ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 3 at 2013 year.

Order result by:
Public date | Title | Authors |

41. The background for decision support tools software unification [№3 за 2013 год]
Authors: Осипов В.П., Сивакова Т.В., Судаков В.А.
Visitors: 5537
The paper describes the development of decision support systems (DSS) that are invariant with respect to the domain area. A unified approach to the DSS is provided. It includes the following principles: no developers’ subjectivity, the domain area invariance, decision support methods multiplicity, decision maker subjectivity and usability. DSS architecture, that implements these principles, based on the frame approach. The framework is responsible for the mechanism of describ-ing domain model criteria and parameters, allows the user to choose their decision support methods and organizes the infor-mation exchange between them, provides storaging, displaying and editing the alternatives attributes, provides access control. The entire set of variable DSS behavior stands out in the modules that are connected via extension points. The article pro-vides some guidelines of DSS quality design. It also proposes the characteristics for quality evaluation including the decision support method properties and software implementation properties of the method. The proposed methodological framework is successfully used to design the DSS COSMOS which is usedin the ranking of applications for scientific and applied re-search on the International Space Station Russian segment.

42. The definition of malicious code authorship using the data compression method [№3 за 2013 год]
Authors: Osovetsky L.G., Стремоухов В.Д.
Visitors: 8445
The article describes a method of determining malicious code authorship based on the combination of the software's code and the code implemented by the known author. The method allows reducing searching the malicious code author and locating the range of possible developers ofmalicious code. This reduces the cost of information protection sys-tems developing and the definition of the security threats original field. The method increases the objectivity of the malicious code author's localization and the source of threats. The paper describes the mathematical algorithms for practical application of the proposed method.

43. Multistep alternatives search in an information catalogue [№3 за 2013 год]
Authors: Palyukh B.V., I.A. Egereva
Visitors: 7547
Despite the fact that data catalogues are widely used in different areas, data search that is considered as thema-jor part of data systematization, is being done with strictly formulated search requests that result in a search results list. How-ever, quite often it is impossible to state a specific search request. It is also impossible to state search criteria specifically. To avoid restricting the access to full information in givencatalogues, it is recommended to provide quality system access. The article addresses software solutions for systematization of heterogeneous data. The article gives solutions description in words and parameters to provide forming a ranked search results list that matches a search request best. The article proves motivation for the use of basic principles of fuzzy systems principles when selecting solutions in registers and catalogues. The article describes an algorithm of multistep decision making process for an original problem with a fixed number ofsteps. It also demonstrates how this system works in a data catalogue.

44. Application of the fuzzy sets theory to the decision making problem under conditions of uncertainty [№3 за 2013 год]
Authors: Pogorelov A.S., Panfilov A.N.
Visitors: 12918
The paper presents an approach to decision making under conditions of uncertainty, based on the application of fuzzy sets theory methods. This approach is applied for decision making problems, which are formally presented in terms of the game theory (statistical games). The task must be represented in the form of decision matrix, indicating the set of all pos-sible alternatives, the set of possible states of the system, the values of performance indicators, as well as the states probabil-ity distribution. This approach is an alternative to thewell-known decision criteria used in statistical games problems, such as Bayesian criterion, the probability maximization, dispersion minimum, modal criteria, etc. The distinctive feature of this ap-proach is that the expert doesn’t need the exact numerical values as the efficiency values, but he can specify some verbal de-scriptions in the form of sentences. This is achieved by using fuzzy sets with their membership functions as the assessment of functionality. Using methods of the fuzzy sets theory allows simplifying the expert evaluation process and increasing the de-cision making quality.

45. Effectiveness investigation of biology-inspired algorithms for combinatorial optimization [№3 за 2013 год]
Authors: Семенкина О.Е., Семенкина О.Э.
Visitors: 11860
Self-adaptive biology-inspired algorithms for the travelling salesman problem are introduced. Self-adaptation is organized through the settings and/or parameters stochasticchoice based on probability distributions of these operators ac-tivation (parameters use) during an algorithm execution. Probability distributions are modified on each algorithm’s step ac-cordingly to the operators (parameters) use success that is defined through the fitness value of solutions built with these oper-ators (parameters). Effectiveness of proposed algorithms is compared with known bio-inspired algorithms, namely with con-ventional genetic algorithm, ant colony optimization algorithm and intelligent water drops algorithm as well as with local search (Lean–Kernighan heuristic). The usefulness of the proposed approach is demonstrated on problems with high dimen-sion.

46. The quality control system for software for the MPD experiment in the NICA collider [№3 за 2013 год]
Authors: Слепов И.П., Рогачевский О.В.
Visitors: 6833
The article expounds a new method to build a quality control system for software design of the MPD experi-ment in the NICA collider. This software is called MpdRoot and is a shell to simulate the detector operations, toreconstruct the experimental data and analyse the events of heavy ions collisions. The author briefly describes software and technical side of the MPD experiment. A website content management system is considered as a platform for this project developers containing technical information about the project, a control version system, a testing system, a monitoring and others web-tools. The result is a complete system of quality control for MpdRoot software project. The article will be useful for software developers with a lot of members who would like to facilitate their work and improve teamwork.

47. Automated flight planning system on Russian segment of the international space station [№3 за 2013 год]
Authors: Станиловская В.И., Беляев А.М., Потоцкий С.И., Козлечков А.Г., Колокольцева О.М., Будникова Т.С.
Visitors: 13489
The article considers the automation of sheduling creation, editing and approval processes for International Space Station (ISS). The timelines structured as hierarchical system, its levels corresponds to the interval of expedition, one week and one day long timelines. Software of Automated Planning System (APS) of ISS developed by authors of this article provides coordinated planning of all crew member activities and activities of ground and on-board control complexes of ISS. APS software also allows creating cargo spaceship timelines. The article observes following topics: system design, activity and timeline database development, design of timeline editor which provides creating and editing timelines, resolving con-flicts, creating complex activities with predefined execution sequence and intermediate periods. The planningprocess imple-mentation with APS takes into account a lot of factors that have an influence on timeline quality and efficiency, and also sat-isfies the sequence-related and resource related restrictions.The paper presents an original method of coding and systematiza-tion of activities, that allows maintaining correspondence between different versions of the same activity in a different time-lines and performing automatic comparison of the timelines. The APS complex for timeline exchanging between internation-al partner organizations that sharing the ISS use is observed.

48. Project management information systems and their using in the field of nanoindustry [№3 за 2013 год]
Author: Stoyanova O.V.
Visitors: 11198
The article considers project management information systems that have gained the greatest distribution in the Russian market of similar systems. The comparative analysis of systems to identificate the opportunities of their effective us-ing for project management in the field of Nanoindustry arecarried out. The Nanoindustry projects features defining achoice of project management information systems characteristics aredescribed. The article shows that because of similar projects complexity for management the software solutions with developed functions of planning, monitoring, control and decision-making support can be recommended. Complex structural interrelations existence in Nanoindustry leads to the fact thatmany administrative tasks can be included in multi project management that demands software for project portfolio management. Essential heterogeneity of projects participants influences a choice of data access technologies. Therefore the web-access, cloudy opportunities and mobile devices software access issubstantially demanded in the considered sphere.

49. Information security systems technique secured from researching [№3 за 2013 год]
Author: Стюгин М.А.
Visitors: 8322
Conflict systems form the research area of our study describingthe methods of protecting counterparty against research, as well as the methods of counteracting the protection against research. The study determines the researcher model in conflict. This model imposes information restrictions when trying to research the object of the conflict. The studyde-scribes four classes of the researcher depending on his information restrictions. The algorithm for designing systems protect-ed against research is also described. The counterparty research problem in a conflict system is that there is an opportunity of using this process to disinform. This is possible, if you knowresearcher's principles of interpretative work on information re-ceived, what gives you the possibility to reflexively control the opponent. Similarly, you can get the scheme to reflexively control the reflexive control process. At the moment the subject that really controls the process has information supremacy. To obtain this information supremacy, the subject has to get conflict's object under control that is sufficient to correct coun-terparty researcher model classes. By correcting classes of the researcher model, you can achieve the point when it becomes impossible for the counterparty to define the research objective. If the subject can get the process under control of this kind, than using the described algorithm it obtains information supremacy. We assume this algorithm can be effectively applied to information security software development. Using the considered algorithm, the analysis system of unauthorized user activity on enterprise websites and enterprise networks (ReflexionWeb and ExLook software) have already been developed.

50. Model development methodology based on modified Petri nets [№3 за 2013 год]
Authors: Суконщиков А.А., Кочкин Д.В.
Visitors: 9652
One of the CAM networks key tendencies of is integration of controlling system technologies. In order to maintain the high quality of control it is necessary to guarantee the joint action of all the CAM subsystems, as well as to en-sure the uninterruptable information interchange together with assistance of the differentiated service of various data flows. QoS (Quality of Service) technologies allow solving this problem adjusting the policy of maintenance of the networking equipment traffic as well as front-end computers’ parameters. The network simulation data conducted using some mathemat-ical tool can become the basis for the selection of theadjustments. As a tool the article suggests using an extension construct-ed on the basis of colored, fuzzy, timed, hierarchical and priority Petri networks. The article provides a formal description of the developed mathematical tool of the modified fuzzy Petri networks. It shows the advantages when modeling network de-vices. According to the modified fuzzy Petri Nets tool the following two methods have been developed: constructing network devices and their elements; composition of the network devices. The network model received with the help of the developed methods can be used for such characteristics of traffic as delay, jitter, transmission speed as well as detecting some problem areas in the network. There are results of modeling various queues of routers, andthe influence of a TCP/IP transmit window on the parame-ters of transfer traffic.

← Preview | 1 | 2 | 3 | 4 | 5 | 6 | Next →