
MAIN PAGE
> Back to contents
Publications of Korobeinikov Anatolii Grigor'evich
Cybernetics and programming, 20181

Korobeinikov A.G., Sidorkina I.G.  Primary processing of seismic event data using wavelets in MATLAB


pp. 3647

DOI: 10.25136/23064196.2018.1.25245
Abstract: The subject of the research in this article are methods of processing seismic events implemented in the MATLAB system. The primary wavelet analysis of seismic event data allows nonprofessional users (not seismologists) to determine the time of the earthquake starting from the values of the wavelet expansion coefficients. In addition, it is possible to estimate the power of the seismic event (magnitude). Examples of specific seismic events are given, the digital data of which were taken from the site http://ds.iris.edu. The results of the calculations are presented graphically. In the MATLAB system, there are a lot of methods for digital data processing and problem solving in different subject areas. To work with nonstationary signals, you often use the Wavelet Toolbox extension package, which is a powerful tool. The MATLAB system, and therefore the Wavelet Toolbox, is constantly evolving. A distinctive feature of the new versions of Wavelet Toolbox is the appearance of new versions and the modification of existing functions. In the article the results of data processing of different seismic events obtained using the modified function cwt (Introduced in R2016b) are considered. The methods considered in the article can be used, for example, in the educational process. And to achieve several goals  training in the system MATLAB, the application of digital data processing methods, the use of wavelet analysis in solving data processing problems, the study of earthquake science. In addition, teaching skills to correctly interpret the findings can bring great benefits to learners in the future.
Cybernetics and programming, 20175

Evstigneeva O.A., Yuganson A.N., Korobeinikov A.G., Grishentsev A.Y., Kubasheva E.S.  Optimization of Transitional Commutation Processes in Thermal Operations Systems


pp. 89102

DOI: 10.25136/23064196.2017.5.24411
Abstract: The subject of the research is the method of reducing the spark load and commutation noise by separating the power elements of thermal plants. The object of the research is thermal installations. The aim of the research is to develop a method for separating the power elements of thermal plants in order to reduce the switching currents when performing thermal control. In the course of their research the authors have conducted simulation based on the example of a heating installation. The results of simulation and comparison of the systems with separation and without separation of the thermal circuits show the efficiency of the application of the separation method to reduce the switching currents while maintaining the admissible system characteristics by the cosφ criterion. The authors also offer their method for reducing switching currents in the process of temperature control of the temperature of thermal installations by transition from one power element of the thermal installation to several, the power of which is distributed in proportion to the first members of the Fibonacci series. The analysis carried out in the research has showed the possibility of reducing switching currents by increasing the number of thermal circuits. The possibility of reducing the switching voltages in several times is demonstrated. The authors offer to divide powers between consumers (thermal loops or cryogenic elements) in proportion to several first terms of Fibonacci numbers. The typical feature for dividing the system into several power circuits is the increase in reacting power. The authors offer the method to return part of the reacting power in thermal plants by back connection of thermal spiral elements.
Cybernetics and programming, 20174

Grishentsev A.Y., Korobeinikov A.G., Yuganson A.N.  Computational optimization of mutual transformations of color spaces based upon the arithmetic fixedpoint.


pp. 8496

DOI: 10.25136/23064196.2017.4.24005
Abstract: In their article the authors provide their results on systematization of methods for computational optimization of the transformation of color spaces based upon the application of fixedpoint arithmetic. The authors formulate the goals and analyze the key problems arising in the situation of computational optimization in the process of color space formation from the standpoint of the speed of operation increase. The principles of transition from a floating point format to a format with a fixed point are stated. The authors also provide an example for the analysis of computational optimization for the mutual transformation of RGB and Y709CbCr. In this article the authros consider the method of computational optimization of the transformation of color spaces based on the application of fixedpoint arithmetic. When applying the considered principle of practical implementation, the computation time for an image of 4134x2756 on an Intel Core 2 Duo processor becomes 18 times less. This is a very significant increase in productivity. It is not too difficult to apply this approach to other similar calculations, especially on modern 64bit and 128bit processors, when the necessary values fit into a single processor register.
Cybernetics and programming, 20173

Grishentsev A.Y., Korobeinikov A.G., Dukel'skii K.V.  Use of the method of numerical estimation for the technical interoperability.


pp. 2338

DOI: 10.25136/23064196.2017.3.23540
Abstract: The object of study involves the method for assessing the quality of technical interoperability means in the open information systems in accordance with the model of interoperability under the GOST R 550622012. The author proposes a method for calculating the estimated characteristics of technical interoperability based upon the evaluation of detection and transformation of data formats by nodes of an open information system. As an example the article includes practical assessments of technical interoperability based upon the criteria for detecting and converting formats, and some software packages for processing graphic images. It is noted in the article that if there is need to observe the evolution of the interoperability of the information system, it is then necessary to preserve the methodological basis for the formation of the initial parameters. The proposed estimation method is based upon the laws of information theory and it is determined by a formal model allowing to calculate the particular and general information entropy characterizing the technical interoperability as the ability of the information system under investigation to detect data in various formats and the ability of the information system under investigation to produce correct data transformations in various formats. The main result of the research is the developed method of estimating technical interoperability that allows to make a numerical estimation of the properties of technical interoperability allowing for the format detection and transformation. The practical result of the study is that it enables the numerical evaluation of interoperability, allowing one to monitor the dynamics of interoperability of various systems under conditions of interaction with a continuously changing intersystem information space.
Cybernetics and programming, 20165

Korobeinikov A.G., Kutuzov I.M.  Obfuscation of concealment calls using InvokeDynamic instructions


pp. 3337

DOI: 10.7256/23064196.2016.5.18686
Abstract: The object of the study is technology of hiding method calls. Hidden calls are need to hide: entity dependencies; data processing logic; algorithms. The methods used to complete the task are limited by language technologies and its performance. Method can be called directly and indirectly: via the bootstrap method; from native code (JNI); using Reflection; using JRE 1.7, InvokeDynamic. The examples with source code are given. The authors conclude that the most promising methods among considered is invokedynamic technology. The study present analysis of such methods as the bootstrap method, calling method from through native code, obfuscation calls via Reflection and InvokeDynamic. The article discusses various ways to conceal the method invocation. The characteristic features of obfuscation for most popular ones are reviewed. The most promising among the discussed methods is invokedynamic technology. It allows completely removing method signature from the source code, leaving only the service information for the bootstrap method. With proper implementation of the bootstrap method it is possible to create bytecode, which will be impossible to decompile into valid Java code, Groovy's or Scala.
Cybernetics and programming, 20162

Piskova A.V., Korobeinikov A.G.  Features of applying lattice theory in digital signature schemes


pp. 812

DOI: 10.7256/23064196.2016.2.17970
Abstract: The subject of the study is the scheme of digital signature, which is an important element in building secure systems used in most realworld security protocols. Reliability of existing schemes of electronic digital signature can be severely lowered in case of developments in classical cryptanalyst or progress in the development of quantum computers. A potential alternative approach is to construct the schemes based on the complexity of certain properties of the lattices, which are supposed to be intractable for quantum computers. Due to significant scientific advances in recent years, scheme based on lattice theory already used in practice and is a very viable alternative to numbertheoretic cryptography. The study is based on the use of methods of lattice theory. This choice is dictated by the lack of solution of problem of finding the shortest vector or finding the nearest vector in polynomial time. The main conclusion of the paper is that the main area of future development in the schemes of the digital signature on the basis of lattice theory is their optimization and implementation of the FiatShamir model in it. For example, Bliss scheme showed high performance and therefore it can be integrated into portable systems and devices.
Cybernetics and programming, 20161

Aleksanin S.A., Fedosovskii M.E.  Development of an automated procedure of digital image improvement using Laplace mask


pp. 258269

DOI: 10.7256/23064196.2016.1.17851
Abstract: The study is devoted to automated procedures of selecting method and relevant parameters for digital image improvement. In this article the authors select filtering method known as Laplace mask to improve images. Since the image is represented by a discrete function, the authors use various discrete representations as an approximation of a continuous formula of twodimensional Laplace operator. Additionally the paper reviews filters (masks) of Laplace high frequency which are frequently used in digital image processing. The research methodology is based on the computational experiments. Software for these experiments is designed using MATLAB system. The novelty of the research is to indicate the direction which will help reduce the time spent on image optimization while increasing the efficiency and reliability of the software for digital image processing. This is confirmed by the results of numerical experiments that were carried out with the use of the developed automated procedures for selecting and setting parameters Laplace masks for digital image processing.
Cybernetics and programming, 20161

Korobeinikov A.G., Fedosovskii M.E., Aleksanin S.A.  Development of an automated procedure for solving the problem of reconstructing blurry digital images


pp. 270291

DOI: 10.7256/23064196.2016.1.17867
Abstract: The study is devoted to methods allowing solving the problem of reconstructing blurry digital images. The authors give a mathematical formulation of the problem of removing blurring from the image. The article presents the Volterra type I equation integral equation. Based on a set of methods that solve this integral equation, the authors propose an automated procedure for solving the problem of reconstructing blurry digital images. The paper discussed in detail the method of Tikhonov regularization. Numerical experiments for different types of digital images are held. The authors give recommendation for choosing the regularization parameter. The research methodology is based on the methods for solving incorrectly posed problems, such as the task of removing the blurring of the digital image. The novelty of the research lies in the uniform approach to solving the problem of removing the blurring of a digital image. This approach has been applied to various kinds of digital images. The results of the selection of the regularization parameter, obtained using numerical experiments are different for different types of images, as expected.
Cybernetics and programming, 20154

Aleksanin S.A.  Development of procedures of the automated choice of methods of the analysis and digital processing of images at the solution of problems of defectoscopy


pp. 6271

DOI: 10.7256/23064196.2015.4.16331
Abstract: In the article the author presents developed procedures of automated automated selection of methods of analysis and digital processing of images, used when creating domainspecific subsystems, in particular for defectoscopy. The relevance of the problem is caused by everincreasing requirements for technical characteristics of modern equipment used in medicine, space exploration, information technology, etc. And this implies the urgency of the task of creating functions of automated selection of methods for digital image processing and analysis in defectoscopy. The described automated procedures for choosing methods for digital image processing and analysis were developed on the basis of modern methods of digital image processing. The main results of the present research of procedures for automated selection of digital image processing solutions for the problems of defectoscopy is that the use of this procedures, depending on qualification, can significantly improve the quality of digital photos. This will lead to better identification of defects, which in turn will allow to withstand all specified technical requirements for manufactured products.
Software systems and computational methods, 20152

Korobeinikov A.G., Markina G.L., Aleksanin S.A., Akhapkina I.B., Bezruk N.V., Demina E.A., Yamshchikova N.V.  Using the MAPLE system of computer algebra in studying the generation of systems of the ordinary differential equations



DOI: 10.7256/24540714.2015.2.14946
Abstract: Nowadays the teachers while lecturing various courses on the ordinary differential equations often use program systems of symbolical mathematics or computer algebra, for example MAPLE well known for its efficiency. In the process of training in computer modeling, teacher often face a problem of designing a mathematical model of the studied process. Because the fundamental laws of nature are formulated as a rule in a language of the differential equations, there is a need to teach the students to design mathematical models. The authors present a solution of the problem of the automated generation of mathematical models on the using a systems of the ordinary differential equations based on Maple system. The paper presents an example of this solution. The given algorithm of generating systems of ordinary differential equations can be easily modified for a specific task. During the course on ordinary differential equations it is necessary to give students the tasks develop the algorithm by themselves. This allows students to develop a culture of logical thinking, which will properly establish cause and effect of physical processes and phenomena from the formal implementation of interdisciplinary connections and practical orientation of training. All of this will undoubtedly contribute to a better knowledge of the disciplines of applied mathematics and other subject areas.
Cybernetics and programming, 20145

Korobeinikov A.G., ., ., ., ., .  Developing of the mathematical and simulation models for calculation of an estimate of informatization object protection from unauthorized physical access


pp. 1425

DOI: 10.7256/23064196.2014.5.12889
Abstract: Methods and techniques allowing to calculate quantitative estimates of level of protection from unauthorized physical intrusion for different informatization objects using various means and protection systems are currently being intensively developed. Generally the quantitative evaluation of protection is represented by a set of probability characteristics, the predominant of which is some integral indicator. Therefore, developing mathematical and simulation models for calculating an estimate of informatization object protection from unauthorized physical access is an urgent task. This model then is used as a part of a complex system of information security. To solve this problem the article presented uses methods of information protection, graph theory and probability theory. The results shown in the article were calculated using Maple system of computer algebra. Scientific novelty of the work is: – in creating a mathematical model for calculation the probability of detecting of unauthorized physical access to information by an alarm system; – in bulding of a simulation model for evaluation of level of protection of informatization object from unauthorized physical access; – in developing of a technique of evaluation of full protection from unauthorized physical access for object of informatization
Cybernetics and programming, 20145

Labkovskaya R.Y., Kozlov A.S., Pirozhnikova O.I., Korobeinikov A.G.  Modeling the dynamics of reed sensors of control systems


pp. 7077

DOI: 10.7256/23064196.2014.5.13309
Abstract: The article is devoted to developing of methods and algorithms of finding eigen values for analyzing dynamics and stability of reed sensors. Matrixtopological method, PCoriented, uses a model with lumped parameters to describe the oscillatory processes of microsensors beam elements and reeds contact cores. Replacement of the system with distributed parameters with the equivalent model with lumped parameters is achieved by using the Rayleigh method. This method leads to considering a system with a higher hardness than original, thereby obtaining a higher frequency compared with the actual. The authors developed a matrixtopological model for frequency analysis of geometricallycomplex and multilink reed sensors based on the switching to the system with lumped parameters using following methods: electromechanical analogies, method RayleighRitz method and graph theory. On the example of one of the three constructs of reeds oscillatory systems the authors compare theoretical results of calculation of reed sensors eigen frequencies, gathered using matrixtopological method with corresponding experimentally obtained values with piezoelectric and optical methods of the reed sensors frequency spectra analysis. The correctness of the frequency analysis was achieved using Fourier frequency filters.
Software systems and computational methods, 20142

DOI: 10.7256/24540714.2014.2.12504
Abstract:
Software systems and computational methods, 20134

Korobeinikov A.G., ., ., . 



DOI: 10.7256/24540714.2013.4.10806
Abstract:
Cybernetics and programming, 20133

Korobeinikov A.G., ., .  Using intelligent agents for magnetic measurements for railway infrastructure monitoring


pp. 920

DOI: 10.7256/23064196.2013.3.8737
Abstract: The paper proposes the use of the intelligent hybrid metaagent for solving a problem of intellectualization management and information systems in rail transport. In order to ensure the safety and risk management for harmful natural and manmade situation in rail transport the authors propose to use intelligent software for management and informational support. The article reviews general structure of intelligent environment as hybrid cognitive agent consisting of four main parts. The main obstacles to the creation of intelligent monitoring systems are: lack of finance support, absence of knowledge base on prethreshold facilities, nonexistence of specialized software and hardware. Modern sensor networks combined in multiagent system where each individual sensor is a single agent, with its local knowledge base possess the necessary characteristics. Multiagent system formed by multiple interacting intelligent agents can be used to solve these problems that are difficult or impossible to solve with a single agent. The article shows variants of construction of logical models of interaction between the sensors using the apparatus of multivalued logic and bilattices.
Cybernetics and programming, 20133

Korobeinikov A.G., .  Obfuscation algorithm


pp. 18

DOI: 10.7256/23064196.2013.3.9356
Abstract: The paper deals with the algorithm of Chenxi Wang’s, shows are the main disadvantages of this algorithm. The authors suggest the ways of modification to improve it. The algorithm of Chenxi Wang's is one of the most famous. The input data for the algorithm is the usual procedure, written in high level language. The authors describe the three stages of obfuscation of any such procedure. In the classic version of Chenxi Wang's the algorithm has poor stability. The authors suggest ways to improve stability of the algorithm, present modified version of the algorithm and reviews results of its implementation. The authors compare the source code and the resulting code and conclude that it is almost impossible to establish their functional identity and the logic of the program code is very difficult to understand using obfuscated source. Sometimes this can be done using the examples run of the resulting source code. This implies that after eliminating the shortcomings the algorithm is quite effective.
Software systems and computational methods, 20133

Korobeinikov A.G., ., ., . 



DOI: 10.7256/24540714.2013.3.10381
Abstract:
Cybernetics and programming, 20132

Korobeinikov A.G., ., ., .  The study of the geoelectric structure of the crust on the basis of the analysis of the phase velocities of ultra geomagnetic variations


pp. 3643

DOI: 10.7256/23064196.2013.2.8736
Abstract: This article presents the results of experimental studies of the geoelectric structure of the crust held in Karelia. For research the authors established 5 highly ternary magnetovariational stations GIMTS1 separated by 510 km apart. The frequency of data recording was 50 Hz. To analyze the changes in apparent resistivity with depth at all 5 locations the authors perofmed processing of input data by two methods  magnetotelluric and phasegradient sensing. To determine the apparent resistivity in each of the magnetic stations authors determined the apparent magnetotelluric resistivity of the earth's crust and changes in the system of resistivity with depth. Preliminary processing results revealed a number of conductive layers in the earth's crust at depths of 23 and 1520 km, probably related to the shungitebearing horizons. Comparison of methods for the interpretation of magnetotelluric and phase gradient sensing has shown their good match.
Software systems and computational methods, 20131

Korobeinikov A.G., ., ., . 



DOI: 10.7256/24540714.2013.1.7162
Abstract:
Software systems and computational methods, 201212

Korobeinikov A.G., ., ., . 



Abstract:
Software systems and computational methods, 201211

Korobeinikov A.G., ., ., . 



Abstract:
Cybernetics and programming, 20122

Korobeinikov A.G., Grishentsev A.Y.  The increase in the rate of convergence of finite difference method based on the use of middleware solutions


pp. 3846

Abstract: To study the characteristics of the process of functioning of any system of mathematical methods, including the engine, should be carried out formalization of the process, ie. a mathematical model. By mathematical modeling we mean the process of establishing compliance with this real object of a mathematical object (mathematical model), and the study of the mathematical model, which allows to obtain characteristics of this real object. A type of a mathematical model depends both on the nature of the real object and tasks of the research and the required reliability and accuracy of the solution of this problem. Any mathematical model, like any other, describes the real object only with a certain degree of approximation to reality. This paper presents a method for calculating interim solution in ndimensional problem with boundary conditions, contributing to the acceleration of the convergence process of a finite difference method. In the practical implementation of this method the number of iterations to achieve a given residual was reduced to 10  100 times, due to the search of the intermediate solutions. Thus, this method can be used to significantly improve the efficiency of a finite difference method.
Cybernetics and programming, 20122

Korobeinikov A.G., Gatchin Y.A., Dukel'skii K.V., TerNersesyants E.V.  Compatibility of borosilicate and fluorosilicate glass layers in the manufacture of optical fiber


pp. 4754

Abstract: Domestic manufacturers of optical fibers are facing the problem of acquisition of raw materials and reagents abroad, which becomes more and more acute  the price is rising, and customs procedures do not contribute to the revival of domestic production of optical fibers made of quartz glass. Consumption of fibers in Russia exceeds the 3.5 million km per year, while the consumption of 1 million km per year is a "critical point" after which is economically feasible to produce the optical fibers at its own factories. This situation has forced to go back to the establishment of the optical fiber production in Russia. Hence the importance of the finding a ways to manufacture quartz optical fiber with a minimum range of reagents used is hight. The solution of this problem is possible only on the basis of substantial modernization and simplification of technological process of manufacturing the optical fiber, so that on the basis of a limited number of domestic materials and reagents to produce fibers that are not inferior counterparts of leading foreign manufacturers of quality, but differ with advantageous cost.
Cybernetics and programming, 20122

Milushkov V.I., Gatchin Y.A.  Using a binary search to optimize the query to retrieve data


pp. 19

Abstract: With the increasing popularity of DBMS its use inevitably begins to demand more and more resources. The first time is possible (and, of course, necessary) to lower the load through optimization of algorithms and / or architecture of the application. However, what if anything that can be optimized is already optimized, and the application still cannot cope with the load? In this article the methods and ways to use binary search to optimize the query to retrieve data are reviewed. Authors giv an overview of php + MySQL and solved the problem of the transfering the queue from fields without indexes to tables with primary keys, which significantly speeds up the query and the database itself. Proposed solution greatly accelerates the search for the desired item by reducing the search range but at the same time sacrificing some accuracy computations. For statistical reasons it is not critical if a few elements of millions will not be taken into account. Otherwise, it is necessary to make and complete epsilon zero search only after reaching the last level of the tree.
Cybernetics and programming, 20121

Korobeinikov A.G., Kutuzov I.M., Kolesnikov P.Y.  Analysis methods of obfuscation


pp. 3137

Abstract: Modern computer technology makes it a variety of tasks relevant to the field of information security. For example, for the protection of copyright in the images methods of steganography are used. To solve the problem of proving authorship (or vice versa) code obfuscation techniques are used. Obfuscation (from Lat. Obfuscare  obscure, obfuscate, and English. Obfuscate  make nonobvious, confusing, confusing) or obfuscated code  is the process of bringing the source code or executable program code to the form, that keeps its functionality, but complicates the analysis, understanding algorithms and modification during decompilation. Currently, there are special programs called obfuscators that performes obfuscation to solve the task in different ways. The article discusses the techniques of obfuscation from the most basic to sophisticated polymorphic generators obfuscators performing the mathematical transformation of the code, as well as the relationship of obfuscation and efficiency of program code execution and reduce the size of the program. The authors describe further development of obfuscation techniques.

