ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 4 at 2015 year.

Order result by:
Public date | Title | Authors |

1. Ergonomic testing of a manned transport spacecraft for crew interface design and training [№4 за 2015 год]
Authors: Serov M.V., Kukin O.N., Yanyushkin V.V., Radchenko V.M., Kharagozyan R.K.
Visitors: 10542
The article considers basic hardware and software solutions for ergonomic testing of new generation spacecraft. It is supposed to create a stand for ergonomic design and pilot testing of crew interfaces: display formats options to inform the crew, a new joystick to control orientation and movement. The article provides a functional composition of the stand and two main operation modes to prepare experimental data and their validation on the basis of software and hardware platforms. These are the ergonomic features of such perspective control devices as orientation and motion control handle on the one hand and various options of information support for the crew using the latest transforming cosmonaut’s console on the other hand that are the most important. All the works are performed along with the development and creation of a unique product. The article describes the main mechanical features of building cosmonauts’ workplace that enable easy assembling and disassembling of the product, its transportation, adaptations and update with regards to emerging requirements and conditions of use. The specialized software provides a number of tasks with remote monitoring and management of new generation spacecraft systems from the workplace of the person in charge using wireless voice communications as well. All the components are unified into a correlated system; data exchange is performed via local computing network. The training hardware includes general purpose industrial objects adapted to the use in the ergonomic stand.

2. The basic concepts of a semantic libraries formal model and its integration process formalization [№4 за 2015 год]
Authors: Ataeva O.M., Serebryakov V.A.
Visitors: 7869
Modern technology development leads to redefinition of the library content concept, which may be not only a traditional description of printed publications, but also other types of objects. The content of digital libraries and physical objects can be linked in various ways. This article considers the library as a structured data repository suitable for integration with other data sources. The paper presents a thesaurus structure to determine their thematic scope, as well as basic concepts to describe such libraries. Such concepts as information resources, attributes sets, information and other associated objects form a conceptual basis for a generated semantic library subject domain. Thesaurus, in its turn, provides terminology support for these concepts, facilitates information system navigation, supports the process of user query qualification and completion. The article also describes the concepts for detailed data integration work; the emphasis is on the concepts used in the process of data reduction. An important characteristic of any data set regardless of its structure is data quality. Based on data quality assessment it is possible to give an objective assessment of the semantic library process efficiency, where the most important process is data integration with other sources. A formal model of concepts described in the article is used to describe a library ontology.

3. Halstead-technique based quality assessment framework for academic software products [№4 за 2015 год]
Author: Afanasova A.I.
Visitors: 6024
Academic software products (ASP) assessment has a major impact on the acquisition level of complex computer and information disciplines. However, programmetry literature does not make the difference between ASP and professional software products (PSP). ASP projects, alternatively to PSP, do not have immediate achievement-oriented feedback from the market environment. Taking into account the scope of documentation, ASP frontal assessment comes out to be a labor-intensive work without necessary effect, which is a quick or visible accruement in student competency on account of unavoidable instructor’s subjectivity stemming from reliance on their personal experience, knowledge and beliefs. According to the authors, a solution is the creation of taskoriented methods, which are different from the PSP assessment methods, and in the development of specific instructor’s tools for ASP assessment. Due to the created non-biased feedback, such tools can contribute to students’ behavior modification. This will take the form of increased not only ASP quality, but also the quality of the entire project-based education process. The paper presents the development results of such ASP assessment tool. Based on the Halstead technique, an algorithm to compute quantitative performance indices for the ASP created by students in C++ is set forth. The authors suggest an original computer program written in C# as a framework tool. The expected results are supported by the product beta testing and trial operation of the assessment framework.

4. A methodical framework of analysis and synthesis of secure software development controls [№4 за 2015 год]
Authors: Barabanov A.V., Markov A.S., Tsirlov V.L.
Visitors: 11609
The paper considers important issues of secure software products standardization of serial production. The authors analyze organizational and technical measures aimed to reduce the number of vulnerabilities when developing and maintaining secure automated systems software. They also systematize standards and guidelines for secure software development. The authors analyze the applicability of the existing methodological approaches to secure software development during information security assessment (including for the software certification). They show harmonization expediency of the developed regulations and practical measures with the international standards like ISO 15408 and ISO 12207.The paper introduces the concept of secure software. There also is a basic set of requirements to assess compliance of the secure software development process. In this case the set of requirements should be based on information security policies and current threats. There is an example of developed requirements. The authors developed the original conceptual model for the analysis and synthesis of secure software development controls based on a set of generated requirements. The conceptual model gives software developers the ability of science-based choice of software development methods. The authors suggest a general method of selecting a secure software development set. There is the indirect evidence of the proposed approach effectiveness. It is noted that the proposed approach was the basis for a national standard regarding security software development.

5. A software package for a social network data analysis [№4 за 2015 год]
Authors: Batura T.V., Murzin F.A., Proskuryakov A.V.
Visitors: 9141
The paper focuses on the problems of extracting and processing social network data. It considers various numerical characteristics, relations and sets analyzed on the basis of output data. It is important that these characteristics are constructive and can be effectively calculated or built using corresponding algorithms. The data amount in social networks is large. It becomes even larger when using distributed data extraction and processing system. That is why the most significant and difficult problem is to determine data, which could be processed effectively enough and is of interest according to the goals. To solve this task, we suggest using the method of determining the amount of audience influence on individual users. The method is based on the dynamic social impact theory proposed by B. Latané. This approach is also useful for solving the problem of determining the primary source of information. This problem is connected to the opinion leader detection problem. Opinion leaders are popular users who form the opinion of the majority. The paper describes one of the methods of opinion leader detection. The article provides a detailed description of the developed software, which processes information from social networks VKontakte and Twitter. It consists of six modules: extraction module, data processing module, user data change tracking module, data analysis module, graph construction module and data visualization module.

6. The problem of creating high temperature computing systems [№4 за 2015 год]
Author: Bobkov S.G.
Visitors: 10329
The article considers the problems of creating high-temperature electronic components for oil, gas, aviation and space industries. It also describes the ways to develop Intelligent Wells (IW) systems. Creation of domestic Intelligent Wells systems would solve not only an import substitution problem; it would also allow reducing the equipment cost significantly. Thus, the cost of electronically controlled valves near perforations of an Intelligent Wells could be reduced from several hundreds of thousands dollars to several tens of thousands. The space industry has similar problems. The price of Western space-related computer can reach half a million euros, and our domestic analogue can be 10 times cheaper. In addition to high radiation resistance, flights to deep space will require functioning in a wide temperature range. The paper considers basic SRISA chips for space applications with functioning temperature up to +125°C, as well as the ways to increase the temperature range. The paper also shows the possibility of creating high temperature chips based on them. To determine the possibility of using these chips in high temperature applications, there have been conducted some studies of the chips with the operation temperature 150°C. The results showed that are at this temperature the operation frequency falls by 10% on average, increasing of power consumption is insignificant. This indicates that the stocks in the project and manufacturing technology are enough.

7. Kalman filter as a method of secondary processing of GLONASS system information [№4 за 2015 год]
Authors: Bolodurina I.P., Nugumanova A.A., Reshetnikov V.N.
Visitors: 13381
The paper discusses methods of positioning a land vehicle based on secondary processing of information from GLONASS satellite navigation system. Vehicle positioning accuracy depends on many factors including the method of finding the coordinates. It is one of the indicators of vehicle effective control. Therefore, one can quickly control the vehicles movement, their actual value and the fuel consumption accuracy. The publications devoted to the problem of dynamic objects positioning, as a rule, do not describe mathematical models and algorithms, they just display the final results. In fact there are no sources, which can clearly describe an algorithmic scheme suitable for developing software. This is due to the fact that the software is a trade secret or an intellectual property. In contrast to existing methods of mobile objects control and monitoring, the authors have developed a Kalman filter algorithm step by step. It increases the positioning accuracy of a land vehicle. The algorithm is a basis for application software, which determines the land object location in real-time and post-processing mode. The paper discusses the cases of mobile and stationary state of a land vehicle. Each case shows using Kalman filter algorithm and the least squares method to enhance positioning accuracy. There is a comparative characteristics of these methods on the basis of selected statistical criteria. The authors set the most accurate method of positioning mobile and stationary objects.

8. Algorithms and models for maintenance process automated control systems [№4 за 2015 год]
Authors: Burdo G.B., Fedotova А.V.
Visitors: 10268
Production systems of enterprises, which produce high technology products, often relate to multiproduct production. When using the technological processes automated control systems (TPACS) in multiproduct production, the main problems are caused by the high situation dynamism in the companies. This is due to the regular emergence of new contracts during a calendar year, resulting in production plans adjustment; the technical regulation approximation because of lack of time for technological preparation leading to operational planning inaccuracy. According to the authors, the proposed process automated control system (for example, aircraft technical maintenance) is devoid of these shortcomings. This is due to the following factors. The hierarchical structure of TPACS reflects the hierarchy of the enterprise production plans and is presented by subsystems of volume, calendar, operational planning and scheduling. TPACS as a system in whole is connected to an organization management system through information and is its subsystem. To ensure scheduling, there is information interaction with production departments. All the subsystems of TPACS are connected, so it is possible to correct all types of plans quickly. Planning is accomplished by using iterative procedures, which provide “thin” fulfillment of production plans. Therefore, higher level production plans adjusting is possible due to feedbacks, and this ensures their feasibility. When production planning, local capacity reserves and operating time funds are planned, the ways of using their reserves are suggested. The operational planning subsystem results in scheduling of production units. It is based on the relative priority method. The paper shows the refined statement of the production unit schedule problem. The particular features are associated with the performance of work by work groups and with the use of priority service schemes. The paper identifies the methods of forming the priority object service schemes that provide a variety of calculations and a choice of optimum in accordance with the established criterion. When refining, TPACS can be implemented as a decision support system in various diversified engineering enterprises, which provide service, repair and high technology products assembly.

9. Software reliability evaluation by discrete-event simulation methods [№4 за 2015 год]
Authors: Butakova M.A., Guda A.N., Chernov A.V., Chubeyko S.V.
Visitors: 6050
The article considers discrete-event modeling and presents its distinctive features comparing to other types of modeling. The main difference is a lack of time reference, i.e. it is enough to keep the sequence of events, and thus the time interval between events isn\'t important. The authors give the definition of a discrete-event system model and add model time, which reproduce the course of events. The article solves the important problem of the event list generation in various ways: object-based and the process-based execution of events. Both ways are considered in detail with the illustration, algorithm and a program implementation element. Events can be united into groups called processes. The process-based modeling is more difficult than object-based as there is a process scheduler. The article also considers the assessment of software reliability based on discrete-event approach. This approach is based on the idea of software reliability growth. Bug scanning is modeled by a stochastic point process. A detected bug is eliminated, thereby the software becomes more reliable. Modeling has two parts: generation of the processes, which imitate introducing bugs in the software, and an assessment of component software system reliability. The paper considers options of calculating bug probability depending on program structure: consecutive, branching, cyclic and parallel. Each option has an illustration and a computation scheme. The cyclic scheme of a software component has the computation scheme of a consecutive component as it is some kind of same-type repetitions of a software component consecutive structure.

10. Automated design flow of self-timed pipelines using EDA tools [№4 за 2015 год]
Authors: Vlasov A.O., Surkov A.V.
Visitors: 7891
The self-timed logic doesn’t use the clock signal and operates in a whole range of environmental parameters, where transistors still can switch. But there are some weak points due to which the self-timed logic is not used along with the traditional synchronous logic. The design of self-timed schemes has two major approaches: signal transition graph (STG) design and the so-called burst-mode technique. The first approach provides the fastest and the smallest schemes, but due to high complexity of working with graphs the scheme size is limited by a number of elements. The burst-mode technique is the best to design big logical blocks, but requires the four-phase dual rail protocol, which leads to logic doubling in the resulting scheme. As a result, the burst-mode logical blocks operate at a half speed and occupy much higher area. Nevertheless, the self-timed logic may still be used in applications, which require extended temperature range and/or supply voltage variation, where the synchronous logic is mostly unavailable. The major disadvantage of all self-timed techniques is the absence of the automated design flow, so self-timed schemes are mostly implemented manually. To reduce the design time we have developed the design flow based on previously created synchronous prototypes. It includes the synthesis, layout and functional verification via modeling.

| 1 | 2 | 3 | 4 | Next →