- Research Article
- 10.15622/sp.2020.19.4.4
- Sep 7, 2020
- SPIIRAS Proceedings
- Ivan Stepanyan + 1 more
The given work describes a technology of construction of neural network system of artificial intellect (AI) at a junction of declarative programming and machine training on the basis of modelling of cortical columns. Evolutionary mechanisms, using available material and relatively simple phenomena, have created complex intelligent systems. From this, the authors conclude that AI should also be based on simple but scalable and biofeasible algorithms, in which the stochastic dynamics of cortical neural modules allow to find solutions to of complex problems quickly and efficiently.. Purpose: Algorithmic formalization at the level of replicative neural network complexes - neocortex columns of the brain. Methods: The basic AI module is presented as a specialization and formalization of the concept "Chinese room" introduced by John Earle. The results of experiments on forecasting binary sequences are presented. The computer simulation experiments have shown high efficiency in implementing the proposed algorithms. At the same time, instead of using for each task a carefully selected and adapted separate method with partially equivalent restatement of tasks, the standard unified approach and unified algorithm parameters were used. It is concluded that the results of the experiments show the possibility of effective applied solutions based on the proposed technology. Practical value: the presented technology allows creating self-learning and planning systems.
- Research Article
1
- 10.15622/sp.2020.19.4.6
- Sep 7, 2020
- SPIIRAS Proceedings
- Антон Михайлович Лях
To date, a huge amount of data on organisms diversity has been accumulated. Databases help to store and use these data for scientific purposes. There exists several dozens of databases for storing biodiversity data that were described in publications. Each has an original structure which badly correlates with the structures of other databases. This complicates data exchange and the formation of big biodiversity data array.
 The cause of this situation is the lack of the formal definitions of universal data components, which allow to build the database with any data on the diversity of organisms. The analysis of publications and author’s experience show that such universal components are present in the characteristics of any organisms. For example, it is an organism taxonomic name and a location where it was found. There are six such components and they answer to one of the six questions: what, where, when, who, where from and where to. What determines the name of an organism; where determines the location where it was found; when indicates the date of finding; who enumerates the persons, who found and analyzed an organism; where from refers to publications, where data about an organism are extracted or published; where to shows in which biological collection an organism is put in.
 Each component corresponds to a separate database table. These tables are linked to the table with data about organism (individual) and they are not linked with each other. Attributes of the links between the organism table and the component tables are stored in intermediate tables. They are used, for example, to store bibliographic facts, descriptions of collection items or geographical points. They also act as docking stations to which tables with any other information are attached.
 The creation of any database about the diversity of living organisms begins with the definition of the table of organism specimens. It must be used even if there is no explicit data on organisms. In that case virtual organisms should be introduced and the other components should be linked with them by means of intermediate tables. The latter are docked to other data. Minimal structures of all the tables, links between them and examples of databases construction are described in the work.
- Research Article
5
- 10.15622/sp.2020.19.4.2
- Sep 7, 2020
- SPIIRAS Proceedings
- Mihail Kochetkov + 5 more
Emergency situations, that cause risks for human life and health, dictate elevated requirements to completeness and accuracy of the presentation of information about current ground environment. Modern robotic systems include sensors, that operate on different physical principles. This causes incrementation of information entering control system. Computing resources and technical capabilities of robotic systems are limited in range and detection probabilities of appearing objects. In case of insufficient performance of the on-board computer system and high uncertainties of ground environment, robotic systems are not able to perform without combining information from robotic group and producing a single view of ground environment. Complex information from a group of robotic systems occurs in real time and a non-deterministic environment.
 To solve the problem of identifying attribute vectors related to a single object, as well as to evaluate the effectiveness of obtained solutions, is possible using known formulas of the theory of statistical hypothesis testing and probability theory only under the normal distribution law with the known mathematical expectation of an attribute vector and a correlation matrix. However, these conditions are usually not met in practice. Problems also arise when methods of nonparametric statistics are used with an unknown law of probability distribution.
 The new method of identifying attribute vectors is proposed, that does not rely on a statistical approach and, therefore, does not require knowledge of the type of distribution law and the values of its parameters. Proposed method is based on the idea of combining cluster analysis and fuzzy logic, and is relatively simple to the basic methods of multidimensional nonparametric statistics.
 The results of modeling information processes are presented. The advantages of proposed method are shown. The comparative values for the number of false recognitions are given. The recommendations are given for constructing fuzzy inference rules when creating an expert system knowledge base.
- Research Article
7
- 10.15622/sp.2020.19.2.5
- Apr 23, 2020
- SPIIRAS Proceedings
- Georgi Tsochev + 2 more
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized.
 The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems.
 The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper.
 A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.
- Research Article
1
- 10.15622/sp.2020.19.2.6
- Apr 23, 2020
- SPIIRAS Proceedings
- Ilya Livshitz
The analysis of well-known methods for ensuring IT-security is presented, methods for evaluating security of IT-components and Cloud services in general are considered.
 An attempt to analyze cloud services not from a commercial position of a popular marketing product, but from a position of system analysis is made. The previously introduced procedure for IT-components evaluation is not stable, since the end user has not a 100% guarantee of access to all IT-components, and even more so to the remote and uncontrolled Cloud service. A number of reviews point at increased efforts to create a secure network architecture and ability to continuously monitor deviations from established business goals. In contrast to the Zero Trust and Zero Trust eXtended models, according to which additional security functions are superimposed on existing IT-components, it is proposed to consider the set of IT-components as a new entity – an Information Processing System. This will allow to move to formal processes for assessing the degree of compliance with the criteria of standards for both existing and prospective IT-components while ensuring security of Cloud services.
 A new method for evaluation which is based on the previously developed hybrid methodology using formal procedures based on two systems of criteria - assessment of the degree of compliance of Management systems (based on ISO/IEC 27001 series) and assessment of functional safety requirements (based on IEC 61508 series and ISO/IEC 15408 series) is proposed. This method provides reproducible and objective assessments of security risks of Cloud-based IT‑components that can be presented to an independent group of evaluators for verification. The results obtained can be applied in the independent assessment, including critical information infrastructure objects.
- Research Article
3
- 10.15622/sp.2020.19.1.1
- Feb 11, 2020
- SPIIRAS Proceedings
- Sergei Soldatenko + 2 more
In this paper, from a cybernetic perspective, the human-nature interactions are considered in the context of modern climate change, unprecedented in its scale and rate caused by anthropogenic activity. The developed structure of the “climate-economy” cybernetic system is presented, the weaknesses of the global governance bodies are analysed, and the main causes of the uncertainties in assessing climate change and the economic damage caused by this change are discussed. It is noted that adaptation measures and strategies developed and implemented by governments of different countries and intergovernmental organizations do not eliminate the causes of global warming and, therefore, have limited capacities, since humans and nature can exist only under specified environmental conditions. Going beyond these conditions, due to climate change, can lead to a global biological catastrophe. Climate policy decisions are made under uncertainty due to the ambiguity of estimates of the future climate, which, in turn, is the result of an insufficiently adequate description of feedbacks in the climate system models. Using low-parametric models of the Earth's climate system, the influence of system’s feedbacks on tangible inter-model differences of climate change estimates obtained using modern climate models of a high degree of complexity is illustrated. Since the climate change adaptation measures proposed by experts are not the struggle with causes, but the fight with consequences, we see geoengineering as a radical adaptation strategy. In contrast to previous studies, we consider the problem of purposefully modifying climatic conditions, implemented by geoengineering methods, within the framework of optimal control theory with mathematical formalization of geoengineering objectives and methods for achieving them. In this paper, an example of the formulation and solution of the optimization problem for stabilizing the Earth’s climate through the injection of finely dispersed sulfate aerosol into the stratosphere is presented.
- Research Article
- 10.15622/sp.2020.19.1.6
- Feb 7, 2020
- SPIIRAS Proceedings
- Oleg Karsaev + 2 more
An approach to the dynamic formation (adjustment) of schedules for distributed photogrammetric image processing in a network of ground centers included in the United geographically distributed information system for receiving and processing Earth remote sensing data from space is considered. Having the fullest satisfaction of requirements of consumers to the satellite images of necessary areas, the approach provides the formation of self-organizing B2B enterprises in the specified network providing information, software and hardware resources of the ground-based facilities of various departmental and other accessories for photogrammetric processing of any received images of the area from the the United geographically distributed information system. It is shown, that a search in B2B enterprise nodes and borrowing the required resources will allow ground centers to flexibly scale physical and virtual means of photogrammetric processing of Earth remote sensing data, quickly form their local structural and functional organizations depending on the current properties of the consumer requests flow for receiving Earth remote sensing data in the United geographically distributed information system, characteristics of the flow of terrain survey materials from orbital monitoring tools, and also take into account the visual and measuring properties of images of the area subject to photogrammetric processing. A method for truncating the set of potential performers of the application in accordance with the existing semantic and other restrictions on the composition of the desired set of performers is proposed. Also mechanisms to encourage ground centers to provide idle resources to B2B enterprise nodes are proposed. They are based on the possibility of receiving monetary or other remuneration from a ground center for participating in distributed application servicing. The development of a well-known model of a self-organizing B2B enterprise creates conditions for a more efficient organization of servicing the flow of applications in the United geographically distributed information system by attracting unused software, information and hardware resources of ground centers of various departmental affiliations.
- Research Article
- 10.15622/sp.2020.19.1.8
- Feb 7, 2020
- SPIIRAS Proceedings
- Д.в Ефанов + 1 more
A method for streamlining state partitioning procedures with two and three outcomes is considered. A terminology and methods of the questionnaire theory were used, and the sequence of partitioning procedures itself was defined as a heterogeneous questionnaire with questions having two or three answers. This class of questionnaires is special and is defined by the authors as a class of binary-ternary questionnaires. This is the simplest class of heterogeneous questionnaires. An increase in number of answers to a question in practice can give an advantage in parameters of the questionnaires, including in the indicator of its effectiveness – the average implementation cost. It is noted that the use of binary-ternary questionnaires in practice can reduce the average time for identifying events on a questionnaire, which is extremely important in those applications of questionnaires in which there is a time limit for identifying events, for example, in critical application systems. A method for optimizing binary-ternary questionnaires is presented, based on the search for the most preferred questions for each subset of identifiable events. The choice of preferred questions is based on establishing a comparison relationship between them. The article describes all possible types of comparison relations between two questions with two answers, two questions with three answers, and also between a question with two answers and a question with three answers. An example of obtaining a mathematical expression for a function that characterizes the preference of questions over each other, as well as a generalized formula for choosing the most preferred question for any heterogeneous questionnaires is given. An algorithm has been formed for the method of ordering questions, which allows one to construct a binary-ternary questionnaire with the lowest implementation cost in polynomial time. An example of a binary-ternary questionnaire optimization by the presented method is given.
- Research Article
- 10.15622/sp.2019.18.6.1462-1490
- Nov 29, 2019
- SPIIRAS Proceedings
- Evgeniy Minakov + 3 more
A development of work to combat the asteroid hazard requires construction and study of areas of outer space in which moving spacecraft-interceptors can affect asteroids. In this paper, such areas are called attack lines, the spatio-temporal characteristics of which depend on the parameters of the asteroid’s orbits and the phase coordinates of the nodal points. At these points the trajectory intersects the asteroids and the orbital planes of the spacecraft-interceptors. In the case of the impact of spacecraft-interceptors on asteroids at nodal points, the study of the spatio-temporal characteristics of the lines of attack, taking into account restrictions on the relative speeds between asteroids and spacecraft-interceptors, is of particular importance. Building and analyzing the corresponding zones of reverse reach are suggested.
 In the article, the developed models include a simulation model, using which random angles between the projections of the velocity vectors of asteroids on a plane of the orbits of spacecraft-interceptors and the current directions on the hodographs of their velocity vectors at nodal points, as well as an analytical model for estimating the spatio-temporal characteristics of boundaries are simulated attacks of asteroids, including: the radii of their external and internal boundaries for certain values of the latitude arguments and arrival time of spacecraft-interceptors at modal points.
 Testing these models and the corresponding characteristics of the attack lines were carries out during computational experiments on two cyclic modeling of the angles between the projections of the velocity vectors of asteroids on the plane of the orbits of interceptor spacecraft and the current directions on the hodographs of their velocity vectors at nodal points. The results obtained made it possible to verify and validate the developed models, on the basis of which a conclusion was drawn about the required degree of their applicability. In the paper also a procedure for estimating the parameters of attack lines, depending on the values of the arguments of the latitudes of interceptor spacecraft and their altitudes above the Earth's surface is proposed. At the same time, an approach is substantiated for estimating the spatio-temporal characteristics of the boundaries of attack of asteroids by spacecraft-interceptors for any inside the planar parameters of their orbits.
- Research Article
3
- 10.15622/sp.2019.18.6.1269-1300
- Nov 29, 2019
- SPIIRAS Proceedings
- Yuri Yazov + 3 more
Traditional approaches to assessing the effectiveness of information security, based on a comparison of the possibilities of realizing threats to information security in absence and application of protection measures, do not allow to analyze the dynamics of suppression by security measures of the process of implementing threats. The paper proposes a new indicator of the effectiveness of protection of electronic documents, aimed at assessing the possibility of advancing security measures of the process of implementing threats in electronic document management systems using the probability-time characteristics of the dynamics of the application of protection measures and the implementation of threats to electronic documents. Mathematical models were developed using the Petri-Markov network apparatus and analytical relationships were obtained for calculating the proposed indicator using the example of the "traffic tunneling" threat (placing intruder packets in trusted user packets) and unauthorized access (network attacks) to electronic documents, as well as the threat of intrusion of malicious program by carrying out an "blind IP spoofing" attack (network address spoofing). Examples of calculating the proposed indicator and graphs of its dependence on the probability of detecting network attacks by the intrusion detection system and on the probability of malware detection by the anti-virus protection system are given. Quantitative dependencies are obtained for the effectiveness of protection of electronic documents due to being ahead of protection measures for threat realization processes, both on the probability of detecting an intrusion or the probability of detecting a malicious program, and on the ratio of the time spent by the protection system on detecting an attempt to implement a threat and taking measures to curb its implementation, and threat implementation time. Models allow not only to evaluate the effectiveness of measures to protect electronic documents from threats of destruction, copying, unauthorized changes, etc., but also to quantify the requirements for the response time of adaptive security systems to detectable actions aimed at violating the security of electronic documents, depending on the probability -temporal characteristics of threat realization processes, to identify weaknesses in protection systems related to the dynamics of threat realization and the reaction of defense systems to such threats electronic document.