indicators of erroneous decisions were obtained: EER = 0.85 % for users in the \"normal\"state.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Honeypot as a tool for creating an effective secure system","authors":"A. Arkhipova, Danila Karevskiy","doi":"10.17212/2782-2230-2021-2-122-135","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-122-135","url":null,"abstract":"In the presente work, the theoretical aspects of honeypot systems were considered, and the classification of honeypots on various grounds was presented. The architecture of a honeypot system is presented, designed to investigate the behavior of an attacker after his penetration into the corporate system, as a tool for implementing a complex effective secure system of the organization.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model for assessing the qualification of IT specialists in software development","authors":"Erchimen Gavriliev, T. Avdeenko","doi":"10.17212/2782-2230-2021-2-67-84","DOIUrl":"https://doi.org/10.17212/2782-2230-2021-2-67-84","url":null,"abstract":"The decisive factor for the successful work of modern IT organizations is the professional qualities of the personnel and the system for its development. Staff training for software development organizations is of particular importance due to the fact that activities in this field make high demands on the level of qualifications of employees, their knowledge and skills, while they tend to quickly lose their relevance. However, there are problems in the assessment of personnel qualifications that can affect its’ objectivity and the effectiveness of further management decisions, for example: favoritism, bias, high exactingness, an erroneous standard. The purpose of the work is to develop a model for assessing the qualifications of IT specialists in the field of software development. . This study investigates personnel assessment system, types of criteria for assessing the qualifications of software developers and testers, which cover technical aspects of activities, interpersonal and mental characteristics of specialists. To assess the qualifications, a model of the conceptual theory of software development competence was selected and changed. Based on a literature review, analysis of vacancies and interviews with IT specialists, the main areas of activity of developers and testers were identified, as well as characteristics that need to be assessed. Based on the modified model, a prototype of the system was developed in the JavaScript programming language and on the Node JS software platform for collecting information, which loads data from the Atlassian Jira version control systems for further evaluation.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}