ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 4 at 2014 year.

Order result by:
Public date | Title | Authors

11. Tool environments for production optimization and planning based on evolutionary metaheuristics [№4 за 2014 год]
Authors: Afonin P.V., Malikova A.A., Sashilina K.S.
Visitors: 13364
This article presents the tool environments based on evolutionary metaheuristics to solve the tasks from three subject domains: optimization of material cutting with a dynamic orders portfolio, modeling and optimization of deliveries chains warehouse policy and project schedules optimization. The paper considers features and methods for solving optimiza-tion and production planning problems. It describes the efficiency of the approach to the development of the modified metaheuristics operators that include the optimization problem constraints. The paper considers the class of optimization problems when the objective function is calculated using the simulation method. The environment of cutting optimization in-cludes the optimization module on the basis of genetic algorithm and laying algorithm (for kitchen units). The user sets: a unit size and their number, color film for pasting unit, urgency of the order and desired utilization of the material. The system outputs are the automatically generated cutting cards. The environment of warehouse management supports multi-inventory systems simulation including two-echelon systems and optimization of model variables using evolutionary strategy. The op-timized parameters are critical levels of ordering goods and orders volume. The criteria includes storage costs, organization costs supplies and penalties for shortage of warehouse goods. The environment of design schedules supports the optimization on the basis of genetic algorithm which includes crossover and mutation operators that provide obtaining the solutions, satis-fying to problem constraints.

12. A questionnaire information system “Apofasi” [№4 за 2014 год]
Authors: Kamaev V.A., Melikov A.V.
Visitors: 10088
The article describes the software that implements data processing and analysis of expert interviews for predictive estimate of economic and social systems reactions on the possible control actions. Existing software prod-ucts for data collecting and processing have drawbacks when calculating the predictive estimate of economic and so-cial systems reactions based on processing and analyzing data obtained from the expert interview. As a result, there is low information awareness because of frequent processing of semantically equivalent information, a large quantity of empty rated values in the hypercube tables. That’s why there is no possibilit y to perform data analysis which is not foreseen by a questionnaire plan. What’s more important, the expert’s confidence in each answer choice is not taken into consideration. Moreover experts’ opinions are not fully analyzed because they can be different in confidence level of predictive estimate for system reaction to the possible management actions. In order to eliminate the mentioned di s-advantages, a processing approach to the questionnaire procedure has been developed. This approach is different b e-cause it includes processes of extra analyzing of the expert estimation results with multivariate analysis to take the best managing decision.

13. Artificial immune systems: review and current state [№4 за 2014 год]
Authors: Chernyshev Yu.O., Grigoryev G.V., Ventsov N.N.
Visitors: 14193
Solving optimization problems is one of the most relevant spheres of heuristic algorithms application, inspired by live or inanimate nature. This article summarizes the current state of relatively new class of bioin spired algorithms that are artificial immune systems, with their issues, prons and cons. The authors are review developments of artificial immune systems, as well as researches of immune networks, immune response, somatic hypermutation, danger theory and selection processes. Artificial immune systems attract more and more interest due to the best of available properties among bioinspired methods such as dynamic location of working elements (from evolutionary algorithms) and learning principles (from artificial neural networks). If immune networking is one of the earliest model-based processes among immune inspired researches, then danger theory and modeling of somatic hypermutation and selection can be considered relatively young research areas. However, immune networks are still pressing problem today: they are used as a key parts of bioinspired hybrid systems. Different implemetations of these systems can be applied in many science researches and industries. Application is often the same as that of heuristi c algorithms researched earlier, but now new application spheres are emerging as well that have not been researched before in this perspective – computer science (for example, data-mining). The review of current state in artificial immune systems sphere is based on work of both foreign and Russian authors.

14. Synthesis of burst-mode asynchronous schemes using Synopsys Design Compiler [№4 за 2014 год]
Author: Surkov A.V.
Visitors: 10723
The industrial needs in a robust computing systems increase the interest in asynchronous logic. The major reasons to use asynchronous design are the high robustness and wide operating temperature range of such schemes. The most significant counter argument is the long developing time as а result of the lack of asynchronous design automation tools (EDA). The burst mode schemes are the asynchronous schemes sub-class which is the easiest to build. The cross-coupled dual rail expansion method is the most popular to design the burst mode schemes and can use the synchronous schemes as an interim step of designing process. The synchronous scheme must perform the same function and can be obtained by a common synthesis way. The conversion from synchronous prototype to burst-mode scheme may use the templates, so it is easy to automate this process. We chose the Synopsys Design Compiler as one of EDA tools, which may provide synchronous synthesis and also use Tcl language for scripting. The whole burst mode synthesis workflow process consists of three major steps: synchronous synthesis from Verilog description, dual rail expansion and construction of complete detection sub-scheme. The last step is to optimize the load capability of the elements of the final scheme through the static timing analysis algorithms built into the DC tool. All the steps are processed by the one tcl script working in the DC shell, so overall process is fully automated. At this time the script has a limited functionality, an d can handle only one pipeline stage per run.

15. Using driver for Ethernet 1 Gbps controller’s prototype testing [№4 за 2014 год]
Author: Slinkin D.I.
Visitors: 10078
The article describes a family of Ethernet controllers created the SRISA RAS. Currently a prototype of a new perspective processor with embedded Gigabit Ethernet controller is being designed. Testing is an integral part of microcircuits design process and is a time-consuming task. This article introduces an approach to testing of an embedded network controller model during its design. The prototype in question is implemented as a field-programmable gate array (FPGA) based on technological card. There are several different ways of microcircuits projects verification. The article offers the network controllers testing method based on author’s practical experience. This testing method has become the main stage of the network controller’s prototype verification. The system software – drivers are suggested as a basis for the testing software. The article also considers the following subjects: the tasks which can be solved using software based tests, such as: smoke tests, suitability, compatibility with different hardware and operation systems, program compatibility with previous version of microcircuit, stability and reliability testing. Special attention is paid to performance testing and to surveying of a network controller’s behavior beyond the limits of normal operation; factors tha t affect the system’s performance; an issue of CPU loading during intensive network activity and the ways of its reduction; situations which can appear during controller’s stress loading. In conclusion the paper discusses a range of functional tests application, as well as their advantages and disadvantages in comparison with other testing methods. Drivers and ready-made tests are presented as means of reducing labor-intensity. The plan of future works is suggested.

16. Ability measuring researches of a fpga hardware module for load testing tasks [№4 за 2014 год]
Author: Borodin A.A.
Visitors: 7776
Quality and reliability assurance of information system is an important task. Nowadays it is mostly solved using load testing. Constant progress of information technologies requires increasing testing efficiency. Load testing is a complicated process that includes many stages. Theory and practice analysis showed that researcher’s attention to test launching is not enough. Efficiency of this stage depends on loader program performance quality and computer characteristics. Practically, resources of a single computer are not enough to produce the required amount of load. That is why there are load -creating methods based on distributed computing which have disadvantages. These methods include cloud and cluster computing as well as a group of computers connected together using local network. This paper presents experimental results of hardware loader characteristics measuring, created by the author based on FPGA to increase load creation stage efficiency. This device allows load testing process without using additional computers. During experiments, maximum load capability of a created prototype has been determined. The results were compared with characteristics of existing computer systems.

17. A performance research of a number of iterative linear solvers within elastoplastic problem [№4 за 2014 год]
Authors: Tolmachev A.V., Konovalov A.V., Partin A.S.
Visitors: 9769
An elastoplastic problem with large plastic deformations is substantially non-linear both geometrically and physically. Most of the finite element solution time is being spent solving linear system in order to find generalized speed vector in the FE grid nodes. To decrease solution time it is crucial to use parallel computations, especially cluster computers. Arising matrix is non-symmetric and has large dimension banded and sparse within band. Direct solvers create fill-in within a band and therefore induce heavy costs both in memory and computation time. We performed a computational experiment based on the test problem of parallelepiped compression with plates on “Uran” cluster located in Institute of Mathematics and Mechanics UB RAS in order to analyze the performance of SOR, BiCGStab and GMRES solvers. We estimated linear solver computation time variance that is induced by random latencies in data transfer within the cluster system. Experiment results showed that SOR requires more time than BiCGStab and GMRES thus is inefficient. GMRES is the fastest on a small nu m-ber of processors. However BiCGStab is more scalable and requires less time than GMRES when using large number of pro-cessors. Solve time deviation does not exceed 5 % from the average. An ILUC preconditioner is the most efficient one execu-tion time-wise, however a SAINV preconditioner requires the least number of BiCGStab iterations.

18. A software package for inductive formation of medical knowledge bases [№4 за 2014 год]
Author: Smagin S.V.
Visitors: 8632
The article provides the description of InForMedKB (Inductive Formation of Medical Knowledge Bases) software package.It allows creating training sets (consisting of clinical histories from various branches of medicine) and forming medical knowledge bases inductivly. These knowledge bases are presented in the form accepted in the medical literature and contain descriptions of diseases (from specified branches of medicine), as well as explanations of these knowledge bases. The developed software package implements training algorithm which solves classification and clustering problems in their new definitions w hich are presented as a special case for problem of estimating the parameters of a reliability model that affects the quality of the training algorithm. This learning algorithm is developed for the useful and easily interpretable mathematical reliability model with parameters. It is a near real-life ontology of medical diagnostics (defined by a system of logical relationships with parameters). Presented algorithm finds parameter values for given model (medical knowledge base), which are close to the values that characterize the object domain of medical diagnostics. Using this software package and real data training set (containing clinical histories from "Acute abdomen" branch of medicine), a medical knowledge base is inductively formed. It has a high level of interpretability for a practicing physician. Descriptions of diseases included in the inductively formed knowledge base (expert evaluation) correspond to knowledge from scientific and academic medical literature. And sometimes they add descriptions of clinical implications dynamics. The formal representation of medical knowledge bases obtained using the software package allows using them in medical diagnostics expert systems.

19. Rear-projection method in visualization subsystem of training simulation system [№4 за 2014 год]
Authors: Giatsintov A.M., Mamrosenko K.A.
Visitors: 9987
Nowadays in many industry sectors (for example, in aerospace industry) there is a shortage of qualified specialists, capable of controlling complex technical systems. There is a need of a massive increase of training centers efficiency, particularly with adaption of new training methods and developing of more effective training complexes. Using multimedia technologies in training-simulation systems development allows creating training materials data banks that include images, texts accompanied by audio, video and visual effects, interactive interface; provide an effective way of using collected information for distant and distributed training. One way of using multimedia data in training simulation systems is to insert a graphical representation of instructor into virtual environment. In order to correctly visualize an image of instructor in a 3D virtual scene a method of rear-projection has been developed. It is based on 3D keying. Its main function is to separate an object from a uniform background. This process can be described as a process of creating a mask that contains information about image translucency that separates an object from other parts of an image. Any keying method is resource-intensive, so processing of large images on CPU can lead to performance problems of visualization subsystem, while one of the requirements for visualization subsystem is real-time operation. Considering this requirement, a realization of keying algorithm uses resources of the video card to process images.

20. The technique and framework for dynamic vulnerabilities detection in binary executables [№4 за 2014 год]
Author: Shudrak M.O.
Visitors: 7744
The article introduces an original technique for binary executables security analysis that allows analyzing ne t-work applications security using fuzz testing which is effective for software bugs detection. Vulnerable network applications are a tremendous threat to network communications security. Vulnerabilities in web browsers and server software can cause a disastrous effect. A good example of it is HeartBleed critical vulnerability in OpenSSL TLS implementation that allows an unauthenticated remote attacker to retrieve critical data from a connected client or server. The technique uses a combination of dynamic binary instrumentation, code coverage analysis, potential erroneous data generation and results analysis. The author also presents a new way to assess effectiveness of each test iteration using code coverage visualization. In the second part the author describes a technique implementation as a software framework that al-lows detecting vulnerabilities in network and file – based applications with high-level of visualization and testing automatiza-tion. In addition, the author conducted a large-scale experimental evaluation of the system on 17 different network applications for different operation systems. The results of the experiment confirmed that system suit s well for vulnerability detection in modern applications. Moreover, the experiments helped detect several previously unknown vulnerabilities in the popular and wide-spread applications.

← Preview | 1 | 2 | 3 | 4 | 5 | Next →