ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 4 at 2017 year.

Order result by:
Public date | Title | Authors

11. A methodical approach to forming functional requirements for a computer attacks protection system for automated control systems and its software implementation [№4 за 2017 год]
Author: Drobotun E.B.
Visitors: 6709
One of the main stages of development and building of secured automated control systems for various purposes is the stage of forming requirements for the developed automated system including security requirements against computer attacks and other information technology impact. Effectively developed and reasonable functional requirements for a computer attacks protection system will allow on the one hand providing the necessary level of automated system protection, on the other hand minimizing consumption of computing and human resources of the protected automated system, the amount of which is limited and finite in any automated system. One of the possible ways to form and prove optimal functional requirements for a computer attacks protection system is using a risk-oriented approach to forming and reasoning of these requirements. The approach includes identifying the severity and probability of possible security threats against the protected automated system. The article offers a methodical approach to formation of functional requirements for computer attacks protection systems for automated control systems. It is based on a risk assessment of information security threats in the automated system and its safe operation threats. The application of the proposed approach will allow forming optimal functional requirements for a computer attacks protection system for automated control systems for various purposes. It will help to achieve optimal resource allocation in an automated system to ensure functioning of the computer attacks protection system.

12. Methods and tools of logic control algorithm design using graphic models [№4 за 2017 год]
Author: A.V. Paramonov
Visitors: 7173
The paper discusses the problems of designing algorithms in automated control systems based on programmable logic controllers, in particular logic control algorithms. For example, these algorithms are implemented at the upper level of drive control systems. The algorithm designing process is called algorithmization. One of the main problems of algorith-mization of logic control tasks is a lack of visual, intuitive forms of algorithms, which do not require specific knowledge from a user. Here a user of an algorithm is both a programmer and an expert in the domain. In the case of a programmer, extra knowledge is problem area knowledge, in the case of an expert extra knowledge is knowledge about the formal theories behind algorithm representation forms and the skills of correct setting of a control problem. The aim of this research is increasing the abstraction level of logic control tasks design processes. To achieve this goal, the paper describes graphic models of automated processing stations as a tool for algorithmization of logic control tasks. It also formalizes the concept of a logic control algorithm in the context of graphic models and gives a detailed explanation of methods for obtaining logic control algorithms using graphic models in the form of the limited-entry decision tables and Moore automatic machine tables. The paper considers specialized environment for developing graphic models and logic control algorithms called Logic Algorithm Designer. It also describes the program interface, the main functionality and working principles. There are the examples of a logic control algorithm and the program code of IEC 61131-3 function block generated automatically from the algorithm. The proposed methods and tools of algorithmization allow improving the connection between a program developer and domain experts while maintaining high quality of these programs, ensuring their completeness and consistency. They also make it possible to reduce the development time due to automatic code generation and a much more detailed elaboration of a control algorithm.

13. Model of evaluating time characteristics of solving a problem in a ship geoinformation system [№4 за 2017 год]
Authors: P.I. Smirnov, Tatarnikova, T.M., N.V. Yagotinceva
Visitors: 6200
The paper proposes a model for evaluating time characteristics of data processing in a ship geoinformation system, which is a local computer network with segment switching. The ship network information infrastructure allows simultaneous data transfer between all interacting pairs "Client-Server". The mathematical apparatus of the model is the network of queuing systems. The model parameters are input stream intensity, node capacity of a ship geoinformation system and a transition probability matrix. Time data processing characteristics are evaluated by a computational experiment using a model. Simulation task is formulated as a problem of choosing technical characteristics of client part of a geoinformation system while ensuring guaranteed system response time. Evaluation of processing data time characteristics in relation to the load and productivity of automated workstations allows choosing the best option for integrating the client part with the server part in the ship geoinformation system while ensuring system guaranteed response time. The requirement to the guaranteed processing time varies depending on the navigation area and consists of connection establishment time "Client-Server" and the reception time of ship spatial data navigation systems.

14. A service model for military computer simulators [№4 за 2017 год]
Author: A.V. Vus
Visitors: 9004
The article considers the issues of servicing computer simulators for training military specialists. Due to active re-equipment of the Armed Forces of the Russian Federation, it is important to use computer simulators to train military specialists. The paper determines a general model of a computer simulator life cycle and a model of the existing service system. The analysis of the existing service system for military computer simulators and its place in the life cycle of a simulator has revealed its disadvantages. The paper determines indicators of computer simulator relevancy that affect the effectiveness of using a computer simulator to train military specialists in educational organizations and institutions and their connection with service maintenance. It also considers the expediency of modernization works and works using bulletins for updating a computer simulator. The authors explain the necessity of creating a new service model for computer simulators, which will allow taking into account questions of actualization and adjustments of special software. They also focus on a role of an organization-developer in actualization of a computer simulator. Finally, the paper proposes a service model that allows both maintaining a computer simulator in good repair and updating it.

15. On the problem of non-format documents retro-conversion in digital content formation and provision systems [№4 за 2017 год]
Authors: A.N. Sotnikov, I.N. Cherednichenko
Visitors: 6499
The paper considers mathematical reasoning of solving the problem of scanned non-format documents retro-conversion (documents recovery), as applied to the task of filling and publishing collections of digital libraries. It also describes the algorithms of automatic clustering and forming auto-adaptive fonts for documents retro-conversion. As a mechanism for working with clustered objects, the authors use a classical approach to form a feature vector based on the estimates calculating algorithm model that describes each object under consideration. The algorithm for automatic clustering is based on a statistical approach to forming characteristic vectors of each cluster and to the dynamic correction of separating hyperplanes. Due to the specifics of the tasks being solved, the authors use a contour approach to graphic objects processing, which allows applying frequency analysis methods based on the Fourier transform. The paper presents estimates of the necessary and sufficient dimension of a feature vector used both for describing graphic objects and for their recovery with minimal distortion after generating output documents during a retro-conversion procedure. Finally, the article shows possible prospects for development of the described method of non-format documents retro-conversion in the field of organization of contextual search within graphic documents.

16. Optimum entropy clustering in information systems [№4 за 2017 год]
Author: B.G. Askerova
Visitors: 8546
The paper researches the possibility of developing a new method for data clustering in information systems. Clustering is a process of searching possible groups in a given set using signs of similarity or difference between elements of this set. The existing entropy clustering method includes an information theoretic approach to a clustering task. The paper suggests a clustering method based on an entropy approach to selecting message items. The paper suggests a method of optimum entropy clustering of high-dimensional data in information systems. It also gives mathematical grounding of the method. The suggested method of optimum entropy clustering is based on the known principle “low entropy corresponds to big information content”. This make it possible to form an optimum clustering regime, as well as an attribute space reduction regime. The paper proposes a method for calculating a level of clustering optimality. It also describes a method for reducting attribute space of high-dimensional data upon their initial processing.

17. Estimation of website security status as badly formalizable objects based on fuzzy logic methods [№4 за 2017 год]
Authors: D.T. Dim, Bogatikov V.N., Klyushin A.Yu.
Visitors: 8438
The article analyzes page load time, which is an important indicator for any website. Websites are typically hosted on web servers with certain characteristics. These websites interact with the environment, which is mostly aggressive and undefined (external threats, such as penetration, service denial, SQL code injection, etc.). It should be noted that there are uncertainties caused by hardware and software, which arise due to the reliability properties of software and hardware products. Thus, any website can be influenced by external factors and various subsystems serving website functions, which leads to abnormal situations and website operation uncertainty. The degree of uncertainty is not always practically feasible to estimate only based on statistical material. This leads to increasing the number of methods and means for intellectualizing the performance of estimations based on artificial intelligence methods, particularly fuzzy estimate methods.

18. Inflight spacecraft safety performance and generating information to prevent high-speed interaction [№4 за 2017 год]
Authors: S.V. Yagolnikov, A.A. Khramichev, A.N. Katulev, Palyukh B.V., I.I. Zykov
Visitors: 9102
The paper considers one of the core necessary conditions to ensure safe operation of a spacecraft (SC) in orbit. It is timely and reliable warning about dangerous near miss of a spacecraft with small-sized objects of space debris (SD). The purpose of the warning is to protect a apparatus from collisions in time. It is assumed that a SC is equipped with an opto-electronic system (OES) for detecting and measuring coordinates of the current position of objects surrounding the protected apparatus. The proposed safety indicators of SC functioning are determined by possible collisions with objects of space debris. The paper also proposes programs and structures of algorithms for generating information to warn about potential collisions. The paper describes the following programs and algorithms: hazard assessment of a SD object detected by OES; translating object coordinates from the spherical coordinate system to the inertial coordinate system with the origin at the Earth’s center by OES and their smoothing as a sample of measurements in the inertial system for subsequent construction of the object ellipse-orbit; estimating current distance between a SC and the detected SD object, in particular, algorithms determining the coordinates of the point of intersecting a SC motion ellipse plane by a SD object motion trajectory, condition testing of a spacecraft motion elliptical trajectory passing through the calculated intersection point, calculating SD object and SC arc lengths trajectories from their current position points to the established point of intersection when it belongs to the SC motion trajectory, calculating the current distance between a SD object and a SC; estimating a time moment of possible collision of a SD object and a SC.

19. Building a unified architecture for production data integration in a mining company [№4 за 2017 год]
Authors: I.O. Temkin, I.S. Konov, A.L. Kubenova, L.G. Zartenova
Visitors: 10101
The article analyzes existing approaches to organizing information systems, such as point-to-point integration, implementation using a general database, creation of a universal data bus, as well as their modifications. It considers use of existing solutions based on ERP system, as well as custom written applications developed in mining companies in terms of mining production. The paper analyzes methods of integrating various information systems, which provide a unified information base of companies. It also considers typical mining business processes that cover the whole production and economy cycle, as well as tasks for these processes showing key features and limitations for created systems. The paper describes general data flows typical for mining companies and ways for information interaction of systems on different functional levels. The authors introduce a problem related to the necessity of changing the existing data integration architectures. They also assess the existing approaches to organizing information systems and give their pros and cons. A solution is based on a service-oriented architecture. The authors consider a possibility of creating a united corporate integration bus that allows integrating new systems into an existing information system efficiently with minimal labor costs considering limitations and specific tasks of the research field. The paper describes basic mechanisms, considers pros and cons of the approach and introduces a generalized way of it’s implementation for mining companies.

20. Ontology design based on non-relational database for intelligent decision support system for medical purposes [№4 за 2017 год]
Authors: Eremeev, A.P. , S.A. Ivliev
Visitors: 10710
As the volume of data in healthcare systems increases, it becomes possible to use complex methods of software data processing to support decision-making in complex problem situations. Since the environment has a strong heterogeneity (different form of reporting, file formats, iterative process of working with the patient), it is required to create a flexible system that will provide effective work under the conditions described. The paper represents building and using ontologies based on a non-relational database for intelligent decision support systems in order to investigate and diagnose complex pathologies. It also describes constructing a software interface to work with this ontology. The created ontology is oriented both to the storage of data on patient examinations conducted by a doctor, and medical assessment reports. In this case, a non-relational database allows operating data in heterogeneous environments (e.g. medical research) more efficiently. The paper discusses the main advantages of non-relational databases compared to traditional relational databases, such as more convenient data handling within a given ontology, its expanding and supplementing, extracting the required data upon a request. The paper also describes software implementation of the proposed approach and illustrates its work. Based on the results of the research, the authors suggest ways of further development in this area. They are: generalization of the obtained results to solve other similar problems of medical diagnostics, as well as using new methods, such as the semantic search against case records, in the implemented intelligent decision support system.

← Preview | 1 | 2 | 3 | 4 | Next →