Сообщение

Main

DOI:10.31854/1813-324X-2020-6-3-100-106

Kucherova K.
Prediction of Cloud Computing Resources Based on the Open Source Monitoring SystemЖурнала ТУЗС - Том 6, №3, 2020

  • Abstract:The paper describes the universal approach for monitoring the data storage of a globally distributed cloud computing system, which allows you to automate creation of new metrics in the system and predict their behavior for the end users. Since the existing monitoring software products provide built-in scheme only for system metrics like RAM, CPU, disk drives, network traffic, but don’t offer solutions for business functions, IT companies have to design specialized database structure (DB). The data structure proposed in this paper for storing the monitoring statistics is universal and allows you to save resources when orginizing database monitoring on the scale of the GDCCS. The goal of the research is to develop a universal model for monitoring and forecasting of data storage in a globally distributed cloud computing system and its adequacy to real operating conditions.
  • Keywords: cloud computing system, database, monitoring, system metrics, prediction, correlation function.

DOI:10.31854/1813-324X-2020-6-3-92-99

Zhuvikin A.orcid-id
A Watermarking Method for Selective Image Authentication Tollerant to JPEG Compres-sion, Brightness and Contrast AdjustmentsЖурнала ТУЗС - Том 6, №3, 2020

  • Abstract: One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.
  • Keywords: brightness, contrast, JPEG, discrete wavelet transform, histogram equalisation, selective image authentication systems.

DOI:10.31854/1813-324X-2020-6-3-66-74

Erokhin S.orcid-id, Petukhov A.orcid-id, Pilyugin P.orcid-id
About the Comparison of Information Security Systems for Asymptotic Information Security Management of Critical Information InfrastructuresЖурнала ТУЗС - Том 6, №3, 2020

  • Abstract: The article discusses the security management capabilities of critical information infrastructures. It discusses approaches to developing security policies that don’t lean on assessing residual risks and identifying a fixed list of threats. We examine the possibility of building information security management systems based on monitoring of security events. A formal description of security events as well as relevant protection methods is proposed. The paper introduces an order relation for information security systems comparison and asymptotic CII security control implementation.
  • Keywords: information security, information security policy, information security events, information security events monitoring, asymptotic management, network events characteristics, critical information infrastructures.

DOI:10.31854/1813-324X-2020-6-3-75-90

Krotov K.orcid-id
Building Complex Schedules of Data Packets Processing with Setting Time Limits of a Conveyor System FunctioningЖурнала ТУЗС - Том 6, №3, 2020

  • Abstract: The problem of planning data packet processing in a pipeline system with a time limit on the duration of its operation intervals is considered. The solution of the problem involves determining the composition of data packets, the composition of groups of data packets processed during these time intervals, and the schedules for processing packets of each group. To optimize solutions, the hierarchical game theory is applied. Conditions have been introduced that allow you to determine packages that are processed or readjusted to processing, which causes maximum downtime of pipeline segments. A method for constructing effective group compositions is proposed, which involves excluding packages that are determined in accordance with these conditions and placing packages that are not included in them in groups.
  • Keywords: hierarchical game, intervals of conveyor system functioning, data packets groups, local optimization.

DOI:10.31854/1813-324X-2020-6-3-58-65

Vasiliev V.orcid-id, Tselykh A.orcid-id, Tselykh L.orcid-id
Method for Validating Graph Models Based on the Effective Control AlgorithmЖурнала ТУЗС - Том 6, №3, 2020

  • Abstract: The article proposes a method for validating mathematical models represented by oriented weighted signed graphs using an efficient control algorithm. The method considers the validated model in terms of spectral properties of the graph adjacency matrix represented by a fuzzy cognitive map (FCM). Using an efficient control algorithm, you can determine the eigenvector direction of the adjacency matrix. This property defines the criteria for checking the FCM.
  • Keywords: model validation, directed weighted graph, fuzzy cognitive map, efficient management.
 
войти

Авторизация