System analysis
In connection with the increase of information confrontation leading States you need to substantiate the possibility to predict real conflicts, including military, observing the information flows generated by media information. Besides the analysis of the results obtained in monitoring the flow of information requires a mathematical evaluation of the studied processes in the information field and forming conclusions on prospects of development of these information flows. Approach to the solution of this problem is given in the article.
The main difficulty in processing information messages, provided to the media for any thematic focus are their almost unlimited quantities. Currently, there are various search engines, allowing for a specific set of keywords you specify any search depth informational messages, surveys, analytic studies for hyperlinks. However, redraft the proposed huge volumes of Internet information resources and to issue its own version requires time-consuming, sometimes not commensurate with the urgency of the generated document. As a result on the Internet is taken, as a rule, ready to stamp the appropriate under preference analytics produces an information document, which suffers from objectivity in the conclusions and assessments.
A method for determining the size of a population is proposed. The general approach for determining the size of a population follows from the statement that the chromosomes of a population must contain the maximum number of different values that cover most of the search area. The method is based on the regression model, which allows you to determine the size of the population, depending on the permissible number of values of the independent variable. The regression model is obtained as a result of processing simulation data in the formation of a population for a single-variable objective function. The problem is solved for a genetic algorithm, where the genotype is represented by a chromosome in binary code, and the phenotype by a decimal integer code of values of independent variables. This allows you to model the formation of a population without reference to specific values of variables. The model was obtained for the power range of the reference sets from 12 to 52, and allows to predict the size of the population beyond the limits of this range. The main area of use of this method is discrete optimization problems with objective functions of several variables, where the ranges of admissible values are finite and have a small dimension.
Management of technical objects
The detection and recognition of sub-surface buried objects, such landmines, with variable characteristics may be extremely difficult. Infrared (IR) thermography, which is widely employed in the detection of discontinuities in materials and structures, would be in principle suitable also for this kind of application. The issue in this case appears to be the presence of excessive levels of background noise, whose modelling is difficult, in that it results from a number of factors e.g., moisture content, presence of vegetation, and variation of solar radiation at topsoil level. In recent years, a number of studies have tried to overcome these limitations and improve the reliability of this method, using filtering and automatic pattern recognition techniques, specific for the detection of buried objects. This work is aimed at revising and commenting the most recent experiences in this application of IR thermography. The article considers the possibility of using an IR thermal imaging camera attached to a multifunctional quadrocopter in order to improve the reliability of detection of ground and buried explosive objects.
Data processing and decision–making
This article focuses on selecting the best quality image from the series without the reference image. The results of studies of a new approach to digital image quality assessment, based on the local quality estimates distribution, are presented. One of the parameters of such a distribution is proposed to be used as a measure of image quality. 16 quality measures of the images described in the scientific literature have been selected. It is shown that the scale parameter of the Weibull distribution is a more accurate global quality measure for the set of local estimates than the mean value. A number of experiments have been carried out to confirm the correctness of such an estimate and its correlation with visual estimates of image quality. Such estimates are very important for a) quality assessment of automatically generated photographs, b) selection of parameters for enhancement-oriented image transformations, such as brightness changes, compression of the dynamic range of brightness, conversion to the grayscale representation, and others.
The verification results of the computer simulation model for calculation of aerodynamic characteristics of bluff bodies (cone with different apex angles and a «cone–cylinder» body) moving in air at different Mach number and zero angle of attack are presented. It is shown that numerical simulation results fairly agree with physical experiment data.
The algorithm of detection of direct contour lines base on euclidean form factor is presented. The essence of the algorithm is the detection of direct contour lines as a result of a comparison with unity of the value of the euclidean form factor, taking into account the sum of the euclidean distances between neighbors pixels forming the contour line, when its length is calculate. The developed algorithm makes it possible to increase the stability of the allocation of lines and the speed of response in comparison with the Hough algorithm is show.
Information security
The article focused on recommendations for the local network protection from unauthorized access of employees (insider attacks) on the basis of access control, using the basic settings of existing equipment. The use of MAC-based access profiles (MAC-based Access Control) is proposed. The problems of information security at the physical and channel levels, as well as the most common types of attacks are considered. For research purposes, a mockup of a typical local area network was created, including personal computers, ZTE ZXHN H208N modem with support WiFi-access point and the switch DES-1210-52, which connected these devices to the network.
Made contact connection to the twisted-pair with clips on the lines Tx and Rx. Kali Linux, tcpdump, bettercap, Wireshark are using as a tools for penetration testing. The network attacks ARP-spoofing with the basic settings of network equipment is discussed. The results of the attack and passive study of the network model are presented. The attack was repeated after activation and configuration IP-MAC-Port Binding, as well as authentication of users based on IEEE 802.1 X standard (MACBased 802.1 X). The results proved the effectiveness of the chosen protective actions.
Information technologies in education
Thanks to the development of computer technologies, information and technical means give positive results in the educational process. The created training complexes of the studied material increase the quality of its perception. The article considers the use of computer graphics on the example of creating an electronic multimedia complex of an interactive nature. The multimedia complex realizes three basic principles of multimedia: the presentation of information through a combination of many perceived environments; presence of several storylines in the content of the product; Artistic design of the interface and navigation tools. We used an HTML-based shell plus JavaScrip and a collection of multimedia work – Adobe Flash plus ActionScript.
The article is devoted to the development of a new generation curriculum for the IT profession. The requirements of leading IT companies and international standards were analyzed to determine the composition of the core competencies. A model for the training of a software engineer in the form of a graph of the formation of competencies is proposed. The model makes it possible to determine the trajectory and labor intensity of forming competencies, and also to optimize the curriculum of the specialty.
The article describes the role of additive technologies in the development of innovative thinking among students, spheres of use of 3D-printers and prototypes created by means of 3D technology. It is specified that additive technologies allow to accelerate operations on design and prototyping considerably, allow students to estimate results of their research, to increase interest in learning, to change methods of presentation of their research for protection. The article presents the most perspective and available for use in education technologies. The FDM technology being the most available prints using the plastic thread melted in a thermohead, but has rather low resolution depending on the speed of plotting of layers. The SLA technology becoming more available to a wide circle of users lately uses photopolymeric resins for printing, has high accuracy and speed of printing that allows to create small and high-precision details and to imitate different materials. The article mentions the active use of 3D-printers in foreign training centers. It describes the creation of the own 3D-printer in Belarusian National Technical University, the creation of laboratory of computer simulation and rapid prototyping in Polotsk State University, the use of 3D-printers in Belarusian State Technological University, Belarusian State University, Belarusian State University of Informatics and Radioelectronics, Brest State Technological University. The positive impact from implementation of additive technologies in educational and R&D life of higher education institutions of Belarus and need of their wide use for educational process is specified. The article points that use of additive technologies at universities will change a mentality of students, their approach to study and creation of new ideas.
ISSN 2414-0481 (Online)