ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 1 at 2013 year.

Order result by:
Public date | Title | Authors |

21. The evaluation of reliability of the integrated cluster system with the meta-scheduler Gridway [№1 за 2013 год]
Author: Корсуков А.С.
Visitors: 9151
The reliability and efficiency of a distributed computing environment mostly depend on the workflow scheduling. Nowadays, the most widely used meta-scheduler is Gridway. In the paper the simulation of this meta-scheduler in the integrated cluster system is considered. The simulation algorithms of the meta-scheduler Gridway are described. The simulation modeling allows to evaluate the efficiency and reliability of the integrated cluster system. The system GPSS World is used as a simulation environment. The model of the meta-scheduler Gridway was described on the special formal language. Next, the text of modeling program on GPSS-language was generated automatically. The computing clusters were considered as nodes of the integrated cluster system which was simulated. The clusters are characterized by different performance and cores count. The integrated cluster systems have complex software and hardware structure. As a result, it is so difficult to find the optimal values of configuration parameters for the used computing schedulers. The simulation modeling tools considered in this paper allow to solve this problem partially and obtain in some cases increase in reliability and efficiency of the integrated cluster system.

22. Modelling in sphere of management of pulse protection against explosion and a fire [№1 за 2013 год]
Author: Кряжич О.А.
Visitors: 8262
In the article of feature of potentially dangerous object are reflected. It is necessary to consider these features in models of object. The variant of supporting pulsed fire and explosion protection for chemical factory modelling was considered in the article. Modelling is made for pulse protection frames from explosion and a fire. It is new technology for which model and management methods to develop follows. Models offered in work are base. There were made conclusions according to practical implementation of the models and study’s perspectives.

23. Automated technology conformance evaluation of the text’s [№1 за 2013 год]
Authors: Кузнецов Л.А., Кузнецова В.Ф.
Visitors: 11041
Considered matching the content of information sources in natural language. Developed a comparison technology based on formalization of texts in the form of probabilistic models, the amount of information is estimated by entropy, and a measure of similarity is the amount of mutual information. Described the technology of text formalization by decomposition of the text in random semantic components, which reflect the probability of semantic nuances of information sources. Identifying closeness of texts semantic content based on the compliance of the morphological and syntactic language objects and their semantic roles. Compared texts are requested to be provided in the form of formal systems of similar morphological and/or syntactic objects, which is associated with a certain semantic role. Semantic proximity of texts may be assessed by proximity of introduced systems of semantic components. Representation of the text in the form of a formal system allows the use of statistical tools for quantitative assessment of their proximity. Proper representation of the text in the form of morphological and syntactic systems can be performed using automated systems analysis and parsing texts in which formalized the existing rules of the language. Provided the examples of implementation this technology and evaluation its adequacy.

24. Automatic system for quality estimation of online courses [№1 за 2013 год]
Authors: Лецкий Э.К., Костюковская Э.И., Пилюгин К.С., Ольховой К.В.
Visitors: 10520
The article is devoted to the description of a system for automatic testing of online courses. The system estimates the quality of the online course, starting with the detection of mistakes on slides screenshots, and gives recommendations on how to improve it. The quantitative estimate of the quality embraces the methodological, inclusive text's quality, and technological components of the online course. The system provides direct access to each slide, collects the data for the quantitative estimate of the quality and generates both intermediate and final protocols for the course testing. The quality estimate is built on the following data: the total number of slides, the amount of illustrations, interactive elements and simulations, the number and variety of questions, as well as the number of questions of each type, the number of grammatical mistakes in the text, the number of short sentences, the morphological analysis of the text, the number of abbreviations that were not explained in the text, and the number of special terms absent in the course glossary. The system is also capable of adding required terms to the glossary.

25. Conceptual framework of building security code analyzer [№1 за 2013 год]
Authors: Markov A.S., Фадин А.А., Tsirlov V.L.
Visitors: 15091
The problems of software security audit automation and support of decisions about software defects are considered. A comparative analysis of known static code analyzers is done. The applicability of static signature analysis (on pattern) to identify defects and vulnerabilities are justified. The principles of construction and structure of the security code analyzer that combines syntactic and semantic code analysis are proposed. The requirements for the signature database are described. The algorithm of the operation of the security code analyzer is given. The efficiency of the proposed solution in terms of adding new languages and programming environments as well as new classes of security defects is shown. The example of the security parser code that demonstrates its effectiveness in identifying a broad class of defects and vulnerabilities is done.

26. Image processing time prediction using determinate methods [№1 за 2013 год]
Authors: Мацко И.И., Logunova, O.S., Посохов И.А.
Visitors: 11048
The article is devoted to the forecast of processing time of images containing objects characterized by random location and irregular shape. The described method of image enhancement and segmentation is aimed at reduction of noise typical for a metallurgical plant. The authors introduce mathematical formulation of algorithms used in the method. They also carried out a computational experiment aimed at estimation of the algorithm operating speed and at finding correlation between that speed and hardware (platform) configuration and image characteristics. The analysis of the experiment results proved that the algorithm operating speed has almost linear relationship with the chosen processor and very little relationship with the RAM capacity. A number of possible trajectories of image processing are also described in the article. Maximum forecast error of the image processing time for different trajectories was 0,5 s. It was found that the most time consuming algorithms (erosion and dilatation) are work faster for low-contrast than for high-contrast images. They are also faster for dark than for light images. To improve the accuracy of the processing time forecast it was offered beforehand to categorize the images by the brightness and contrast level and to carry out statistical analysis for each separate group.

27. Web service optimization using caching [№1 за 2013 год]
Authors: Melnikov I.I., Demidenkov К.А., Evseenko I.А.
Visitors: 14382
The paper describes a method for accelerating network data transfer through combination of caching, selective compression and encryption and a WAN-accelerator based on this method. The accelerator contains a client part and a server part. It encapsulates the data channel and caches data on the client and server side. Special hashes are used to synchronize cached data on the client and server side. If some data cached on the client side and some data cached on the server side are same, a response will be extracted from client cache and won’t be waited from the server. Data can be quickly and effectively compressed by the methods of selective compression used in the accelerator if necessary. The WAN-accelerator encrypts data to improve data transfer security. WAN-accelerator server part cache asynchronous update helps to cut latency time of a response from a web-service caused by computational complexity and transaction time. Usage of the accelerator can be an effective solution for the problem of client application speed acceleration when a client application requires permanent communication with a web-service. The WAN-accelerator is an independent program module that doesn’t require integration with an existing web-service and its modification. It is transparent for a web-service and a client application. Especially it is useful for an organization that has a host system for data processing and management that contains one or more servers with data access through web-services and many clients on a great distance from them.

28. Program complex to predict of the solubility in supercritical fluids [№1 за 2013 год]
Authors: Menshutina N.V., Батин С.Э., Гуриков П.А.
Visitors: 13917
The article describes the program complex to predict of the solubility in supercritical fluids. Data analysis in chemistry and technology of supercritical fluids is allowed by program complex. To predict the solubility the methodology QSPR and molecular dynamics were used. For the first time ever in QSPR-model were included temperature and pressure of supercritical fluids. The program complex database stores information about solubility of five hundred chemical compounds in supercritical carbon dioxide (over twenty thousand data points). It is available to search compounds by CAS number and determine the spatial structure. The program complex can be a working tool for scientists working in the field of supercritical fluids.

29. Software tool of the reliability of information management systems analysis automation development [№1 за 2013 год]
Authors: Мушовец К.В., Попов А.М., Золотарёв В.В.
Visitors: 8449
The results of software automation reliability analysis of information management systems are present here. For the first time, universal interactive integrative approach, combining the benefits of the most effective methods of analysis of information management systems is presented. This approach is based on a modification of the progressive logic-probabilistic analysis of the reliability of information management systems by the method of constructing the functional integrity scheme, which allows to build models using non-monotonic bridge elements. Automation tool of the analysis of the reliability of information management systems developed by the authors allows us to construct a model of complex information management systems, such as satellite communication system, a distributed control system and is a good native alternative to the existing software.

30. Integrated toolkit for organization of the problem-oriented distributed computing [№1 за 2013 год]
Authors: Oparin G.A., Novopashin A.P., Feoktistov A.G.
Visitors: 11883
In this paper the approach to integrated use of tools for organization a distributed computing within the single environment for design, create and using problem-oriented software is represented. Problem-oriented software operates in the integrated cluster system. The characteristics of integrated cluster system are considered and the technological scheme of computing problems solving in this system is suggested. The integrable tools are listed: the non-procedural programming environment SyKruS for synthesis of parallel programs taking into account constraints on used resources of computer system and programming modules run-time, the toolkits DISCOMP and ORLANDO TOOLS for development of problem-oriented software in a homogeneous and heterogeneous distributed computing environments respectively, the toolkit DISCENT for cluster Grid development, the toolkit SIRIUS for modeling of problem-oriented software. The integration of tools is based on the cluster system model developed by the authors. The examples of problems solved with the use of above-listed tools are represented. The distinctive feature of represented approach is coordinated use of methodology of development parallel and distributed software packages, multiagent technology for the computing process management and integrated modeling (conceptual, simulation and seminatural) problem-oriented software.

← Preview | 1 | 2 | 3 | 4 | Next →