Showing 1 to 10 of 1072 matching Articles
Results per page:
Export (CSV)
By
Osipov, P. A.; Aleksejeva, L. Ya.; Borisov, A. N.; Chizhov, Yu. A.; Zmanovska, T. P.; Zabiniako, V. M.
Show all (6)
The present paper discusses various aspects of embedding the intrusion detection system based on the personal adaptive behavior profile into the existing complex information system. The paper proposes the classification of types of access to the target information infrastructure in order to assess the feasibility of the established system integration. The criteria for evaluating the effectiveness of the implementation of the established system are also described. A method for calculating the dynamic threshold level of abnormality is proposed in the present research. The paper also considers a technique of adjusting the sensitivity of the system in case of abnormal user behavior. The paper describes the approach used for system scaling in case of an increase in the intensity of the incoming requests.
more …
By
Melikov, A. Z.; Nagiev, F. N.; Kaziev, T. S.
Models of multirate systems in which inelastic and elastic calls (ie-calls and e-calls, respectively) are jointly serviced are investigated. It is assumed that through the entire service period the iecalls simultaneously occupy b ≥ 1 channels of the system, moreover, all the channels begin and complete servicing of the same ie-call simultaneously. The elastic calls simultaneously occupy m channels, m ≤ m ≤
$$\bar m$$
, where m and
$$\bar m$$
are specified quantities, with the service rate being proportional to the number of channels busy servicing e-calls. Models with continuous and discrete band for servicing e-calls are investigated in detail. Effective numerical algorithms for calculating the characteristics of the models are developed and results of computational experiments are presented.
more …
By
Gorchakova, E. V.
The dynamics of a system that describes the interaction between two similar species are studied. A normal form that is reduced to a normal form of the system of diffused weakly connected Hutchinson equations is constructed.
By
Kol’chugina, E. A.
This article considers a problem of securing the coexistence of predator and prey species under the conditions of the closed artificial world of digital organisms. A new scheme of relations is proposed between digital organism species, in which the predator eliminates only a prey species progeny at a larval stage. It is shown that in this case, long-term coexistence between the predator and the prey is possible. The results are necessary for creating software systems with distributed artificial intelligence, that are capable of self-management and self-organization.
more …
By
Liu, Yunchang; Li, Chunlin; Li, Layuan
Recently, Multimedia cloud is emerging as a promising technology to effectively process multimedia services. A key problem in multimedia cloud is how to deal with task scheduling and load balancing to satisfy the quality of service demands of users. In this paper, we propose a two levels task scheduling mechanism for multimedia cloud to addresses the problem. The first level scheduling is from the users’ multimedia application to the data centers, and the second is from the data centers to servers. The data centers and virtual machines both are modeled as M/M/1 queuing systems. The algorithm proposed formulates the task-scheduling problem as cooperative game among data centers. Then we allocate the tasks received by a data center to servers using cooperative game again among servers. Various simulations are conducted to validate the efficiency of the proposed task scheduling approaches. The results showed that the proposed solutions provided better performance as compared to the existing approaches.
more …
By
Feyziyev, F. G.; Babavand, A. M.
A description of the decoding of cyclic codes in the class of sequential machines based on the Meggitt theorem is considered. Formulas for the description of the logic of the detection and correction of errors in cyclic codes are proposed.
By
Xiong Zhang; Shangguan, Hong; Ning, Aiping; Wang, Anhong; Zhang, Jiao; Peng, Sichun
Show all (6)
The existing pedestrian detection algorithms are not robust in the case of noise, obstruction and illumination change. To solve the problem, we propose a pedestrian detection algorithm combining the edge features of color image with the features of Histogram of Oriented Gradient on Depth image (referred to as the HOD features). The algorithm describes overall structural features of pedestrians by using shearlet transform to extract their edge features from color images, and obtains local edge features of corresponding depth images by generating HOD features. The overall structural features and local edge features are combined to form new feature descriptors to train a SVM (support vector machine) classifier. Due to the full integration of the two types of features, the algorithm shows significant advantages in pedestrian detection in the case of interfering factors such as noise, obstruction, illumination, and similar colors. The experimental results show that the detection accuracy rate of this algorithm is 15% higher than that of other algorithms when the false-positive rate is 0.1.
more …
By
Poltavtseva, M. A.; Zegzhda, D. P.; Kalinin, M. O.
Abstract—
The article considers the concept and features of Big Data management systems and their differences from traditional DBMS’s. The authors describe changes in the intruder model and new vulnerabilities in data management systems. A new threat model is developed. The article presents new problems of information security in a distributed Big Data processing and storage system.
more …
By
Petrov, M.; Gagarski, K.; Belyaev, M.; Itsykson, V.
Show all (4)
Automated test generation has received a lot of attention in recent decades, because it is one possible solution to the problems inherent to software testing: the need to write tests in the first place and providing test coverage for the human factor. De facto the most promising technique to automatically generate a test is dynamic symbolic execution assisted by an automated constraint solver, e.g., an SMT solver. This process is very similar to bounded model checking, which also deals with generating models from source code, asserting logic properties in it, and processing the returned model. This paper describes a prototype unit test generator for C based on a working bounded model checker called Borealis and shows that these two techniques are very similar and can be easily implemented using the same basic components. The prototype test generator has been evaluated on a number of examples and has shown good results in terms of test coverage and test excessiveness.
more …
By
Taheri-Kalani, Jafar; Zarei, NadAli
This paper addresses an adaptive method for designing a sensorless trajectory tracking control scheme for a wheeled mobile robot. In order to reduce the cost of the robot, a new Nonlinear Observer (NOB) is used to leave out velocity sensors in the robot. Also, an adaptive model reference technique is used for designing the dynamic controller. In order to ensure the implementability of proposed controller, dynamic controller and nonlinear observer are designed in the presence of uncertainties. In addition, the Observer-based Kinematic Controller (OKC) is designed in the presence of sliding velocity. In order to improve the performance of the kinematic controller, sliding velocity is estimated and used for modification of kinematic controller. Finally, the effectiveness of the proposed method is demonstrated by simulations.
more …
-