ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Bookmark

Next issue

1
Publication date:
16 March 2021
-->

Journal articles №2 2012

31. Automated control system of transport of liquid carbon dioxide pipeline [№2 за 2012 год]
Authors: (bochkarev@msa.pstu.ru) - , Ph.D; (tai@pstu.ru) - , Ph.D; (druzakin@msa.pstu.ru) - , Ph.D;
Abstract: Discusses the technological process of transportation of liquid carbonic acid technology pipeline. Makes the case for monitoring the process. Proposed hardware and software automation control of carbonic acid. Is the version of the technical implementation of information-measuring system.
Keywords: control, an automated system issue, pipeline, transportation, liquid carbon dioxide
Visitors: 10617

32. Information model and mechanisms of the process to commercializations result innovations activity [№2 за 2012 год]
Authors: (tav@permcnti.ru) - , Ph.D;
Abstract: In work are presented information models and mechanisms of the process to commercializations result innovations activity within the framework of operation regional innovation-technological complex. They are considered information-organizing model and functional presentation information-organizing ensuring the process to commercializations result innovations to activity.
Keywords: information provision, information mechanisms, control management, information and organizational model
Visitors: 10007

33. The method of parallel logical inference of consequences for propositional calculus [№2 за 2012 год]
Authors: (favt_agalakov@vyatsu.ru) - ; (strabykin@mail.ru) - , Ph.D; (m.tomchuk@mail.ru) - , Ph.D;
Abstract: A method for new facts obtaining from the current knowledge base and incoming facts is offered. A substantial and a formal statements of the problem, a formal description of the inference procedure and a description of the offered method are considered. The method operation is illustrated by an example of consequences inference.
Keywords: parallel computing, output logical consequences, inference
Visitors: 8325

34. Forming an integral efficiency factor of information system functioning [№2 за 2012 год]
Authors: Semenov S.A. (sergeysemenov53@gmail.com) - Military Academy of the Aerospace Defence, Ph.D; Arzhaev V.I. (arzhaeVI@cps.tver.ru) - R&D Institute Centerprogramsystem (Branch Manager), Ph.D; V.S. Semenov (Sven258@yandex.ru ) - Military Academy of the Aerospace Defence (Lecturer), Ph.D; (sergey.monichev@gmail.com) - ;
Abstract: Offered an approach to creating an integral efficiency factor of information system operation using its abstract-algebraic model.
Keywords: abstract model, effectively, integral indicator, system
Visitors: 7983

35. Semi-markov models of systems with fuzzy parameters [№2 за 2012 год]
Authors: (midli@mail.ru) - ; (byg@yandex.ru) - , Ph.D;
Abstract: The limitations of existing approaches to the construction and use of semi-fuzzy models for the analysis of the functioning of systems are considered. The main classes of fuzzy functions, which should be used as a fuzzy mappings in constructing models of semi-Markovian systems with fuzzy parameters, are allocated and described. An approach to the analysis of semi-fuzzy models, regardless of which of the options are clear, and which – fuzzy are presented.
Keywords: fuzzy representation, fuzzy function, fuzzy parameters, fuzzy semi-Markov model
Visitors: 6771

36. Variants constructions of algorithm search solution of inverse problems using neural networks [№2 за 2012 год]
Authors: (putchkov63@mail.ru) - ; A.Yu. Puchkov (putchkov63@mail.ru) - Smolensk Branch of the Moscow Power Engineering Institute (Associate Professor), Ph.D;
Abstract: Two variants of the algorithm of numerical solution of inverse problems using artificial neural networks and pre-treatment measurements of the discrete Kalman filter are considered.
Keywords: Kalman filter, neural network, inverse problems
Visitors: 10580

37. Experimental acknowledgement of consistency of estimations of difficulty of tasks of a test [№2 за 2012 год]
Authors: (ein@sssu.ru) - , Ph.D;
Abstract: The results of numerical experiments confirmed the consistency of maximum likelihood estimates of the latent parameter «difficulty of the task» Rush's dichotomous one-parameter model at the fixed number of tasks of test L of identical test difficulty and indefinitely increasing the sample size of students N. It is shown, that under the same conditions of estimation of level of preparation of n-th student, calculated from the permissible dichotomous response matrix, tend in probability to their original estimates .
Keywords: Rush's model, the latent parameter, the test task, consistency of assessments, test, dichotomous matrix
Visitors: 8090

38. Software tool for simulation modeling with the graph models [№2 за 2012 год]
Authors: (surstrat@mail.ru) - ; Korablin Yu.P. (y.p.k@mail.ru) - Russian State Social University, Ph.D; (aneznanov@hse.ru) - , Ph.D;
Abstract: We introduce the original program package G-IPS Ultimate intended for simulation modeling of systems (including real-time modeling). The simulation model is represented by set of decision graphs of special kind, which allows to defining a fuzzy models of system. According to the obtained results we made up conclusions on the future development of the proposed methods and the practical application of the software.
Keywords: software package, bases of diagnostic knowledge, expert diagnostic system, graph model, simulation
Visitors: 10092

39. Vulnerability of web content protection of type HTML Guardian [№2 за 2012 год]
Author: Ermakov D.G. (Ermak@imm.uran.ru) - Institute of Mathematics and Mechanics Ural Branch of the Russian Federationn Academy of Sciences;
Abstract: The task of overcoming of protection of information from copying, similar to ProtWare's HTML Guardian, is considered. To solve the task we suggest using standard means of MS Windows: Windows PowerShell scripting language and browser MS Internet Explorer. It is shown that it is impossible to protect a web page content, since the browser receives the non-encoded HTML-code, and there is a simple and fast method to receive this non-encoded code by means of PowerShell.
Keywords: .net, ms internet explorer, ms windows powershell, overcome the defense, infosecurity
Visitors: 9231

← Preview | 1 | 2 | 3 | 4