ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 1 at 2014 year.

Order result by:
Public date | Title | Authors |

11. Information-simulation modeling system architecture for IT-infrastructure life cycle support [№1 за 2014 год]
Author: Grishakov V.G.
Visitors: 16224
The article suggests the architecture of information-simulation modeling system for IT-infrastructure manage-ment support. Because of organization distribution, this modeling system can be used for management support in IT-departments. It is a base platform for development monitoring, estimation, decision support and management realization sys-tems. This modeling system supports unified hybrid IT-infrastructure model that includes several particular models: IT-infrastructure technical component model, a model of administration man agement tasks and goals, a model of IT knowledge domain. A unified hybrid IT-infrastructure model consists of informational and simulation models. Data from informational model is used for simulation model, its results in complementing informational model. A hybrid modeling system consists of informational and simulation modeling systems. The authors suggest using virtual system of hybrid modeling as a base pla t-form for IT-infrastructure modeling system development.

12. Synthesis of the subscriber telecommunication networks structure [№1 за 2014 год]
Authors: Dmitriev G.A., Margolis B.I., Muzanna M.M.
Visitors: 9405
The need to separate the telecommunication network in terms of topological structure on the terminal (su b-scriber) and a core (backbone) network is described. The problem of synthesis of a subscriber network is stated. It represent s minimizing the sum of the distances from the subscribers to the main switching nodes with limitations of the ability to con-nect each subscriber to a single site. A complete matrix of distances from the subscribers to the switching nodes is presented. It is shown that the problem of subscribers’ optimal connection to sites switching refers to the class of linear integer pr o-gramming problems with equality constraints. The equality constraints for each subscriber’s connection conditions to one node switching is formulated. Based on the MatLab bintprog standard function, the authors have developed the program that allows synthesizing the topological structure of a user's network using a plurality of users, multiple nodes and switching ma-trix of distances between them. The paper shows the results of calculating the optimal connection of subscribers with the cri-terion of minimum sum of distances to the switching nodes for the telemedicine network of the Republic of Yemen. The art i-cle presents a method for calculating capacity of subscriber communication channels based on the supposed information flow for the received structure of subscriber network and its maximum load. Results of bandwidth calculation for the resulting structure of subscribers network of the Republic of Yemen that is received from synthesis.

13. Models as basic information architecture artifacts [№1 за 2014 год]
Author: test_1
Visitors: 15088
Information and knowledge have long been associated with the key factors designed to ensure reliable opera-tion and the organic development of any economic system. The same role is assigned to the information model and data models in the «information architecture» domain, the most substantial component in its overall architectural description. In this article the structure, content and highlights of building information models, data models and other information elements of the economic system are discussed in the context of the overall architectural design process. Ultimately, the co ntent is in-tended to help readers to understand the «information architecture» interaction domain with other domains of the overall a r-chitecture of the economic system – the business architecture, organizational structure, information applications, technology infrastructure – and to understand its key position in this interaction.

14. A model for design of ensembles of intelligent information technologies for detecting information security incidents [№1 за 2014 год]
Authors: Bukhtoyarov V.V., Zhukov V.G.
Visitors: 10419
The development of effective methods to detect information security incidents is an urgent problem. The im-portance of this problem is determined by current trends in communication in information systems and by security require-ments for such systems. One of the trends is using intelligent information technologies as basic tools for solving this problem. These intelligent information technologies also include artificial neural networks proved their efficiency when solving such problems as classification, modeling and forecasting. Due to the common trends of information systems, the so -called en-semble approaches became more popular for solving data mining problems. They allow processing the information in parallel by several neural networks to obtain more effective solutions. The authors propose to use a three-step evolutionary approach to detect information security incidents. The results of experimental studies of the proposed approach on a KDDCup'99 data set are presented. The paper also considers using individual neural networks in the case of individual classifiers distribution – the so-called ensemble-distributed approach. The authors propose a method for determining cases when the problem to be solved by individual neural network and when the entire ensemble of neural networks is used. Ensemble-distributed method efficiency is tested on the problem of detecting information security incidents. The ways for further studies of the proposed methods are marked.

15. Study of differential adaptive genetic algorithm for conditional optimization problems solving [№1 за 2014 год]
Authors: Zhukov V.G., Parotkin N.Yu.
Visitors: 7841
The article discusses standard methods for solving constrained optimization problems based on artificial dete-rioration of the objective function value when violating given constraints. The methods of assigning dynamic and adaptive penalties are described. The paper considers selection modifications in a differential adaptive genetic algorithm based on the behavioral memory method for adapting it to this class of problems. The paper presents the results of study a combination of standard methods and observable differential algorithm on a test functions set that show the most efficient combination of dynamic penalty and algorithm modification. The algorithm modification is presented in the possibility of a transition to S k subset only solutions that satisfy all the constraints. Allocation of two subsets determines low efficiency of adaptive penalties due to inability to obtain complete information on the entire set of decisions and frequent changes in S o subset. Based on a comparison of the data and test results of other genetic algorithms, it is concluded that the differential algorithm is better av-eraged performance of the classical algorithm, but can yield better at non-optimal settings, as well as comparable to the co-evolutionary algorithm. This allows using differentiated adaptive genetic algorithm to solve practical optimization problems.

16. Modeling decision-making processes in compex organizational and technical systems [№1 за 2014 год]
Author: Zavgorodniy V.N.
Visitors: 10532
The article considers the class of confronting organizational and technical systems. The operation of these sys-tems is based on the extensive using of technical means and carried out in interaction with the environment. Environment which affects a controlled object in the process of realization of tasks is interpreted as "nature" in the article. Uncertainty in knowledge of the decision maker in factors, conditions and mechanisms of the controlled object (subject) functioning is understood as the game-theoretical uncertainty. The article considers the family of multicomponent games. A two-component game model that is formed from matrix and statistical games-components in terms of functioning of the confronting organizational and technical systems is re-searched. The article proposes approaches to solving multicomponent games for modeling decision support. Given research direction can be useful in the development of decision support systems.

17. Three dimensional vlsi floorplanning subsystem considering elements’ mutual thermal effect [№1 за 2014 год]
Authors: Kureichik V.M., Kulakov A.A.
Visitors: 9527
The paper describes the approach to the floorplanning problem in three-dimensional through-silicon vias inte-grated circuits with the heat distribution optimization. Formulation and the objective function of the floorplanning optimiza-tion problem are described. The article proposes the approach based on combination of genetic algorith m and simulated an-nealing algorithm. It considers elements’ mutual thermal effect by scheme thermal modeling. The algorithms combination is implemented by inserting a local search operator in the genetic algorithm. An operator is applied to the population after the mutation operator. The paper describes the method of modified B*tree to represent circuit topology of three-dimensional in-tegration IC. Calculation of a circuit thermal characteristic in the paper is based on a simplified and full thermal model. Thay signifi-cantly reduce the time complexity of the planning algorithm. Complex thermal model calculates the temperature in the steady numerical method of finite differences. For the midterm evaluation of the maximum temperature the simplified thermal mod-el with sufficient accuracy for estimating of the heat distribution is offered. The developed planning software architecture based on the object-oriented approach with code separation scheduler, cal-culation of the objective function and thermal modeling in separate modules are described. The experimental results and con-clusions on the applicability are outlined.

18. Technological models for management of company automated control system development [№1 за 2014 год]
Author: Loginov I.V.
Visitors: 12815
The article considers technological models of company automated control system on informatizied business -process level for development management. Technological models application is based on the necessity of development management automation based on continuous effectiveness evaluation of management activities (maintenance, modernization and adaptation of company automated control system considering environment conditions changing). The article extracts four levels of technological models that indicate qualitative assessment of state and effectiveness for informatizied business-processes. These technological models allow estimating instantaneous and integrated effectiveness characteristic values of automatization and informatization for achievement company goals and tasks within a lifecycle. An effect from applying technological models allows increasing management effectiveness. It includes timely detecting uneffective and loweffective automatization projects and utilization of obsolete business-processes.

19. Synthesis gas telemedicine networks [№1 за 2014 год]
Authors: Margolis B.I., Muzanna M.M.
Visitors: 10230
The article considers the graph model of structural-functional synthesis of backbone telecommunication net-work. It also describes the problem of the backbone structure synthesis. This problem is in minimizing the distances when passing information to the regional switching nodes. The optimal routes for information passing to the regional nodes of backbone network are obtained using a matrix of distances between backbone nodes and the graphshortestpath function in MatLab. The problem of parametric synthesis of backbone network is considered. It consists in determining the capacities of the main communication channels using synthetic topological structure and values of the input streams from subscribers. It is shown that the problem of parametric synthesis of backbone network belongs to a class of nonlinear optimization problems with constraints like inequality and equations. Inequality constraints are formulated for capacity of channels and the type of conservation equations for saving flows in the network nodes. The article presents a developed program that allows finding the optimal information flows in the backbone communication channels using criteria of average messages delay and maxi-mum network load. The program is developed on the basis of the standard fmincon function in MatLab. A methodology for calculating capacity for maximum information flows in the main channels to regional switching nodes. There are the results of calculation of optimal channels capacities for backbone telecommunication network backbone of the Republic of Yemen. An example of passing information to the particular backbone source node and the regional destination node is shown.

20. Using data compression and double caching to increase client-server applications operating efficiency [№1 за 2014 год]
Authors: Evseenko I.А., Melnikov I.I., Demidenkov К.А.
Visitors: 10234
Many organizations use client-server applications in order to afford their employees and clients an opportunity to work with necessary information on their local computers. Delays of networking and data processing on the server side must not aggravate this process. The problem of accelerating client-server applications with caching and data transfer rate in-crease had not existed until client-server applications had became popular in wide area networks. But the problem of granting fast access to a central server and accelerating client-server applications has become important because of enterprise expan-sion, creation new service centers and remote desks in different regions of the world. The double caching (caching on the cli-ent side and on the server side) with periodical client/server cache update and the additional arrangements for accelerating da-ta transfer (compression and encryption) were proposed to solve the problem. The WAN accelerator has been developed based on this method. It is an independent program module. It is transparent for a client-server application that uses it. The accelerator contains two parts: the client part (accelerator-client) and the server part (accelerator-server). The TCP connection is established between the parts. The accelerator-client intercepts client HTTP requests, caches, compresses, encrypts them and then sends them to the accelerator-server. The accelerator-server receives the requests, decrypts, decompresses, caches them and then sends the restored HTTP requests to the server. The server processes the requests and generates the HTTP r e-sponses. The accelerator-server intercepts the responses, caches, compresses and encrypts them and after that sends them to the accelerator-client. The accelerator-client receives the responses, decrypts, decompresses and caches them and after that sends the restored HTTP responses to the client. If the identical HTTP request is intercepted by the accelerator-client, the HTTP response will be extracted from the accelerator-client cache (it is the best case because there is no need to send the HTTP request to the server and wait for the HTTP response) or from the accelerator-server cache (it is the worst case because there is a need to send the HTTP request to the accelerator-server and wait for the response from its cache but there is no need to send the HTTP request to the server and wait until the response will be generated). Test series were run to evaluate operating efficiency of the accelerator. The client and server mocks were used for this purpose. The client mock was sending the test HTTP requests and the server mock was receiving the requests and generating the test HTTP responses. The accelera-tor was intercepting the requests and responses. The HTTP requests and responses had the same structure like the HTTP r e-quests and responses used by the real client-server applications in the target organizations. The test series demonstrated that usage of the accelerator could decrease response time for 14–98 % depending on network bandwidth and identical re-quest\response repetition rate. The user could see that the client-server application had been working faster.

← Preview | 1 | 2 | 3 | 4 | Next →