Electronic modeling

Vol 44, No 5 (2022)

CONTENTS

Mathematical modeling and Computation Methods

 
 

3-24
 
25-35
  36-50

Computational Processes and Systems

 
51-60

Application of Modeling Methods and Facilities

 
KOMAROV M.Yu., HONCHAR S.F., ONYSKOVA A.V., BAKALYNSKYI O.O., PAKHOLCHENKO D.V.
Recommendations for Ensuring Cyber Protection of Industrial Control Systemsof Energy Sector


61-72
 
73-89
 
90-101
 
102-113

A METHOD OF ACCELERATED QUANTITATIVE EVALUATION OF COMPONENTS OF FPGA-BASED SECURITY SYSTEMS

S.Ya. Hilgurt

Èlektron. model. 2022, 44(5):03-24

https://doi.org/10.15407/emodel.44.05.003

ABSTRACT

Recently, various approaches have been successfully used in information security tools to detect harmful activity, including artificial intelligence technologies. But only the signature approach can completely eliminate recognition errors. That is especially important for critical infrastructure objects. One of the main disadvantages of signature tools is the high computational complexity. Therefore, the developers of such systems turn to hardware implementation, primarily on a reconfigurable platform, that is, using FPGAs. The ability to quickly reprogram FPGAs gives reconfigurable security systems unprecedented flexibility and adaptive possibilities. There are many different approaches to the construction of hardware pattern matching circuits (that are parts of signatures). Choosing the optimal technical solution for recognizing a specific set of patterns is a non-trivial task. For a more efficient distribution of patterns between components, it is necessary to solve an optimization task, the objective function of which includes the quantitative technical characteristics of hardware recognition schemes. Finding these values at each step of the algorithm by performing the full digital circuit synthesis procedure by the CAD is an unacceptably slow approach. The method proposed in this study for the accelerated quantitative evaluation of components of reconfigurable signature-based security systems, based on the use of the so-called evaluation functions, allows solving the problem.

KEYWORDS

signature-based security system, NIDS, multi-pattern string matching, FPGA, quantification

REFERENCES

  1. Smyth, B. (2003), Computing Patterns in Strings, Pearson Addison Wesley, Essex, England.
  2. Chen, H., Chen, Y. and Summerville, D.H. (2011), "A Survey on the Application of FPGAs for Network Infrastructure Security", IEEE Communications Surveys and Tutorials, Vol. 13, 4, pp. 541-561, available at: 
    https://doi.org/10.1109/SURV.2011.072210.00075
  3. Hilhurt, S.Ya. (2013), "Reconfigurable Accelerators: Analytical Review", Elektronne modelyuvannya, Vol. 35, no. 4, pp. 49-72.
  4. Abdulhammed, R., Faezipour, M. and Elleithy, K.M. (2016), "Network Intrusion Detection Using Hardware Techniques: A Review", IEEE Long Island Systems, Applications and Technology Conference (LISAT'16), April 2016, pp. 1-7, available at: https://doi.org/10.1109/LISAT.2016.7494100
  5. Jyothi, V., Addepalli, S.K. and Karri, R. (2018), "DPFEE: A High Performance Scalable Pre-Processor for Network Security Systems", IEEE Transactions on Multi-Scale Computing Systems, Vol. 4, no. 1, pp. 55-68, available at: https://doi.org/10.1109/TMSCS.2017.2765324
  6. Evdokimov, V.F., Davydenko, A.N. and Hilgurt, S.Ya. (2018), "Additional stages of the procedure for online reconfiguration of hardware accelerators for information security tasks", Modelyuvannya ta informatsiyni tekhnolohiyi, Vol. 85, pp. 3-11.
  7. AMD, Xilinx, available at: www.xilinx.com (accessed: June 27, 2022).
  8. Evdokimov, V.F., Davydenko, A.N. and Hilgurt, S.Ya. (2017), "Organization of centralized generation of configuration files for hardware accelerators of information security tasks", Modelyuvannya ta informatsiyni tekhnolohiyi, Vol. 81, pp. 3-11.
  9. Hilgurt, S. (2019), "Constructing Optimal Reconfigurable Pattern Matching Tools for Information Security", Bezpeka informatsiyi, Vol. 25, no. 2, pp. 74-81, available at: https://doi.org/10.18372/2225-5036.25.13824
  10. Hilgurt, S.Ya. (2021), "A Survey on Hardware Solutions for Signature-Based Security Systems", 1st International Workshop on Information Technologies: Theoretical and Applied Problems 2021 (ITTAP 2021), Ternopil, Ukraine, November 16-18, 2021, Vol. 3039, pp. 6-23, available at: http://ceur-ws.org/Vol-3039.
  11. Cho, Y.H. and Mangione-Smith, W.H. (2004), "Deep Packet Filter With Dedicated Logic and Read Only Memories", 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Proceedings, pp. 125-134, available at: https://doi.org/10.1109/fccm. 25.
  12. Sourdis, I., Pnevmatikatos, D.N. and Vassiliadis, S. (2008), "Scalable Multigigabit Pattern Matching for Packet Inspection", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 16, no. 2, pp. 156-166, available at: https://doi.org/10.1109/tvls1. 912036.
  13. Bloom, B.H. (1970), "Space/Time Trade-offs in Hash Coding with Allowable Errors", Communications of the ACM, Vol. 13, no. 7, pp. 422-426, available at: https://doi.org/10.1145/362686.362692
  14. Geravand, S. and Ahmadi, M. (2013), "Bloom Filter Applications in Network Security: a State-of-the-Art Survey", Computer Networks, Vol. 57, no. 18, pp. 4047-4064, available at: https://doi.org/10.1016/j.comnet.2013.09.003
  15. Aho, A.V. and Corasick, M.J. (1975), "Efficient String Matching: an Aid to Bibliographic Search", Communications of the ACM, Vol. 18, no. 6, pp. 333-340, available at: https://doi.org/10.1145/360825.360855
  16. Jiang, W., Yang, Y.H.E. and Prasanna, V.K. (2010), "Scalable Multi-Pipeline Architecture for High Performance Multi-Pattern String Matching", 24th IEEE International Parallel and Distributed Processing Symposium (IPDPS'10), Atlanta, GA, April 19-23, 2010, pp. 1-12, available at: https://doi.org/10.1109/IPDPS.2010.5470374
  17. Hilgurt, S.Ya. (2019), "Constructing CAMs Based on Digital Comparators by Reconfigurable Means for Solving Network Security Tasks", Elektronne modelyuvannya, Vol. 41, no. 3, pp. 59-80, available at: https://doi.org/10.15407/emodel.41.03.059
  18. Hilgurt, S. (2019), "Constructing Bloom Filters by Reconfigurable Means for Solving Information Security Tasks", Bezpeka informatsiyi, Vol. 35, no. 1, pp. 53-58, available at: https://doi.org/10.18372/2225-5036.25.13594
  19. Hilgurt, S. (2019), "Constructing Deterministic Finite Automata by Reconfigurable Means for Solving Information Security Tasks", Zakhyst informatsiyi, Vol. 21, no. 2, pp. 111-120, available at: https://doi.org/10.18372/2410-7840.21.13768
  20. Hilgurt, S.Ya. (2021), "Comparative Analysis of Approaches to the Building of Reconfigurable Security Tools Components", Problemy informatyzatsiyi ta upravlinnya, Vol. 2, no. 66, pp. 17-26, available at: https://doi.org/10.18372/2073-4751.66.15712.
  21. AMD, Xilinx "Virtex® UltraScale+™ HBM FPGAs provide the highest on-chip memory density with up to 500Mb of total on-chip integrated memory, plus up to 16GB of high-bandwidth memory (HBM) Gen2 integrated in-package for 460GB/s of memory bandwidth", available at: www.xilinx.com/products/silicon-devices/fpga/virtex-ultrascale- plus-hbm.html (accessed 27.07.2022).
  22. Huang, J., Yang, Z.K., Du, X. and Liu, W. (2006), "FPGA Based High Speed and Low Area Cost Pattern Matching", IEEE Region 10 Conference (TENCON 2005), Melbourne, Austra­lia, November 21-24, 2005, pp. 2693-2697, available at: https://doi.org/10.1109/TENCON.2005.300988
  23. Sourdis, I. and Pnevmatikatos, D. (2003), "Fast, Large-Scale String Match for a 10gbps FPGA-Based Network Intrusion Detection System", Field-Programmable Logic and Applications, Vol. 2778, pp. 880-889, available at: https://doi.org/10.1007/978-3-540-45234-8_85

Full text: PDF

 

MODELING OF PERCOLATION BEHAVIOR OF THERMAL CONDUCTIVITY IN POLYMER NANOCOMPOSITES CONTAINING CARBON NANOTUBES

Е.А. Lysenkov

Èlektron. model. 2022, 44(5):25-35

https://doi.org/10.15407/emodel.44.05.025

ABSTRACT

An overview of the most correct mathematical models for describing the thermal conductivity of polymer-carbon nanotube systems, which characterize percolation behavior, is given. It is shown that the Landauer model, which does not take into account the presence of a percolation transition at low filler concentrations, is in poor agreement with the experiment. The sigmoidal model describes experimental data well, but is purely empirical. Zhang's model turned out to be incorrect for this type of system, as it was designed for a system with a high filler content. The scaling model showed good agreement with experimental data for a system with a low percolation threshold.

KEYWORDS

thermal conductivity, carbon nanotubes, thermal conductivity models, polymer nanocomposites, percolation behavior

REFERENCES

  1. Chena, H., Ginzburg, V.V., Yang, J. et. al. (2016), “Thermal conductivity of polymer-based composites: Fundamentals and applications”, Progress in Polymer Science, Vol. 59, рр. 41–85.
    https://doi.org/10.1016/j.progpolymsci.2016.03.001
  2. Han, Z. and Fina, A. (2011), “Thermal Conductivity of Carbon Nanotubes and their Polymer Nanocomposites: A Review”, Progress in Polymer Science, Vol. 36, pp. 914–944.
    https://doi.org/10.1016/j.progpolymsci.2010.11.004
  3. Hu, J., Huang, Y., Yao, Y. et. al. (2017), “A Polymer Composite with Improved Thermal Conductivity by Constructing Hierarchically Ordered Three-Dimensional Interconnected Network of BN”, ACS Applied Materials & Interfaces, Vol. 9, no. 15, рр. 13544–13553.
    https://doi.org/10.1021/acsami.7b02410
  4. Huxtable, S.T., Cahill, D.G., Shenogin, S. et. al. (2003). “Interfacial heat flow in carbon nanotube suspensions”, Nature Materials, Vol. 2, no. 11, pp. 731–734.
    https://doi.org/10.1038/nmat996
  5. Aalilija, A., Gandin, Ch.-A. and Hachem, E. (2021), “A simple and efficient numerical model for thermal contact resistance based on diffuse interface immersed boundary me­thod”, International Journal of Thermal Sciences, Vol. 166, pp. 106817.
    https://doi.org/10.1016/j.ijthermalsci.2020.106817
  6. He, C. and Xu, J. (2020) “Finite element analysis of the thermal conductivity and the specific heat of Carbon Fiber Reinforced Plastic (CFRP) composites”, 2020 International Conference on Artificial Intelligence and Electromechanical Automation (AIEA), рр. 771–774.
    https://doi.org/10.1109/AIEA51086.2020.00169
  7. Fiedler, Th., Pesetskaya, E., Öchsner, A. and Grácio, J. (2005), “Numerical and analytical calculation of the orthotropic heat transfer properties of fibre reinforced materials”, Materialwissenschaft und Werkstofftechnik, Vol. 36, no. 10, рр. 602–607.
    https://doi.org/10.1002/mawe.200500905
  8. Kwon, S.Y., Kwon, I.M., Kim, Y.-G., Lee, S. and Seo, Y.-S. (2013), “A large increase in the thermal conductivity of carbon nanotube/polymer composites produced by percolation phenomena”, Carbon, Vol. 55, pp. 285–290.
    https://doi.org/10.1016/j.carbon.2012.12.063
  9. Kim, B.-W., Park, S.-H., Kapadia, R.S. and Bandaru, P.R. (2013), “Evidence of percolation related power law behavior in the thermal conductivity of nanotube/polymer composites”, Applied Physics Letters, Vol. 102, pp. 243105.
    https://doi.org/10.1063/1.4811497
  10. Zhang, G., Xia, Y., Wang, H., Tao, Y., Tao, G. and Tu, S. (2010), “A Percolation Model of Thermal Conductivity for Filled Polymer Composites”, Journal of Composite Materials, Vol. 44, no. 8, pp. 963–970.
    https://doi.org/10.1177/0021998309349690
  11. Lysenkov, Е.А. and Dinzhos, R.V. (2019), “Theoretical analysis of thermal conductivity of polymer systems filled with carbon nanotubes”, Journal of Nano- and Electronic Physics, Vol. 11, no. 4, рр. 04004.
    https://doi.org/10.21272/jnep.11(4).04004
  12. Lysenkov, Е.А. (2019), “Simulation of thermal conductivity of polymer nanocomposites, using models based on thermal-electrical analogy”, Nanosistemi, Nanomateriali, Nanotehnologii, Vol. 17, no. 4, pp. 761–772.
    https://doi.org/10.15407/nnn.17.04.761
  13. Landauer, R. (1952), “The Electrical Resistance of Binary Metallic Mixtures”, Journal of Applied Physics, Vol. 23, no. 7, рр. 779–784.
    https://doi.org/10.1063/1.1702301
  14. Tjørve, E. (2003), “Shapes and functions of species–area curves: a review of possible mo­dels”, Journal of Biogeography, Vol. 30, no. 6, pp. 827–835.
    https://doi.org/10.1046/j.1365-2699.2003.00877.x
  15. Taherian, R. (2014), “Development of an Equation to Model Electrical Conductivity of Po­lymer-Based Carbon Nanocomposites”, ECS Journal of Solid State Science and Technology, Vol. 3, no. 6, pp. M26–M38.
    https://doi.org/10.1149/2.023406jss
  16. Sun, K., Zhang, Z.D., Qian, L., Dang, F., Zhang, X.H. and Fan, R.H. (2016), “Dual percolation behaviors of electrical and thermal conductivity in metal-ceramic composites”, Applied Physics Letters, Vol. 108, pp. 061903.
    https://doi.org/10.1063/1.4941758
  17. Lysenkov, Е.A. and Klepko, V.V. (2015), “Characteristic features of the thermophysical properties of a system based on polyethylene oxide and carbon nanotubes”, Journal of Engineering Physics and Thermophysics, Vol. 88, no. 4, рр. 1008–1014.
    https://doi.org/10.1007/s10891-015-1278-3
  18. Forero-Sandoval, I., Cervantes-Alvarez, F., Ramirez-Rincon, J. et. al. (2021), “Percolation threshold of the thermal, electrical and optical properties of carbonyl-iron microcomposites”, Applied Composite Materials, Vol. 28, no. 2, pp. 447–454.
    https://doi.org/10.1007/s10443-021-09869-z

Full text: PDF

 

ANALYSIS OF REQUIREMENTS AND QUALITY MODEL-ORIENTED ASSESSMENT OF THE EXPLAINABLE AI AS A SERVICE

O.Y. Veprytska, V.S. Kharchenko

Èlektron. model. 2022, 44(5):36-50

https://doi.org/10.15407/emodel.44.05.036

ABSTRACT

Existing artificial intelligence (AI) services provided by cloud providers (Artificial Intelligence as a Service (AIaaS)) and their explainability have been studied. The characteristics and provision of objective evaluation of explainable AI as a service (eXplainable AI as a Service (XAIaaS)) are defined. AIaaS solutions provided by cloud providers Amazon Web Services, Google Cloud Platform and Microsoft Azure were analyzed. Non-functional requirements for XAIaaS evaluation of such systems have been formed. A model has been developed and an example of the quality assessment of an AI system for image detection of weapons has been provided, and an example of its metric assessment has been provided. Directions for further research: parameterization of explainability and its sub-characteristics for services, development of algorithms for determining metrics for evaluating the quality of AI and XAIaaS systems, development of means for ensuring explainability.

KEYWORDS

explainable artificial intelligence, AI as a Service, requirements for artificial intelligence, model of AI quality, metrics

REFERENCES

  1. Elger, P.P. and Shanaghy E.E. (2020), AI As a Service: Serverless Machine Learning with AWS, Manning Publications Company, available at: https://www.manning.com/books/ai-as-a-service.
  2. Top 10 artificial intelligence problems you should know, CloudMoyo, Enabling digital transformation with Cloud and AI, available at: https://www.cloudmoyo.com/blog/ai-ml-automation/top-10-potential-ai-artificial-intelligence-problems/ (accessed: July 03, 2022).
  3. Artificial Intelligence and Life in 2030, Analysis & Policy Observatory, available at: https://apo.org.au/sites/default/files/resource-files/2016-09/apo-nid210721.pdf (accessed: July 04, 2022).
  4. What Is AIaaS? AI as a Service Explained, BMC Blogs, available at: https://www.bmc. com/blogs/ai-as-a-service-aiaas/ (accessed: July 04, 2022).
  5. O'Brien, S. (2018), Anything as a Service (XaaS), RingCentral UK Blog, available at: https://www.ringcentral.com/gb/en/blog/definitions/anything-as-a-service-xaas/ (accessed: July 08, 2022).
  6. Lins, S. et al. (2021), “Artificial Intelligence as a Service”, Business & Information Systems Engineering, Vol. 63, no. 4, pp. 441–456, available at: https://doi.org/10.1007/s12599-021-00708-w
  7. Adadi, A. and Berrada, M. (2018), “Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)”, IEEE Access, Vol. 6, pp. 52138–52160, available at: https://doi.org/10.1109/ACCESS.2018.2870052
  8. Kharchenko, V., Fesenko, H. and Illiashenko, O. (2022), “A basic model of non-functional characteristics for assessing the quality of artificial intelligence”, Radioelektronic and Computer Systems, 2, pp. 131–144, available at: https://doi.org/10.32620/reks.2022.2.11 (accessed: July 06, 2022).
  9. Artificial Intelligence Services, Amazon Web Services, available at: https://aws.amazon.com/ machine-learning/ai-services/ (accessed: July 03, 2022).
  10. Directory of Azure Cloud Services, Microsoft Azure, Cloud Computing Services, available at: https://azure.microsoft.com/en-us/services/ (accessed: July 03, 2022).
  11. Products and Services, Google Cloud, available at: https://cloud.google.com/products# section-3 (accessed: July 03, 2022).
  12. ISO 25010, PORTAL ISO 25000, available at: https://iso25000.com/index.php/en/iso-25000- standards/iso-25010 (accessed: July 04, 2022).
  13. Kharchenko, V., Fesenko, H. and Illiashenko, O. (2022), “Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application”, Sensors, Vol. 22, no. 13, pp. 4865, available at: https://doi.org/10.3390/s22134865.
  14. Overview of Everything as a Service (XaaS), GeeksforGeeks, available at: https://www. org/overview-of-everything-as-a-service-xaas/ (accessed: July 04, 2022).
  15. Saeed, W. (2021), Explainable AI (XAI): A Systematic Meta-Survey of Current Challenges and Future Opportunities, arXiv.org e-Print archive, available at: https://arxiv.org/pdf/2111. pdf (accessed: July 04, 2022).
  16. Than, A. (2022), “Interpretable AI: Building explainable machine learning systems”, Manning, available at: https://www.manning.com/books/interpretable-ai.
  17. AI Gun Detection Technology, ZeroEyes, available at: https://zeroeyes.com/ (accessed: July 11, 2022).
  18. Ahmed, S. et al. (2022), Development and Optimization of Deep Learning Models for Weapon Detection in Surveillance Videos, Applied Sciences, Vol. 12, no. 12, pp. 5772, available at: https://doi.org/10.3390/app12125772 (accessed: July 11, 2022).
  19. Google apologizes after its Vision AI produced racist results, AlgorithmWatch, available at: https://algorithmwatch.org/en/google-vision-racism/ (accessed: July 04, 2022).
  20. Vasyliev I. (2022), “A framework for metricevaluation of artificial intelligence systems based on quality model”, Systemy upravlinnya, navihatsiyi ta zvyazku, Vol. 68, pp. 41–45, available at: https://doi.org/10.26906/SUNZ.2022.2.041 (accessed: July 10, 2022).

Full text: PDF

 

PIECEWISE LINEAR APPROXIMATION OF SMOOTH, FLAT CURVES BY THE SECANT METHOD

I.P. Kryvoruchko

Èlektron. model. 2022, 44(5):51-60

https://doi.org/10.15407/emodel.44.05.051

ABSTRACT

The approximation of smooth lines by a piecewise linear function is relevant in many applications, where this representation can significantly simplify the technological process without a significant loss in quality indicators. An improved method of dividing or representing a smooth curve by a piecewise linear line is proposed, which, in comparison with dividing by the "chord" method, reduces the degree of difference between the approximated and approximating curves for the selected number of segments. The essence of the method consists in the successive point-by-point calculation of the deviation between the approximated line, given analytically, and the straight line segment until the condition of equality of this deviation of the specified tolerance value is met. The next step is to correct the point of intersection of these lines by moving it along the ordinate axis by an amount equal to part of the tolerance in the direction determined by the convexity (concavity) of the original curve. The proposed method of piecewise linear approximation is supposed to be used to implement the sinusoidal motion of the carriage with the sensors in the vibro-calibration system.

KEYWORDS

piecewise linear approximation, secant method, chord method.

REFERENCES

  1. Stone, H. (1961), “Approximation of curves by line segments”, Mathematics of computation, Vol. 15, no. 73, pp. 40-47.
    https://doi.org/10.1090/S0025-5718-1961-0119390-6
  2. Lenchuk, I., Pavlenko, Yu., Zalevsky, V. and Pavlov, A. (1977), “Piecewise linear approximation of the contours of garment parts with a given tolerance”, Tekhnologiya legkoy promyshlennosti, Vol. 4, pp. 109-116.
  3. Ligun, A. and Shumeiko, A., (1997), Asimptoticheskiye metody vosstanovleniya krivykh [Asymptotic methods for recovering curves], Institut matematiki NAN Ukrainy, Kyiv, Ukraine.
  4. Korotkov, V. (2016), “Construction of an asymptotically optimal algorithm for piecewise linear interpolation”, Zbirnyk naukovykh prats Dniprovskoho derzhavnoho tekhnichnoho universytetu, Vol. 1, no. 28, pp. 29-33.
  5. Vladymyrskyi, A., Vladymyrskyi, I., Ivashchenko, A. and Kryvoruchko, I. (2019), “Develop­ment of the structure of the low-frequency automated vibration calibration unit NAVKU-3”, Modelyuvannya ta informatsiyni tekhnolohiyi, Vol. 89, pp. 45-49.
  6. Kryvoruchko, I. (2022) “Piecewise linear approximation of the sinusoidal movement of the carriage of the vibration calibration complex”, SWorldJournal, Vol. 11-01, pp. 79-84, avai­lable at: https://doi.org/10.30888/2663-5712.2022-11-01-59.
  7. Deza, M. and Deza, E. (2009), Encyclopedia of Distances, Springer, Berlin–Heidelberg, Germany.
    https://doi.org/10.1007/978-3-642-00234-2

Full text: PDF