Main Scientific Results

  • Main Scientific Results in 2014

    • Scientifically grounded and developed: the project "Information security strategy" and three model legislative acts (for the states – participants of the CIS). The documents were adopted at 41st plenary session of the IPA CIS,28.11.2014 ; "Recommendations for rapprochement and harmonization of the national legislation of member states of the Collective Security Treaty Organization in the sphere of ensuring information and communication security". The document was adopted at the 7thplenary session of the CSTO PA 27.11.2014 (R.M. Yusupov, M.A.Vus)

    • We have created theoretical framework as well as software and hardware for technology platform for development and operation of multimodal interfaces based on spatial-temporal structuring data on users, application of modules of multichannel audio and video signals processing, differing by a focus on the design and support of personalized multimodal information management services and heterogeneous robotic systems. (A.L. Ronzhin)

    • We have developed a method of computer sonography of underwater objects in an ocean waveguide. Its essence lies in the estimation of the distributions of the intensities of the acoustic fields of underwater objects based on the harmonized with the environment processing of signals received by acoustic antenna. The novelty consists in the development of new algorithms for calculation of acoustic field and solution of the inverse problem in an underwater waveguide. The method is intended to illuminate the underwater environment in sonar underwater surveillance systems. (V.V. Popovich)

    • We have developed amodel and algorithmic support for the technology of model building of big data target variables. The technology is fully implemented in software, tested experimentally and confirmed its computational efficiency and performance. (V. I.Gorodetskiy)

    • We have developed an optional algorithm for analysis and prediction of the behavior of cloud applications that useprofile activity and time series forecasting models.  Anomaly detection is based on data received from the analyzer. The prospects of the method lie in the possibility of detecting new types of attacks. (V. I. Vorobyev)

    • We have developed a new method for constructing crypto schemes, allowing overcoming the difficulties of solving factorization and discrete logarithm problems simultaneously. The method provides for the extension of the range of cryptographic algorithms and protocols with high security level. (A.A. Moldovyan)

    • We have developed models of socially important behavior on the basis of Bayesian Belief Networks, which offer new approaches to processing specific data type (survey results) and provide support for decision making under circumstanceswhere it is impossible to organize long-term observation for data reception. (A.L. Tulupyev)

    • We have created algorithms and methods for preprocessing of electrophysiological data, consistent with mathematical methods for subsequent data mining. Tools for structural-linguistic processing and analysis of electrophysiological signals have been upgraded and new methodshave been developed that use constructive and statistical associations of parameters and fragments of electrophysiological signals, which allows improving assessment of functional patients’state and conducting a deeper analysis of the psychological effects. (S.B.Rudnitskiy)

    • We have developed an algorithm for compression of 3D data, which is characterized by the use of space-filling curve to reorder elements in point clouds and does not require a reconstructed surface of the object. The concept of replication of 3D model and its propertieshave been defined. (V. V. Alexandrov)
      We have developed models, a methodology and software environment for modelling of protection processes of information and telecommunication networks against infrastructure attacks.These models differ from the existing ones by the use of hierarchical componentbased architecture and developed libraries of attacks and protection mechanisms.These results are important for studying performance of various types of malware, search of optimal configurations of counteraction mechanisms andassessment of the effectiveness of their functioning. (I.V.Kotenko)