16 research outputs found
Intersection of triangles in space based on cutting off segment
The article proposes a new method for finding the triangle-triangle
intersection in 3D space, based on the use of computer graphics algorithms --
cutting off segments on the plane when moving and rotating the beginning of the
coordinate axes of space. This method is obtained by synthesis of two methods
of cutting off segments on the plane -- Cohen-Sutherland algorithm and
FC-algorithm. In the proposed method, the problem of triangle-triangle
intersection in 3D space is reduced to a simpler and less resource-intensive
cut-off problem on the plane. The main feature of the method is the developed
scheme of coding the points of the cut-off in relation to the triangle segment
plane. This scheme allows you to get rid of a large number of costly
calculations. In the article the cases of intersection of triangles at
parallelism, intersection and coincidence of planes of triangles are
considered. The proposed method can be used in solving the problem of
tetrahedron intersection, using the finite element method, as well as in image
processing.Comment: Convergent Cognitive Information Technologies. Convergent 2019.
Communications in Computer and Information Science, in press, Springer, Cham.
http://it-edu.oit.cmc.msu.ru/index.php/convergent/convergent2019 (14 pages,
11 figures
Systematic approach to providing intelligent decision support whilst digital transformation of management processes in agro-industrial complex
Modern economic conditions, characterized by digitalization processes and the influence of geopolitical factors contributing to the development of domestic information technologies have made the issue of providing support for management decision-making by specialized systems important. In this regard, the purpose of the study is to analyze the logistics of information flows and identify problems associated with the digital transformation of management processes in the agro-industrial complex (AIC). A systematic approach was chosen as the main method. The logical analysis and synthesis were used as well. Based on the identified movements and interrelations of information flows, and limiting factors for its effective use, an automated information and analytical decision support system (AIASDSS) is proposed in the context of a unified digital platform. Its components are described and principles of operation are formulated. In the focus is the creation of an information platform module oriented mainly on agricultural producers who occupy a central place in the agro-industrial complex. It is noted that work is underway to ensure the intellectualization of decision-making processes in agricultural organizations through the use of mathematical, statistical and information tools. Particular solutions are given. The research materials are addressed to authorities and can be used in managing agricultural production
Π Π°Π·ΡΠ°Π±ΠΎΡΠΊΠ° ΠΈ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΎΠ² ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠ°Π²ΠΈΠ» Π΄Π»Ρ ΡΠ·Π»ΠΎΠ² ΡΠ΅ΡΠ΅Π²ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π² ΠΌΡΠ»ΡΡΠΈΠΎΠ±Π»Π°ΡΠ½ΠΎΠΉ ΠΏΠ»Π°ΡΡΠΎΡΠΌΠ΅
As part of the study, existing solutions aimed at ensuring the security of the network perimeter of the multi-cloud platform were considered. It is established that the most acute problem is the effective formation of rules on firewalls. Existing approaches do not allow optimizing the list of rules on nodes that control access to the network. The aim of the study is to increase the effectiveness of firewall tools by conflict-free optimization of security rules and the use of a neural network approach in software-defined networks. The proposed solution is based on the sharing of intelligent mathematical approaches and modern technologies of virtualization of network functions. In the course of experimental studies, a comparative analysis of the traditional means of rule formation, the neural network approach, and the genetic algorithm was carried out. It is recommended to use the multilayer perceptron neural network classifier for automatic construction of network security rules since it gives the best results in terms of performance. It is also recommended to reduce the size of the firewall security rule list using the Kohonen network, as this tool shows the best performance. A conflict-free optimization algorithm was introduced into the designed architecture, which produces finite optimization by ranking and deriving the most common exceptions from large restrictive rules, which allows increasing protection against attacks that are aimed at identifying security rules at the bottom of the firewall list. On the basis of the proposed solution, the adaptive firewall module was implemented as part of the research.Π ΡΠ°ΠΌΠΊΠ°Ρ
ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΠ΅ ΡΠ΅ΡΠ΅Π½ΠΈΡ, Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½Π½ΡΠ΅ Π½Π° ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΠ΅ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΠΏΠ΅ΡΠΈΠΌΠ΅ΡΡΠ° ΠΌΡΠ»ΡΡΠΈΠΎΠ±Π»Π°ΡΠ½ΠΎΠΉ ΠΏΠ»Π°ΡΡΠΎΡΠΌΡ. Π£ΡΡΠ°Π½ΠΎΠ²Π»Π΅Π½ΠΎ, ΡΡΠΎ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΠΎΡΡΡΠΎΠΉ ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ° ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠ°Π²ΠΈΠ» Π½Π° ΠΌΠ΅ΠΆΡΠ΅ΡΠ΅Π²ΡΡ
ΡΠΊΡΠ°Π½Π°Ρ
. Π‘ΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΠ΅ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Ρ Π½Π΅ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡ ΠΎΠΏΡΠΈΠΌΠΈΠ·ΠΈΡΠΎΠ²Π°ΡΡ ΡΠΏΠΈΡΠΎΠΊ ΠΏΡΠ°Π²ΠΈΠ» Π½Π° ΡΠ·Π»Π°Ρ
, ΠΊΠΎΠ½ΡΡΠΎΠ»ΠΈΡΡΡΡΠΈΡ
Π΄ΠΎΡΡΡΠΏ ΠΊ ΡΠ΅ΡΠΈ. Π¦Π΅Π»ΡΡ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΏΠΎΠ²ΡΡΠ΅Π½ΠΈΠ΅ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΠΈ ΡΡΠ΅Π΄ΡΡΠ² ΠΌΠ΅ΠΆΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΡΠΊΡΠ°Π½Π° ΠΏΡΡΠ΅ΠΌ Π±Π΅ΡΠΊΠΎΠ½ΡΠ»ΠΈΠΊΡΠ½ΠΎΠΉ ΠΎΠΏΡΠΈΠΌΠΈΠ·Π°ΡΠΈΠΈ ΠΏΡΠ°Π²ΠΈΠ» Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ Π½Π΅ΠΉΡΠΎΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Π° Π² ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠ½ΠΎ-ΠΎΠΏΡΠ΅Π΄Π΅Π»ΡΠ΅ΠΌΡΡ
ΡΠ΅ΡΡΡ
. ΠΡΠ΅Π΄Π»Π°Π³Π°Π΅ΠΌΠΎΠ΅ ΡΠ΅ΡΠ΅Π½ΠΈΠ΅ ΠΎΡΠ½ΠΎΠ²Π°Π½ΠΎ Π½Π° ΡΠΎΠ²ΠΌΠ΅ΡΡΠ½ΠΎΠΌ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠΈ ΠΈΠ½ΡΠ΅Π»Π»Π΅ΠΊΡΡΠ°Π»ΡΠ½ΡΡ
ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΏΠΎΠ΄Ρ
ΠΎΠ΄ΠΎΠ² ΠΈ ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ Π²ΠΈΡΡΡΠ°Π»ΠΈΠ·Π°ΡΠΈΠΈ ΡΠ΅ΡΠ΅Π²ΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ. Π Ρ
ΠΎΠ΄Π΅ ΡΠΊΡΠΏΠ΅ΡΠΈΠΌΠ΅Π½ΡΠ°Π»ΡΠ½ΡΡ
ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠΉ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½ ΡΡΠ°Π²Π½ΠΈΡΠ΅Π»ΡΠ½ΡΠΉ Π°Π½Π°Π»ΠΈΠ· ΡΡΠ°Π΄ΠΈΡΠΈΠΎΠ½Π½ΡΡ
ΡΡΠ΅Π΄ΡΡΠ² ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠ°Π²ΠΈΠ», Π½Π΅ΠΉΡΠΎΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Π°, Π° ΡΠ°ΠΊΠΆΠ΅ Π³Π΅Π½Π΅ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ Π°Π»Π³ΠΎΡΠΈΡΠΌΠ°. ΠΠ»Ρ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ ΠΏΡΠ°Π²ΠΈΠ» ΡΠ΅ΡΠ΅Π²ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄ΡΠ΅ΡΡΡ ΠΏΡΠΈΠΌΠ΅Π½ΡΡΡ Π½Π΅ΠΉΡΠΎΡΠ΅ΡΠ΅Π²ΠΎΠΉ ΠΊΠ»Π°ΡΡΠΈΡΠΈΠΊΠ°ΡΠΎΡ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΡ Β«ΠΌΠ½ΠΎΠ³ΠΎΡΠ»ΠΎΠΉΠ½ΡΠΉ ΠΏΠ΅ΡΡΠ΅ΠΏΡΡΠΎΠ½Β», ΠΏΠΎΡΠΊΠΎΠ»ΡΠΊΡ ΠΎΠ½ Π΄Π°ΡΡ Π»ΡΡΡΠΈΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ Ρ ΡΠΎΡΠΊΠΈ Π·ΡΠ΅Π½ΠΈΡ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ, ΠΈ ΡΠΌΠ΅Π½ΡΡΠ°ΡΡ ΡΠ°Π·ΠΌΠ΅ΡΠ½ΠΎΡΡΡ ΡΠΏΠΈΡΠΊΠ° ΠΏΡΠ°Π²ΠΈΠ» Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΌΠ΅ΠΆΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΡΠΊΡΠ°Π½Π° ΠΏΡΠΈ ΠΏΠΎΠΌΠΎΡΠΈ ΡΠ΅ΡΠΈ ΠΠΎΡ
ΠΎΠ½Π΅Π½Π°, ΠΏΠΎΡΠΊΠΎΠ»ΡΠΊΡ ΡΡΠΎ ΡΡΠ΅Π΄ΡΡΠ²ΠΎ ΠΏΠΎΠΊΠ°Π·ΡΠ²Π°Π΅Ρ Π»ΡΡΡΡΡ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΡ. Π ΡΠΏΡΠΎΠ΅ΠΊΡΠΈΡΠΎΠ²Π°Π½Π½ΡΡ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΡ Π±ΡΠ» Π²Π½Π΅Π΄ΡΠ΅Π½ Π°Π»Π³ΠΎΡΠΈΡΠΌ Π±Π΅ΡΠΊΠΎΠ½ΡΠ»ΠΈΠΊΡΠ½ΠΎΠΉ ΠΎΠΏΡΠΈΠΌΠΈΠ·Π°ΡΠΈΠΈ, ΠΊΠΎΡΠΎΡΡΠΉ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡ ΠΊΠΎΠ½Π΅ΡΠ½ΡΡ ΠΎΠΏΡΠΈΠΌΠΈΠ·Π°ΡΠΈΡ ΠΏΡΡΠ΅ΠΌ ΡΠ°Π½ΠΆΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΈ Π²ΡΠ²Π΅Π΄Π΅Π½ΠΈΡ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΡΠ°ΡΡΠΎ Π²ΡΡΡΠ΅ΡΠ°Π΅ΠΌΡΡ
ΠΈΡΠΊΠ»ΡΡΠ΅Π½ΠΈΠΉ ΠΈΠ· Π±ΠΎΠ»ΡΡΠΈΡ
Π·Π°ΠΏΡΠ΅ΡΠΈΡΠ΅Π»ΡΠ½ΡΡ
ΠΏΡΠ°Π²ΠΈΠ», ΡΡΠΎ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΡΠ²Π΅Π»ΠΈΡΠΈΡΡ Π·Π°ΡΠΈΡΡ ΠΎΡ Π°ΡΠ°ΠΊ, ΠΊΠΎΡΠΎΡΡΠ΅ Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½Ρ Π½Π° Π²ΡΡΠ²Π»Π΅Π½ΠΈΠ΅ ΠΏΡΠ°Π²ΠΈΠ» Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ, Π½Π°Ρ
ΠΎΠ΄ΡΡΠΈΡ
ΡΡ Π²Π½ΠΈΠ·Ρ ΡΠΏΠΈΡΠΊΠ° ΠΌΠ΅ΠΆΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΡΠΊΡΠ°Π½Π°. ΠΠ° Π±Π°Π·Π΅ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΠΎΠ³ΠΎ ΡΠ΅ΡΠ΅Π½ΠΈΡ Π² ΡΠ°ΠΌΠΊΠ°Ρ
ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½ ΠΌΠΎΠ΄ΡΠ»Ρ Π°Π΄Π°ΠΏΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΠΌΠ΅ΠΆΡΠ΅ΡΠ΅Π²ΠΎΠ³ΠΎ ΡΠΊΡΠ°Π½Π°
DECOMPOSITION METHODS OF SOLVING THE PROBLEMS OF THE COMPUTER-INTEGRATED PRODUCTION CONTROL
The object of investigation: the automated control systems of the computer-integrated production. The purpose of the work: the investigation and search for the ways of the efficiency increase of the computer-integrated productions functioning due to the improvement of the methods of solving the problems of planning and control with the character of structure of the parameters set in the course of the multi-level decomposition of these problems. For the first time, it has been proved, that the diagram of break of the ordered parameters set form the distributive grid. The quantitative evaluation of the diagrams of decomposition, and the algorithms of its generation have been developed. The program complex has been developed for solving the problems operative control CIM, allowing to reduce the time of solving or to increase the increase the dimension of the problems, to be solved, by the order. The program complex of solution of the problems of control CIM has been introduced in service. The problems of the production planning and optimization of the operative control, the problem of the debts intertest have been solved. The field of application: the computer-integrated production, minorseries production in machine construction, the study process in the Higher School.Available from VNTIC / VNTIC - Scientific & Technical Information Centre of RussiaSIGLERURussian Federatio
Investigation of Optimization Algorithms for Neural Network Solutions of Optimal Control Problems with Mixed Constraints
In this paper, we consider the problem of selecting the most efficient optimization algorithm for neural network approximationβsolving optimal control problems with mixed constraints. The original optimal control problem is reduced to a finite-dimensional optimization problem by applying the necessary optimality conditions, the Lagrange multiplier method and the least squares method. Neural network approximation models are presented for the desired control functions, trajectory and conjugate factors. The selection of the optimal weight coefficients of the neural network approximation was carried out using the gravitational search algorithm and the basic particle swarm algorithm and the genetic algorithm. Computational experiments showed that evolutionary optimization algorithms required the smallest number of iterations for a given accuracy in comparison with the classical gradient optimization method; however, the multi-agent optimization methods were performed later for each operation. As a result, the genetic algorithm showed a faster convergence rate relative to the total execution time
The Optimal Control of Cellular Communication Enterprise Development in Competitive Activity
International audienceThe work is devoted to the construction and justification of the mathematical model of the competitive behaviour of cellular communication in the form of a system of nonlinear differential equations with delay time describing the dynamics of changes in the subscriber base of cellular operators competing for shared resources
Approach to the Effective Use of Limited Computing Resources in Educational Institutions for Providing Multimedia Services
Existing approaches to the use of computing resources is too wasteful for educational institutions. Modern multimedia services require significant computing power, which are not always available. In this paper, we introduce an approach that allows more efficient use of limited resources by dynamically scheduling the distribution of data flows at several levels: between the physical computing nodes, virtual machines, and multimedia applications with use cloud computing
Request Stream Control for the Access to Broadband Multimedia Educational Resources in the Distance Learning System
This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes
Generation of a text description of weakly structured optical coherence tomography images
Computer vision methods help to automate and improve processes in the field of medicine. In the field of ophthalmology, computer vision algorithms can be used to analyze images obtained using optical coherence tomography OCT, to identify pathologies and changes in the structure of the eye, however, due to the heterogeneity of patterns and configurations of tomographs, a comprehensive solution is needed. Within the framework of this work, an approach to the construction of a system for generating a text description of DICOM images using artificial intelligence methods is presented. To build a system of automatic description of anatomical properties and pathologies, a set of models for detection and classification was built on the OCT image. Data augmentation was performed for the task of recognizing areas with retinal slices in the OCT image. The computational experiment of constructing classification models showed recognition accuracy from 0.75 to 0.93 according to the balanced accuracy metric. Based on the developed models, a web service has been developed to demonstrate the functionality, which provides a report on finding 11 tags on an OCT scan
Development and Study of Algorithms for the Formation of Rules for Network Security Nodes in the Multi-Cloud Platform
As part of the study, existing solutions aimed at ensuring the security of the network perimeter of the multi-cloud platform were considered. It is established that the most acute problem is the effective formation of rules on firewalls. Existing approaches do not allow optimizing the list of rules on nodes that control access to the network. The aim of the study is to increase the effectiveness of firewall tools by conflict-free optimization of security rules and the use of a neural network approach in software-defined networks. The proposed solution is based on the sharing of intelligent mathematical approaches and modern technologies of virtualization of network functions. In the course of experimental studies, a comparative analysis of the traditional means of rule formation, the neural network approach, and the genetic algorithm was carried out. It is recommended to use the multilayer perceptron neural network classifier for automatic construction of network security rules since it gives the best results in terms of performance. It is also recommended to reduce the size of the firewall security rule list using the Kohonen network, as this tool shows the best performance. A conflict-free optimization algorithm was introduced into the designed architecture, which produces finite optimization by ranking and deriving the most common exceptions from large restrictive rules, which allows increasing protection against attacks that are aimed at identifying security rules at the bottom of the firewall list. On the basis of the proposed solution, the adaptive firewall module was implemented as part of the research