ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 1 at 2014 year.

Order result by:
Public date | Title | Authors

21. Modeling agents interaction in a multi-agent system using the apparatus of coloured petri nets and fuzzy logic [№1 за 2014 год]
Author: Vladimirov A.V.
Visitors: 11683
The article identifies problems in functioning of major adaptive information systems, as well as the basic re-quirements. It allows forming a structure of an adaptive information system and highlighting its main segments. The paper al-so shows functions of system components and describes its action. A structure of agent-based component of the adaptive in-formation system with the consideration of the functions of agents is obtained. Using the apparatus of colored Petri nets the author models the process of agents’ interaction in a multi-agent adaptive information system. A basic set of colors is shown, the main model components are considered, model work at different stages is researched, an analysis of the main systems properties is made. The article describes tasks processing by systems agents, basic states of agents used in processing tasks, queues mechanisms in system functioning. A description of the agents is shown like a tuple. A model of construction quality evaluation is considered. A prototype of fuzzy inference system is built based on obtained common set of production rules, optimized to enhance the sustainability and adequacy of the model, as well as certain fuzzy linguistic variables. A term set of linguistic variables are considered. The construction quality estimation based on input data is made. The effect of variations of input fuzzy linguistic variables for the output variable is analyzed. The three-dimensional visualization of the quality as-sessment model is obtained and analyzed.

22. Modeling decision-making processes in compex organizational and technical systems [№1 за 2014 год]
Author: Zavgorodniy V.N.
Visitors: 10543
The article considers the class of confronting organizational and technical systems. The operation of these sys-tems is based on the extensive using of technical means and carried out in interaction with the environment. Environment which affects a controlled object in the process of realization of tasks is interpreted as "nature" in the article. Uncertainty in knowledge of the decision maker in factors, conditions and mechanisms of the controlled object (subject) functioning is understood as the game-theoretical uncertainty. The article considers the family of multicomponent games. A two-component game model that is formed from matrix and statistical games-components in terms of functioning of the confronting organizational and technical systems is re-searched. The article proposes approaches to solving multicomponent games for modeling decision support. Given research direction can be useful in the development of decision support systems.

23. A model of the information security events choice based on fuzzy automata [№1 за 2014 год]
Authors: Borisov V.V., Goncharov M.M.
Visitors: 10722
The article is devoted to solving the current problem of the choice of security measures for various information sys-tems. This paper considers generalized fuzzy automata and adaptation of their structure to solve assigned tasks. A model of c hoice of measures to ensure security based on the fuzzy automata and a method of its construction is suggested. The model is a kind of fuzzy automata, which can be simultaneously in several states. It allows considering the simultaneous effect of several events , as well as their interactions with each other and the impact on the system parameters over time. A phased method of constructing fuzzy m a-chine according to the model requirements is proposed. A method for selecting actions based on the proposed model is presented. The paper also shows the application of the method for evaluating interventions based on the described model. The proposed model and the method for choosing information security measures can provide adequate description of the interaction between events and system concepts that affect the risks for a variety of information systems under uncertainty, the ability to analyze a simult aneous im-pact of measures from various groups (affecting the threats and vulnerabilities of the system) on the resulting risks level. Besides, the proposed model allows assessing the implementation of measures in stages, as well as considering the impact on information r e-sources over time. The developed model and method can be used in designing decision-support tools in the feild of information security.

24. A model for design of ensembles of intelligent information technologies for detecting information security incidents [№1 за 2014 год]
Authors: Bukhtoyarov V.V., Zhukov V.G.
Visitors: 10427
The development of effective methods to detect information security incidents is an urgent problem. The im-portance of this problem is determined by current trends in communication in information systems and by security require-ments for such systems. One of the trends is using intelligent information technologies as basic tools for solving this problem. These intelligent information technologies also include artificial neural networks proved their efficiency when solving such problems as classification, modeling and forecasting. Due to the common trends of information systems, the so -called en-semble approaches became more popular for solving data mining problems. They allow processing the information in parallel by several neural networks to obtain more effective solutions. The authors propose to use a three-step evolutionary approach to detect information security incidents. The results of experimental studies of the proposed approach on a KDDCup'99 data set are presented. The paper also considers using individual neural networks in the case of individual classifiers distribution – the so-called ensemble-distributed approach. The authors propose a method for determining cases when the problem to be solved by individual neural network and when the entire ensemble of neural networks is used. Ensemble-distributed method efficiency is tested on the problem of detecting information security incidents. The ways for further studies of the proposed methods are marked.

25. The modified query processing model in distributed databases [№1 за 2014 год]
Authors: Tarakanov O.V., Dunaev V.A.
Visitors: 10165
The authors research the methods to remove inconsistencies between the need to support a current status of distributed database components with real-time replication and limited bandwidth capacity of telecommunication subsystem. The actuality of efficiency increasing of distributed database under conditions of limited telecommunication subsystem ca-pacity is explained. Existing approaches to mathematical modeling of information exchange in distributed databases in a rep-lication mode are presented. They are based on the finite automata theory, the theory of probability and the queueing theo-ry.Local and remote query processing procedures are shown in detail as well as different characteristics of distributed data-base replica fragment. The model using the characteristics of replica's fragment is proposed. The characteristics are listed. The possibility of queuing theory and renewal theory usage in query processing modeling in distributed databases is consid-ered. The adequacy estimation for developed model in the case of using in mining enterprises is given. The scope of proposed model is shown.

26. Ontologies in the “Binary Model of Knowledge” [№1 за 2014 год]
Authors: G.S. Plesniewicz, B.S. Karabekov
Visitors: 4970
Онтология представляет в формальном виде общее знание о предметной области для данного приложения. Конкретное знание для приложения выражается с помощью фактов, структурированных в соответствии с онтологией. База фактов представляет текущее состояние приложения. В настоящее время известно много формализмов для спецификации онтологий. Наиболее разработанными и исследованными являются языки дескриптивных логик. На основе этих логик были разработаны языки семейства OWL, которые признаны стандартными комитетом W3C. Однако эти языки не являются типизированными и поэтому лишены тех преимуществ, которыми обладают типизированные языки. В настоящей работе дается краткое описание типизированных концептуальных языков для разрабатываемой системы «Бинарная Модель Знаний» (БМЗ), предназначенной для построения и анализа онтологий и баз фактов. В частности, описаны язык структурной спецификации (для определения структуры индивидных объектов и фактов), язык запросов к базам фактов, язык логической спецификации (для спецификации экстенсионалов понятий), язык продукций (для состоятельного преобразования баз фактов). В работе также показана возможность применения системы БМЗ к задаче прогнозирования автодорожных пробок.

27. Three dimensional vlsi floorplanning subsystem considering elements’ mutual thermal effect [№1 за 2014 год]
Authors: Kureichik V.M., Kulakov A.A.
Visitors: 9532
The paper describes the approach to the floorplanning problem in three-dimensional through-silicon vias inte-grated circuits with the heat distribution optimization. Formulation and the objective function of the floorplanning optimiza-tion problem are described. The article proposes the approach based on combination of genetic algorith m and simulated an-nealing algorithm. It considers elements’ mutual thermal effect by scheme thermal modeling. The algorithms combination is implemented by inserting a local search operator in the genetic algorithm. An operator is applied to the population after the mutation operator. The paper describes the method of modified B*tree to represent circuit topology of three-dimensional in-tegration IC. Calculation of a circuit thermal characteristic in the paper is based on a simplified and full thermal model. Thay signifi-cantly reduce the time complexity of the planning algorithm. Complex thermal model calculates the temperature in the steady numerical method of finite differences. For the midterm evaluation of the maximum temperature the simplified thermal mod-el with sufficient accuracy for estimating of the heat distribution is offered. The developed planning software architecture based on the object-oriented approach with code separation scheduler, cal-culation of the objective function and thermal modeling in separate modules are described. The experimental results and con-clusions on the applicability are outlined.

28. Using data compression and double caching to increase client-server applications operating efficiency [№1 за 2014 год]
Authors: Evseenko I.А., Melnikov I.I., Demidenkov К.А.
Visitors: 10237
Many organizations use client-server applications in order to afford their employees and clients an opportunity to work with necessary information on their local computers. Delays of networking and data processing on the server side must not aggravate this process. The problem of accelerating client-server applications with caching and data transfer rate in-crease had not existed until client-server applications had became popular in wide area networks. But the problem of granting fast access to a central server and accelerating client-server applications has become important because of enterprise expan-sion, creation new service centers and remote desks in different regions of the world. The double caching (caching on the cli-ent side and on the server side) with periodical client/server cache update and the additional arrangements for accelerating da-ta transfer (compression and encryption) were proposed to solve the problem. The WAN accelerator has been developed based on this method. It is an independent program module. It is transparent for a client-server application that uses it. The accelerator contains two parts: the client part (accelerator-client) and the server part (accelerator-server). The TCP connection is established between the parts. The accelerator-client intercepts client HTTP requests, caches, compresses, encrypts them and then sends them to the accelerator-server. The accelerator-server receives the requests, decrypts, decompresses, caches them and then sends the restored HTTP requests to the server. The server processes the requests and generates the HTTP r e-sponses. The accelerator-server intercepts the responses, caches, compresses and encrypts them and after that sends them to the accelerator-client. The accelerator-client receives the responses, decrypts, decompresses and caches them and after that sends the restored HTTP responses to the client. If the identical HTTP request is intercepted by the accelerator-client, the HTTP response will be extracted from the accelerator-client cache (it is the best case because there is no need to send the HTTP request to the server and wait for the HTTP response) or from the accelerator-server cache (it is the worst case because there is a need to send the HTTP request to the accelerator-server and wait for the response from its cache but there is no need to send the HTTP request to the server and wait until the response will be generated). Test series were run to evaluate operating efficiency of the accelerator. The client and server mocks were used for this purpose. The client mock was sending the test HTTP requests and the server mock was receiving the requests and generating the test HTTP responses. The accelera-tor was intercepting the requests and responses. The HTTP requests and responses had the same structure like the HTTP r e-quests and responses used by the real client-server applications in the target organizations. The test series demonstrated that usage of the accelerator could decrease response time for 14–98 % depending on network bandwidth and identical re-quest\response repetition rate. The user could see that the client-server application had been working faster.

29. Intellectual systems using for effective management of synthesis of gypsum composites of condensation curing based on natural and technogenic raw materials [№1 за 2014 год]
Authors: Palyukh B.V., Petropavlovskaya V.B.
Visitors: 8689
The article presents the way of using information systems and program and technical products when creating and effective managing composite synthesis based on natural and technogenic raw materials. Receiving such composites ex-cludes a roasting stage and demands providing certain interdependent factors. They are necessary for formation of crystallizational structure. Therefore management of such composite synthesis is a complex multicriteria problem. It needs creating a control system for interconnected criteria of its quality indicators optimization. The control system architecture is described. The general control model of synthesis of new generation aggregate in the form of structure is provided. The cognitive map of process control is given. It includes the criteria hierarchy and the selected complexes of separate tasks. It re-flects the interaction interface of a system and external world. The cognitive map describes complex object "the person ‒ a material ‒ habitat" considering receiving high-quality and environmentally friendly construction products. Created ready-made product meets customer requirements including safety at all life cycle stages, from the moment of its design until its utilization.

30. Ant colony method application to implement cryptanalysis of block cryptosystems [№1 за 2014 год]
Authors: Chernyshev Yu.O., Sergeev A.S., Dubrov E.O., Ryazanov A.N.
Visitors: 12127
The authors investigate the possibility of application of ant colony algorithms for block system cryptanalysis. The reason is that a transition to block enciphering allows increasing firmness of cryptographic algorithms considerably. Dis-tinctive features of ant algorithms are noted considering classical genetic algorithms. The article shows how the problem of a private key search can be reduced to a classical task of appointments which is solved with ant colony algorithm. There is a cryptanalysis problem algorithm, a block diagram of cryptanalysis of DES 2nd type, and an example of implementing cryp t-analysis algorithm. In this example, based on a code text block, an initial text block and a private key with the base of a le t-ters combinations matrix are defined. It is also considered that each bit of a code text is defined by each bit of the initia l text and each bit of a key, and that both the initial text and code text contain symbols from identical alphabets.

← Preview | 1 | 2 | 3 | 4 | Next →