RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics
Latest Publications


TOTAL DOCUMENTS

66
(FIVE YEARS 57)

H-INDEX

0
(FIVE YEARS 0)

Published By Russian State University For The Humanities

2686-679x

Author(s):  
Anastasiya N. Zhukova ◽  
◽  
Marina S. Shapovalova ◽  

Computerized traffic modeling makes it possible to find out the modification needs to assess the traffic flow on the roads and detect likely problem areas in order to take timely measures to eliminate them. Competent preparation of a road network formation plan based on the acquired information makes it possible to reduce the load on the road transport line, avoid traffic jams, and also reduce the average time spent by drivers on the roads. The macroscopic and microscopic models of the cars flow were analyzed by authors to implement the computer model. The article considered the model of the cellular automata by Nagel–Schreckenberg, with the author’s addition that takes into account the presence of the road sections inaccessible for driving in. The need to modify the lane change algorithm was implemented: the condition of the need to change the lane when car is meeting an inaccessible road section was added. And also the “polite” drivers algorithm for bypassing inaccessible areas with a high density of the traffic flows was proposed. Such a model is realized on Python programming language. An analysis of vehicles behavior with different traffic density and location of inaccessible road sections for two- and three-lane roads was carried out based on that model modification.


Author(s):  
Andrei V. Gavrilenko ◽  

The article considers an issue of information security of the distance education systems. It analyzes the functions and architecture of the typical distance education system. With considering the requirements of information security it also discusses the university information system for solving the distance learning problems. The author defines valuable assets and information resources and describes the existing security threats. The subjects of interaction in the distance learning mode are presented. There is a consideration of the principal directions of the university’s activity in the distance learning system, requiring constant monitoring of information security. A threat model is worked out and the main security vulnerabilities are highlighted. The analysis of the causes and consequences of information security violation in the distance learning system is carried out and most vulnerable and critical nodes were identified. The hardware and software requirements for the remote mode work are regarded. A recommended list of hardware and software tools that ensure compliance with safety requirements is presented. The major lines of protection for distance learning systems are highlighted. The article proves the necessity of conducting a regular security assessment as a means for monitoring an effectiveness of the protection system.


Author(s):  
Sergey A. Obukhov ◽  
◽  
Valery P. Stepanov ◽  
Igor V. Rudakov ◽  
◽  
...  

The evoked potentials (EP) method consists in recording bioelectric reactions of the brain in response to external stimulation or while performing cognitive tasks. The goal of the work is to develop a mathematical model of the system for detection and classification of evoked potentials on the electroencephalogram (EEG). The main odd of the machine EP detection are artifacts from EEG recordings and the high variability of potentials. EP detection and classification algorithm includes three stages. At the preliminary stage, the frequency-time and spatial signal transformations – a set of Butterworth frequency filters, linear composition and averaging of the recorded signals from different sensors are used to remove noise and uninformative EEG components. The next step is the direct fixation and averaging of the evoked potentials. At the final stage, to reduce the dimension of the problem, the information features vector is formed. The parameterized image is used as input of the binary classifier. The support vector method is used to construct the classifier. During the study, the optimization of the regularization C parameter of the classifier was carried out using the estimation of sliding control. The proposed solution is useful for human-machine interaction and for medical procedures with biofeedback.


Author(s):  
Andrei N. Bogdanov ◽  

The article tells about the life and main directions of scientific research of the outstanding Soviet and Russian scientist in the field of mechanics, Academician Gorimir Gorimirovich Cherny (1923–2012); as well as it gives an overview of some of the results obtained to date in the development of his work in the field of analytical study of the dynamics of shock waves in inhomogeneous media, determining the optimal shape of bodies in a supersonic flow, exothermic flows, boundary layer theory, transonic flows. A graduate of Moscow University, G.G. Cherny was a participant in the Great Patriotic War, after its end he played a big role in the development of many areas of science, the organization of scientific research, the education of scientific personnel. He was one of the founders of the Research Institute of Mechanics at Moscow State University, held managerial positions in scientific and educational institutions, and created a scientific school in the field of mechanics. Research by G.G. Cherny, in the main, referred to high-speed gas dynamics. He carried out analytical studies of the subtle issues of calculating flows in various conditions and devices. Many of his results have become classic.


Author(s):  
Sof'ya A. Serebryakova ◽  
◽  
Mikhail V. Filippov ◽  

Nowadays authors of cinematographic works are often faced to protect copyright need. One way to resolve such an issue is to use digital watermarks. Digital watermarks are some kind of encrypted message that allows distinguishing the original work from its forgery. At the same time the audio or video file with a built-in message looks no different from a file without a digital watermark, what is a key advantage of its use and at the same time it makes difficult to playback the file illegally. A set of methods for undetectable hiding some bit sequences in others is called digital steganography. An important advantage of steganography over cryptographic methods is the hiding the fact of embedding a code message. Embedding digital watermarks by using the least significant bit method allows embedding a digital watermark in such a way that a person will not notice any changes in the video file. The article considers the known methods of embedding digital watermarks and the structure of the AVI file format. It presents an algorithm for embedding and extracting digital watermarks for AVI video files based on LSB method with using hash-function. The algorithm provides a counteraction to the spread of counterfeit products.


Author(s):  
Valerii V. Arutyunov ◽  
◽  
Nataliya V. Grishina ◽  

The paper analyzes the scientific activity of Russian organizations in the three regional scientific clusters of Russia (Moscow, St. Petersburg and the cluster of the Moscow region), the results of which in a number of branches of science are characterized by high values of the demand, citation and Hirsch indices obtained on the basis of scientometric indicators (publication activity, citation, Hirsch index) from the database of the Russian Science Citation Index (RSCI). At the same time, 11 such natural science branches were identified in the Moscow cluster (chemical technologies and industry, geodesy and cartography, biology, physics, communications, chemistry, biotechnology, astronomy, electrical engineering, electronics and radio engineering, geography) and corresponding organizations in each of these branches of science, in St. Petersburg-six (electrical engineering, physics, geology, electronics and radio engineering, geodesy and cartography, mechanics), in the Moscow region cluster – five (physics, instrumentation, chemistry, chemical technologies and industry, nuclear engineering). The three leaders in the index of demand for research results in the Moscow cluster include the L.Y. Karpov Research Institute of Physics and Chemistry (branch of science – chemical technologies and industry), the Research and Design Institute of Information, Automation and Communication in Railway Transport (geodesy and cartography) and the Institute of Micro-Production (biology). The Moscow Region cluster is dominated by the Institute of Microelectronics Technology and High-Purity Materials of the Russian Academy of Sciences (physics), the Joint Institute for Nuclear Research (instrumentation) and the Institute of Engineering Immunology (chemistry). Among the leaders in the St. Petersburg cluster are the M.A. Bonch-Bruevich St. Petersburg State University of Telecommunications (electrical engineering), Peter the Great St. Petersburg Polytechnic University (physics) and I.S. Gramberg Research Institute of Geology and Mineral Resources of the World Ocean (geology).


Author(s):  
Vladislav O. Blagov ◽  
◽  
Dmitry A. Mityushin ◽  
Gennadiy Yu. Puchkov ◽  
Elena V. Remizova ◽  
...  

The tempestuous and rapid development of biometric technologies based on both the static and dynamic identification signs of a person could not bypass one of the important spheres of life in modern society – the fight against crime. Most of the solutions related to personal identification by papillary patterns, iris and retina of the eye, drawing of veins on the arm and thermographic face cards are widely used in the access control and management systems, systems for protecting the automated information systems from unauthorized access to information. At the same time, the use of those signs in the investigation and disclosure of crimes is just beginning to be introduced into the activities of the law enforcement agencies of the Russian Federation. The use of the information systems in that area can significantly increase the effectiveness of the fight against crime, especially crimes against the person. Of particular interest is the use of data on the phenotypic signs of the suspect in the investigation of crimes, i.e. information about his height, weight, hair color, eyes, skin tone, and blood group. The article discusses the basic principles of creating an automated information system for identifying a person based on biological material left by persons who were present at the crime scene. It defines the complex of organizational and scientific issues that need to be solved when creating a system, ensuring its information security and software implementation. Also it proposes an algorithm for two-stage searching the information stored in the databases of the ISOD (UDS) services, based on modern data processing methods.


Author(s):  
Ulugbek Yu. Tuliev ◽  
◽  
Musulmon Ya. Lolaev ◽  

Reducing the dimension of the feature space for describing thematic documents is considered. Descriptions of documents are presented in the form of an “object-property” table, for the formation of which thematic dictionaries were developed with a volume of no more than 100 keywords for each subject area. The correctness of the formation of dictionaries is proved in the framework of the problem of the pattern recognition with disjoint classes. Results of the analysis of the topological properties of the feature space by the values of the compactness measures are used as a research tool. The values of the compactness measures are the quantitative estimation of structures in relations between objects for each class and for the sample as a whole. The structure of relationships is investigated through the division of the class objects into disjoint groups. A path always may be created based on binary relation of connectedness between any two objects of a group. The choice of the space for the description of documents is made by solving the problem of conditional optimization using the Lagrange method. The condition for the formation of an ordered sequence of features is determined. Applying of an ordered sequence is considered as a method to reduce the combinatorial complexity of the selection algorithms. When removing uninformative features from the description of documents, the value of the measure of the compactness of the sample reaches its maximum. A visual representation of the complexity of the configuration of groups and the connectivity of objects from their composition is given.


Author(s):  
Mariya V. Vinogradova ◽  
◽  
Aleksei A. Maksakov ◽  
Aleksei E. Samokhvalov ◽  
◽  
...  

For modern information systems for modeling and monitoring the labor resources, as well as to ensure the quality of a special assessment of working conditions, it is necessary to study the impact of the labor intensity and adapt methods for analyzing the non-production losses from temporary disability of employees. The authors supplemented the previously presented mathematical model for non-productive losses of working time from diseases and industrial injuries of workers engaged in dangerous and harmful working conditions with normal and increased intensity. Also, the shortcomings of the automated modeling system based on the flow model, which led to distortion of the research results, were eliminated. The influence of the labor intensity in harmful production conditions on human health is taken into account. The developers conducted experiments with the data of the automated information management system of a construction enterprise, where employees are engaged in the construction of main gas pipelines in various regions of Russia. The practical significance of the research results is formulated: the changes made to the system significantly improve the quality of special assessments of working conditions, regularly conducted at enterprises, as well as the quality of the labor norms setting. The application of the presented modeling system is especially relevant in the context of the coronavirus pandemic, when it is necessary to accurately determine the risk groups of workers.


Sign in / Sign up

Export Citation Format

Share Document