Time filter

Source Type

Bukhvalov O.,Intelligent Platform and System Ltd. | Gorodetsky V.,St Petersburg Institute For Informatics And Automation | Karsaev O.,Intelligent Platform and System Ltd. | Samoylov V.,Intelligent Platform and System Ltd.
IFAC Proceedings Volumes (IFAC-PapersOnline) | Year: 2013

The paper presents an efficient privacy preserving distributed algorithm intended to coordinate local production schedules of B2B plant network involved in joint fulfillment of multiple dynamically incoming orders. This task is challenging and has no satisfactory solution of industrial scale so far. The proposed solution exploiting multi-agent software architecture is validated based on a case study dealing with industrial scale distributed coordination of production schedules of autonomous shops of a big production plant. © IFAC. Source

Kolpaschikov L.,Extreme North Agricultural Research Institute | Makhailo V.,St Petersburg Institute For Informatics And Automation | Russell D.E.,Yukon College
Ecology and Society | Year: 2015

The Taimyr wild reindeer herd, i.e., caribou (Rangifer tarandus), is one of the most important wildlife resources in the Russian Far North and may constitute the largest migratory Rangifer herd in the world. Over the last 60 years the herd has undergone a recovery from low numbers in the 1940s, reaching high densities by 1970 that concerned wildlife managers and domestic husbandry herds, with an 11.7% annual growth rate. At that time an aggressive commercial harvest of the herd was implemented, and organized wolf control was initiated with the goal of stabilizing herd numbers and injecting needed economic activity into the region. These actions dampened the rate of increase throughout the 1970s and 1980s to a 3.0% annual growth rate. From 1991, after the collapse of the Soviet Union and the loss of financial capability to sustain the commercial harvest and continue wolf control, the population again increased at a 5.6% annual growth rate, until peaking in 2000 at just more than 1 million animals. Since 2000 the herd has been in decline; harvesting, primarily unregulated, has increased; the wolf population has increased; and range conditions have deteriorated. Understanding what has occurred in the Taimyr range can provide North American managers with valuable lessons in understanding the large migratory herds on this continent, especially given that the social and political situation in Russia enabled intensive management, i.e., harvest and wolf control, that may not be able to be duplicated in North America. © 2015 by the author(s). Source

Kotenko I.,St Petersburg Institute For Informatics And Automation | Chechulin A.,St Petersburg Institute For Informatics And Automation | Komashinsky D.,F-Secure
Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015 | Year: 2015

The paper is devoted to the issues of automated categorization of textual information which can be applied in the systems intended to block inappropriate content. The approach used for feature selection and construction is proposed. The text mining methods used for research (Decision Tree classifiers) are analyzed. Besides that, the techniques of Web sites analysis that provide information in different languages are suggested. The aspects of collection and analysis of text features required for classification in certain categories are investigated. Results of experiments on analysis of text correspondence to different categories are given. The classification quality is evaluated. The text classification component, developed as a result of this paper, is intended for realization in F-Secure systems aiming to block inappropriate web content. © 2015 IEEE. Source

Bogdanov V.,St Petersburg Institute For Informatics And Automation | Kotenko I.,St Petersburg Institute For Informatics And Automation
Communications in Computer and Information Science | Year: 2013

One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers the suggested approach to proactive monitoring of security policy performance and security mechanisms functioning. This approach is based on the different strategies of automatic imitation of possible users' actions in the computer network, including exhaustive search, express-analysis and generating the optimized test sequences. It is applicable to different security policies (authentication, authorization, filtering, communication channel protection, etc.). The paper describes stages, generalized algorithms and main peculiarities of the suggested approach and formal methods used to fulfill the test sequence optimization. We consider the generalized architecture of the proactive monitoring system "Proactive security scanner" (PSC) developed, its implementation and an example of policy testing. © Springer-Verlag Berlin Heidelberg 2007. Source

Merkuryeva G.,Riga Technical University | Merkuryev Y.,Riga Technical University | Sokolov B.V.,Saint Petersburg State University of Information Technologies, Mechanics and Optics | Potryasaev S.,St Petersburg Institute For Informatics And Automation | And 2 more authors.
Journal of Computational Science | Year: 2015

The paper presents the state-of-the-art in flood forecasting and simulation applied to a river flood analysis and risk prediction. Different water flow forecasting and river simulation models and systems are analysed. An advanced river flood monitoring, modelling and forecasting approach is introduced. It extends the traditional approach based on modelling river physical processes by integration of different types of models and technologies such as input data clustering and filtering, digital maps of a relief and river terrain, data crowdsourcing, heterogeneous data processing, hydrological models for time scale modelling water flows and geo-simulation, inundation visualisation and duly warning on flooding. A case study on river flow forecasting and simulation for river flood risk analysis and management is given. © 2014 Elsevier B.V. Source

Discover hidden collaborations