+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№5(59) September-october 2015 year

Content:

IT management

Resource management

The goal of this article is to investigate an approach to the organization of IT infrastructure management for a network of multifunctional complexes of roadside service on the basis of IT Service Management (ITSM) best practices. IT Service Management refers to the implementation and management of quality information technology services. The network of multifunctional roadside complexes has a very complex IT infrastructure consisting of a large number of different components. Moreover, the company is planning to actively use IT outsourcing. Business continuity significantly depends on the quality of provided IT services, the availability and reliability of IT infrastructure. Firstly, the problems that the network of multifunctional complexes of roadside service faces due to the lack of proper IT infrastructure management and maintenance are identified. Then a system of management processes is developed using ITSM best practices and in compliance with the business goals and the role of IT in the network of multifunctional complexes of roadside service. A combination of several methodologies and techniques was used: COBIT 5 framework for information technology management and governance, The Information Technology Infrastructure Library (ITIL v. 3) — a set of practices for IT service management, and the first international standard for IT service management — ISO/IEC 20 000. The capability of the proposed solution to address the identified problems and to mitigate risk is justified.

Performance management

Author: V. Zavgorodnij

Now has the opportunity to make informed choices on the implementation of the applied processes or cloud technology based on its own resources, do not use cloud technologies. There are several options for cloud solutions and different combinations of partial transfer to the cloud applied processes, the problem of choosing the optimal solution becomes quite complicated. The applied system is a set of interrelated components of the information system, which provides a solution specific application in a particular company. Applied system consists of the following components of the information system: users; experts; application (a set of applications); User Interface — information system; shared hardware and software information systems involved in the implementation of an application or set of applications. It is proposed to link the concept of information risk not only the safety of information, but also to its quality. Fundamentals of information risk management applied systems, presents the general model of calculating the costs of information risk management applied systems. The optimality criterion is the decision about the choice of a technology implementation of the applied process is the minimum of the cost of managing information risk. The advantage criterion is to bring the cost of providing information risk management and the amount of the alleged damage to the company from the negative developments in the enterprise information system.

IT and education

Educational environment

Author: V. Aitov

Historically automation of various business areas in universities was implemented not as holistic and integrated information systems. On the contrary these systems were isolated from each other. But all of them could require data of other systems, often in real-time and furthermore with support of write operations. In many universities attempts were made in order to eliminate the problem of integration by creation a single holistic system, but all of these attempts were unsuccessful. Thus, integration is necessary to combine individual systems into a unified information system of university. For example the access control system must be integrated with main information system. Besides, this integration must be in real-time. Access control system also can make many connections (sql-queries) to database of main information system. In this article the integration of main information system and elearning platform was considered. MOODLE acts as the e-learning platform, 1C: Enterprise acts as the main information system. Administration of users in manual mode is difficult and ineffective when too many users are in a system (more than 7000 in our case). The e-learning platform uses the main information system as a provider of user database. Any record in this database contains username, password, photo, etc. As a result of this integration, transfer of user`s photo between systems in realtime was achieved in a high load environment.

Software engineering

Defense software

In the paper we propose a generalized block diagram of an information system of Internet banking, which reflects the modular architecture of the system, the relationship of users and the control loop. We propose a system model of information system of Internet banking, the use of which will help minimize the number of cybercriminals, optimize and improve the comprehensive system of information security organizations of economic and social development, improve the efficiency of secure information systems Internet banking, choose the right strategy for the development of Internet banking services. Model of information system of Internet banking will assess the level of security of the system, which is determined by solving the problem of decision support in poorly structured domain, characterized by heterogeneous characteristics. Proposed a set-theoretic model of decision support in Information Security Management Information Systems Internet banking, allowing accumulate analytical information about ongoing threats cybercriminals provide automated support for decisions on matters of neutralization cybercriminals, measures to ensure the protection of confidential information, facilitate the development of operating influences. The article presents a formalization of the model cybercriminals, characterized by personal parameters offender and scenarios for the theft of confidential information in the information system of Internet banking. The basis of the model laid down by cybercriminals typical images of cybercriminals, who will determine the potential intruder in the information system of Internet banking. The proposed solutions will increase the power of information security information system of Internet banking, to increase the efficiency and quality of management decision-making for the protection of confidential information.

The article refers to the possibility of using neural network security methods of digital transmission in wireless networks. Analyzed the organization of information transfer and synchronization signals by two groups of transmitters operating in different frequency ranges. Organization of the system involves the transfer of synchronization signals by a group of transmitters with the same characteristics, but located at certain points in space. As a result, the correct information sequences can be accepted only if you know the area of the intersection of coverage zones of all clock transmitters. For protection of the transmitted information, it is proposed to use two neural network structures. The first neural network is constructed of two modified dynamic neural modules and a neuron with excitatory- inhibition dynamics. Its main purpose is to produce a background of the information signal, which is applied to conceal the information transmission, and also does not allow to determine activity times of transmitting stations. A modified Hungarian algorithm was used to configure the neural network and identify entry points of feedback signals was used. The second neural network structure consist of a dynamic digital neuron. One of the structures of a neuron is a block of memory, the content of its cells completely determines the dynamics of the development of states of the neuron. Its primary purpose is to generate a unique signal to synchronize the whole wireless network. Configuring of the neuron was carried out using a random search algorithm with self-learning. The main purpose of the algorithm was to initialize the memory block of a neural element. The joint functioning of the two developed neural network structures can protect the transmitted information without using of scrambling methods.

Software development technologies

Engineers have to use special methods for improvement of value of operational characteristics (parameters) of the technical device. The design engineer is to carry out the analysis of arrays of scientific and technical documents in a certain subject subarea for search of such methods. To be guided in the huge volume of the documents used for the purpose of search of methods to the expert is difficult, and search and the analysis of each document can be long. The purpose of work is to create the databases project for storing data of scientific and technical documentation in the structured view and to organize effective search in this database with use of ontologies. Authors have developed the logical model of the document and have described stages of database design. Authors created the ontology for the automated processing of semantics of information and its effective use. Classification of classes, subclasses is formed. Characteristics are identified that describe these concepts. Conceptual structure of the ontology is developed and designed in Ontorion Fluent Editor. Process of creation of classes of ontology, instances of classes and relations between instances is described. The created ontology is integrated with ontology «generalized methods of improvement of operational characteristics, system «Intelligence» and allows the user to receive not only information on reception of improvement of the characteristic (the name, the link to the document), but also detailed information on the most scientific and technical document.

Author: D. Oshkalo

Model-driven engineering approach considers the software project as a set of interrelated models representing the main artifacts of a development process, such as source code, configurational files, schemes of data warehouses, user interface, program architecture, etc. A relation between the models comes either from design dependencies (when one model is generated from another), or from the actual purpose of the models (when several models describe the same feature of the system). Both cases imply the related models to be consistent, i. e. the information is one model is somehow corresponds the information in another. Since the models are being modified, the consistency relation between them is broken and needs to be restored to maintain the development process. The article describes the activity called model synchronization, which handles the changes made to the models and correctly propagates them to the related ones, making them consistent. The activity is proposed to be built upon the well-defined model transformation techniques, which consist of a transformation engine and a set of transformation rules. Model synchronization properties and requirements are defined. Much consideration is given to incremental change propagation, conflict resolution and change verification. The classification of the model transformation methods and its vital parts is presented to define the most suitable approach as a basis for further model synchronization process development.

Simulation

Actor modeling

The objectives of the company, including the improving the quality of processes and products, changes in the internal and external environment — these are the main reasons for the continuous modernization of automation with the aim of enhancing the efficiency, automate processes throughout the enterprise. Vitality — is an opportunity to realize the goal of management information system (MIS) operation in cases of adverse effects. Mechanisms to ensure vitality while can be very diverse. For example, it can be generated the new information process, which implements the purpose of the information system. Such an opportunity will characterize the information system the possession of properties vitality. Some mechanisms of adaptation, compensation, recognition, reconstruction, reconfiguration and reengineering are the technological basis of the dynamic functional MIS-system reorganizations. Obviously, vitality information system may, on the one hand, be considered as its objective property that depends on the subject, audience, time, and on the other hand — as a characteristic that they want to give it in the case of artificial formation, such as during the information operations. At every stage of the life cycle the MIS-system its corresponding version is used. The new versions bring new defects in the system in addition to the positive properties. Evolution is the process of structural and functional changes during its life cycle at the system. This article deals with the evolution model of the management information system in presence of defects, diagnose and extract them. Modelling of developing information management system and supporting of its working ability is an actual problem to be solving.

Theoretical approach

Information sistems

Information technology (IT) is a set of methods, processes, tools and hardware that provide for the decision makers in the various fields of activity the ability to access any required information. Currently, there is no established classification IT. A variety of technologies are studied in different disciplines. At the same time, in order to help to navigate the variety of information technologies they need to be ordered in some way. This paper offers a multi-level classification of the IT based on the allocation to strata from the bottom up techniques, tools and equipment to the work with information depending on their degree of complexity — from the means of communication human with a computer, collection, storage, retrieval, different ways of processing information to the IT for extract the knowledge and to the emergence of new information as a result of the complex methods. The paper uses the information models of F. E. Temnikov and A. A. Denisov to describe the principles of the proposed classification. The hierarchical structure of the IT in this paper is presented within two levels of itemization — a general one which comprises the whole specter of the existing IT and a detailed one which consists of the second level technologies that are specific for every particular general technology branch.

Researching of processes and systems

Author: G. Smentsarev

The article discusses the role of formalization’s methods as a prerequisite for automated analysis of human social and cultural systems and for development of appropriate research methods and algorithms. It is describes those goals and objectives for the study of human social and cultural systems, that can use automated analysis methods based on formalized presentations. The article analyzes the characteristics and purpose of the two types of formalization: the humanitarian and mathematical. It describes the mathematical methods of human social and cultural systems formalizing for solving various classes of problems, such as evaluating the level of development of human social and cultural systems and analysis of its social efficiency, evaluating the effectiveness of individual organizations and cultural institutions, forecasting the directions of evolution for human social and cultural systems and identifying factors, that influence on the human social and cultural systems evolution. The article describes the author’s model of evaluation of the two types human social and cultural system’s effectiveness: the sphere of culture and the sphere of national security, that depends from the factors of the cultural environment. This model is based on the provisions and principles of qualimetry as a science that studies the methods for measuring the qualitative effects by using of quantitative indicators. Using the method of regression analysis and real statistical data the author determined the kind of dependence between these species of human social and cultural systems. When describing mathematical models of the effectiveness of individual organizations and institutions of culture, that are elements of the sphere of culture, the author paid special attention to the description of its own model. This is a universal model for evaluating the effectiveness of organizations and cultural institutions, based on the concept of monetization of free time, which is spent by individuals to visit institutions of culture in the conditions of competition between the different sources of information for the attention of individuals.