3 research outputs found

    Development of a System for Graphic Captcha Systems Recognition Using Competing Cellular Automata

    Full text link
    Peculiarities of the use of competing cellular automata for problems of recognition of complex captcha systems have been explored. For this purpose, the concept of competing cellular automata has been introduced and a mathematical model of their functioning and interaction has been developed. The mathematical model of competing cellular automata based on the set theory has been described to specify moving cellular automata, which shift to the neighboring states of characters and implement their transition rules in such a way. Based on this mathematical model, a recognition system for captcha images implemented in the code by means of JavaFX 2.0 technology has been developed, which allowed reaching the crossplatformness and correct functioning on different operating systems.The libraries of cellular automata have been developed for the English language. Each symbol of the alphabet is represented in the form of a state system, which is aligned with a cellular automaton with states describing the given symbol.We used Java programming language for development and OpenCV library for the ability to handle images which allowed us to achieve high-quality recognition results. The architecture of the developed system of recognition of complex captcha images in the form of diagrams of classes of the main blocks with detailed descriptions of each class has been considered. Computer experiments have been carried out with different sets of distorted characters used in actual captcha systems and recognition quality indices of the developed software obtained.It has been shown that the probability of obtaining the correct result of captcha image recognition exceeds 80 % with a degree of deformation of characters up to 20 %. With a degree of deformation of characters over 30 %, there is a high probability of false character recognition.The advantages of the method of text character recognition based on competing cellular automata include simplicity of rules of engagement, ability to parallelize the process of recognition easily, capability of recognition of distorted and partially overlapping characters that are the basis of modern captcha system

    Improvement of the Method of Calculating a Group of Sound­insulating Panels

    Full text link
    Original single-layer and multilayer structures of sound-insulating panels are considered, as well as their advantages compared to traditional analogs.The shortcomings of the method of optimization calculation of a group of sound-insulating panels designed to reduce noise in several production rooms are analyzed. This method has limited functionality due to a relatively small number of objective functions and the corresponding conditions for their use. Given this, an improved method of optimization calculation of a group of sound-insulating panels is proposed.The improvement of the method consists in increasing the number of objective functions intended for multipurpose optimization taking into account real production conditions. The refinement of the algorithm consists in the preliminary selection of a subgroup of panels with additional requirements for operating conditions (increased strength, fire safety, etc.). Under these conditions, the operator directionally distributes structures and materials among the selected panels.The statement of the optimization problem of group calculation with an extended list of objective functions and restrictions is given. Recommendations on selecting an objective function in specific production conditions are given.The regulatory requirements for noise reduction in production rooms and spectral characteristics of sound insulation of panels made of various materials are given. The spectral characteristics of noise in the room before and after application of the sound-insulating panel are also given.The effectiveness of the method is confirmed by the steady reduction of the mathematical expectation and variance of the total noise load on people in production premises with an increase in the number of iterations. The calculation method demonstrated the reduction of excess noise load in comparison with standard method

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Full text link
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed
    corecore