卷 23, 编号 2 (2024)

Mathematical modeling and applied mathematics

Prioritized Retrial Queueing Systems with Randomized Push-Out Mechanism

Zayats O., Korenevskaya M., Ilyashenko A., Muliukha V.

摘要

The article is focused on a single-channel preemptive queuing system. Two stationary Poisson flows of customers are incoming to the system. The first flow has an absolute priority over the second one: a new high-priority customer from the first flow displaces a low-priority one from the service channel and takes its place. The capacity of the system is limited to k customers. There is a probabilistic push-out mechanism in the system: if a new high-priority customer finds that all the places in the queue are occupied, then it has the right to displace one low-priority customer from the queue with probability a. Both types of customers have the same exponentially distributed service times. Customers who failed to enter the system due to the limited size of the queue, as well as those expelled from the queue or service channel when the push-out mechanism is triggered, are not lost immediately, but they are sent to a special part of the system called the orbit and designed to store repeated customers. In orbit, there are two separate unlimited queues, consisting of low-priority and high-priority repeated customers, respectively. If there are no free places in the system, new customers with a probability q are added to the corresponding orbital queue. The waiting time of repeated customers in orbit is distributed according to an exponential law. The parameter of this law may differ for different types of customers. After waiting in orbit, secondary customers try to re-enter the system. The probabilistic characteristics of the described queuing system are calculated by the method of generating functions, previously proposed by the authors for calculating a similar system without repeated customers. This method allows finding the main probabilistic characteristics of distributions for both types of customers. Particular attention is paid to the study of the dependence of the loss probabilities for both types of customers on the parameters of the system, primarily on the push-out probability a, the capacity of the system k, and the probability of repeated circulation (probability of persistence) q. It is shown that the effect of blocking the system and the effect of the linear law of customers’ losses, previously identified in similar problems without repeated customers, remain valid even in the presence of secondary repeated customers. The theoretical results are proved by numerical calculations. The blocking area for the second type of customers was calculated along with the area of linear loss law for both types of customers. We studied the influence of the probability of repeated circulation q on the shape of these areas and on the dependence of the loss probabilities for both types of customers on the push-out probability a.
Informatics and Automation. 2024;23(2):325-351
pages 325-351 views

Statistical Substantiation of the Revising of Readings by the CityAir Station of PM2.5 Concentration Levels in the Atmospheric Boundary Layer of the City

Karepova E., Petrakova V.

摘要

As a marker characterizing air pollution in the surface layer of the atmosphere of modern cities, the concentration level of particulate matter with a diameter of 2.5 microns or less (Particulate Matter, PM2.5) is often used. The paper discusses the practice of using a relatively cheap optical sensor, which is part of the CityAir station, to measure the concentration of PM2.5 in an urban environment. The article proposes a statistically justified correction of the primary data obtained by CityAir stations on the values of the concentration of suspended particles PM2.5 in the surface layer of the atmosphere of Krasnoyarsk. For the construction of regression models, measurements obtained from E-BAM analyzers located at the same observation posts as the corrected sensors were considered as a reference. For the analysis, primary data was used 1) from 9 automated observation posts of the regional departmental information and analytical system of data on the state of the environment of the Krasnoyarsk Territory (KVIAS); 2) from the 21st CityAir station of the monitoring system of the Krasnoyarsk Scientific Center of the Siberian Branch of the Russian Academy of Sciences. The paper demonstrates that when correcting sensor readings, it is necessary to take into account meteorological indicators. In addition, it is shown that the regression coefficients significantly depend on the season. Supervised learning methods are compared for solving the problem of correcting the readings of inexpensive sensors. Additional information on the results of data analysis, which was not included in the text of the article, is available on the electronic resource https://asm.krasn.ru/.
Informatics and Automation. 2024;23(2):352-376
pages 352-376 views

Towards Automated and Optimal IIoT Design

Ebraheem A., Ivanov I.

摘要

In today’s world, the Internet of Things has become an integral part of our lives. The increasing number of intelligent devices and their pervasiveness has made it challenging for developers and system architects to plan and implement systems of Internet of Things and Industrial Internet of Things effectively. The primary objective of this work is to automate the design process of Industrial Internet of Things systems while optimizing the quality of service parameters, battery life, and cost. To achieve this goal, a general four-layer fog-computing model based on mathematical sets, constraints, and objective functions is introduced. This model takes into consideration the various parameters that affect the performance of the system, such as network latency, bandwidth, and power consumption. The Non-dominated Sorting Genetic Algorithm II is employed to find Pareto optimal solutions, while the Technique for Order of Preference by Similarity to Ideal Solution is used to identify compromise solutions on the Pareto front. The optimal solutions generated by this approach represent servers, communication links, and gateways whose information is stored in a database. These resources are chosen based on their ability to enhance the overall performance of the system. The proposed strategy follows a three-stage approach to minimize the dimensionality and reduce dependencies while exploring the search space. Additionally, the convergence of optimization algorithms is improved by using a biased initial population that exploits existing knowledge about how the solution should look. The algorithms used to generate this initial biased population are described in detail. To illustrate the effectiveness of this automated design strategy, an example of its application is presented.

Informatics and Automation. 2024;23(2):377-406
pages 377-406 views

Image Warping and Its Application for Data Augmentation when Training Deep Neural Networks

Sirota A., Akimov A., Otyrba R.

摘要

The paper focuses on the improvement of the quality of learning for deep neural networks for a small data set in a classification task. One of the possible approaches to improve the quality of learning is researched which is based on the use of data augmentation (artificial reproduction of the data set) by image warping. The presented mathematical model and fast algorithm for warping make it possible to transform the original image while preserving its structural basis. The proposed algorithm is used to augment image data sets containing a small number of training samples. The augmentation consists of two stages including horizontal mirroring and warping of each of the samples. The effectiveness of such augmentation is tested through the training of neural networks of various types: convolutional neural networks (CNN) of a standard architecture and deep residual networks (DRN). A specific feature of the implemented approach for the solution of the problem under consideration consists in the refusal to use pre-trained neural networks with a large number of layers as well as further transfer learning, since their application incurs costs in terms of the computational resources. The paper shows that the efficiency of image classification when implementing the proposed method of augmenting training data on small and medium-sized data sets increases to statistically significant values of the metric used.
Informatics and Automation. 2024;23(2):407-435
pages 407-435 views

Artificial intelligence, knowledge and data engineering

A Review Work: Human Action Recognition in Video Surveillance Using Deep Learning Techniques

Sujata Gupta N., Ramya K., Karnati R.

摘要

Despite being extensively used in numerous uses, precise and effective human activity identification continues to be an interesting research issue in the area of vision for computers. Currently, a lot of investigation is being done on themes like pedestrian activity recognition and ways to recognize people's movements employing depth data, 3D skeletal data, still picture data, or strategies that utilize spatiotemporal interest points. This study aims to investigate and evaluate DL approaches for detecting human activity in video. The focus has been on multiple structures for detecting human activities that use DL as their primary strategy. Based on the application, including identifying faces, emotion identification, action identification, and anomaly identification, the human occurrence forecasts are divided into four different subcategories. The literature has been carried several research based on these recognitions for predicting human behavior and activity for video surveillance applications. The state of the art of four different applications' DL techniques is contrasted. This paper also presents the application areas, scientific issues, and potential goals in the field of DL-based human behavior and activity recognition/detection.

Informatics and Automation. 2024;23(2):436-466
pages 436-466 views

Algorithm for Optimization of Keyword Extraction Based on the Application of a Linguistic Parser

Kravchenko D., Kravchenko Y., Mansour A., Mohammad J., Pavlov N.

摘要

This article presents an analytical comparison between constituency parsing and dependency parsing – two types of parsing used in the field of natural language processing (NLP). The study introduces an algorithm to enhance keyword extraction, employing the noun phrase extraction feature of the parser to filter out unsuitable phrases. This algorithm is implemented using three different parsers: Spacy, AllenNLP and Stazna. The effectiveness of this algorithm was compared with two popular methods (Yake, Rake) on a dataset of English texts. Experimental results show that the proposed algorithm with the SpaCy parser is superior to other keyword extraction algorithms in terms of accuracy and speed. For the AllenNLP and Stanza parsers, our algorithm is also more accurate, but requires much longer execution time. The results obtained allow us to evaluate in more detail the advantages and disadvantages of the parsers studied in the work, as well as to determine directions for further research. The running time of the SpaCy parser is significantly less than the other two parsers because parsers that use transitions for deterministic or machine-learned set of actions to build the dependency tree step by step. They are typically faster and require less memory than graph-based parsers, making them more efficient for parsing large amounts of text. On the other hand, AllenNLP and Stanza use graph-based parsing models that rely on millions of features, which limits their ability to generalize and slows down the speed of analysis compared to transition-based parsers. The task of achieving a balance between the accuracy and speed of a linguistic parser is an open topic that requires further research due to the importance of this problem for improving the efficiency of text analysis, especially in applications that require real-time accuracy. To this end, the authors plan to conduct further research into possible solutions to achieve this balance.
Informatics and Automation. 2024;23(2):467-494
pages 467-494 views

H-Detect: an Algorithm for Early Detection of Hydrocephalus

Baloni D., Rai D., Sivagaminathan P., Anandaram H., Thapliyal M., Joshi K.

摘要

Hydrocephalus is a central nervous system disorder which most commonly affects infants and toddlers. It starts as an abnormal build-up of cerebrospinal fluid in the ventricular system of the brain. Hence, early diagnosis becomes vital, which may be performed by Computed Tomography (CT), one of the most effective diagnostic methods for diagnosing Hydrocephalus (CT), where the enlarged ventricular system becomes apparent. However, most disease progression assessments rely on the radiologist's evaluation and physical measures, which are subjective, time-consuming, and inaccurate. This paper develops an automatic prediction utilizing the H-detect framework for enhanced accurate hydrocephalus prediction. This paper uses a pre-processing step to normalize the input image and remove unwanted noises, which can help extract valuable features easily. The feature extraction is done by segmenting the image based on edge detection using triangular fuzzy rules. Thereby, the exact information on the nature of CSF inside the brain is highlighted. These segmented images are saved and again given to the CatBoost algorithm. The Categorical feature processing allows for quicker training. When necessary, the overfitting detector will stop model training and thus efficiently predicts Hydrocephalus. The outcomes demonstrate that the new H-detect strategy outperforms the traditional approaches.

Informatics and Automation. 2024;23(2):495-520
pages 495-520 views

Intelligent Eye Gaze Localization Method Based on EEG Analysis Using Wearable Headband

Romaniuk V., Kashevnik A.

摘要

In the rapidly evolving digital age, human-machine interface technologies are continuously being improved. Traditional methods of computer interaction, such as a mouse and a keyboard, are being supplemented and even replaced by more intuitive methods, including eye-tracking technologies. Conventional eye-tracking methods utilize cameras to monitor the direction of gaze but have their limitations. An alternative and promising approach for eye-tracking involves the use of electroencephalography, a technique for measuring brain activity. Historically, EEG was primarily limited to laboratory conditions. However, mobile and accessible EEG devices are entering the market, offering a more versatile and effective means of recording bioelectric potentials. This paper introduces a gaze localization method using EEG obtained from a mobile EEG recorder in the form of a wearable headband (provided by BrainBit). The study aims to decode neural patterns associated with different gaze directions using advanced machine learning methods, particularly neural networks. Pattern recognition is performed using both ground truth data collected from wearable camera-based eye-tracking glasses and unlabeled data. The results obtained in this research demonstrate a relationship between eye movement and EEG, which can be described and recognized through a predictive model. This integration of mobile EEG technology with eye-tracking methods offers a portable and convenient solution that can be applied in various fields, including medical research and the development of more intuitive computer interfaces.

Informatics and Automation. 2024;23(2):521-541
pages 521-541 views

Information Security Risk Assessment in Industry Information System Based on Fuzzy Set Theory and Artificial Neural Network

Asfha A., Vaish A.

摘要

Information security risk assessment is a crucial component of industrial management techniques that aids in identifying, quantifying, and evaluating risks in comparison to criteria for risk acceptance and organizationally pertinent objectives. Due to its capacity to combine several parameters to determine an overall risk, the traditional fuzzy-rule-based risk assessment technique has been used in numerous industries. The technique has a drawback because it is used in situations where there are several parameters that need to be evaluated, and each parameter is expressed by a different set of linguistic phrases. In this paper, fuzzy set theory and an artificial neural network (ANN) risk prediction model that can solve the issue at hand are provided. Also developed is an algorithm that may change the risk-related factors and the overall risk level from a fuzzy property to a crisp-valued attribute is developed. The system was trained by using twelve samples representing 70%, 15%, and 15% of the dataset for training, testing, and validation, respectively. In addition, a stepwise regression model has also been designed, and its results are compared with the results of ANN. In terms of overall efficiency, the ANN model (R2= 0.99981, RMSE=0.00288, and MSE=0.00001,) performed better, though both models are satisfactory enough. It is concluded that a risk-predicting ANN model can produce accurate results as long as the training data accounts for all conceivable conditions.

Informatics and Automation. 2024;23(2):542-571
pages 542-571 views

The Concept of Processing, Analysis and Visualization of Geophysical Data Based on Elements of Tensor Calculus

Vorobeva G., Vorobev A., Orlov G.

摘要

One of the main approaches to processing, analysis and visualization of geophysical data is the use of geographic information systems and technologies, which is due to their geospatial reference. At the same time, the complexity of presenting geophysical data is associated with their complex structure, which involves many components that have the same geospatial reference. Vivid examples of data of such a structure and format are gravitational and geomagnetic fields, which in the general case are specified by three and four-component vectors with multidirectional coordinate axes. At the same time, today there are no solutions that allow visualizing these data in a complex without decomposing them into individual scalar values, which, in turn, can be presented in the form of one or many spatial layers. In this regard, the work proposes a concept that uses elements of tensor calculus for processing, storing and visualizing information of this format. In particular, a mechanism for tensor representation of field components has been formalized with the possibility of combining it with other data of the same format, on the one hand, and convolution when combined with data of a lower rank. Using the example of a hybrid relational-hierarchical data model, a mechanism for storing information on tensor fields is proposed, which provides for the possibility of describing and subsequently applying transformation instructions when transitioning between different coordinate systems. The paper discusses the use of this approach in the transition from the Cartesian to the spherical coordinate system when representing the parameters of the geomagnetic field. For complex visualization of tensor field parameters, an approach based on the use of tensor glyphs is proposed. The latter are superellipses with axes corresponding to the rank of the tensor. In this case, the attribute values themselves are proposed to be visualized relative to the corresponding axes of the graphic primitive in such a way that the data distribution can be specified by varying the gradient of the corresponding monochrome representation of the parameter along the corresponding axis. The performance of the proposed concept was investigated during a comparative analysis of the tensor approach with known solutions based on the scalar decomposition of the corresponding complex values with their subsequent representation in the form of one or many spatial layers. The analysis showed that the use of the proposed approach will significantly increase the visibility of the generated geospatial image without the need for complex overlapping of spatial layers.
Informatics and Automation. 2024;23(2):572-604
pages 572-604 views

Согласие на обработку персональных данных с помощью сервиса «Яндекс.Метрика»

1. Я (далее – «Пользователь» или «Субъект персональных данных»), осуществляя использование сайта https://journals.rcsi.science/ (далее – «Сайт»), подтверждая свою полную дееспособность даю согласие на обработку персональных данных с использованием средств автоматизации Оператору - федеральному государственному бюджетному учреждению «Российский центр научной информации» (РЦНИ), далее – «Оператор», расположенному по адресу: 119991, г. Москва, Ленинский просп., д.32А, со следующими условиями.

2. Категории обрабатываемых данных: файлы «cookies» (куки-файлы). Файлы «cookie» – это небольшой текстовый файл, который веб-сервер может хранить в браузере Пользователя. Данные файлы веб-сервер загружает на устройство Пользователя при посещении им Сайта. При каждом следующем посещении Пользователем Сайта «cookie» файлы отправляются на Сайт Оператора. Данные файлы позволяют Сайту распознавать устройство Пользователя. Содержимое такого файла может как относиться, так и не относиться к персональным данным, в зависимости от того, содержит ли такой файл персональные данные или содержит обезличенные технические данные.

3. Цель обработки персональных данных: анализ пользовательской активности с помощью сервиса «Яндекс.Метрика».

4. Категории субъектов персональных данных: все Пользователи Сайта, которые дали согласие на обработку файлов «cookie».

5. Способы обработки: сбор, запись, систематизация, накопление, хранение, уточнение (обновление, изменение), извлечение, использование, передача (доступ, предоставление), блокирование, удаление, уничтожение персональных данных.

6. Срок обработки и хранения: до получения от Субъекта персональных данных требования о прекращении обработки/отзыва согласия.

7. Способ отзыва: заявление об отзыве в письменном виде путём его направления на адрес электронной почты Оператора: info@rcsi.science или путем письменного обращения по юридическому адресу: 119991, г. Москва, Ленинский просп., д.32А

8. Субъект персональных данных вправе запретить своему оборудованию прием этих данных или ограничить прием этих данных. При отказе от получения таких данных или при ограничении приема данных некоторые функции Сайта могут работать некорректно. Субъект персональных данных обязуется сам настроить свое оборудование таким способом, чтобы оно обеспечивало адекватный его желаниям режим работы и уровень защиты данных файлов «cookie», Оператор не предоставляет технологических и правовых консультаций на темы подобного характера.

9. Порядок уничтожения персональных данных при достижении цели их обработки или при наступлении иных законных оснований определяется Оператором в соответствии с законодательством Российской Федерации.

10. Я согласен/согласна квалифицировать в качестве своей простой электронной подписи под настоящим Согласием и под Политикой обработки персональных данных выполнение мною следующего действия на сайте: https://journals.rcsi.science/ нажатие мною на интерфейсе с текстом: «Сайт использует сервис «Яндекс.Метрика» (который использует файлы «cookie») на элемент с текстом «Принять и продолжить».