«INFORMATICS AND APPLICATIONS»
Volume 6, Issue 1, 2012
Content | Bibliography | About Authors
Abstract and Keywords.
SKEW STUDENT DISTRIBUTIONS, VARIANCE-GAMMA DISTRIBUTIONS AND THEIR GENERALIZATIONS AS ASYMPTOTIC APPROXIMATIONS.
- V. Korolev Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University; IPI RAN,
- I.A. Sokolov IPI RAN, email@example.com
Abstract: The paper demonstrates that skew Student distributions and (skew) variance-gamma distributions can appear as
limit laws in rather simple limit theorems for regular statistics, in particular, in the scheme of random summation of
random variables and, hence, can be regarded as asymptotic approximations to the distributions of many processes
related to the evolution of complex systems.
Keywords: skew Student distribution; variance-gamma distribution; limit theorem; random sum; transfer theorem
MATHEMATICAL SUPPORT FOR NONLINEAR MULTICHANNEL CIRCULAR STOCHASTIC SYSTEMS ANALYSIS BASED ON DISTRIBUTION PARAMETRIZATION .
- I.N. Sinitsyn IPI RAN, firstname.lastname@example.org
Abstract: Theory and mathematical support for nonlinear multichannel circular stochastic systems (CStS) on distribution
parametrization are given. Themain topics are: circular orthogonal expansions (COE) for circular randomvariables
and stochastic processes, stochastic equatioons for multichannel CStS, integrodifferential equations for one- and
multidimensional densities, general COE method, methods of wrapped normal approximation, initial and central
moments, software tools “CStS-ANALYSIS.” The results are illustrated by examples.
Keywords: analytical modeling; circular random variable; circular stochastic process; coefficients of circular
orthogonal expansion; “CStS-ANALYSIS;” MATLAB; nonlinear multichannel stochastic system; one- and
multidimensional densities; circular orthogonal expansion; standard density; wrapped normal density
ANALYSIS AND OPTIMIZATION PROBLEMS FOR SOME USERS ACTIVITY MODEL.
PART 2. INTERNAL RESOURCES OPTIMIZATION.
- A. V. Bosov IPI RAN, AVBosov@ipiran.ru
Abstract: The paper continues investigation of themathematicalmodel describing the activity of users sugessted by the author
earlier. The problem of optimizing the distribution of information system internal resources based on the quadratic
criterion of quality is formulated and solved. Suboptimal optimization algorithms are presented.
Keywords: information system; stochastic observation system; quadratic criterion
ON A VIRTUAL WAITING TIME IN THE QUEUEING SYSTEMWITH HEAD-OF-THE-LINE PRIORITY
AND HYPEREXPONENTIAL INPUT STREAM.
- A. V. Ushakov IPI RAN, email@example.com
Abstract: The single server queue with hyperexponential input stream, head-of-the-line priority discipline and two service
disciplines, FIFO (first in, first out) and LIFO (last in, first out), for customers of one priority class is considered.
The distributions of the virtual waiting time for each priority class are obtained.
Keywords: virtual waiting time; head-of-the-line priority; hyperexponential input stream
A REFINEMENT OF NONUNIFORM ESTIMATES OF THE RATE OF CONVERGENCE IN THE CENTRAL LIMIT THEOREM UNDER THE EXISTENCE OF MOMENTS
OF ORDER NOT HIGHER THAN THE SECOND.
- S. V. Popov Faculty of Computational Mathematics and Cybernetics, M. V. Lomonosov Moscow State University,
Abstract: Nonuniform estimates of the rate of convergence in the central limit theorem for sums of independent random
variables with the moments of order not higher than the second are specified.
Keywords: central limit theorem; convergence rate estimate; absolute constants
COMPUTER SYSTEM OPTIMIZATION USING SIMULATION MODEL AND ADAPTIVE ALGORITHMS.
- M.G. Konovalov IPI RAN, firstname.lastname@example.org
Abstract: A problem of effective jobs execution control in computer system is considered. An approach based on the use of
adaptive strategies in the simulation model is proposed. On an example of the specific computer system, an original
methodology of simulation model construction is outlined. As adaptive strategies, the gradient algorithms are
used, developed in the theory of partially observed Markov decision-making process. The results of computational
experiment are presented.
Keywords: computer systems; simulation; adaptive algorithms
EXTRACTION OF IMPLICIT INFORMATION FROM THE TEXTS IN NATURAL LANGUAGE:
PROBLEMS AND METHODS.
- I. P. Kuznetsov IPI RAN, email@example.com
- N. V. Somin IPI RAN, firstname.lastname@example.org
Abstract: A semantic-oriented linguistic processor, which provides deep analysis of text in natural language and forms
knowledge structures, is considered. A significant direction in development of such processors is connected with the
extraction from the texts the named entities, their properties, and links, presented in implicit forms. The methods
of such extraction at different levels of text analysis (lexical-grammatical, syntactical-semantic and conceptual) are
Keywords: automatic text analysis; knowledge extraction; linguistic processor; implicit information
IDENTITY AND ACCESS MANAGEMENT OF THE USERS’ RIGHTS IN HIGH AVAILABLE DATA CENTER.
- M. V. Benderina IPI RAN, email@example.com
- S. V. Borokhov IPI RAN, firstname.lastname@example.org
- V. I. Budzko IPI RAN, email@example.com
- P. V. Stepanov IPI RAN, firstname.lastname@example.org
- A. P. Suchkov IPI RAN, email@example.com
Abstract: The functional and organizational charts and principles of the identity and access management of the users’
rights, developed for the two strategies to information protection, which are accepted by the organization or cloud
computing community, are stated. The works organization procedure to create a centralized identity and access
management system of the users’ rights as a part of the information security maintenance system for high available
collective data-processing centers is defined.
Keywords: high availability; information security; data-processing center
EXTENDING INFORMATION INTEGRATION TECHNOLOGIES FOR PROBLEM SOLVING
OVER HETEROGENEOUS INFORMATION RESOURCES.
- L.A. Kalinichenko IPI RAN, firstname.lastname@example.org
- S.A. Stupnikov IPI RAN, email@example.com
- V.N. Zakharov IPI RAN, firstname.lastname@example.org
Abstract: This position paper is an attempt to match up the emerging challenges for problem solving over heterogeneous
distributed information resources. State-of-the-art in subject mediation technology reached at IPI RAN is
presented. The technology is aimed at filling the widening gap between the users (applications) and heterogeneous
resources of data, knowledge, and services. Also, the paper affects the semantic-based information integration
technologies challenges including investigation of application-driven approach for problem solving in the subject
mediator environment, a provision for support of executable declarative specifications of the applications over the
mediator, enhancement of presence of knowledge-based facilities at the mediator level, and mediation of databases
with nontraditional data models motivated by the need of large data support.
Keywords: subject mediation; heterogeneous information resources; scientific problem solving; information
integration; application-driven approach; rule-based languages; nontraditional data models
THE MOTIF INFORMATION ANALYSIS BASED ON THE SOLVABILITY CRITERION
FOR THE PROTEIN SECONDARY STRUCTURE RECOGNITION.
- K. V. Rudakov Dorodnicyn Computing Center of the Russian Academy of Sciences;Moscow Institute of Physics and Technology
(State University), email@example.com
- I. Yu. Torshin Russian Center of the Trace Element Institute for UNESCO, firstname.lastname@example.org
Abstract: The development of the formal description of recognition of protein secondary structure problem is presented.
The key concepts of motif, informativity estimate of a motive, and the order of the motives, allowing to use the
formalismfor the analysis of actual precedent sets are introduced. The experiments on the solvability testing indicate
a possibility of an efficient selection of the most informative motifs.
Keywords: algebraic approach; bioinformatics; locality; solvability; feature value classification
SPEAKER IDENTIFICATION SYSTEMFOR THE NIST SRE 2010.
- I.N.Belykh Speech Technology Center, St.-Petersburg, email@example.com
- A. I.Kapustin Speech Technology Center, St.-Petersburg, firstname.lastname@example.org
- A. V.Kozlov Speech Technology Center, St.-Petersburg, email@example.com
- A. I.Lohanova Speech Technology Center, St.-Petersburg, firstname.lastname@example.org
- Yu.N.Matveev Speech Technology Center, St.-Petersburg, email@example.com
- T. S.Pekhovsky Speech Technology Center, St.-Petersburg, firstname.lastname@example.org
- K.K. Simonchik Speech Technology Center, St.-Petersburg, email@example.com
- А.K. Shulipa Speech Technology Center, St.-Petersburg, firstname.lastname@example.org
Abstract: A description of a speaker identification system by voice is presented. This system was developed for submission on
speaker recognition system evaluation at NIST SRE 2010.
Keywords: biometry; speaker identification; voice recognition; pitch; formants; GMM; SVM; NIST
FAST PROCESSING OF FINGERPRINT IMAGES.
- V. J. Gudkov Chelyabinsk State University, Department of AppliedMathematics, email@example.com
- M. V. Bokov South Ural State University, Department of AppliedMathematics, firstname.lastname@example.org
Abstract: A consistent method of identification of individual features from fingerprint image with the severe restrictions is
briefly described. Individual features are stored in the image template. The templates are used for fingerprint
Keywords: fingerprint; image processing; flow matrix; period matrix; minutiae
TEACHING OF SKIN EXTRACTION ALGORITHMS FOR HUMAN FACE COLOR IMAGES.
- Y. Vizilter State Research Institute of Aviation Systems (GosNIIAS), email@example.com
- V. Gorbatcevich State Research Institute of Aviation Systems (GosNIIAS), firstname.lastname@example.org
- S. Karateev State Research Institute of Aviation Systems (GosNIIAS), email@example.com
- N. Kostromov State Research Institute of Aviation Systems (GosNIIAS)
Abstract: Two methods for teaching of algorithms for the skin extraction in color images of human faces are proposed and
discussed. The first method is based on self-organizing neural network called “growing neural gas.” The second
one is based on morphological classification by minimal cutting of neighborhood graph for a training set in color
space. The CIE Lab color space is applied for color description in both cases. The efficiency of both methods is
demonstrated. The differences in selection results of the proposed methods are explored and demonstrated.
Keywords: biometrics; human skin extraction; self-organizing neural networks; morphological classification; graph
REAL-TIME HAND GESTURE RECOGNITION BY PLANAR AND SPATIAL SKELETAL MODELS.
- A. V. Kurakin Moscow Institute of Physics and Technology (State University), firstname.lastname@example.org
Abstract: The hand gesture recognition problem is considered. Algorithmto detect planar positions of fingertips by the image
of hand silhouette is proposed. It operates with the analysis of continuous skeleton of the hand shape for silhouette
segmentation. An extension of the algorithm to spatial case is presented. It uses stereo pair of hand silhouettes to
estimate spatial positions of hand and fingertips. The developed methods work in real time, allowing their use in
applied hand gesture recognition systems.
Keywords: continuous skeleton; shape analysis; gesture recognition; stereovision
COMBINED APPROACH TO LOCALIZATION OF DIFFERENCES FOR MULTIMODAL IMAGES.
- D.M.Murashov Dorodnicyn Computing Center, Russian Academy of Sciences, d email@example.com
Abstract: An approach to the problem of localization of the differences in multimodal images is suggested. The approach
is based on specific object detectors and local information-theoretical image difference measures implemented as
conditional entropy of the analyzed image pair. The proposed approach is applied to the problem of detecting
repainting areas of fine art paintings using the images acquired in visible and ultraviolet spectral ranges.
Keywords: multimodal images; measure of image difference; information-theoretical measure; conditional entropy;
images of fine art paintings
SECURED BIOMETRIC VERIFICATION BASED ON FINGERPRINT TOPOLOGY BINARY REPRESENTATION.
- O. S. Ushmaev IPI RAN, firstname.lastname@example.org
- V. V. Kuznetsov IPI RAN, email@example.com
Abstract: The paper deals with combination of cryptographic constructions and fingerprint identification. A technique of
repeatable binary string extraction from fingerprint images is suggested. The binary features from topological
relations between minutiae points are extracted. For an arbitrary minutiae point, the neighboring ridges are traced
until the event is encountered: minutiae or projection of minutiae. Then, these events are encoded. Thus, 50–
100-bit descriptions for each minutiae point are obtained. In order to extract longer binary string, two techniques
are suggested. The first one is the self-aligned technique, while the second one requires public helper. Thus,
384–756-bit binary string is extracted. The strings have approximately 20% erroneous bits, which are corrected
using two-layer Bose–Chaudhuri–Hocquenghem (BCH) major voting codes. The experiments on FVC2002 DB1
dataset show that 20–40-bit error-free binary string can be reproduced from genuine fingerprint with 90 percent
Keywords: secured biometric verification; fuzzy extractor; fingerprint