+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№2(56) March-april 2015 year

Content:

IT business

Internet marketing

Advertising spreads very fast on social networks, forums and similar communication sites. In 2013, the online social media tools were used by 38.3 per cent of companies, and this number is constantly growing. This article deals with the online marketing, social networking and brand concepts. It analyses specific characteristics of a brand and social networking as well as their significance. Based on the example of the brand Vytautas, the success factors of the brand on social networks are set. Consumer opinions on the importance of social networks for promoting the brand are assessed. The analysis employs the following methods: the biometric Eye Tracking analysis and multiple criteria assessment method.

Business information systems

Effective development of nowadays business must be based on scientific knowledge and sciencebased solutions, which are designed to properly integrate electronic and mobile business models into enterprises current traditional activities. IT-based development should be followed by rightly identified characteristics of electronic, mobile business and participants in this area, analysed strategy aspects and identified the role and importance of business model in this context. The aim of this article is to analyze the effective electronic and mobile business integration to traditional business aspects from the strategic point of view. To achieve this goal, the main characteristics of e- and m-business were identified, information technology-based business strategies and business model classification were analyzed. Research methodology employed: systematic literature analysis and synthesis, grouping, graphic information visualization techniques.

IT management

Performance management

The main goal of this article if analyze possibilities of implication of distributed information systems in government regulation multifaceted phenomena, the impact of which can only be done by indirect methods. This is an important field for further research the integration of monitoring systems, algorithmic computational problems in the individual subsystems and their integration. In particular, the necessity of using such systems for the analysis of the impact of instruments of state control development of the route network of regular air transport the analysis of civil aviation activities, the results of which indicated that the directions constituting more than 40% of passenger traffic route network 2007, currently not served. All of this suggests the need to evaluate specific directions from a position in accessibility to the population. Thus, when designing distributed systems, it is necessary not only to identify subtasks research, but also to determine the particular objects of study. As a result of the application of multivariate classification algorithm with training it was revealed that Russian airlines use 4 types of business models in the choice of the route network and only 3 of them can have a substantial impact on the state route network that must be taken into account in the selection of monitoring sites.

IT and education

Training IT specialists

The paper discusses the issues associated with the design and development of professional standards in Russia. Describes the creation of professional standards, the main directions of their development, practical application, the automation status of this activity. It is noted that in modern society are changing the main structural components of professional identity — the content of activities, processes, experience, strategies for professional advancement. «Professional resistance» is replaced professional mobility. Therefore, the role of professional standards that describe the requirements for knowledge, skills and specialist skills. In professional standards in the it sector must take into account peculiarities of this sector is the rapid development, virtuality and the multilevel character of the objects of it professionals, the presence of other groups of standards affecting the use of information technology — it standards, educational standards and other Necessary monitoring changes in the it and timely revision of professional requirements. Requires additional structuring elements of the content of professional standards. In particular: development of standardized classifications of skills-based typing of objects and subjects of employment; submission of professional standards in the form of information modules model characterizing the competence of the specialist, and the use of the principle of «modularity» of the content of professional standards which allow reuse information elements, in various professional standards. The content of professional standards will become more uniform due to the standardization of semantic elements. It will form a «professional vertical control of the integrating mechanism of the modern state.

Software engineering

Algorithmic efficiency

Authors: N. Danilov, T. Shulga

Increasing complexity of software products also increases the demands on their usability. The article focuses on the software product’s usability evaluation based on the user’s activity data. There are different types of user’s activity data and visualization methods for them, the choice of which depends on the data composition and specificity. One of the most popular is a point data, such as mouse clicks and movements. The commonly used visualization method for point data is a heat map — graphical representation of data where the individual values contained in a matrix are represented as colors. Authors suggest using the heat map as a mathematical model of the user’s activity, what allows formalizing the user’s interaction with the software interface. However, there are no formal methods, described in scientific sources, for constructing heat maps based on the point data of the user’s activity. Authors propose the formal method for constructing such kind of heat maps. The proposed method allows constructing heat map taking into account data density and expert-defined parameters to achieve the desired clarity of visualization. In addition, described method was implemented in free software.

Network Technologies

Author: D. Namiot

The paper discusses the problem of design and development for mobile services using wireless tags. As wireless tags here we consider mobile phones and other devices that support Bluetooth. Any Bluetooth device (Bluetooth node) in so-called discoverable mode we consider as wireless tag. Our model defines how to link user defined content to wireless tags. In this model, Bluetooth devices let define the context-dependent data available to mobile users in the proximity. Dislike the specialized Bluetooth tags (beacons), our model does not require the preliminary scene preparation. Any mobile device with Bluetooth support can play a role of wireless tag. The proposed scheme covers all stages of the life cycle of mobile services: how to create a tag (tags), how to bind data to them and how to view data associated with tags. So, ordinary mobile phone is enough to create a data channel. Our article discusses potential applications of the proposed model. The typical examples are classifieds. One mobile user creates some announce and makes it available (readable) for other mobile users in the proximity (in the vicinity of the author). By the same manner we can create any commercial content (advertising) and make it available for visitors in malls, café, etc.

Laboratory

Study of processes and systems

It shows the influence of pipeline systems for reliability, cost-performance and industrial security enterprises of the chemical industry and other industries. It shows the role of system maintenance and repair, as well as integrated logistics support in ensuring the capacity for work of industrial piping systems. The drawbacks of maintenance and integrated logistics support using disparate software tools are shown. To eliminate these drawbacks authors offered of the approach to integrated logistic support for the life cycle of pipeline systems of industrial enterprises based on the theory of artificial intelligence, modern methods of mathematical modeling and logistics resource saving in the field organization of production. Developed the following heuristic computational tools computerized integrated logistics support industrial piping systems: logic and information life-cycle model of pipeline systems, which mimics the procedure logistic support of piping systems, as complex organizational and technological decision-making procedures; frame and productional models represent unformalized knowledge about the technical and structural characteristics of the pipeline; heuristic-computing algorithms of calculation of the technical and structural characteristics pipeline systems. Developed heuristic-computing tools allow to automate integrated logistics support life cycle of pipeline systems and to organize the interaction of all its subjects in a single information space.

Author: V. Yuriev

Information security risk management includes periodic evaluation of the quality of practice giving reduce to risks and returning risks for an acceptable level. Generally quantitative and qualitative indicators of detected risks are used in forming enterprise information security budget. It is suggested to solve the problem of forming information security budget by evaluation of the enterprise information assets and using game theory and strategic approach. The probabilities of reflection of unauthorized access to enterprise information resources became the elements of the payoff matrix of two-player antagonistic game. The probability of reflection of the attacks to information assets is described by the function with two arguments: 1) average probability of attack in a certain economic field; 2) value of invested funds to improve the information asset security. This approach allows distributing the total amount of funds allocated to provide enterprise information security in selected information assets areas. It is offered to find the solution of the antagonistic game with the use of linear optimization methods. The mixed strategies obtained by solving the antagonistic game are used to determine the amount of funds invested in security of different information assets. The model developed in this paper represents the combination of strategic two-player antagonistic game and a game of a single player against nature in terms of risk, which is solved by using the Bayesian information criterion.

Models and Methods

The article discusses actual issues in the application of automated control systems to optimize the process of investment projecting at the enterprise. Investment projecting is an important aspect of the activities of an entity in the modern economy. To solve the optimization problem of investment projecting is proposed to use a network of economic-mathematical modeling. The rationale for applying the methods of network management to optimize investment activity. Shows a gradual process of forming a network model that includes the entire sequence of complex operations, investment projecting, such as: collection of baseline data, marketing analysis, financial analysis, sensitivity analysis, building financial models, generation of alternatives, analysis and selection of the optimal project. Given the detailed description and the graphical representation of the selected processes and the resulting network model. Possibilities of application of information technologies for solving problems network modeling and implementation of adaptive control model. Automation can be done using the visual object-oriented programming in high-level languages, Delphi, C++, C#, Java, JavaScript, PHP, Perl, etc.

Various mathematical and statistical models can be used as basis for constructing scoring systems. These models can be obtained by linear regression, logistic regression, discriminant analysis, decision trees, neural networks, and others. The article describes an example of constructing a model of behavioral skroring in the banking sector, based on a neural network program IBM SPSS Statistics. Also this article presents the technique of modeling, sequence of network settings in the dialogs procedures of the program SPSS, code syntax for the implementation of the considered algorithm, and the simulation of results. These results can be used in the educational process for laboratory work and workshops in teaching methods in neural network modeling program SPSS, as well as independent research. The purpose of writing this article is to review the methodological aspects and step alogoritma constructing a neural network program IBM SPSS Statistics 22 for example, behavioral scoring in the banking sector. Under the behavioral scoring understood mathematical model by which on the basis of a set of known characteristics of the object of study (independent variables) projected a certain desired characteristics (dependent variable), the value of which is not known researcher.

Theoretical approach

Mathematical methods

Authors: O. German, Yu. German

Аn original approach to find a maximum-size independent set in a fuzzy graph is presented together with the necessary formalization technique. The approach is oriented at practical usage in applied artificial intelligent systems using fuzzy logic and modal logic concepts. The problem may be encountered in face recognition with some possible distortions. The vertices stand for the points in the face image with approximately similar color and brightness. Obviously, in the case of image distortion the arcs in the graph may be assigned with the values in 0,1‑diapason. A fuzzy graph contains some nodes (arcs) with indefinite measure of their belonging to the graph. The situation may appear when no constrict classifying rules exist as explained in the paper. One can use a measure of 0.5 to interpret indefiniteness. This an interpretation enables one to apply modal logic for problem formalization and solving. The modality of the type «possible» is interpreted by the 3‑valued formula with truth value not less than 0.5; the modality of the type «necessary» is interpreted by the 3‑valued formula with the truth value equal to 1. The approach represented in the paper may be interesting for the researchers engaged in the recognition and classifying problems.

Author: A. Lyubomudrov

For the construction of the calculating machines full functional sets of logic functions are used. In the full functional sets even thought one of the functions is to be a nonmonotonic function. So the aim of the article is to construct the effective approach to the definition of the belonging algebra logical functions to the class of the monotonic functions. The approach is suggested proposes using groups of logical variables as numbers where the digits of numbers are the mentioned logical variables. Then the values of the functions are examined at the fixed positions with the fixed numbers. If all function meanings are true then the function is a monotonic one. In the other case we have a nonmonotonic function. This approach enables us to check the belonging of the algebra logical functions to the class of the monotonic functions without commensurable checkings of the groups of logical variables. The quantity of the commensurable chekings may be equal to N = 22n – 1 where n is the quantity of the variables in one group. So the approach is proposed is rather effective.

Information security

Software and hardware systems

Developers of modern data protection software do not pay enough attention to false positive problem while calculating checksum of its files and other data delivered using insecure data transport. That leads to major problem, if attacker can replace checksum or replace process of getting data from file, then most of antiviruses and other very important software will be compromised. Authors of that article developed software for assessing the stability of data protection against different attacks. Method that shows possibility to compromise large amount of systems based on specific of operation system’s file request operations. Software was also developed and tests show that many important utilities such as md5, sha256 (for FreeBSD) and cverify. exe, vipnethashcalc-tool. exe (both of them certified in Russia as data protection software) are not protected against false errors while calculating checksums. Errors appear in 100% test cases. In addition, tests were made for software called «FIKS 2.0.1» witch have special license from Federal Service for Technical and Export Control of Russia (FSTEC). That software also unprotected against false errors and tests proves that.