Novosibirsk State University of Economics and Management

nsuem.ru
Novosibirsk, Russia
SEARCH FILTERS
Time filter
Source Type

Freidina E.V.,Novosibirsk State University of Economics and Management | Botvinnik A.A.,Russian Academy of Sciences | Dvornikova A.N.,Russian Academy of Sciences
IOP Conference Series: Earth and Environmental Science | Year: 2017

The natural resource potential of mineral deposits is represented by three categories: upside, attainable and investment. A modern methodology is proposed in this paper for production quality control, and its tools aimed at ensuring agreement between the product quality and the market requirements are described. The definitions of the costs of the product quality compliance and incompliance with the consumer requirements are introduced; the latter is suggested to use in evaluating resource potential of mineral deposits at a certain degree of probability. © Published under licence by IOP Publishing Ltd.


Antoshchenkova I.V.,National Research University Higher School of Economics | Bykadorov I.A.,Novosibirsk State University of Economics and Management
Automation and Remote Control | Year: 2017

This paper considers a monopolistic competition model with the endogenous choice of technology in the closed economy case. Our aim is to obtain the comparative statics of the equilibrium and socially optimal solutions with respect to the technological innovation parameter that affects costs. The key findings are the following: consumption and investments in productivity both increase with the growth of technological innovation; the behavior of the equilibrium variables depends on the elasticity of demand only; the behavior of the socially optimal variables depends on the elasticity of utility only; finally, the behavior of the equilibrium and socially optimal variables does not depend on the properties of the costs as a function of investments in R&D. © 2017, Pleiades Publishing, Ltd.


Monarev V.A.,Russian Academy of Sciences | Pestunov A.I.,Novosibirsk State University of Economics and Management
Prikladnaya Diskretnaya Matematika | Year: 2016

We introduce a new approach to steganalysis called \the tentative filtering" and consisting in inserting an additional filtering phase before the final classification in order to select those containers where stego-information can be reliably detected. The size of this \good" subset of containers can be considered as an additional characteristic of the detector. We introduce three methods for implementing the tentative filtering: the naive method, the simple classification, and the combined classification. The experiments demonstrate that it is possible to select about 35 % of BOSSbase v1.01 images, for which HUGO 0.4 bpp is detected with the error less than 0.003, while the error over the whole set is 0.141. It is also demonstrated that it is possible to select about 5 % images, for which HUGO 0.1 bpp is detected with the error less than 0.05, while the whole set gives the error 0.37 (which is not quite a reliable detection).


Freidina E.V.,Novosibirsk State University of Economics and Management | Botvinnik A.A.,Russian Academy of Sciences | Dvornikova A.N.,Russian Academy of Sciences
Journal of Mining Science | Year: 2014

Topicality, concept, principles and tool of the robust control in open pit mining are given. It is shown that each stage of the product quality control must have permissible range of fluctuation for coal properties, loading equipment capacity and work area limits in open pit mines. The goal and capabilities of the robust control is the stable operation of the production system within the set limits and constraints. The article presents methodology and implementation tool for the robust control in open pit coal mines. © 2014, Pleiades Publishing, Ltd.


Rodionova Z.V.,Novosibirsk State University of Economics and Management | Bobrov L.K.,Novosibirsk State University of Economics and Management
Scientific and Technical Information Processing | Year: 2016

This paper justifies the relevance of the reliable protection of information and the development of measures to reduce information risks in libraries with comprehensive information resources. A brief description of the objects of protection and the main threats, including those that are related to the processing of personal data, is provided. It is alleged that analysis of models of the business processes of a library makes it possible to track the impacts of changes on many aspects of information security. The position of the information system for security analysis of the business process in the overall system of information security is determined. Steps for the formalization and updating of the rights of access to information resources of a library are illustrated. It is emphasized that the basic document for information-security risk management is a threat model that reflects the data on sources of threats and vulnerabilities of the system, impacted objects, and a number of other parameters. A block diagram that illustrates the process of analyzing the threats and vulnerabilities and a knowledge meta-model for the management of information-security risks are provided. It is concluded that based on the relationship of business processes that are reflected in a formal notation it is possible to automatically obtain the data on the degree of influence of security aspects of information objects of a particular sub-process on the results of business processes of a higher level, and as a result, on the achievability of the purposes of an organization. © 2016, Allerton Press, Inc.


Pestunov A.I.,Novosibirsk State University of Economics and Management
Journal of Applied and Industrial Mathematics | Year: 2014

We study how does the Hamming weight of the difference between two values influence the probability of this difference preservation after modulo addition and subtraction. By the difference between two random variables we mean the operation XOR which is standard for cryptanalysis. We prove that if the most significant bit of the difference is equal to 0 (is equal to 1) then the probability of the difference preservation is equal to 2-h (equal to 2-(h-1)), where h is the Hamming weight of the difference. The theoretical results are confirmed experimentally. © 2014 Pleiades Publishing, Ltd.


Monarev V.,Novosibirsk State University | Pestunov A.,Novosibirsk State University of Economics and Management
Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014 | Year: 2014

We introduce a known-key scenario for steganalysis and propose an approach to construct highly accurate quantitative detectors within it. As an example we construct a quantitative detector based on the well-known SPAM-features and apply it to steganalysis of non-distorted bitmap images with LSB-matching. While the state-of-the-art methods aiming at solving this problem allow to detect payloads up to 0.1 bits-per-pixel, the proposed method detects effectively up to 0.001 bpp. Despite essential utilization of SPAM-features, which have been originally designed for LSB-matching, our method detects LSB-replacement as well, in average, with the same accuracy as LSB-matching. Thus, the known-key scenario is a very powerful tool, and it would be worthwhile to adapt the state-of-the-art methods to this scenario for the purpose of attaining even more accuracy of steganalyzers. © 2014 IEEE.


Pestunov A.,Novosibirsk State University of Economics and Management
Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014 | Year: 2014

Although differential cryptanalysis is widely employed for iterative block ciphers security analysis, it's basic notions are not properly formalized and relations between them are not systematized (especially related to truncated differentials). We present a formalization of these notions using special binary masks, and use it for their systematization, which allows to show strictly that truncated differential characteristic is the most general notion and non-truncated characteristics, non-truncated differentials and truncated differentials are in fact truncated characteristics under certain conditions. We also formalize the procedure of truncated characteristics concatenation and show that for a Markov cipher the probability of the resultant characteristic is estimated as their product (as it was shown by Lai and Massey for non-truncated characteristics). © 2014 IEEE.


Gorbacheva A.,Novosibirsk State University of Economics and Management | Smirnov S.,Novosibirsk State University of Economics and Management
AI and Society | Year: 2016

The processes of changing the way of thinking, typical for modern people, and subsequently shaping a new “Homo clicking” individual are analyzed. The authors consider a specific mindset of “Homo clicking” illustrating it with some patterns and modes of action that characterize individuals in the human–machine interface. Under this frame, the influence of modern converging technologies upon human conduct is examined and functional redistribution between human beings and technical devices is outlined. In the literature, the latter phenomenon is referred to as “life outsourcing.” This material is used to introduce several principles that form the basis for a new type of thought and actions of “Home clicking”: snapping, transforming trust into knowledge, and action reduction. Reducing the traditional classic understanding of a human act of thinking to a pattern of a thinking act as a need-satisfying act is described. In the last section, we introduce an extension of Searle’s Chinese room, which can be seen as a possible consequence of intensive exploitation of technologies. © 2016 Springer-Verlag London


Glinskiy V.,Novosibirsk State University of Economics and Management | Serga L.,Novosibirsk State University of Economics and Management | Khvan M.,Novosibirsk State University of Economics and Management
Procedia CIRP | Year: 2016

The reason for the research is Russia's transition to the model of sustainable development. The environmental component plays the important role in the formation of sustainable development of the territories. This research area enables to estimate the influence of environmental parameters on the level of sustainable development of territories. Indicators characterizing the state of the environment and ecological potential of these territories were used as indicators which have an impact on sustainable development. This research was carried out on the basis of multiple regressions method. For the first time the classification of regions of the Russian Federation for 2013 by the level of environmental safety was made. As a result, the most significant indicators affecting the sustainable development of territories were revealed and decisions for the management of these parameters were developed in order to improve the sustainable development of territories. © 2016 The Authors. Published by Elsevier B.V.

Loading Novosibirsk State University of Economics and Management collaborators
Loading Novosibirsk State University of Economics and Management collaborators