Preview

Informatics

Advanced search
No 1 (2015)
View or download the full issue PDF (Russian)

INFORMATION TECHNOLOGY 

113-120 881
Abstract

An overview of modern directions of research in the field of chaotic dynamics is provided. The results of the research can be used for the control of mobile robots. There are such directions of research as stabilization of nonlinear dynamical systems with chaotic dynamics, generation of chaotic vibrations and their applications in information processing. The tasks of mobile robots control that allow to increase functionality and autonomy of robots operating in non-deterministic environment are formulated.

MATHEMATICAL MODELING 

45-55 761
Abstract

Multiserver queuing system with an infinite buffer and impatient customers, operating in a random environment is investigated. Customers arrive to the system according to the Markovian arrival flow. Service time of a customer has a phase type distribution. During the waiting time in the buffer customers can be impatient and leave the system forever. The system parameters depend on the state of the random environment. The ergodicity condition is derived. The formulas for calculating the main performance measures of the system are obtained. The Laplace-Stieltjes transforms of waiting and sojourn times of a customer in the system are calculated.

56-63 883
Abstract

Thermal 3-D model of a rural area building is proposed. The model includes constructive, finite element, analytical and computational models which are created using SolidWorks software (constructive model) and COMSOL Multiphysics software (finite element, analytical and computational models). An additional object was created for modeling heat transfer process in the whole volume of building. Studies have shown model efficiency and possibility of its application for optimizing building isolation.

64-72 672
Abstract

There is a conjecture that for any dense schedule in the problem Om||Cmax the makespan is at
most (2− 1/m) times the makespan of the optimal schedule, where “m” is the number of machines. In the paper the conjecture is proved for m ≤ 9 аnd some other special cases.

73-79 764
Abstract

A numerical model of non-isothermal moisture transfer in soil is developed and adapted for used media. An SPS software module which allows carrying out long-term forecasting for the solution of three-dimensional non-isothermal heat and moisture transfer of contaminants in soil is developed.

80-89 928
Abstract

The problem under consideration is to reduce the area of the layout of regular VLSI structures by means of their multiple folding. The method of solving the key problem of multiple folding, which is implementability checking of the folding set, is suggested. The method is based on the task reduction to solving a logic equation and checking Boolean satisfiability of a conjunctive normal form.

SIGNAL, IMAGE, SPEECH, TEXT PROCESSING AND PATTERN RECOGNITION 

8-16 847
Abstract

The problem of the synthesis of linear combined filter for the criterion of minimizing current losses on the basis of the recursive least squares method is being solved. This approach does not require
a priori knowledge of the statistical characteristics of impacts that is an advantage compared with the Kalman filter. A comparative evaluation of the filters’ accuracy is provided using the values of variances of the filtering errors.

17-25 705
Abstract

The paper proposes using fuzzy integrals for merging classifier decisions in speaker recognition
systems. Instantaneous frequency and instantaneous amplitude are considered as the set of features. The approach shows significantly better results than a single classifier. A comparison of the proposed approach with the other methods for merging classifier decisions is provided.

26-38 988
Abstract

Features of biometric access control system design for control people's access to certain facilities
are described. Basic algorithms for fingerprint processing and analysis are given in details. Construction schemes of three variants of an access control system are presented.

39-44 852
Abstract

An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. A high level architecture is shown, where Data Mining algorithms are considered as functional elements and a general or specialized co-processor as an accelerator for computer performance. An accent has been made on the necessity to provide compatibility of the librarian algorithms and the architecture of the parallel co-processor. The technique for correct comparative evaluation of the alternative hardware platforms in the framework of the proposed approach is presented.

INFORMATION PROTECTION AND SYSTEM RELIABILITY 

90-101 1944
Abstract

Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on cipher text and to obtain an encrypted result which matches the result of operations performed on the plain text. The article presents a basic concept of the homomorphic encryption and various encryption algorithms in accordance with the fundamental properties of the homomorphic encryption. The examples of various principles and properties of homomorphic encryption, some homomorphic algorithms using asymmetric key systems such as RSA, ElGamal, Paillier algorithms as well as various homomorphic encryption schemes are given. Prospects of homomorphic encryption application in the field of secure cloud computing, electronic voting, cipher text searching, encrypted mail filtering, mobile cipher and secure feedback systems are considered.

102-112 755
Abstract

Application of watermarking technology for the protection of digital devices and their descriptions
is considered. Primary definitions, models, categories of attacks, characteristics and classification
of watermarks are described. Hardware watermarking examples are shown.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1816-0301 (Print)
ISSN 2617-6963 (Online)