+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№3(63) May-june 2016 year

Content:

IT management

Performance management

This article is about efficiency assessments and decision support tools for geographical information systems. In this article described new suggestion and solutions of the decision support problem in the sphere of applying geographic informational systems and the way they used in busyness-process management. Authors suggest using busyness-processes models with a GIS tools in order to provide information about result forecasts and resource use efficiency to the one who make a decision. Prototype of the system, which implements all of these suggestions, were developed by the authors and described in the end of this article. Key feature of this system is represented by idea, that planning in terms of tasks and operations can’t clearly show the real situation, where all actions are connected and use the one single scope of resources (human resources, technical resources, materials, documents, e.t.c). In other words, planning should be performed in terms of business processes and business process resources. In that way, experts and planning-tool users could be provided with enough information about resource using efficiency and predicted results (forecast) in order to achieve higher level of the decision support for users. In this article authors describe an example of the agriculture planning using business-process models and ontological knowledge base.

Author: N. Prokimnov

Comprehensive, accurate and qualitative information is the basis of research, decision-making and management activities at different levels and applications. The non-trivial cases to obtain data related to the solution of complex problems and requires establishing special data collection or monitor system, the traditional approach to the construction is based on pre-formed requirements derived from system analysis stage. However, the actually observed processes due to their unpredictable character are typically different from expected ones having highly variability of their parameters’ values and behavior styles thus reducing the originally built monitoring system efficiency because of ever-growing discrepancy between the initial objectives and actually observed environment. The solution may exist in creating a system of adaptive monitoring, featuring flexibility to change its structure and behavior depending on changing conditions. The paper describes the fundamental concepts for building systems in an adaptive manner taking into account and generalizing the accumulated experience of implementing this approach. We indicate the possible adaptation areas, describe the main system components and objects, such as triggers and indicators, enumerate the requirements they should meet and enlist the recommendations for their design. In addition, the possible IT technologies, platforms and application systems examples that implement an adaptive monitoring approach are highlighted.

Software engineering

Defense software

Author: V. Ustselemov

One of the approaches of adaptive tuning subsystem information security of information systems based on an assessment of risk level to overcome the informational security subsystem offender system, using reasoning mechanisms precedents and neuro-fuzzy inference. Analysis of the functioning of the information security subsystems shown that the destructive effects on information systems lead to a change in its current state, and the risks successfully overcome the security subsystem may increase substantially. At the same time, risk assessment means analysis showed that the application of the existing approaches to their assessment does not take account of what their change in the operation of an information system, and does not solve the problem of information security subsystem reconfiguration to reduce the risks to overcome values. In the event of an information system on the state of a safe state for the assessment of risks to overcome information security subsystem uses a hybrid subsystem risk assessment, which includes in its composition two modules: information risk assessment module based on arguments by precedents and information risk assessment module based on neural network ensemble. The input data are the values of the parameters of the information system, describing its current state, and the output generates a control effect on the reconfiguration of resources and information security subsystem mechanisms.

Software development technologies

Author: A. Vichugova

The complexity of information processing caused the increasing the level of software abstraction and forces the changes of the process of creating this type of products. Functional stages of the software development process in practice are implemented in a variety of models and methodologies. Needs to reduce the time of software development led to new approaches, methods and tools of the organization, implementation of this process. The paper outlines the modern trends in the reduction of routine operations in designing, coding, testing, deployment and documentation software, and analyzed the implementation of these tendencies in the form of a series of tools to automate one or several aspects of software development. The following aspects are discussed in the research: unification of techniques and technologies, containerization, migration to the cloud, continuing integration of processes and data, promotion of declarative programming approaches and languages, focused on math and statistical processing of BigData, multiparadigmality of languages and raising the level of their abstraction. There are examples of transformation of classical concepts of software development to the present state through all steps of the process: from requirements analysis to implementation and maintenanceaccording to the current needs and capabilities of the IT market. The possible ways of changing the users and professionals competencies in the field of information technology (IT) are described.

The aim of the research is to analyze the methodological aspects of the decision support systems (DSS) processing and the DSS substantial classification. The novelty of the results lies in the fact that classification features and their possible values, being the subject and the goal of such a system, are suitable to the designed managerial decisions, as well as the classification can be used to create a specific DSS. Hypothesis: it is possible to allocate classification features of DSS, the list and the contents of which will determine the substantial (enlarged) DSS classification suitable to the construction of concrete DSS. Also, the selected classification features and their values can be used to construct DSS content, i. e. to design a block structure of created DSS. Method of research: systematic and logical analysis on the base of the subordination of the created DSS to aims and content of the generated managerial solutions. Results: based on the reasonable classification features and their values the substantial classification of decision support systems is built, as well as the block structure of the DSS, considered in the wide, and in the narrow sense as well. The research is supported by the grant RFBR 13.15.202.2016. The results published in the paper were presented at the International Scientific Conference «New Challenges of Economic and Business Development — 2016. Society, Innovations and Collaborative Economy», Riga, http://www.evf.lu.lv/conf2016.

Algorithmic efficiency

Author: M. Nafikov

Nowadays the 3d printing lets us produce cheap retina scanners. Researchers have printed an ophthalmoscope adapter for a smartphone to observe a retina using the smartphone camera. Thus, the main disadvantage of the retina scanners disappears; moreover, the invention lets us use retina based biometric authentication and automatic disease detection systems using only the smartphone. Both the biometric authentication systems and the automatic disease detection systems require features characterizing the identity or the disease. Such features are blood vessels and this article is devoted to detection of them. Two algorithms of the blood vessels segmentation based on median filter and Gabor filters are developed and represented. Steps of preliminary image processing also are described. The first step is contrast enhancement based on using green channel and contrast limited adaptive histogram equalization, and the second step is background exclusion based on high frequency filter. The first segmentation algorithm uses automatic thresholding Otsu, median filter and filter by length. The second algorithm uses Gabor filters and analyzing histogram of the image applies automatic thresholding. To estimate the performance of the proposed algorithms, tests have been conducted on the two databases: DRIVE and STARE. The results show that the segmentation algorithm based on median filter can be applied both in the biometric authentication systems and in the automatic disease detection systems. The second segmentation algorithm requires lots of computing power, and therefore can’t be applied in the biometric authentication systems. The 3d printing technology lets us use the retina scanners by almost any smartphones and further researchers in development of the retina based automatic disease detection systems provide detecting of the blood vessels disease in the early stages and monitoring progression of the disease only by our smartphones. It will undoubtedly improve the level of healthcare. Project materials are available at https://github.com/forcesh/authentication_based_on_retinal_images

Author: D. Bukharov

The article shows an approach to design a set, used for text equivalent search. Similar tasks are analogous to duplicate searching, evaluation of authority and plagiarism, library search organizing and Internet search systems. To solve this task there are different approaches, focused to meaningfulness, philological features of a natural language and stylistics. This approach takes into account a set of features: word frequency, punctuation, morphemic word structure, letter case and artifacts of texts (letter-digital compositions). Every text, which used for comparison, previous processed according to the set of features. As a result is formed mask of a text, used as a basis of data for a comparison algorithm. The software for text equivalent search and the comparison algorithm are implemented on the Java programming language. Computational experiments included different variants of the algorithm of search set designing are attended. The software is tested on a set of texts, which includes both original texts and modifications of them. As a result of computational experiments, areas of growth are defined and a pattern of software modules communication is showed.

Models and methods

The research goal was initially to develop a network (graph) database (DB) of wide applicability for representing the meaning obtained from a text in a natural language (general DB). Since the meaning descriptions of the physical world are often encountered in texts, it was required to separate the DB part (named the physical DB) intended to describe the spatio-temporal and cause-effect relationships between objects. The article draws attention to this part of DB because it can be used not only in NLP but also in many other areas: automatic systems of mobile technical objects for orientation in space, virtual reality, etc. The physical DB describes the physical world from the standpoint of subjective perception by a person or a technical object. The object-attribute approach to the data structure underlies the general and physical DB. An organization principle and a rigid format were developed for the general DB, and the information search technology and a principle for obtaining new information on the basis of the already existing information are additionally developed for the physical DB. The physical DB can describe practically all possible characteristics of objects and relations between objects in the real world: relative position of objects, direction, shapes and dimensions of objects, metrics, relationships between cause and effect. The real world perception subjectivity is ensured by the application of the theory of fuzzy sets and linguistic variables.

Authors: P. Oleynik, S. Greger

The article deals with analysing of the process of building information system architecture. It was revealed that the description or the general architecture of the information system is a composition of descriptions of models built in different notations, using differing semantics. Means and methods for constructing these models can be separated into independent subsystems in the system providing target information system design, and the general architecture of the target system depends on the characteristics of providing the system. Revealed the composition of subsystems forming system provides design-time Web information system. Ontology developed to formalize the description of information system architecture that provides the opportunity to determine the configuration of the project development, system model, and the relationship of ontologies used to represent the sub-systems. We propose a method of matching the descriptions of models allows you to shape the description of the overall architecture of the target system and describes the unified metamodel of object system which can be used for domain-driven design of database system.

Laboratory

Researching of processes and systems

Author: E. Malinovskaya

Presented research problem of moving objects behavior as applied to the analysis of images from surveillance cameras. Analyzed possibility of solving the problems of mathematical modeling in the field of security with using of scientific data and research from the field of psychology, neuroscience and cognitive science. Used the theory of reflexive processes V. A. Lefebvre into account characteristics of situational behavior of moving objects for account causes of the defects of the system. Proposed to form a typical behavior scenario of the moving observed group objects. Selected defective behavior scenario as probabilistic source security threats, based on the analysis of several subsystems specially. The principle of structural classification of situational behavior in accordance with possible violations of safety and classification systems of the type of interaction of the object — system. Defined 9 basic types of dynamic systems, the objects of which have internal motives decision. The analysis of the transitions from one state to another, from which you can select different transitions, some of which are potentially dangerous.

The article shows the feasibility of genetic and evolutionary algorithms, based on the technique of creating iterative models tabular means Microsoft Excel on a «programming without programming,» without the use of software code in VBA language. Genetic algorithms in conjunction with evolutionary strategies are two main directions of evolutionary modeling. With their help can be found solving many complex problems in various areas, such as software development, systems of artificial intelligence, optimization, artificial neural networks, and other branches of knowledge. Presented in the article table model genetic algorithm proves that the tabular method, you can create simulation models of algorithms that were previously implemented only with the use of specialized simulation systems, or by programming. It should be noted that the above table model can be easily modified and extended (the size of chromosomes and the number of individuals in the population), and the proposed technique table simulation genetic algorithms can be successfully used for other, more complex optimization problems. Developed with the help of the proposed simulation models allow technology to virtualize laboratory training course in many disciplines — scientific and economic profiles, increase the efficiency of educational process in high schools, as characterized by exceptional clarity, ease of analysis, the implementation of experiments, a visual representation of the results. The results are of interest to specialists in the optimization of systems and processes, as well as for teachers, advanced students and students of higher educational institutions.