+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№6(84) November-december 2019 year

Content:

IT and education

Educational environment

Author: N. Prokimnov

Recent decades have been marked by significant changes, both in the very concept of higher education, and in the internal organization of the system. Among the features characteristic of the current period are a significantly increased number of students and the expansion of their age range, which naturally affected the nature of the work of the university teachers whose accounting and organizational duties are beginning to take up a steadily growing proportion of their time. Such conditions stimulate the search for possible ways and means to mitigate the negative impact of these factors as much as possible by automating repetitive routine operations. The approach proposed in this paper is based on the idea previously proposed by the author along with its implementation in the form of a software application based on a spreadsheet editor and represents its significant development. Among the advantages of the advanced version, one may note both higher systematization level and functional diversity, as well as improved technical parameters. The significantly increased volume and complexity of the modernized version led to the need to develop and implement concepts and rules of internal construction. The work contains a description of the functional features of the application, the basic principles of its organization, as well as information regarding the technical characteristics of the current sample. The proposed principles for constructing a software framework may in the opinion of the author be useful for creating and maintaining applications using a similar platform.

The analysis of software tools for the formation of educational and methodological documentation in the university (work programs, funds of assessment tools, passports of competencies, etc.) by the criterion of functional completeness was carried out. A list of software features has been highlighted, a comparative quantitative assessment has been made. The results of the analysis allowed to systematize information about the functional completeness of the educational and methodological documentation generation software, to rank the existing systems according to the criterion of functional completeness, to identify groups of similar systems.

Software engineering

Algorithmic efficiency

Author: N. Dmitriev

We propose a complex method of reconstruction of values on topographic maps for creating of digital terrain models by use of produced hypsographic plans and recognized values of altitude marks. These digital terrain models can be used further as base for decision support system or geographic information system. Reconstruction is based on interpretation of the plan as weighted directed graph. Nodes of the graph are contour lines; edges are possibilities of direct transition between two nearestneighbor contour lines. Weights are values of slopes between two lines. Missed values are finding by algorithm based upon breadth-first search that analyze subspaces between hypsographic curves with morphological operations. Mistaken altitude marks are deleted by using comparison of results produced by started breadth-first search from different nodes. Formulas for morphological analysis and calculation of slopes are presented. Method is tested on prepared topographic maps based on digital terrain models generated with diamond-square algorithm. Preparing involves deleting of intermediate values and replacing indexed values and altitude marks with wrong numbers. Method reconstructs all values without any mistakes with recognition error up to 37% and speed of 4.1 seconds per megapixel and can be used in work of geodesic companies.

In this article the problem of development of systems of technical vision of preliminary processing of images for the purpose of allocation of characteristic features of objects is considered. The characteristic features of the detection of moving objects using the inter-frame difference in the Matlab medium are analyzed. It can be noted that there are many methods for detecting objects: algorithms based on various frame differences, as well as modeling and subtraction of the rear lights. These methods for detecting moving objects on video data are: background subtraction method, background subtraction method using a mixture of Gaussian distributions, contouring, and much more. The necessity of using binarization and noise in order to improve the recognition of the object boundaries and the quality of the image is identified and justified. On the basis of the conducted research the author offers to allocate a mathematical way of interpretation, the main characteristics of the analysis of the inter-frame difference making the mathematical and technical way are formulated. The author also uses mathematical morphology to analyze the image in terms of its shape in order to perform a series of transformations on the images that change the shape of the objects contained in the image.

Information infrastructure

Document flow is an important link in the organization of workflow of any company, since it determines not only the instances of document movement, but also the speed of document movement. Under the organization of a document flow, the rules are understood according to which the movement of documents should occur. The organization combines the entire sequence of document movements in the organization’s management staff, all operations for receiving, transmitting, compiling and processing, sending documents to the file. In modern companies, employees of various departments are increasingly faced with the problem of a lengthy and inefficient process of documenting business trip. Thus, the need to automate the process of arranging travel is obvious. This will reduce the time for the creation, coordination and approval of travel, the risks of losing documents will disappear. Automation of this business process will streamline the work and significantly speed up the execution of the final task. The authors automatized the document flow of the “The business trip formalization” process using the example of Desnol Soft Bryansk, a company that develops computer software on the 1C: Enterprise platform. Automating the document flow of the business trip formalization process required presenting this business process as “as it should be” using the BPMN notation. After that, the process was developed and implemented in the program in 1C: Document 8. The development of the document flow automation process of the business trip processing is used in the company and ensures reliable data storage; reduction of information processing time; reducing labor intensity and facilitating the labor of workers; prevent errors when working with documents; implementation of operational data exchange. Presented automation of business processes can be used by the management of other companies, whose employees are often engaged in the formalization of business trips.

Online courses and testing systems are becoming an integral part of distance learning systems today. As an increasing number of people embrace online examinations, the need for validity protection becomes more important. Personification is a huge challenge in online examinations administering because of online users’ anonymity. In this article, we solved this problem through the use of keystroke dynamics, which refers to the identification of users based on their typing patterns. Our work confirmed the fact that it is possible to distinguish users according to their typing patterns. Our architecture promises higher accuracy and reliability compared to other methods that use the dynamics of keystrokes to distinguish between real and fake users, since it has 3 levels. The architecture contains of a statistical level, machine learning level, and a logical comparison level in hierarchical order. When a user signs up in the system, his typing data is automatically captured for use in templates generation. The templates are used as references to continuously authenticate the user while taking an online examination. An experiment was conducted, the research results showed that the accuracy of user authentication was 97.5%. Also we found out that our architecture outperformed other decision in several aspects. That aspects are also observed in our work.

Processes and systems modeling

In modern conditions, evacuation is one of the main ways to ensure the safety of people in the event of an emergency, in particular, in case of fire. The task of determining the level of fire risk in buildings includes many factors that affect the outcome of the evacuation. This leads to the need to simulate evacuation using information technology. The article describes a combined model of the development of events during a fire, including modeling both the spread of a fire in a building and its dangerous factors, as well as the behavior of people during evacuation in an emergency. Using the Unity 3D engine, a software product has been developed that allows you to visualize the course of events during a fire, taking into account these factors. Simulation of fire and agent behavior is performed using Microsoft Visual Studio 2017 in C#. The use of Unity component structure allowed to bind the scripts to the corresponding types of objects (agent, fire source, evacuation area) and reproduce the described patterns of their behavior. The behavior of agents is modeled taking into account the level of emotional state of the agent, his field of vision, his level of awareness of the structure of the building, volitional and leadership qualities. To test the performance of the model, the premises of the building were recreated. A number of experiments have been performed. On the basis of the developed model, it is possible to obtain, without using large computing power, the most complete picture of the evacuation course during a fire, to evaluate the level of fire risk taking into account both objective and psychological factors.

The article is devoted to the problem of the transition to the color space of printing synthesis using the intermediate space of the mathematical evaluation of color to obtain high-quality color reproduction on various materials. The relevance of the article is caused by insufficient knowledge of the issues related to the transition from the additive system of color coordinates to subtractive when Pantone colors are substituted by CMYK. The purpose of this work is to identify a possibility of using the intermediate space of mathematical color estimation when Pantone colors are substituted by CMYK and reproduction on various materials. The objects of research are prepress processes. The subjects of the study are the methods for color evaluating and choose of the optimal correction for reproduction of an image without distortion of colors. The research problem is that the standard profile is a correspondence of color coordinates specified in tabular form, which are not enough to achieve color reproduction on reproductions without distortion. Additionally, when printing on various materials, it is necessary to take into account its’ characteristics in order to be able to create a profile of the printing press. When switching from one color space to another, additional processing is possible aimed at changing the color coordinates. The authors substantiated the conclusion that in order to print Pantone colors as a standard triad, it is necessary to determine the occurrence of color into the color gamut of the printing press and perform an additional processing for the quality color transition. The scientific novelty of the study shows the ability to print these Pantone colors with CMYK colors on various materials with the necessary physiological accuracy of reproduction. To achieve the acceptable value of the color difference in the reproduction, the use of selective correction methods is necessary. Thus, it is necessary, along with traditional methods, the authors propose to develop models, methods and means of additional processing using the capabilities of software as a combination of methods of transition from one color space to another.

Software engineering

RPA is a computer program that is configured to automate tasks previously performed by humans. The goal is minimizing routine work by attracting virtual employees. UiPath is one of the most popular RPA tools, due to the ability to automate any processes and applications,an intuitive interface that even a business user can easily master. The ideology of RPA implies the existence of a library of possible robot actions - the smallest unbreakable elements of automation in THE RPA, in UiPath’s terminology of activities. The article examines the formation of the lifecycle of the RPA implementation project. The analysis phase selects business processes, which boils down to the creation of a Process Design Document (PDD) process development document. This only one document provides insight into the process needed to develop the RPA solution. The methodology of the Business Process Model and Notation (BPMN) is used to review the analysis stages, which main purpose is to provide an accessible notation for describing the business processes of all users: from analysts who create process diagrams and developers responsible for the implementation of business process technologies to managers and ordinary users who manage these business processes and monitor their implementation. Based on this document, the solution architect creates a technical project with distribution to different functions and develops indicators for auditing. The technical design result is the first version of the Solution Design Document (SDD). In addition to the SDD document, an assessment of the necessary efforts and a time-review of the developed process are being worked out during the development phase and the recommended basis for automation. At the end of the article, an updated life-cycle model and models of each of the stages are presented, which allow reducing time costs, as well as avoiding options for various kinds of inaccuracies and adjustments.

Laboratory

Models and Methods

The article proposes a new approach to the automatic analysis of short messages arriving at Internet portals and e-mails of public authorities. The developed model allows to classify short unstructured text documents in a lack of statistical information and a low degree of thematic rubric intersection. The input data for the algorithm for constructing the model is the set of rubrics and the training sample. Its result is fuzzy scales of significant words in thesaurus of the rubrics, which ensures the correct presentation of the document characteristics and the operation of the classification (rubrication) algorithm.

Author: I. Vygodchikova

Deciding making on structure and volume of investment companies should be based on mathematical models to make reasonable and reliable choice. Because of significant increase in electronic transactions at stock market, traditional portfolio investment models are no longer applicable due to need to process large amounts of constantly changing data, so other portfolio risk assessments are required. In article is offered the approach consisting in application of rating the companies in model of uniform distribution of the investment risk serving as alternative the model of minimization of risk H. M. Markowitz. Much attention is paid to rating procedure, which is the author's development and based on hierarchical analysis procedure of ranked indicators, taking into account their priority. The stability of author's approach of rating construction on basis the analysis of results of exclusion the least priority indicator was proved. Computational experiments were performed. In experiments were used next indicators – output of production and profits of the largest (by output) of the companies of Russia. Integral rating of companies was compiled, using which calculation the share structure of investment was performed using the minimax criterion and additional condition on profitability. Author recommends use the presented tools to compile an investment portfolio of shares the large companies in Russia.

Information security

Cyberphisical sequrity

The article explores the task of determining information security state of autonomous objects using the information obtained through a side acoustic channel. The basic prerequisites for using of external independent monitoring systems for monitoring condition of objects at the risk of the influence of threats to information security are considered. An experiment aimed at studying the functioning parameters of unmanned vehicles in various functioning situations was performed. The appearance and statistical characteristics of the signals, with the help of which it becomes possible to identify abnormal deviations during the operation of unmanned vehicles, are shown. An algorithm of two- and three-class classification of the states of the studied objects is presented. Analysis based on the obtained sample is very sensitive to any changes in the software and hardware configuration. At the same time, with a minimum time of accumulation of statistical information using the proposed approach based on a given threshold, it becomes possible to determine the point at which the attack was began. The proposed approach model implies the possibility of using various mathematical apparatus, statistical methods, and machine learning to achieve specified indicators for assessing the state of information security of an object.

The article presents analysis of various applications of the “pilot project” as a concept, describes the procedure for the pilot projects implementation regarding ICS information security scope (critical information infrastructure facilities). The article defines a term “pilot project” for the cybersecurity field. The relevance of this study lies in the need to create security systems for the critical information infrastructure of the Russian Federation, the key element of which is information protection tools that have passed conformity assessment for use at specific facilities, taking into account the specifics of their implementation, operation and threat model. The problem is that there is no unified understanding of the targets and objectives of the pilot projects, in IT&OT industry. As the result of this there is an overestimation of time spent on coordination and implementation of projects, including their targets, objectives, a list of expected results and criteria for their evaluation. It also affects the selection of specialists with the necessary qualifications. The article is based on the successfully experience in pilot projects in accordance with the developed original methodology in 2017-19.