+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№6(66) November-december 2016 year

Content:

IT business

Business information systems

The work discusses the features of network planning and management of small-scale discrete manufacturing. The main aim of the development of network planning algorithm and its implementation in the automated planning system is to create of the calendar production schedule and make possible its dynamical adjustment. The calendar production schedule is characterized by frequent transferences of work, the starting and ending terms, the emergence of new jobs (orders) within the production cycle etc… Automation of network planning and management processes should be carried out by the solution of the complex interdependent tasks connected with both reengineering of current planning processes and network adaptation algorithms for a specific production type and their further program implementation. The requirements to the content of the information support for the automation of the Gantt chart construction on the base of network models and the requirements to the appropriate software product which takes into account features of electronic small scale production. The software architecture is offered on the base of the executed analysis and the system of automated planning small-scale production of the electronic equipment is tested. The system makes possible the dynamic adjustment of the production plan.

Electronic bank

Author: I. Savelyev

The purpose of this paper is to review the Blockchain-technology and its practical application. Blockchain essence of technology lies in the decentralised storage system that does not allow to make adjustments to the already recorded data. The main properties of the technology — decentralised, protection and preservation of information, Privacy or openness. At the moment, there are several basic models Blockchain application -private, public and Blockchain-services. At article highlighted several problems in the current implementation, the practical application of technology Blockchain. The most common algorithm Proof-of-work with the growth of the volume leads to major energy costs. Low Blockchain scrutiny of the practical application of technology outside the financial sector of the economy. In the case of Blockchain in the financial sector, the role of banks and the presence of life will decline — Blockchain users will be able to perform financial transactions with each other, without intermediaries. To implement this functionality will require the implementation of Smart Blockchain contracts. It is proposed to use Blockchain in the following areas: Insurance, taxation, sign transfers, automatisation of penalties. Blockchain technology perfectly realises functional notary system. The idea of private Blockchain is ideal for the development of ECM-systems.

IT management

Performance management

Author: V. Dyakin

The need for strict selection and prioritization of innovation arises in the mind of the limited own financial resources. The first task in the definition of optimal set of measures in the framework of a rolling medium-term plan that delivers the maximum increase to the values of the KPIs of the corporation under the terms of financial feasibility. The second challenge is scheduling and managing the execution of medium-term plans, implementation of measures to control target dates to achieve the required results and funding. To solve such a problem without the development of specific modules of enterprise information system is not possible. The algorithm of the medium-term plan, taking into account the needs in co-financing for the state support in the framework of the federal target programs, is proposed. Describes the information model of the data, giving an idea of the structure of electronic directories and documents in automated system. The greatest effect from the use of the proposed tools will be achieved by integration of the described subsystems in management information system with provision of discharging current data and methods of calculation of KPIs and the delivery of the results for users.

This article analyzes the ARIS methodology diagram of an example of diagrams: Cause-and-Effect Diagram, Value-added Chain Diagram, Communications diagram, Organizational Chart. Present new approaches to the development of diagrams, templates that allow analysts and designers to carry out an effective analysis of the subject area. Any study begins with an analysis of business processes and their compliance with business strategy as a whole. Of special importance is the presence of a common language perception of the current and final results of this work to make an informed management decision. The basis for the efficient management of the organization is a formalized description of its business processes, which is necessary for the analysis of «bottlenecks», the transfer of accumulated skills, standardization activities, audits, benchmarking. If business processes are not regulated, which means that work is being done on the basis of established rules and regulations, which are kept in the minds of employees. If such an arrangement is inevitable loss of various types of resources: financial, material, labor, time, and others. The company has an effective method of regulation is the most important factor in the success of any project.

IT and education

Training IT specialists

Author: A. Shemetova

In the article actual problems of teaching parallel programming in technical universities in terms of the formation of the necessary competencies for the successful positioning of the future experts of IT-trends in the labor market. 
Ability to develop software solutions in parallel processing of tasks is a necessary condition for the formation of the subject competence of students of IT-trends and qualification is an important characteristic of the modern specialist in applied mathematics, computer science and computer engineering. 
However, experience shows that when they begin to study the above questions, parallel programming is still difficult to understand students as It is significantly different from the usual methods of logical and structured programming, complementing them with new steps. Thus, there is a need to develop methodological approaches to the development of competencies in the field of parallel programming of future specialists in the direction of preparation «Computer Science and Engineering». 
The author proposes the following technique practical training: 
1. In the first stage, to get acquainted with the construction and architecture of multiprocessor computer systems, as well as the theoretical study of the major parallel methods for solving problems provided the use of a software system «Parallel Laboratory» (abbreviated name ParaLab). 
2. In the second phase, when students will receive theoretical training is already sufficient in the field of parallel methods of solving problems, it is proposed to build the simplest computing cluster on multiple computers on a Microsoft HPC Server 2008‑based. 
3. The third step is proposed execution of parallel tasks to create a computing cluster. Such an approach to the selection and application of methods at different stages of training provides a systematic and successful absorption of the students practical skills of parallel computing for high-performance systems.

Software engineering

Network Technologies

Abstract: The main line of the article is the proof of the concept of BML language. BML is the main part of BlockSet methodology created for Web-development. The article examines the problem of software evaluation on that basis. At beginning of the work authors proposes the new model with complex of criteria. The criteria includes a lot of properties: psychological factors of developers, the language features, system requirements and so on. Psychological factors includes perception and training speed. Language features are flexibility, instructions set, complexity, recipe set. The problem is in difference between of imperative and declarative programming. There are a few methods of evaluation by criteria listed above suitable for both language paradigms. The «threshold entry» term introduced and found correlation between volume and quality of source code. Also authors propose term of «fault probability» related to the complex of typical project faults appeared during project developing. In the classification of software metrics authors revealed three main characteristics for evaluation: work amount, style of code, developer effort. Authors applied the hierarchy analysis method to identify the most important criterion. Due to research authors proposed «recipe set» block for further study as fundamental criterion for others.

Author: Y. Lavrenkov

The complexity of synchronizing local timers on individual nodes of the communication network is to assess the time needed for an information message with current time stamp for transporting from the source to the target node. Transportation time depends on the state of information transmission channels and routing protocols. To estimate the time advance of the package with time stamp it is proposed to use a distributed neural network architecture, which contains a delay line with taps, which changes the information part of the temporary package during its movement through the communication network. To perform time correction at the delivery of the packet to the target node of the neural network expert that has the ability to increase the complexity of the internal architecture without loss of stability of functioning of the cascade-correlation neural network. The learning procedure consists in tuning only added neuroelements, which makes it possible to increase the speed of operation of the system as a whole. To improve the efficiency of the entire system has been used a method for compressing data information part of the temporary package with the use of neural network built on neuroelement made to a summing integrator with losses on the scheme with switching capacitors. A complex of two trigonometric neural networks performs data compression by considering the most significant characteristics of the analyzed signal combinations. Analysis of process of functioning of the cascade-correlation neural network showed the ability to perform correction of timers located in the network nodes. Evaluation of the averaged dynamics of change of the error counts time in units of the communication network proved the effectiveness of the proposed synchronization approach.

Models and althorithms

Author: S. Pomelov

An important part of modern science and economics are numerical computations in mathematical models. Their efficiency depends on the effectiveness of the hardware. This, in turn, is related to parallel computations’ optimizations. A new approach to the optimizations and developing a tool for parallel computing process optimization are the goals of the ongoing research. These software tool development principles and other resulted applications are described in the paper. Properties of computer architecture are suitable for formalization. Parallel algorithms already exist in a mathematical form. From the two points, two mathematical models are derived: the model of the computational algorithm and the computer architecture model. Along with other points, here described their properties and applications. Both models, even though they represent vastly different real-world objects, are described in the same terms and with the equivalent level of detail and structure. This distinction from similar works allows developing a new approach to comparative analysis of the algorithm scalability, as well as algorithm efficiency for a given architecture. These models are used as a basis for a core module of the software implementation for simulation and optimizing the architecture and algorithm interactions. In this article, after the computational process simulation description with the models’ usage, as a midline working result, placed suggestions for practical using the software, proposed approach and results of those simulations. At the ending, a few practical examples are demonstrated. The last simulation example is crosschecked with a computational experiment, derived important conclusions from its results.

The aim is to develop software for the automation of the work of the magneto-optical device. The paper describes the developed automated devices for the study of magneto-optical materials. Materials for this study thin film with a magnetic anisotropy in which the two-dimensional ordered domain structures can be formed. These materials are transparent in the infrared and visible spectral range and exhibit a magneto-optical Faraday effect. Domain structures are of interest for the creation of controlled diffraction gratings, baffles, switches, fiber-optic communication lines, etc. The device can change the external influence on the sample, analyze and recognize objects (digital images), highlight the region with the labyrinthine domain structure. External influences may be magnetic and thermal fields. Formation of ordered two-dimensional domain structures in the material depends on the parameters of the external field: the pulse duration, intensity, direction, offset voltage, the direction of DC offset, etc. The device allows you to get the equilibrium labyrinthine domain structure and register settings of external fields. At present, the developed software is used in conjunction with a magneto-optical device for materials research at the Department of Radio Engineering, National Research Mordovia State University.

Author: D. Roshchin

created in the process of performing research and development work when new products creating. It is used to reprodutcion or simulate the specific properties of the specified products and is made to verify the principle of its action and characterization. The creation of a model in the process of engineering design the measurement system is an important stage at which the analysis of the achievability of the requirements for the functional purpose of the system is performed, and searches for ways to meet these requirements. Information obtained at this stage will help determine the choice of technical means of the system, its composition, type, and placement of elements. Particular attention is paid to the choice of the software platform, developing and program debugging. During the creation of the coordinate-measuring system model mutual relations were determined between its elements. Operation to achieve the coordinated interaction of technical, methodological, mathematical and software of the system is realized. The functional part of the system is carried out to check its ability to perform the assigned functions. The principle of operation of the system is proved in practice, the methods of the coordinate measurement are worked out, and the technical and metrological characteristics of the created model are evaluated. The results of this work will facilitate the development of solutions to the problems that may arise in the process of engineering design and building coordinate measuring systems in the future.

Information security

Author: M. Styugin

Authentication still remains one of the major problems in information security. There is a large number of solutions aimed at providing security of authentication. Some of the solutions are intended to ensure that authentication data are impossible to be compromised by accessing the transfer channel for authentication data (class A attacks). Other types of security methods protect authentication data in their storage (class B attacks). Authentication by username and password is currently the most widely used authentication method. Passwords are stored on a server with implementation of one-way hash functions. Password hash can be cracked by brute force enumeration, which allows successful class B attacks. The paper presents a password identification method, which does not involve storing passwords in one centralized place. Passwords are split in many parts that are stored on separate computers on the Internet. Assuming that one or several computers of such network are compromised it will not result in disclosure of any useful authentication data. Hence, remote nodes may be untrusted and all internet users can become participants of the data exchange. The solution presented in this paper provides a multiple increase of user password security against class B attacks even should an adversary succeed in cracking the server and a part of the network nodes. DKAuth is the practical implementation of the presented technology. The above solutions were tested as an authentication service. The data obtained evidence that the DKAuth Protocol can be used even in applications with high operation loads.

The article сonside the issues of information security specific wireless network architecture. An assessment of the state of information security systems based on indicators of the events intensity that occur in the process of malicious impact in terms of queuing theory. The analysis of the potential opportunities for the offender «soft» attacks on a wireless network. The analytic dependence by which to measure the state of information security elements of a wireless network architecture. Model of destructive information impact offender information security. The results showing the accuracy of the assumptions about the exponential distribution law for the duration of service requests network nodes.

Laboratory

Models and Methods

Author: I. Vygodchikova

The development of the methodology of time series analysis has been studied by many researchers. This G. E. P. Box, G. M. Jenkins, N. N. Taleb, S. Johansen, C. A. Sims, A. Yu. Loskutov, B. P. Bezruchko, V. B. Bayburin, and many others. One of the effective methods of time series analysis is the criterion of uniform approximation by Chebyshev, which has not been considered in the literature in relation to multivalued mappings by using the Hausdorff metric. The paper presents method of analysis and parameters estimation of a mathematical model of multivalued time series, composed of ranges of values of a certain indicator using as a criterion of optimality the maximum of the local Hausdorff distances between ranges of values and the values of the approximating function. The aim of this work is to develop a mathematical method of modeling the time series which are represented by ranges, based on the development of the method of uniform approximation of functions in case of set-valued maps using the Hausdorff metric, and the creation of effective, from the point of view of availability of hardware and software implementations in real-time, algorithm.