+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№3(75) May-june 2018 year

Content:

IT management

Project management

The article presents the features of innovative projects of industrial enterprises that complicate the process of their management. The main groups of mathematical methods used to manage innovative projects are identified. The possible directions of further developing mathematical methods in the field of managing the complex innovative projects at industrial enterprises are determined. Algorithms of accounting the influence of uncertainty factors on the duration and costs that associate with implementing the innovation project works are presented. A distinctive feature of these algorithms is the usage of fuzzy production rules. These rules formulate recommendations for managing these projects based on the distribution of resources available in the organization depending on the results of each stage. It allows minimizing the execution time, both individual stages, and the entire innovation project as a whole. The variant of information support formation is offered that is presented in the form of a physical model of the database. This model allows storing all the information available in the industrial organization that necessary to manage these projects. A distinctive feature of this database is the ability to store information on the impact of uncertainties on the implementation effectiveness in a formalized form. This information is necessary for the implementing the developed algorithms.

Software engineering

Software development technologies

To solve problems parallel to the data, the computational complexes of the following architecture are gaining in popularity. The computing system consists of a universal part and m computational elements on SoC, FPGA, GPU, and so on. Computational elements receive tasks with blocks of size k, executing them in the future in an offline mode. The computing element may fail due to overheating or power failure. The probability of this event is known. After failure, we believe that the computational element is not restored. The larger the block size processed by one calculator, the less likely that the task will be performed on the remaining calculators. It is necessary to choose the size of the block in such a way as to obtain a guaranteed probability of completing the task. The article gives a equation that is suitable for calculations, which makes it possible to estimate the probability of accomplishing the task. This probability depends on the number of calculators and the size of blocks of elementary tasks. The results of a computational experiment for some values of computational elements and block sizes are presented. The equation allows you to select the optimal size of blocks of elementary tasks for a given probability of solving a problem.

The authors consider the application of the system approach for building the information space for the life cycle of the production of medicines. Visualization is provided by models in the IDEF0 notation. This approach was designed to increase visibility and simplify the perception of complex technological processes. The QbD principle is based on the construction of the information shell, which is well-proven and will be understood by a wide range of readers. To implement it on the basis of a system approach, the Shuhart-Deming cycle is used, which allows obtaining all the necessary information about the general concept of the technological processes being built. The combination of the PDCA cycle and the system approach is given. The system approach opens the possibility of designing and building a single information space, which is a necessity. The criterial approach is analyzed and system management models are constructed in Melentiev’s notation. The article provides reference materials in the form of tables and diagrams that are required to accompany and explain the process of building individual units and subsystems of the unified information space being developed. Developed control systems are based on the initial training and further use of artificial intelligence subsystems, which is necessary to significantly reduce the number of errors in calculations at all stages of the formation and application of projected systems. Technologies, which in the modern world are called artificial intelligence, have long and successfully been used in various fields of life of modern society. Their implementation should be carried out strictly in stages with strict control. General provisions and features of control subsystems are also specified in this article.

Algorithmic efficiency

In this article is considered the NP-hard optimization strip packing problem that is actual in solving many practical problems of automation and control, in particular, it takes a place in solving such problems as cutting of materials, calendar scheduling and planning, placement of resources in multiprogramming systems and a lot of other problems. With the aim to optimize the placement of objects in a container, the iterative packing compaction algorithm which insures the increasing of the density of packed objects was developed. In the basis of the proposed algorithm lays usage of six rules which select several placed objects with the aim of removing them with subsequent more rational filling of the freed spaces in a container by the deleted objects through a single-pass heuristic algorithm. The results of carried out computational experiments on the investigation of the packing compaction algorithm on the standard test instances of the strip packing problem with the given random and optimized placements are presented. On the average the packing compaction algorithm provides increasing the density of random placements to 3% and density of optimized placements to 0.4%. The developed algorithm has been implemented in a general form, which makes it possible to use it not only for two-dimensional problems as well as for three-dimensional orthogonal packing problems.

This treatise about the developing a mathematical model and algorithm selection to pick a set of measures for the ascertainment of a specific technical and economic regime TPP equipment in real-time using a formal mode. The formal task was: to develop mathematical models and algorithms that allow a formal way to select a set of activities used to select a certain technical and economic regime for a TPP management system in real time. To select the arrangement that are used for solving problems of choice regime of equipment was built instrument based on the use of abstract logic and AND/OR graph. The conversion Karnaugh maps into AND/OR-graph helps to divide decision parent task into subsidiary tasks, which is demonstrable for decision-makers. As a result, an algorithm for processing three generalized scenarios was proposed, which is implemented by an information system for aggregating and analyzing technical and economic indicators and in which it is possible to implement such an algorithm. The use of such an approach will reduce costs for expensive experts, distribute responsibilities, enable operational personnel of TPPs to accumulate, edit and aggregate the knowledge of various specialists, leading to improved quality of production and financial planning of generating companies.

Information infrastructure

Author: Y. Lipuntsov

Assigning a stable, valid throughout the life cycle object a code can significantly simplify information exchange both in global communities and within a domain. The article describes the methods of codification, based on the ontological representation of the domain, on the example of Education and the Stock Market. Two modules of software need the object’s identification: Core components, or master data, and roles. Unambiguous identification for core components is necessary to link data about objects used in different domains or application in order to aggregate core component’s attributes. With the use of codification systems, it becomes possible to compare similar objects from different systems, as well as create conditions for the application with future technology as the system of distributed registry blockchain where the identification of an object has a key role. In the digital economy there are significant changes in the «Role» module — the count of process participants significantly expands: suppliers, consumers, and other actors. Some part of transactions can be performed by digital devices. Identification in this case becomes an important element of business processes. Separate groups of business process actions require a different level of identification. This understanding of the identification infrastructure involves all stakeholders into a secure environment creation.

This article solves the heterogenous data mapping problem on real data sources in Situation-Oriented Databases. In accordance with Polyglot Persistence SODB uses various type of documents. It is necessary to use external data sources like relational and JSON/XML documents. To manage this diversity of sources proposed special provision for hierarchical situation model of SODB named as virtual multidocuments. There are three type of data sources discussed — XML/JSON, Zip-archives, MySQLidocuments from relational database MySQL. Introduced inversional methods for mapping virtual multi-documents on real data sources by means of doc-elements. For each functional element three special modules are recommended to implement with known structures. Implementation technique is shown on SQLite example and based on three functions SQLite3_doc, SQLite3_load, SQLite3_save. First SQLite3_doc module defines how to connect to source within model and send a query. Second SQLite3_load module specifies how to return document is selected from table of relational database and loaded in virtual multi-document for handling and subsequent saving. In this function interpreter of SODB creates special DPO-object (DPO — Data Processing Object) within that all handling operations are performed. DPO-object can concern of several virtual multi-documents. For late stages must be implemented third function SQLite3_save that performs saving ending result in serverless SQLite3 database. All proposed functions implemented on PHP example in web-application of SODB.

Simulation

Actor modeling

Author: Olga Bulygina

The optimization task solution of promoting innovative projects into the regions with using of a complex simulation model and included modules of bacterial optimization is considered below. As the object of research, the process of forming an innovative cluster was chosen. The complex model is implemented in the modeling system «Actor Pilgrim» with the implementation of the common virtual time, spatial and financial dynamics (money, financial instruments). The simulation results are tied to topographic information of different scales.

Laboratory

Models and Methods

The aim of the work is to study the possibility of formalizing the system-object approach «Unit- Function-Object». To achieve this goal, the ideas of calculating Abadi-Kardeli objects were used in the formal description of the conceptual provisions of this approach. In terms of this calculus, a special object is formulated that represents the system as an element of Unit-Function-Object (UFO-element), and a corresponding graphical representation is proposed. Some algebraic operations with special objects as UFO-elements are described: connection of objects, association of objects on an input, association of objects on an exit. The described operations are considered as basic operations of the proposed system calculus as UFO-elements. They correspond to three structural phenomena and three kinds of objects from which any structure and system of any complexity can be created: a simple stream (a simple object), a merger of flows (a merging object), and a branching of the flow (branching object). As a matter of fact, these operations are reduced to describing in the terms of the Grenander pattern theory the «image» obtained by constructing a «configuration» of non-derivative objects (graphic formalisms) and describing non-closed connections. The classification of these elements by their nodes is proposed, which is based on the basic hierarchy of connection classes used within the system-object approach. This classification allows us to use a limited alphabetic set of elements when modeling systems. The developed calculus of systems as UFO-elements provides aggregation of such elements and facilitates their decomposition. In addition, this calculus allows us to take into account a number of system-wide regularities. The obtained results show the expediency of constructing a formalized system theory by expanding and improving the calculus formalizing the system-object approach, the foundations of which are presented in the work.

Author: M. Bazilevskiy

When constructing regression models, the key stage is the model specification, which assumes the choice of composition and the mathematical form of the relationship between the variables in regression equation. To date, there is no system of standard recommendations and methods that would form a rigorous theoretical basis for selecting a model specification. The article is devoted to the problem of specification of regression models, namely, the subset selection in linear-multiplicative regressions. Linear-multiplicative regressions are non-linear in factors, but linear in parameters, and reflect the degree of joint influence of independent variables on the dependent variable. This problem can be formalized as a problem of partial-Boolean linear programming. Since the solution of such problems requires the computational capabilities of modern computers, a universal software package was developed for constructing linear-multiplicative regressions, which can be used in technical studies, economics, business, sociology, medicine, etc. To demonstrate its work, the problem of volume modeling passing large-capacity containers at the Zabaikalsk-Manchuria railway checkpoint. At the same time, the speed of solving such computational problems was tested.

Theoretical approach

Decision support systems

Author: O. Tikhanychev

One of the most important tasks of the mathematical support of any decision support system is the consolidation of the solutions being developed. At present, there are mathematical methods for consolidating joint solutions and methods for coordinating decision making. To coordinate the solution of tasks and the modeling necessary for the application of decision support systems, methods are used to harmonize the opinions of experts, and to coordinate the application of models and tasks. The latter is usually divided into methods of programmable and informal coordination. Practice has shown that existing approaches to coordination of decisions, both subjective and formal, do not provide automation of decision support. The article proposes to use hybrid approaches to provide a coordinated solution of problems and modeling. At the same time, it is determined that in the future, with the improvement of automation tools, informal decision-making methods can be used in decision support systems as the most promising. First of all, for decision support systems oriented to work with poorly formalized tasks. The formulation of the task of developing a dispatch model for decision support systems based on a neural network is formulated.

Information security

Data protection

Author: M. Styugin

The problem of exploitation of program code vulnerabilities is one of the most relevant for ensuring information systems security. This problem is frequently related to developer errors, to the lack of validation of input data and to subroutines. Recently, many different solutions for this problem have been proposed. However, their low efficiency is due to the inability to automatically separate a piece of code that is useful (from the point of view of the system’s function) from a code or range of values that are useless in terms of user value as well as those that are vulnerable. A method for analyzing a program execution based on signatures is proposed in this work. Thus, the input data generate a certain algorithm signature. Anomalies at the signature level indicate possible exploitation of vulnerabilities. Therefore, we can launch anomalous activity in a sandbox or correct the program code based on anomalous activity automatically. The implementation of the proposed technology uses a web server as an example and exhibits a high efficiency for detecting any remote attacks on the program code. Shortcomings include a high percentage of false positives. This percentage can be lowered by taking into account additional analysis of input values, which may be a future development direction of this study.