information object
Recently Published Documents


TOTAL DOCUMENTS

69
(FIVE YEARS 31)

H-INDEX

6
(FIVE YEARS 1)

Informatics ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 82
Author(s):  
Kanyarat Kwiecien ◽  
Wirapong Chansanam ◽  
Thepchai Supnithi ◽  
Jaturong Chitiyaphol ◽  
Kulthida Tuamsuk

The aim of this study was to analyze the content, context, and structure of folktales from the Mekong River Basin, and to develop a metadata schema for data description and folktale storage. The research was conducted using the MAAT metadata lifecycle model, which comprises the following four steps: (1) conducting an information content analysis; (2) creating metadata requirements, (3) developing a metadata schema; and (4) carrying out a metadata service and evaluation. The folktale analysis, based on Anne Gilliland’s information object analysis, revealed the following: (1) the folktale content consists of types of tales, and the morals, beliefs, and parts they incorporate; (2) the folktale context consists of and names distributors, characters, scenes, magical objects, ethnic groups, languages, countries, relationships between tales, and their sources; (3) the folktale structure includes verbal, non-verbal, and mixed forms. The metadata schema development adopted the functional requirements for bibliographic records concepts and existing metadata standards, resulting in metadata with the following 18 elements: identifier, title, creator, contributor, description, relation, language, medium, sources, date, rights, keyword, character, moral, ethnic group, motif, place, and country. The metadata elements were described using the categories: name, definition, format, example, and note.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012028
Author(s):  
A Obukhov ◽  
A Volkov

Abstract Analysis and assessment of the state of information objects is an urgent task in adaptive systems. Information about the current state of the system, its constituent components, the object of observation can be used in the decision-making process or in the implementation of control algorithms. However, an information object can have a complex structure or be characterized by many features, among which it is difficult to distinguish the main components. Therefore, an algorithm for analyzing and assessing the state of information objects is proposed, based on obtaining the compressed state of objects using neural networks. The resulting compressed state sufficiently characterizes the original object, but has a lower dimension. This can be used to speed up the analysis and assessment process and improve its accuracy in adaptive systems.


2021 ◽  
Vol 2061 (1) ◽  
pp. 012076
Author(s):  
V V Tulchinskii ◽  
V I Tulchinskii ◽  
S I Kondratyev ◽  
A L Boran-Keshishian

Abstract The article discusses the possibility of creating a system for automating the process of searching and assessing the danger of targets using machine vision and existing ship systems. The technologies for processing images from the ship’s camera system are analyzed: object recognition by a ready-made convolutional neural retrained network, as well as object detection by SURF algorithms. The parameters of the danger of goals within the framework of the problem to be solved have been analyzed and developed, and a structural analysis has been elaborated. The functionality of the automatic operation of the system as a closed circuit has been considered. To achieve the technical result in the system as an integrated part of the ship’s equipment based on cognitive information processing, a composite information object from the ship’s sensors and control systems was introduced. It is decomposed into blocks in which the associated logical information processing takes place using basic modules consisting of adaptive cells-approximators as learning elements capable of independently processing information. The following units are included in the local area network: an information support unit (ISU), a decision making unit (DMU), a command-organizational unit (COU) with an operator’s workstation. The ISU is connected by a two-way communication output with aggregate LAN units, the other output is connected in series with a situation determination unit and the “model of the surrounding space” block. The survey was carried out on board a modern LNG gas carrier using ship systems.


Author(s):  
Alexander Dodonov ◽  
◽  
Vadym Mukhin ◽  
Valerii Zavgorodnii ◽  
Yaroslav Kornaga ◽  
...  

The article describes the concept of a unified information space and an algorithm of its formation using a special information and computer system. The process of incoming object search in a unified information space is considered, which makes it possible to uniquely identify it by corresponding features. One of the main tasks of a unified information space is that each information object in it is uniquely identified. For this, the identification method was used, which is based on a step-by-step analysis of object characteristics. The method of parallel information object search in unified information spaces is proposed, when information object search will be conducted independently in all unified information spaces in parallel. Experimental studies of the method of parallel information object search in unified information spaces were conducted, on the basis of which the analysis of efficiency and incoming objects search time in unified information spaces was carried out. There was experimentally approved that the more parameters that describe the information object, the less the time of object identification depends on the length of the interval. Also, there was experimentally approved that the efficiency of the searching of the incoming objects in unified information spaces tends to a directly proportional relationship with a decrease in the length of the interval and an increase in the number of parameters, and vice versa.


2021 ◽  
Vol 2021 ◽  
pp. 1-32
Author(s):  
Ali Seyfollahi ◽  
Ali Ghaffari

IPv6 routing protocol for low-power and lossy networks (RPL) has been developed as a routing agent in low-power and lossy networks (LLN), where nodes’ resource constraint nature is challenging. This protocol operates at the network layer and can create routing and optimally distribute routing information between nodes. RPL is a low-power, high-throughput IPv6 routing protocol that uses distance vectors. Each sensor-to-wire network router has a collection of fixed parents and a preferred parent on the path to the Destination-oriented directed acyclic graph (DODAG) graph’s root in steady-state. Each router part of the graph sends DODAG information object (DIO) control messages and specifies its rank within the graph, indicating its position within the network relative to the root. When a node receives a DIO message, it determines its network rank, which must be higher than all its parents’ rank, and then continues sending DIO messages using the trickle timer. As a result, DODAG begins at the root and eventually extends to encompass the whole network. This paper is the first review to study intrusion detection systems in the RPL protocol based on machine learning (ML) techniques to the best of our knowledge. The complexity of the new attack models identified for RPL and the efficiency of ML in intelligent and collaborative threats detection, and the issues of deploying ML in challenging LLN environments underscore the importance of research in this area. The analysis is done using research sources of “Google Scholar,” “Crossref,” “Scopus,” and “Web of Science” resources. The evaluations are assessed for studies from 2016 to 2021. The results are illustrated with tables and figures.


Author(s):  
Alexander Dodonov ◽  
Vadym Mukhin ◽  
Valerii Zavgorodnii ◽  
Yaroslav Kornaga ◽  
Anna Zavgorodnya

The article discusses the concept and principles of building unified information space and presents a scheme for its formation. The article considers formation of unified information space using a specialized information computer system, which is actually a hardware and software basis for supporting unified information space. The stages of information object identification in unified information space are considered. The article suggests a method for finding missing features of an incoming object by implementing the information objects interaction with each other within unified information space.


2021 ◽  
Vol 3 (2 (111)) ◽  
pp. 35-44
Author(s):  
Vadym Mukhin ◽  
Valerii Zavgorodnii ◽  
Yaroslav Kornaga ◽  
Anna Zavgorodnya ◽  
Ievgen Krylov ◽  
...  

This paper suggests a method to search for an incoming object in order to identify its unambiguously, based on the integration of information spaces into intermediate unified information space. At the same time, the incoming object identification process involves appropriate attributes. This paper describes the process of information object arrangement within a unified information space that forms for a set of dynamically changing objects. It should be noted that each subject in the set collects information about the environment, including interaction with other objects. In the process of forming a unified information space, the information system collects information from data sources that are represented in different formats. The system then converts this information and forms a unified information space, thereby providing users with information about objects. A two-tier system of connections at the global (cloud) and local (fog) levels of interactions has been considered. At the same time, it should be noted that a unified information space formation requires the implementation of tools to support the transformation of information objects; that necessitates the implementation of translators ‒ special converters at different levels. A method to combine information spaces into an intermediate unified information space has been proposed; analysis was performed to determine the time and efficiency of the search for incoming objects within it. It was experimentally established that the more parameters that describe an information object, the less the time to identify an object depends on the length of the interval. It has also been experimentally shown that the efficiency of finding incoming objects tends to be a directly proportional dependence while reducing the length of the interval and increasing the number of parameters, and vice versa


2021 ◽  
Vol 7 (Extra-B) ◽  
pp. 396-405
Author(s):  
Petr Mikhailovich Kurdyuk ◽  
Victor Alexandrovich Ochakovsky ◽  
Nikolay Vladimirovich Pavlov ◽  
Evgeny Alexandrovich Chaban ◽  
Gyulnaz Eldarovna Adygezalova

This article considers a modern information trend, namely the formation of a digital profile in Russia, which gave rise to a scientific discussion about its positive and negative aspects especially during the COVID-19 pandemic. The study puts forward and substantiates a hypothesis that digital profiles are an administrative and legal mode of this special information object. This administrative and legal regime consists of the objectives and principles of functioning and protection of this object, a digital profile as an object of the regime, and tools for the legal support of its functioning, i.e. regulatory rules and administrative procedures for the use and security of this object. Filling these components with legal content will allow forming the regulatory structure of a digital profile belonging to a person and other subjects of public relations.


Author(s):  
K. A. Mira

The article is devoted to the problem of recognizing an information object that has a monetary equivalent in the form of electronic means of payment, cryptocurrency, bonuses on card accounts, uncertified shares and other securities as the subject of theft of other people’s property, committed using information technologies. In the course of the study, there was made an analysis of judicial practice in criminal cases of the theft of electronic means of payment, statistics on the commission of crimes of this type, regulatory legal acts and scientific sources. Particular attention is paid to the issue of the theft of bonuses, the characteristics of this subject of theft and the existing schemes for committing these crimes. Based on the results of the study, a definition was formulated and a characteristic was given to information objects that have a monetary equivalent, in particular, electronic means of payment and bonuses, scientific and legal consolidation of a unified terminology is proposed in order to streamline the practice of investigating theft of someone else’s property, in particular, theft of someone else’s property, committed using information technologies. 


2021 ◽  
pp. 55-62
Author(s):  
Viktor Mihaylenko ◽  
Tetyana Honcharenko ◽  
Khrystyna Chupryna ◽  
Tamara Liazschenko

The article presents the development of method of integrated spatial information processing based on multidimensional data models. Joint description of spatial data of different levels of detail (LOD) using a multidimensional model and attribute data using a relational model is difficult and requires the development of modified structures of multidimensional data models. The description of spatial and attribute data based on multidimensional information objects (MIO) is determined. It is proposed to use a new type of MIO - modified multidimensional information objects (MMIO). MIO and MMIO schemes allow describing multidimensional information objects and relationships in the form of a single multidimensional structure. On the basis of the introduced method of joint description of spatial and attributive data using extended multidimensional information objects, a multidimensional data model is built. This approach allows integrating different types of databases and contains a unified description of spatial and attribute data in the form of a multidimensional information object. The developed method is supposed to be used in BIM (Building Information Modeling) technology of computer modeling to solve general planning tasks.


Sign in / Sign up

Export Citation Format

Share Document