{"title":"Optimization of the iot network protocol choozing for monitoring audio information","authors":"U. A. Vishnyakou, Bahaa Shaya","doi":"10.21122/2309-4923-2023-2-32-37","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-32-37","url":null,"abstract":"The subject of research is the choice of a protocol in the Internet of Things (IoT) network for monitoring and analyzing audio information. The purpose of the article is to optimize the process of choosing a protocol for monitoring audio information based on IoT and evaluate the results. The authors have developed an IoT framework for monitoring and analyzing audio and voice information. The IoT network includes a sound sensor (microphone), a unit for analyzing the information received from it and a decision-making module. The description of protocols in the IoT network for assessing the sound level is given: the Wireless USB standard, the narrowband standard of the NB-IoT. The hierarchy analysis method was used to select the best protocol. The methodology and its main formulas for calculating the best option are given. A table of the four selected protocols for the IB network is given. As characteristics of the protocols, the following are considered: downlink speed, latency, device bandwidth, device transmission power. A matrix of paired comparisons of protocol parameter indicators based on expert assessments has been formed. Four matrices of paired comparisons of transmission standards variants in relation to the indicator of speed, delay, bandwidth of devices, transmission power of devices are constructed. Calculations of local vectors and priority vectors of quality indicators were performed for these four matrices. Then the matrix of vectors of global priorities is calculated by calculating the sum of the products of local vectors of matrices of paired comparisons of transmission standards variants on the corresponding priority vectors of quality indicators of the matrix of paired comparisons of protocol parameters. From the results obtained, the best protocol option for the network and sound monitoring was determined by the maximum value.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135592735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of shortest path algorithms on energy consumption of multi-core processors","authors":"A. A. Prihozhy, O. N. Karasik","doi":"10.21122/2309-4923-2023-2-4-12","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-4-12","url":null,"abstract":"Modern multi-core processors, operating systems and applied software are being designed towards energy efficiency, which significantly reduces energy consumption. Energy efficiency of software depends on algorithms it implements, and, on the way, it exploits hardware resources. In the paper, we consider sequential and parallel implementations of four algorithms of shortest paths search in dense weighted graphs, measure and analyze their runtime, energy consumption, performance states and operating frequency of the Intel Core i7-10700 8-core processor. Our goal is to find out how each of the algorithms influences the processor energy consumption, how the processor and operating system analyze the workload and take actions to increase or reduce operating frequency and to disable cores, and which algorithms are preferable for exploiting in sequential and parallel modes. The graph extension-based algorithm (GEA) appeared to be the most energy efficient among algorithms implemented sequentially. The classical Floyd-Warshall algorithm (FW) consumed up to twice as much energy, and the blocked homogeneous (BFW) and heterogeneous (HBFW) algorithms consumed up to 52.2 % and 21.2 % more energy than GEA. Parallel implementations of BFW and HBFW are faster by up to 4.41 times and more energy efficient by up to 3.23 times than the parallel implementation of FW and consume less energy by up to 2.22 times than their sequential counterparts. The sequential GEA algorithm consumes less energy than the parallel FW, although it loses FW in runtime. The multi-core processor runs FW with an average frequency of 4235 MHz and runs BFW and HBFW with lower frequency of 4059 MHz and 4035 MHz respectively.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135549264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User's interface for extraction of the chemical structure information from the systematic name of organic compound","authors":"L. A. Grigoryan","doi":"10.21122/2309-4923-2023-2-59-63","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-59-63","url":null,"abstract":"The user's interface «Nomenclature Generator» for extraction of the chemical structure information from the systematic name of organic compound represented according to IUPAC nomenclature is developed at the All-Russian Institute for Scientific and Technical Information of Russian Academy of Sciences.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About development of expert possibilities for consideration of equipment projects and technological decisions","authors":"D. J. Lobach","doi":"10.21122/2309-4923-2023-2-38-41","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-38-41","url":null,"abstract":"The purpose of the research described in the article is to formulate and substantiate the methodology for analyzing quantitative patterns of parameters of projects, devices, systems and technologies, that can be used for relative or rating comparison of projected, planned or applied investigated objects without using long-term experimental or operational data. The proposed approach to the analysis of quantitative patterns makes it possible to conduct a primary assessment of the advantages of innovative technologies, acomparative assessment of the safety of technical complexes, a targeted pre-operational assessment of equipment parameters, and to form planned distinctive parameters for the implementation of experimental and commercial technical projects.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control of the temperature regime of the process of bacterial oxidation on the basis of fuzzy logic","authors":"O. A. Jumaev, I. L. Kovaleva, G. B. Mahmudov","doi":"10.21122/2309-4923-2023-2-42-47","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-42-47","url":null,"abstract":"The work is devoted to modeling the temperature control system for the process of bacterial oxidation of refractory gold-bearing sulfide ores. The simulation was performed using the Fuzzy Logic Toolbox editor in the MATLAB software package. The substantiation of the set of input and output variables, the type of membership functions was carried out, the base of rules for the inference engine was formed. The main stages of modeling are described and the results are analyzed. The use of trapezoidal membership functions is substantiated.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. V. Naprasnikov, I. L. Kovaleva, Y. V. Polozkov, D. P. Kunkevich, A. V. Borodulya
{"title":"Finite-element model of a sole with the using of cellular objects","authors":"V. V. Naprasnikov, I. L. Kovaleva, Y. V. Polozkov, D. P. Kunkevich, A. V. Borodulya","doi":"10.21122/2309-4923-2023-2-24-30","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-24-30","url":null,"abstract":"One of the possible approaches to the formation of the optimization model of the underlay is the use of cellular objects. At the same time, the question of constructing geometric models of such objects is relevant. Code fragments and construction results for one variant of geometry in IronPython language in SpaceClaim environment to solve such a problem are given. A possible approach to solving the problem of forming boundary conditions changing in time and space is described.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network models for organizing the learning process","authors":"A. A. Lobaty, D. A. Konopacki","doi":"10.21122/2309-4923-2023-2-65-69","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-2-65-69","url":null,"abstract":"Статья посвящена обоснованию принципов построения сетевых моделей организации и проведения учебного процесса на основе применения основных положений теории множеств, теории графов и теории топологии. Рассматриваются модели организации управления учебным процессом и модели сетевого обучения на примере структуры гипотетического высшего учебного заведения. Проводится анализ топологических свойств сетевых моделей на основе существования свойств гомеоморфизма между топологическими пространствами, характеризующими сложную систему организации учебного процесса. Проведен анализ отношений между множествами элементов рассматриваемой системы, множествами их параметров, численными значениями параметров и информационными характеристиками системы. Рассматривается также множество различных состояний (структур) системы и её подсистем, которые связаны с множествами фазовых координат, что позволяет использовать математический аппарат теории динамических систем случайной структуры. Представление систем организации и проведения учебного процесса с помощью сетевых моделей позволяет создать модели функционирования этих систем, модели информационных потоков и провести их оптимизацию на основе заданных критериев, характеризующих материальные затраты и эффективность систем.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135591347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical bayesian algorithm for processing thermographic images of the cow udder for diagnosing mastitis","authors":"I. I. Hirutsky, A. G. Senkov, Y. A. Rakevich","doi":"10.21122/2309-4923-2023-1-42-46","DOIUrl":"https://doi.org/10.21122/2309-4923-2023-1-42-46","url":null,"abstract":"The article presents results of our experiments carried out to study the invariance of the digital description of the imageThere in the paper is formulated a mathematical problem of multi-hypothetical detection of subclinical and clinical mastitis in dairy cows by the maximum values of udder temperature measured by digital processing of the udder thermal images. The optimal temperature threshold values corresponding to the Bayesian criterion of the minimum average risk in the above multi-hypothesis detection problem are determined by numerical modelling.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135015544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
С. Н. Петров, Д. В. Ахраменко, С. М. Горошко, Т. А. Пулко
{"title":"РАЗГРАНИЧЕНИЕ ДОСТУПА В ЛОКАЛЬНОЙ СЕТИ С ИСПОЛЬЗОВАНИЕМ БАЗОВЫХ НАСТРОЕК СЕТЕВОГО ОБОРУДОВАНИЯ","authors":"С. Н. Петров, Д. В. Ахраменко, С. М. Горошко, Т. А. Пулко","doi":"10.21122/2309-4923-2018-3-55-61","DOIUrl":"https://doi.org/10.21122/2309-4923-2018-3-55-61","url":null,"abstract":"The article focused on recommendations for the local network protection from unauthorized access of employees (insider attacks) on the basis of access control, using the basic settings of existing equipment. The use of MAC-based access profiles (MAC-based Access Control) is proposed. The problems of information security at the physical and channel levels, as well as the most common types of attacks are considered. For research purposes, a mockup of a typical local area network was created, including personal computers, ZTE ZXHN H208N modem with support WiFi-access point and the switch DES-1210-52, which connected these devices to the network. Made contact connection to the twisted-pair with clips on the lines Tx and Rx. Kali Linux, tcpdump, bettercap, Wireshark are using as a tools for penetration testing. The network attacks ARP-spoofing with the basic settings of network equipment is discussed. The results of the attack and passive study of the network model are presented. The attack was repeated after activation and configuration IP-MAC-Port Binding, as well as authentication of users based on IEEE 802.1 X standard (MACBased 802.1 X). The results proved the effectiveness of the chosen protective actions.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"1 1","pages":"55-61"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48565255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ИСПОЛЬЗОВАНИЕ ИНТЕЛЛЕКТУАЛЬНЫХ И БЛОКЧЕЙН ТЕХНОЛОГИЙ В ИНФОРМАЦИОННОМ УПРАВЛЕНИИ","authors":"Владимир Анатольевич Вишняков","doi":"10.21122/2309-4923-2018-1-45-50","DOIUrl":"https://doi.org/10.21122/2309-4923-2018-1-45-50","url":null,"abstract":"The aim of this work is the analysis of methods, approaches, technologies, means of information management (IM), using both conventional technologies and adding new intellectual and block chain. Trends in the use of intelligent technologies in information management are given. The developments in the field of intelligent agents based on semantic web, web-services and semantic web-services, the use of cloud computing (CC) are shown. The main ideas of semantic technologies, in which a page of the semantic network contains information in two languages: the natural and special, understood only by intelligent software agents (IA) are discussed. The use of block chain technology for the control of various material and non-material assets are done. Technically, the block chain technology is another application layer on top of the stack of the Internet protocols and can be integrated with the semantic level. The use of intelligent technologies in the information management in the cloud area with the work of IA. The intelligent web (web 3.0), which became the next stage in the development of the Internet is discussed. It forms the semantics on the ontology dase, creating new opportunities for IA to perform various user requests. Analyzes the major developments in the field of intellectualization of IM, and the main tendencies of their development. The result was a list of criteria and their values, which must meet an intelligent system for IM. As trends in the development of IM is considered the improvement of models and methods of joint activity of IA in the cloud area using block chain technology. Three directions of development of intellectual control system are proposed. As the development of information management proposed the creation of an instrumental platform based on multi agent approach, integrating semantic and block chain technology in the cloud area.","PeriodicalId":30907,"journal":{"name":"Sistemnyj Analiz i Prikladnaa Informatika","volume":"373 1","pages":"45-50"},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68015513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}