+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№3(69) May-june 2017 year

Content:

IT business

Business information systems

Author: A. Zainchkovsky

The relevance of the study is due to the need to ensure the effective functioning of innovative regional industrial clusters, including the innovation-active industrial enterprises and organizations of innovation infrastructure. This article is based on a proposal for integration of information resources of all participants in a complex innovation process with the use of innovation management decision support in clusters of a specified type. A leading approach in the study is the controlling methodology application, allowing to identify the main internal and external environment factors to select rational tools of information management support in innovative regional industrial clusters. The article presents the model of information exchange between integrated innovation process participants in the innovation territorial industrial clusters in the implementation of controlling functions, which are coordinated by the center of the controlling cluster. The model identified the main functional areas of the controlling system, corresponding to six cycles of a complex innovation process, as well as four levels of controlling information processes in the cluster: controlling content, controlling applications, controlling processes, controlling of cluster complex information integration and its region localization. As an example, such issue as the task of classification and selection of innovative proposals (including open innovation) for their further use by the cluster enterprises based on four types innovative filters was solved by the proposed controlling information flows system. The article can be useful for creating regional information systems providing information support of management processes in territorial innovation industrial clusters.

Authors: Maxim Dli, N. Salov

Business entities performance is inextricably linked with information resources sharing today. This problem can be solved by information systems integration. Often IT is not company’s core function and information system integration is carried out using IT-outsource. Architecture patterns choice and information system development project management are keys in this case. This article suggests relevant to modern conditions information systems integration architecture patterns. Information system life cycle stages and information systems development project stages interrelation model taking in the account information risks influence is suggested for effective information system development project management. Decision support system architecture is suggested for information risks minimization during information systems development project. Suggested results practical utilization is assumed towards the development of business entities information system integration project management.

IT management

Resource management

Research of software development cost estimation methods is the aim of the paper. The ability to estimate the cost of the software is necessary for all parties of the evaluation process. The customer should estimate the financial costs of the acquisition or development. The developer have to quickly determine the cost of the development and price of the product. But the estimation can be quite difficult because of the different amounts of initial information. Software as a part of the IT-market was researched. Existing methods of the software cost evaluation were observed. Strengths, limitations and recommendations for some software cost evaluation techniques were presented. The scheme of selecting the appropriate evaluation methods and the scheme of a combined approach to product cost estimation under different amounts of initial information were described.

Software engineering

Models and althorithms

Author: V. Bajnev

The article describes the optical system for the light-emitting diodes. Analyzed the features of the secondary use of the optical elements in the form of lenses and prisms for different LED emission patterns in space. Formulated the requirements imposed on the optical elements. The paper considers the problem of designing modern lighting devices and optical systems. Analysis of the development of lighting devices shows that the main stage in their development is the calculation of the optical system, the results of which largely determine the lighting fixtures and functional characteristics. Application and development of specialized software for the calculation and simulation of lighting devices significantly facilitates and speeds up the process of their design. The paper presents a mathematical model developed by the software system, described in the hierarchical structure of the simulation geometry of lighting devices. Building an extended triangulation grid facilitates the approximation of smooth surfaces of the optical element and the photometric body. The software package is carried out modeling of LED optical systems and luminaires based on them using surface models, ray tracing and calculation of photometric body.

Author: A. Dunayev

The classical problem in computer vision, image processing, and machine vision is that of determining whether or not the image data contains some specific object, feature, or activity. Such problem is also called image recognition problem. An original approach to graph isomorphism problem is defined, which is used in images recognition system. A specificity of the suggested approach is based on the usage of graph structure hashing mechanism. Graph hashing is based on such invariant graph characteristic as the shortest distances between the nodes. An application implementing this approach was developed. Developed application can read an image of symbol into a graph and compare graphs by solving the graphs isomorphism problem. Presented approach was tested on graphs of different types, also on big graphs with more than 100 nodes, and gave a correct answer. A big advantage of this approach is the possibility to store hash-codes in database, since hash-code consists of decimal numbers. It gives an opportunity to create a database of different images, such as faces, symbols, signs. Decimal numbers comparison is very fast, that’s why a quick search can be performed in the database of images. In conclusion, this approach can be successfully used for solving many kinds of image recognition problems.

Software development technologies

The article summarizes authors’ experience of application of information technologies to support the life cycle of complex technical systems (CTS), accumulated independently in the field of creation and administration of such technologies in various industries, from the viewpoint of quality management [1]. Products related to the category of CTS have a number of significant features which make higher demands on the organization of their life cycle (LC). The creation of CTS is usually done interacting collection of companies and organizations that require appropriate management of their work at various stages of the life cycle. Expenses for creation of CTS pays off due to their use over a long service life. Integrated indicator of CTS quality may serve as an indicator of the effectiveness of CTS in the appointment during his lifetime. With the exception of the stage of operation (which is realized the beneficial effects from the use of the product), the remaining stages of the lifecycle are costly. The effectiveness of the lifecycle management of CTS largely depends on the choice of means and methods of process management and lifecycle resources. In scientific and technical literature and promotional materials of some firms are approved on the application of homogeneous PLM systems [3, 4]. The analysis of the structure of events and resources in the lifecycle of CTS (see Fig. 1 and Fig. 2) shows that the effective application of homogeneous PLM systems is impossible. An integrated life-cycle management system of CTS should be based in a geographically distributed heterogeneous information networks, which is a collection of autonomous problem-oriented information systems, developing independently, provided preserve information compatibility.

Artificial intellect

The article is devoted to the hybrid intelligent information systems (HIIS) description using metagraph approach. The generalized structure of HIIS is proposed based on the modules of «consciousness » and «subconscious». To implement the generalized structure of HIIS it is proposed to use holonic multi-agent system (MAS). The structure of such a MAS can be described using metagraph approach. Using metagraph model it is possible to describe the structure of both static and dynamic agents to implement HIIS. Metagraph approach is one of the variants of the description of «networks with the emergence». The emergence in metagraph is achieved through the use of metavertices. It is shown that unlike the metagraph, the hypergraph is not fully «networks with the emergence». Hypernetwork fully contains the possibilities of describing the «networks with the emergence». The emergence in hypernetwork is achieved through the use of hypersimplex. Metagraphs compared to hypernetworks provides a more simple and flexible description of the «networks with the emergence». Metagraph data model, including the agents, can be presented in the predicate form, which has the property of homoiconicity. The predicate representation of data and agents allows agents of higher levels to modify the structure of the agents of the lower levels, which is an important feature of the development of HIIS. As an example of metagraph approach usage it is possible to describe the structure of a perceptron neural network. The model of neural network may be represented in metagraph form. To create, change, learn and execute the neural network different metagraph agents are used. The proposed metagraph approach may be considered as complex model for HIIS development.

Simulation

Theory and practice

The problem of the exhaustion of mineral resources is one of the most important global environmental and economic problems of mankind. The problem progresses, which is not surprising, since the availability of natural resources limited, but the demand for them is growing. In this paper presented a simulation model of the salt reserves exhaustion, which depending on the number of input data can be used to simulate the salt extraction process with displaying the dynamics of the exhaustion of these reserves in tabular and graphical data by years, and also to see how will be changed along with this parameter wells productivity, the number of wells put into operation, the number of conserved wells and many other important parameters. To develop the model was used available materials about the salt deposits in Ishimbai area. Presented such input data as salt reserves, the number of commissioned wells, the average productivity of the well, the planned annual percentage commissioning, the planned annual percentage of conservation. The model is created in the well-known simulation modeling software program iThink with iconic cognitive maps. It includes three basic sub-models «Salt reserves», «Wells» and «Productivity», that mainly determine the overall structure and state of the model. Presented the analysis of the resulting model by software iThink that allows to judge the sustainability, adequacy and efficiency of the model. The studies are very important for business planning, especially at this time when more and more difficulties arise with the extraction of some minerals due to their significant exhaustion.

Laboratory

Models and Methods

The orthogonal packing problem is a problem related with the founding of the optimal placement of a given set of small orthogonal items (objects) into a set of large orthogonal items (containers). This problem is a well-known NP-completed problem that has many applications in industry and economics. To solve the packing problems usually are applied various approximation algorithms that are based on the heuristic methods of optimization. To provide the effectively work of an optimization algorithm is necessary to minimize any delays related with construction of a placement according to solution obtained by the algorithm. For this purpose were investigated the causes affecting the speed and quality of placement generation by the given solution in a form of a sequence of objects to be placed into containers. The paper is presented an effective model of orthogonal objects management which provides the possibility of constructing orthogonal packings of arbitrary dimension in solving of all optimization problems of orthogonal packing and rectangular cutting. This model is the fasted compared with other known models for objects management. In paper are given algorithms of placement and deleting objects. The deleting objects algorithm may be used in future in realization of the algorithm for the local improvements of the obtained placement. The efficiency of the proposed model is demonstrated on the standard three-dimensional orthogonal packing test problems.

Information security

Data protection

Author: M. Styugin

Complexity of computer information systems at present does not allow an overall verification to ensure absence errors and vulnerabilities at the development stage. Consequently, the more complex is the system, the more it is subjected to the information security risks. Recently there have been several approaches to solving the security problem for complex information systems. The paper presents a generalized algorithm for development of systems secure from research. The algorithm includes methods for blurring system parameters and methods based on the moving target technology. Both above methods are versatile and can be implemented for typical solutions as well as for unique algorithms applicable to hardware-software solutions. The algorithm includes detection of critical components which when compromised may be a security threat. The search for sources of randomness and parameters, which can be used for building a blurring process or a self-complication process for a computer information system. A system’s protection from research prevents attackers from gathering information sufficient for exploiting vulnerabilities, while the system’s vulnerabilities are not eliminated. A method for quantitative evaluation of changes in the security level of information systems is presented. The method is based on changing the set of potential attacks after implementation of the methods for protection against research. Analysis of the results achieved by implementation of the DKAuth password authentication technology and the BSRouter network security software and hardware complex showed the decreased potential for successful attacks by 25% and 12.26% accordingly.

Nowadays, users of social networks (Social Network) are increasingly using them to promote businesses, distribute advertisements for goods and services, leisure, hobbies, personal communication and information exchange, thus being an open source of information for intruders. Attackers use various ways to implement attacks, one of which is the dissemination of targeted information. Successful distribution of targeted (unwanted) information entails the implementation of the attack scenario and the achievement of the target of the attacker. In this regard, the attackers have an interest in involving the so-called social networking community leaders (users who have a high level of trust, influence among a large number of community users) who are able to successfully implement a part of the attack scenario of the attacker. The article attempts to formalize a generalized algorithm for the distribution of targeted information in social networks: a set of initial data and the results of the algorithm work are presented — parameters for implementing attack scenarios, the variation of which will allow it to be detailed. The technique of protection from the targeted information distributed in social networks is offered, which will allow to increase the level of protection of personal data and personal information of users of social networks, reliability of information. The results of the research will help to prevent threats to information security, to counteract attacks by intruders who often use competitive intelligence and social engineering methods by applying countermeasures, develop a model of protection against targeted information and, on its basis, implement special software for integration into virtual social networks.