ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2014 year.

Order result by:
Public date | Title | Authors |

11. Goal-resource networks [№2 за 2014 год]
Author: Dyundyukov V.S.
Visitors: 11085
The article introduces the current problem of developing methods and models of the weighted and indistinct graphs. This problem is considered in connection with aims of forming multi -agent systems. Creating a multi-agent system involves selecting and joint usage of required resources by agents in organizational network. Nowadays the prob lems of re-sources exchange modeling in case of agents’ interaction and multi-agent systems creation still remain insufficiently invest i-gated. This fact causes the expediency of building organization structure based on goal -resource networks (GRN). GRN are a new type of network models that are developed at the intersection of graph theory, resource and agent theories. Models and methods are developed to formate, operate and support multi-agent systems based on weighted multi-graphs. These multi-graphs are focused on formalization of collective goals formation processes and resources exchange between system participants. The software support system of formation, modification and analysis of GRN is constructed. The article presents software interface for network structures analysis, calculation examples of GRN parameters and network structure selection according to the set numerical parameters.

12. Evolution and information systems design principles for enterprise management [№2 за 2014 год]
Authors: Zalozhnev A.Yu., Zalozhneva L.L., Chistov D.V., Shuremov E.L.
Visitors: 12618
Evalution and some principles enterprise management information systems (MIS) design for different levels are considered in the article. MIS support the logistic and manufacturing systems operation. Industrial, technological and business processes are performed by these systems, they are also involved in goods a nd services distribution. Evolution is a MIS functionality gradual increasing. It involves the use of new approaches, principles and related technological solutions. The basic concepts of MIS are presented. Analogies between principles and technological solutions that underly in MIS con-cepts on the one side and concepts and approaches used in control theory on the other side are set. Particular examples show that notions checked and tested earlier in control theory were included into the enterprises managem ent practice as the result of gradual introduction of MIS design principles. These notions are feedback, equilibrium, controllability, sensitivity, stab il-ity, optimality, adaptation, identification, parameters evaluation, reachability and observability, in formation control and oth-ers. Special attention is paid to such subsystems of MIS as customer relationship management and supplier relationship ma n-agement as well as software applications and components within its composition. Attention is also paid to oth er subsystems focused on the business processes support. Complex approach to enterprise management system designing is considered. It implies both horizontal and vertical integration of control systems. In vertical integration the main emphasis is on the C IM concept. Its software implementations allow carrying out vertical automated control of industrial enterprise technological processes.

13. EaaS model based approach to cloud services provision [№2 за 2014 год]
Authors: Zalozhnev A.Yu., Chistov D.V., Shuremov E.L.
Visitors: 8312
Prices and potential volumes optimization can be the basis for the cloud services provider’s marketing policy. This activity is aimed to developing and providing with a wide range of cloud services for clients. There are several cloud service models depending on the users’ needs. An EaaS model is considered as a service model. A public cloud is considered as a deployment model. This article discusses one of possible approaches to the provision of cloud computing services by services provider. The potential volume of provider's cloud service is not formally limited in each moment. Payments for cloud services are proportional to times of their use. Cloud services provider is considered as a single profit center. Under ex-penditure means variable expenses for cloud service each species creating and other operating expenses. The other operating expenses add if their allocation to per unit volume of cloud service each type is possible. The cloud computing services pr o-vision optimization problem is reduced to the problem of determining the profit maximizing prices and potential volumes of cloud services. These prices and potential volumes have to maximize the service provider’s operation profit. O ptimization criterion is a quadratic form. The appropriate conditions allow stating that the solution considered corresponds to the profit maximum. The results are valid if no limitations on providers’ cloud services potential volumes. If it is so, then the problem formulation is modified with these l imitations taking into account. This problem is a quadratic programming problem. The computer model based on spreadsheets was developed for calculations. Study results of the obtained model are discussed.

14. Explicit and fuzzy probabilities product algorithm and its software implementation [№2 за 2014 год]
Authors: Zatonskiy A.V., Kopoteva A.V.
Visitors: 10586
This paper proves the explicit and fuzzy probabilities product algorithm theoretically and practically. It is a classical probability theory problem of events calculation product. It ass umes that an event probability can be represented as a fuzzy or explicit number. Such a problem appears whith the need in calculating all of the conflict outcomes probabilities and there is no statistical data about participants’ possible behavior. In this case possible strategies probabilities are assessed by experts in natural language terms and then transformed into fuzzy numbers. To represent a fuzzy probability we use a 5 -level semantic scale with a [0;1] segment as its values’ support and a triangular membership function type. In order to calcu-late the probabilities product it is necessary to accelerate fuzzy number to an integer power and multiply fuzzy number to e x-plicit and another fuzzy number. A method of -cuts and interval arithmetic is used to do that. Since the resulting product is a fuzzy number, we defuzzify it using the longitudinal center of gravity method. Algorithm software implementation is execu t-ed in the Borland Delphi environment.

15. Adjustment of the forging capd decision using the fuzzy set theory [№2 за 2014 год]
Authors: Kanyukov S.I., Konovalov A.V.
Visitors: 10461
The paper describes a new approach to creating the CAPD for press forging of shafts under uncertainty cond i-tions of the technological constraints boundaries imposed on the design parameters due to the i nsufficient formalization of the subject domain. As a result, the technological solutions related to the design process are various for different enterpri ses, and they are often ambiguous or even contradictory within one enterprise. The paper consideres two stages of the computer-aided design of the forging technology. At the first stage the design process is automated. All technological restrictions (in the base of the normative -reference information) are strictly impl e-mented. At the second stage the design is repeated. But this time the effects on the design parameter carried out by the user in active dialogue regime are taken into account. The paper pays special attention to the procedure of the design parameter co n-trol. The value of each parameter must belong to the specific technological interval with fuzzy boundaries. The novelty of the paper is the fact that the uncertainty of technological interval boundaries is formalized by the theory of fuzzy sets and fuzzy reasoning. The concept of membership function and quality criteria of designed process is input and filled with the physical meaning. Using the developed approach to creating forging CAPD allows increasing the work stability of the system in real pr o-duction conditions, giving a comparative evaluation of the quality of the received design decisions and facilitating signif i-cantly the implementation of the system in various enterprises.

16. Analysis of the programm use the language of asynchronous functional schemes models using linear-time temporal logic [№2 за 2014 год]
Authors: Korablin Yu.P., Kosakyan M.L.
Visitors: 10613
The article describes the formal method for analyzing properties of concurrent and distributed programs. Au-thors suggest a method for verifying technical systems for various temporal properties feasi bility, such as a security property (a typical example of security properties is lock-freedom). To represent models of technical systems authors use the language of asynchronous functional schemes (AFS). It i n-cludes semantic values of AFS-programs represented as the sets of computing sequences (running ways of the distributed AFS-program). Then semantic value is represented as a system of recursive equations. This system is a convenient form for representing semantic values of programs to analyze various programs’ properties. The AFS-program semantic value, represented as a system of recursive equations, and the temporal property, represented as a formula linear-time temporal logic, is converted into a Büchi automata to verify the feasibility of temporal p roperties. After that the composition of these automatons is constructed. The temporary property feasibility on the original AFS -program is verified according to this composition. The proposed method has a significant advantage compared to similar methods which has an intermediate stage for transformimg a technical system into the Kripke’s system and then converts it into a Buchi’s automaton. And in the proposed method the technical system directly converts into a Buchi’s automaton. The proposed method can be easily automated. It allows to simplify essentially labor -intensive process of analyzing se-mantic values of programs. Theoretical material of the article includes a number of examples, in particular, an example of the proposed method a p-plication for verification the feasibility of security properties (no locks) on the distributed system.

17. Iterative method of ship landing and stability calculation in systems of the automated survivability assessment [№2 за 2014 год]
Authors: Lushin G.V., Kuryatnikov V.V., Markov M.S., Ivanov B.G.
Visitors: 7606
The article describes the method of calculating landing and stability of an intact and damaged ship in systems of the automated survivability assessment. The iterative method for a given load is based on V.G. Vlasov’s method of succes-sive approximations. It allows solving the problem with given and controlled accuracy degree. It does not solve some spatial problem of in trim landing characterization. It calculates the diagram of crosscut statistic stability of a freely trimmed ship. Calculated parameters of crosscut diagram are used to assess the ship state. The method uses a mathematical model of the ship. It is specified by the point coordinates on the theoretical surface and watertight compartments. It allows calculating the parameters of landing, stability and others that characterize the safety of the ship for a given load (flooded compartments) with controlled accuracy. The article contains load calculation principles for a damaged ship at various ways of flooding watertight compartments, including doubtful flooded compartments. There are certain formula dependances that allow assessing stability of an intact and damaged ship.The authors conclude that using this iterative method can improve the efficiency and reasonability of decision-making and assignment the measures to restore sta-bility.

18. On the automated survivability evaluation technology and safety for russian navy ships [№2 за 2014 год]
Authors: Lobanov S.L., Blednov D.A., Sorokin V.E.
Visitors: 6696
Many military shipbuilding specialists connect the numerous accidents and disasters which occurred on ships after the World War II with their insufficient survivability. The paper states that the ship safety is the main feature which can withstand accidents and probable damage in the peacetime during the ship service process under routine con ditions. The au-thors analyse the “safety” term, used in the Russian Navy. They also propose an approach to develop an automated assess-ment technology for this term. This method is based on a minimum level criterion of ship operation. The article describes and proves events which should be excluded to ensure such level of the ship functioning. The ship safety criteria definition is based on its functional efficiency of preventing these events by means (systems) of the ship. Definitions and basic parities to describe their parameters calculation are given. It is offered to enter two management levels of the ship and its means (sys-tems) at struggle for safety: low at manual and high at remote control by means (systems) of the ship. The re is an example of possible division of the ship on emergency regions . Their equipment and mechanisms fall within the scope of adverse factors of various accidents. Safety estimations formalization is based on allocation of the functional -independent operations which are carried out by significant elements of the ship means (systems) on maintenance a minimal necessary level of its functio n-ing. It also is based on construction of functional -topological circuits of elements and structural -logic circuits of these opera-tions performance conditions as direct graph. Quantitative values of functional-independent operations performance parame-ters are calculated according to corresponding circuits to logic expressions. The article considers the process of definition of projected ships safety rating according to entered criteria and parameters, as well as recommendations to increase their safety. The concluding part of the paper formulates a number of proposals to improve ships safety of the Russian Navy.

19. On practical implementation of active memory model [№2 за 2014 год]
Authors: Myshev A.V., Telnov V.P.
Visitors: 7309
The paper describes a new approach of practical implementation of active memory models to create algorithms and procedures of information coding and decoding technologies for problems of packin g, protection, restoration and the analysis of any format data flows in transfer and storage channels. The methodology of models practical implementation is connected with virtualization of storage channels and channels of data flows transfer or informatio n objects on binary fields of information spaces in information systems and networks. Virtualization and active memory models on binary fields for channels of storage and information objects transfer is shown in the following. Any information object is considered as the binary set, its logical structure is described by active memory model. For m-ing elements of such structure on binary sets in memory are active and passive virtual cells. From a mathematical and logical point of view for practical realization, active memory model has two main functions. First, it defines and sets the scheme and algorithm for creation of optimal information space on a binary set. Second, it defines logical structure for algorithmic schemes of the headings organization for loadi ng information object in information "container" (logical and physical el e-ments) of memory of transfer and storage channels. For practical implementation the authors chose information space configuration in the form of a tuple < X, N>, where X is a final set of N alphabet symbols chains, and N is a final set of binary chains of fixed or variable length. Initial information objects (IO) were described by a tuple , where N is a final set of binary chains of fixed length. And N was defined as a final set of binary chains of variable length for output IO. Information technologies of files packing based on Haffmen and Shannon -Fano's prefix methods were realized within such information space configuration, and optimal information spaces for the packing tech nology to yield the best result are defined. Regularities between capacity and information attributes of file structures on binary fields in coding technologies are defined. Comparative analysis of the practical efficiency for the developed approach regarding software products such as RAR, ZIP, etc., oriented to similar problems solution, identifyed the principal paradigm of the approach: it has a theoretical and methodological development and practical continuation.

20. Intelligent control system of a 7 degrees of freedom robot-manipulator based on soft computing [№2 за 2014 год]
Authors: Ulyanov, S.V., Nikolaeva A.V., Barkhatova I.A., Nozdrachev A.V.
Visitors: 10218
The problems of designing control systems using soft computing on the example of complex control object (redundant 7 degrees of freedom manipulator) are described. One of major settings and advantages of effective application of automated control system is achieving control purpose with maximal control quality on a high level and with minimal charge of practical resource of “Control object – regulator” system on lower operation level. The efficiency of used software for sp e-cific task of problem-oriented field depends on software intelligence level and task complexity. Th у paper showes in the ad-vantages and efficiency of concerned intelligent computing for effective solution of classical tasks (e.g. design of robust i n-telligent control systems). General methodology of robust fuzzy knowledge base design using special intell igent toolkit (Knowledgebase Optimizer on soft computing technology) is investigated in this article. The efficiency of intelligent control systems designed using soft computing technologies is described in comparison with control systems using constant co effi-cients of regulator. A set of performance criteria adapted to concerned control object (robot manipulator with 7 degrees of freedom) is introdused to estimate control systems work according to required accuracy characteristics. To demonstrate inte l-ligent control performance quality, a wide range of internal and external unpredicted situations is described.

← Preview | 1 | 2 | 3 | 4 | Next →