The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, aircraft-airship mathematical model is proposed, control laws in longitudinal and lateral channel is designed, advantages of combined UAV type is concluded.
This article is devoted to the navigation tasks for space robots, which operates in the neighborhood of unstable libration point of the Earth-Sun and in the near-Earth space. Movement space robot is addressed under circular restricted three-body problem. The possibility of maneuvering in the near-Earth space with the return to neighborhood collinear libration points is shown.
Dynamics of manipulator with parallel kinematics is examined in the article with the help of mathematical models which characterize interrelations between the control signals, disturbances and the platform's center of mass co-ordinates.
In this paper, reconfigurable (active) flight control system for recovering controllability of the aircraft when an unexpected problem (such as faults or failures to the actuators/sensors or structural damage) occurs during a flight is proposed.
The paper considers the main issues and recommendations for using the risk assessment techniques based on the analysis of static, dynamic and historical security information. The system of security metrics and techniques for their calculation are suggested. Proposed techniques are based on attack graphs and service dependencies. They allow evaluating security of network topologies, malefactors and...
The paper considers an approach to computer attack modeling and security evaluation which is suggested to realize in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of malefactors' behavior, building a common attack graph, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing security...
Machine learning have been one of the most considered techniques for achieving automatic intrusion detection. Despite many of these machine learning approaches have achieved the goal of getting high accuracy levels in a more automatic way, the fact is that only a few of them have actually been deployed on real life scenarios. This could be explained if we take into consideration that some of the assumptions...
This work is devoted to the multicollision attacks analysis. Known methods of the multicollision attacks counteraction are considered and main trends of these methods development are determined. Methods of data blocks bonding and hash constructions for their implementation are proposed. Theoretical infeasibility analysis of constructions based on these methods is performed and it is shown, that for...
Using Payment Card Industry Data Security Standard (PCI DSS), introduced to the required obligatory execution in 2008 for all organizations working with card systems VISA, MasterCard, American Express, Discover and JCB, has been described. Considered all the 12 requirements of the standard, proved their productivity and the main ways of these requirements implementation in payment cards automatic...
This paper addresses the problems of creating an innovative technology for the education of engineers from experience in humanities and engineering sciences on the basis of so-called “recurrent” forming scientific and R&D technical tasks for students, as well as realizing software and hardware systems of mobile robots, including special robotics.
In this paper, an approach for development of program-verifier whereby it is carried out a check of mission for autonomous underwater vehicle (AUV) is proposed. The approach is consisted in substitution of standard libraries, in which described access to all resources of AUV, on libraries which carry out transmit of commands and parameters of these commands to external program-verifier. The program-verifier...
Community discovery in complex network has become an interesting topic in recent years. Multi-objective optimizations can entirely handle community discovery problem instead of single objective optimizations. Thus a multi-objective genetic algorithm approach is proposed for community discovery in complex networks in this paper. We improved MOGA-Net [1] proposed by Pizzuti by applying effective searching...
This paper presents a method for extracting automatically classification rules via multi-objective genetic algorithms. The paper also proposes a novel objective measure to quantify the similarity of the rules. The other objectives of the rules are average support value and accuracy. We experimentally evaluate our approach on socio-demographics and biochemistry datasets of schizophrenia patients and...
Represented system is for supplying of architect with data, knowledge and methods needed to make decisions in the process of software systems (SS) design. It includes two subsystems: first one is subsystem of requirements specification and communication to SS, and second is architecture design subsystem. For requirements specification and communication formalism of basic protocols method and technic...
This paper shows the application of statistics techniques, simulation and optimization methods for data - based scheduling production. The software of this methods, allows us to analyze the process construction rules for many variants reflecting a variety of combination other factors. For the analysis of the production process the greedy randomized adaptive search procedure (GRASP) and simulation...
This paper describes our experience in the development of the Food Track&Trace Ontology (FTTO), an ontology oriented to the domain of food traceability. FTTO is used to share knowledge between agents involved in the Food Supply Chain and intends to be a reference that permits to work with information obtained through the matching and merging of different controlled vocabularies. As part of a bigger...
The problem of getting working characteristics of signal recognition decision rules by statistical modeling with the aid of polynomial regression has been considered. Designs to minimize the average prediction variance of a regression function over a design region (Q-optimal) have been substantiated. The effectiveness of the developed methods has been illustrated by examples.
The procedure of tolerance design is suggested for distribution laws given by statistical series. The scattering region is formed as box having smoothing vertices. The approximation of boundary section of statistical series is used by normallike distribution law. This method can be used for modal distribution law.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.