+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№4(58) July-august 2015 year

Content:

IT business

Business information systems

Author: А. Volkov

The article considers the issues related to the integration of information from various sources for complex application in solving problems of financial institutions. Approaches are suggested for use in data warehouses organize information from external sources: open data, Internet, state of automation systems, etc. emphasizes the importance of using financial institutions structural beginning, shared meanings, redistributable formed in the present state automation. An example of such a system is the system of interdepartmental electronic interaction that enables the financial institution to get automated information from state and municipal agencies. Another example is also introduced in Russia a unified system of identification and authentication, providing a legally confirmed authorization of users of automated systems. It is noted that in a society based on such systems form some external to the financial organization master data management environment, which must be effectively used by financial organizations to obtain new functionality automation and additional structuring information in their data warehouses. Discusses the potential use of financial organizations open data generated in the present time, various organizations in the initiative order, and published various state and municipal agencies of Russia. The article also considers the interaction of financial institutions and service it service it company, including the use of the process approach to develop, support, and development of automation for financial institutions.

Market analysis

Author: V. Yatsko

which was created on a request from an overseas firm, processes chats, blogs, and forums to provide as output generalized negative and positive scores as well as specific subjectivity terms associated with the product’s name given in user’s query. The system is based on the highly structured ontology and linear grammar. The ontology consists of syntactic and semantic terms ad their subcategories, groups and classes. Semantic terms are those ones expressing subjectivity and having either positive or negative semantic orientation. Syntactic terms do not express subjectivity but can modify the intensity of polarity of semantic terms. The relation between semantic and syntactic terms is defined as a binary relation and groups with symmetric, asymmetric, and inverse relations between syntactic and semantic terms are distinguished. Semantic terms are assigned scores from 1 (–1) to 9 (–9). The paper suggests differentiating between formal and linguistic ontologies. Linear grammar comprises rules that allow mapping ontology terms onto the names of products and generate phrases with semantic and syntactic terms. The overall system’s efficiency measured in terms of recall and precision of information retrieval achieves 86%.

IT management

Performance management

The article analyzes the approaches to the formation of information system of knowledge management in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements of knowledge management, including lifecycle management of knowledge — use of existing concepts and the creation of new knowledge, allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network. For example, data analysis of the dynamics of passenger flows using the tools of analysis of principal components and discriminant analysis, and also applications in public administration such concepts as creating an airport network on the basis of a system of airports-hubs shown that existing approaches of choice has a significant limitation. Therefore, the information of a knowledge management system should include information about how theoretical modeling and algorithm data mining tools.

IT and education

Educational environment

The article defines the objectives, principles and priorities of Informatization of University of Technology, on which to base long-term prospects of corporate information infrastructure. On the basis of the analysis determined the main directions and priorities of Informatization. It is based on that needs to be developed new learning theories such as constructivism, learning without time and space boundaries. Traditional circuit training is outdated and needs to be replaced with new and progressive forms. Needs to be developed new learning theories such as constructivism, learning without time and space boundaries. To improve the quality of education and training of highly qualified specialists for industrial and economic structures of the country, it is necessary to intensively use new educational information technologies. The article shows that to improve the quality of education and training of highly qualified specialists for industrial and economic structures of the country, it is necessary to intensively use new educational technologies. Basis must be information technology, which is one of the most important factors determining the development of modern society. The development and application of information and communication technologies clearly show that the Informatization of high school, is a key condition for the subsequent accelerated development of science, economy and culture. Today, highly skilled workers shape economic and social development level of the country. Therefore, the Informatization of higher and secondary professional education is becoming very important element of Informatization of Russia. The transition to a qualitatively new level of education is particularly necessary Technological University, brings together in a single educational complex: University, College and technical school. It is therefore necessary to determine the objectives, fundamental principles and priorities of the University Informatization, on which to base long-term prospects of the corporate information infrastructure necessary concept of the University.

Software engineering

Information security

Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary control unit that carries control commands that may be intercepted, viewed or tampered with. Currently, there are many ways of ensuring information security of the radio channel. However, there are no methods for assessing signaling radio bearer security from unauthorized access. The purpose of this paper is to provide a method of quantitative and qualitative evaluation of security radio signals from unauthorized access. The analysis showed that at present there are no perfect valuation techniques protected from unauthorized access. In addition to the drawbacks of each method individually, many of them have a common negative feature is the fact, not security assessment is comprehensive and focused on one or more threats to information security. The authors proposed a method of quantitative and qualitative evaluation of security against unauthorized wireless access, including automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained evaluated radio alarm security against unauthorized access three different wireless car alarms that have different methods of protection against threats such as browsing, interception and substitution. The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized access different: a comprehensive assessment of security wireless alarm radio from unauthorized access, simple math, simple software implementation and adequate representation of the probability of different types of wireless alarm counter threats to information security in the radio channel.

Laboratory

Author: A. Azhmuhamedov

The analysis of social engineering systems allowed to build fuzzy cognitive model of assessment of its man-made elements to arrive at an informed judgment about the need for control actions to bring the State of the social subsystem to the specified level. The set of control actions is implemented through the use of institutional mechanisms, motivation and information management. You must ensure that the level of motivation is not greater than the optimum value, and the intensity of institutional measures was below critical. To calculate the value of concepts at the lower levels of the hierarchy model can be used as an additive vector measure up, because in this case, the values of some concepts can be offset by other values. For the top level of appropriate application of convolution, because the multiplicative if at least one of the concepts of {«level of motivation “; «Psychophysical capabilities; «Competence»} «variable linguistic factor» is set to «Low», then the integral evaluation of the level of effectiveness of the man-made element should be taken as equal to «Low». Evaluation of the concept of “ Level motivation» may correspond to the values of the negative term-many of the linguistic variable. Assessment of the status of the subject in this case will also take «negative » values. Content that can be interpreted as the potential destructive impact of man-made element on the system-«insider threat».

Study of processes and systems

The problem of estimating the wind energy potential of the region in view of the terrain with the assistance of software tools for modeling and calculation is formulated. Currently there are no readymade software solutions for the implementation of the whole set of terrain and wind flow modeling procedures. A description of the difficulties encountered in the integrated use of heterogeneous software solutions for the problem of evaluation of wind power potential in the areas is given. The authors propose a methodical approach to search places efficient allocation of wind power plants, considering the use of software products. Methodical approach consists of three stages — preliminary analysis of the terrain, terrain modeling, simulation of wind flow. Approbation of the methodical approach to the creation of simple terrain models, as well as with the creation of a model of the real terrain near the Ayan village of Khabarovsk Territory is conducted. Application of methodical approach allows to realize computer airflow simulation over the terrain and thus solve important practical problem of defining the sites of effective placement of wind turbines. According to calculations at these sites the wind speed increases substantially: from 5 to 8 meters per second. This allows to take this areas for further analysis.

Models and Methods

Author: I. Fedorov

The Bunge–Wand–Weber ontology is widely used in object-oriented development of IT applications. It shows how a real world objects are mapped to the ontology concepts. Wand and Weber suppose that the ontological expressiveness of a modeling language used to describe the world around us, can be assessed by investigating the mapping from a set of language primitives to a set of constructs of the proposed ontology. One of the main success factors of the use of modeling language or notation is its ability to provide a set of modeling primitives, which can be directly mapped to the relevant concepts of Bunge–Wand–Weber ontology. However, the existing Bunge–Wand–Weber ontology is not fully suitable for describing business processes. The analysis shows that the ontology misses the concept of time, the mapping of logical operators of modeling language on the concepts ontology remains unclear, ontology contains no concept necessary to map a performer of process operations. The paper proposes to clarify the distinction between internal and external events, thus introduce a category of time; adds the concept of the actor who initiates the start of the execution or completion of the process operations; change the definition of the transformation, adding the meaning of unit of work that doesn’t change the object, but rout it to the next operation thus allowing to map logical operators. As a result of the proposed adaptation the Bunge — Wanda — Weber ontology becomes adequate to the task of business processes modeling.

Author: P. Oleynik

The article presents a unified object system metamodel, developed by the author and used them in the development of large software systems over the past few years. This paper is the development of the material, briefly presented in the article «The Concept Creation Service Corporate Information Systems of Economic Industrial Energy Cluster», published in the Applied Informatics journal in № 6 from 2014. The urgency of the problem is reasonable overview of existing work presented in this article. The article presents the latest to date version of the metamodel and describes the main constituent elements. Attention is paid to the hierarchy of metaclasses used in the simulation application domain entities. Also considered metaclass hierarchy representing the different types of atomic and class attributes. Attention is given to the description and dynamic (behavioral) component by implementing the methods and events classes. Finally, conclusions are made about the future development work. Behavioral characteristics are implemented through various validation rules. The article deals with the decisions relating to the management of visibility and accessibility of the individual elements of graphic controls. All elements of the metamodel was tested under a variety of complex database applications. Further development of this paper is the development of custom UML-profile that allows to simplify the process of designing the program and database structure. This profile can be used in teaching students the design and implementation of software.

Mathematical tools

Author: I. Vygodchikova

In the study of dynamic processes is necessary realistic and objective causal analysis of events. Such analysis is possible due to application of mathematical and computer simulation methods. Existing methods of modelling, quantification and forecasting typically require large volume of the original data, which is not always available, especially when the simulated indicator depends on several variables, and they underestimate the possibility of extremely rare events that violate distribution pattern of this indicator. The purpose of this paper — development of a new minimax method estimating of dynamic patterns for rectangular grid of values of independent variables, mathematical study of a new method of modeling, the establishment of an effective algorithm, demonstration of application. Are stated and proved the properties of the solution of the problem which is implementation of tools modeling technique, that allowed develop an algorithm in the form of step by step instructions, which is easily implemented in any software environment. In the article demonstrated examples of implementation of the algorithm, in particular, reviewed its application to assess the dynamic trends for the purpose of data compression and prediction of missing values in the sample. Proposed a minimax model of multiple regression and its realization for estimation of parameters of autoregressive depending. Mathematical justification and obtained the properties of the new model allowed to develop effective, from the viewpoint of availability of the software implementation in real-time, algorithm.

Point of view

Methodology of science

This article is devoted to a problem of creation of the program systems (PS) organizing the information search (IS), and providing high rates of efficiency for the mass user (not the expert in the field of informational technologies). Researches weren’t limited by the review of achievements in practice of creation PS_IS, and also in the corresponding scientific and engineering disciplines. The subject of researches is the process of achievement of mutual understanding in communication between two subjects. Such researches completely correspond to the character of researches in the scientific direction of artificial intellect. It points out the essence which allocates from the process of communication between subjects, and it is explained the concept corresponding to it and it is offered to call «initial identification». Consideration of process of initial identification allowed to reveal the main contradiction in a problem of creation PS_IS. In the process of communication (and respectively in IS) the subject operates with all known set of concepts and uses thus as gained recognition (simple or compound) names of concepts, and the names formed directly in the course of communication. However in a natural language only 83.000 concepts are called by simple unique names (in a word). Compound names called incomparably more concepts, they make only insignificant part of concepts with which the subject operates in communication. Thus, the dominating part of algorithms of II is connected with application of quickly named concepts. It is shown that process of an operational name is feasible only with use of the model of knowledge approached to gnoseological model. And it is also specified that after some time in computer systems emergence of such models of knowledge is possible. For the new technology of IS the organization of access of each concrete tag of a concrete concept to its names in base of names is offered. That makes a basis of the organization of base of simple and compound names. Also other characteristics of the organization of the dictionary at triune essence are provided. Such concept as»construction of sentence» is offered for a broad use in scientific practice interpretation of which corresponds to interpretation of the concept «sense of the sentence» with explanations, which allow to draw sense from sequence of alphanumeric symbols. A great place in this work takes consideration of algorithms of formation and recognition of sentences (that is II). Many situations of II suspension are revealed and described. It is noted that completeness of such situations, and also algorithms of permission of the concrete situations and scenarios of interactive interaction providing finishing II up to the end make the essence of works on formation of the specification on design of PS realizing new technology of IS. In conclusion it is pointed out that the declared subject due to its scale can’t be opened in one article in details (scrupulously) to conform to requirements to the specification on creation of II. It is important that the complete picture of new technology of IS is given in article and feasibility of such technology is shown.