{"title":"Analysis of the Excess Kurtosis of Two-Component Mixtures of Shifted Non-Gaussian Distributions","authors":"A.I. Krasilnikov","doi":"10.15407/emodel.46.02.015","DOIUrl":"https://doi.org/10.15407/emodel.46.02.015","url":null,"abstract":"The dependence of the extremes and zeros of the excess kurtosis on the weight coefficient is researched. Formulas for finding the extrema points, the values of the minimums and maximums of the excess kurtosis are obtained. Conditions on the shift parameter under which the extrema points belong to the interval are determined. Formulas for finding the zeros of the excess kurtosis are obtained and conditions on shift parameter under which the roots of the equation are real and belong to the interval are determined. Examples of calculating extremes and zeros of the excess kurtosis of two-component mixtures of shifted non-Gaussian distributions are considered. The results of the research justify the possibility of practical application of two-component mixtures of shifted distributions for mathematical and computer modeling of an infinite number of non-Gaussian random variables with negative, positive and zero excess kurtosis.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"2002 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140718725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method and Means for Choice of Penetration Testing Services","authors":"A. Podzolkov, V. Kharchenko","doi":"10.15407/emodel.46.02.043","DOIUrl":"https://doi.org/10.15407/emodel.46.02.043","url":null,"abstract":"The methods of assessing the security of information systems (IS) with the help of special means of penetration testing (PT) and services that provide the corresponding tools (Penetration Testing as a Service, PTaaS) are analyzed. The indicators to compare PTaaS tools and services are substantiated, namely: provision of a report on compliance of the tested product with data protection requirements, availability of security certificates, use of appropriate testing methodologies, etc. A method has been developed for selecting a PTaaS service according to the customer’s requirements to increase IS cyber security by improving the completeness and reliability of penetration testing, as well as reducing the search time for PT tools. A cloud service is proposed that supports the implementation of the method and provides the option of choosing PTaaS. It was determined that the use of the proposed method and service enables users to quickly and conveniently choose PTaaS according to the requirements and work model of organizations or digital products.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"2004 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140718689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of the Mathematical Model, Properties, Classes and other Features of Software Agent Development","authors":"E.V. Zelenko","doi":"10.15407/emodel.46.02.003","DOIUrl":"https://doi.org/10.15407/emodel.46.02.003","url":null,"abstract":"Reviewed: features of the definition of an agent and a software agent, its dimensions and other components; models of software agents and its properties; classification of software agents by architecture, communication principles and agent communication languages (ACL), as well as existing platforms for their development (e.g., JADE, SPADE); multi-agent system (MAS); behavior types of SPADE software agent based on the example of one of the platforms (including for subsequent experiments to compare behaviors in terms of hardware resources usage). Minor adjustments have been made to the syntax of mathematical expressions describing the agent model, and a revision of the formalized definitions of agent property set has been proposed; a formalized description of the model of studied agent type is determined.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"143 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140717339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience in Focus: Rethinking the Risk Matrix","authors":"F. Korobeynikov","doi":"10.15407/emodel.46.02.035","DOIUrl":"https://doi.org/10.15407/emodel.46.02.035","url":null,"abstract":"This research presents a three-dimensional risk matrix model designed for the analysis and prioritisation of critical risks in the context of resilience. Traditional risk assessment methods prevalent in information security, which typically juxtapose the likelihood and consequences of risks, are inadequate for fully capturing the intricacies of critical risks. The proposed three-dimensional model addresses these shortcomings by cohesively integrating the dimensions of likelihood, impact and cost of risk management. This integration provides a holistic tool for resilient risk analysis that goes beyond the capabilities of traditional models. A key feature of this model is its ability to address the complexities associated with critical risks, which are often not adequately addressed by traditional risk matrices due to their stochastic nature and significant potential impact on organisational resilience. By incorporating budgetary constraints into the risk assessment process, the model enables a more objective and quantifiable approach to managing critical risks. It shifts the evaluative focus from a purely probabilistic perspective to a cost-value based assessment, emphasising the balance between potential benefits and mitigation expenditure. This approach not only refines the accuracy of critical risk assessment, but also enhances existing risk management practices, providing a more robust and strategic tool for managing organisational risk.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"1973 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140719120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating the Most Common Types of Test Assignments Using Artificial Intelligence","authors":"A. Taranowski, V.D. Samoylov","doi":"10.15407/emodel.46.02.088","DOIUrl":"https://doi.org/10.15407/emodel.46.02.088","url":null,"abstract":"The paper considers extending the fundamental possibility of using AI technologies to create test assignments in order to cover the most common types thereof. While outlining the set of AI-based tools available for creating test assignments it substantiates the general approach to creating test assignments using AI technologies whereas the impact of negative factors inherent in them is levelled. The series of experiments undertaken allowed to confirm the possibility of creating the common types of test assignments using AI technologies as substantiated with the AI-based tools available as outlined. Which finally resulted in proposing ready to use prompt templates aimed at creating such types of test assignments as multiple-choice questions (single correct answer and multiple correct answers included), matching tests, sequence restoring tests, and short-answer questions for entering the expected value. Another series of experiments produced an important side effect of supporting prompt template that provides assistance in determining the type of test assignment relevant for an arbitrary text.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"35 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140720936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Image Compression Using Image Preprocessing, and Huffman and Quite Ok Image Algorithms","authors":"Y.M. Krainyk, D.V. Dotsenko","doi":"10.15407/emodel.46.02.075","DOIUrl":"https://doi.org/10.15407/emodel.46.02.075","url":null,"abstract":"The article reveals modern approaches to building a swarm system with an emphasis on the swarm of unmanned aerial vehicles. The main components of the architecture of the swarming system were considered: swarming model, communication network, control system. The difference between the principles of controlling individual UAV and a large group (swarm) of UAVs is considered. The importance and necessity of further development of methods and systems for managing swarm systems is outlined.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"396 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140719325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of Swarm Systems’ Anatomy. Interaction Problem","authors":"O.A. Kravchuk, V.D. Samoilov","doi":"10.15407/emodel.46.02.101","DOIUrl":"https://doi.org/10.15407/emodel.46.02.101","url":null,"abstract":"The article reveals modern approaches to building a swarm system with an emphasis on the swarm of unmanned aerial vehicles. The main components of the architecture of the swarming system were considered: swarming model, communication network, control system. The differ-ence between the principles of controlling individual UAV and a large group (swarm) of UAVs is considered. The importance and necessity of further development of methods and systems for managing swarm systems is outlined.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140717504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms for Digital Processing of Correlation Functions in Leak Detectors","authors":"A.A. Vladimirsky, I. Vladimirsky, D.M. Semenyuk","doi":"10.15407/emodel.46.02.060","DOIUrl":"https://doi.org/10.15407/emodel.46.02.060","url":null,"abstract":"The article is devoted to the processing of cross-correlation functions. The need for this processing is due to a wide variety of interference conditions for searching for leaks in underground pipelines. Interference often significantly distorts the appearance of correlation functions and makes it difficult to accurately determine the coordinates of damage for pipeline repairs. Various approaches to combating these distortions are considered, depending on the available information about the characteristics of interference and leakage noise. Such features as the characteristic delay of the correlation function, which often corresponds to an interference burst and features of the frequency distributions of interference and leakage noise. An algorithm for extracting the leak coordinate from the correlation function as the coordinate of the source of a broadband signal by orthogonal decomposition of the CCF is considered. This problem is solved on the basis of classical approaches to the synthesis of shaping and synthesis of matched filters. The connection between the results obtained is shown. Thus, two approaches were used: one has the main goal of suppressing interference, without directly determining the coordinates of leaks, the other, on the contrary, is focused primarily on the selection of useful correlation of leak noises. In real-life conditions, it is advisable to combine both approaches due to the variety of acoustic environments encountered.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140717600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security Systems of Highly Functional Uav Fleets for Monitoring Critical Infrastructure: Analysis of Disruptions, Attacks and Counterapproaches","authors":"H. Zemlianko, V. Kharchenko","doi":"10.15407/emodel.46.01.041","DOIUrl":"https://doi.org/10.15407/emodel.46.01.041","url":null,"abstract":"The modern world is becoming increasingly dependent on the security of critical infrastructure facilities (CIF), which is monitored by UAVs, their fleets and multifunctional fleet systems (MFS UAVs). The UAV MFS have a complex digital infrastructure (DIS). The DIS is based on new information technologies that have certain security deficiencies and create new cyber threats, in particular, due to specific vulnerabilities that can be exploited externally. The provi-sion of cyber security of the CIS of the MBF of UAVs has been studied thanks to the develop-ment of a sequence of analysis of cyber threats using the IMECA procedure. An overview of existing cyber security assessment methods and their limitations was conducted; developed models of the OKI monitoring system based on the UAV MBF; analyzed cyber threats to its CIS; the criticality of cyber attacks and the impact of countermeasures; formulated recommen-dations for ensuring cyber security and general conclusions based on research results. A method of ensuring cyber security of the CIS of the MBF UAV was created, which consists of determin-ing its specific features as an object of cyber threats, analyzing violators, vulnerabilities, risks of critical violations and choosing countermeasures, the use of which allows you to increase the level of cyber security and reliability of the monitoring system and ensure a temporary response to cyber threats.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"114 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Models of Local Heating of Elements of Electronic Devices","authors":"V. Havrysh","doi":"10.15407/emodel.46.01.021","DOIUrl":"https://doi.org/10.15407/emodel.46.01.021","url":null,"abstract":"Linear and non-linear mathematical models for the determination of the temperature field, and subsequently for the analysis of temperature regimes in isotropic spatial heat-active media sub-jected to internal and external local heat load, have been developed. In the case of nonlinear boundary-value problems, the Kirchhoff transformation was applied, using which the original nonlinear heat conduction equations and nonlinear boundary conditions were linearized, and as a result, linearized second-order differential equations with partial derivatives and a discontinu-ous right-hand side and partially linearized boundary conditions were obtained. For the final linearization of the partially linearized differential equation and boundary conditions, the ap-proximation of the temperature according to one of the spatial coordinates on the boundary sur-faces of the inclusion was performed by piecewise constant functions. To solve linear bounda-ry-value problems, as well as obtained linearized boundary-value problems with respect to the Kirchhoff transformation, the Henkel integral transformation method was used, as a result of which analytical solutions of these problems were obtained. For a heat-sensitive environment, as an example, a linear dependence of the coefficient of thermal conductivity of the structural material of the structure on temperature, which is often used in many practical problems, was chosen. As a result, analytical relations for determining the temperature distribution in this envi-ronment were obtained. Numerical analysis of temperature behavior as a function of spatial co-ordinates for given values of geometric and thermophysical parameters was performed. The in-fluence of the power of internal heat sources and environmental materials on the temperature distribution was studied. To determine the numerical values of the temperature in the given structure, as well as to analyze the heat exchange processes in the middle of these structures, caused by the internal and external heat load, software tools were developed, using which a ge-ometric image of the temperature distribution depending on the spatial coordinates was made.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"164 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}