ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2012 year.

Order result by:
Public date | Title | Authors

11. Method of virtual simulation and prospects In the limitations anduncertainties [№2 за 2012 год]
Author: Myshev A.V.
Visitors: 9908
Substantive provisions and principles of a method virtual prospect in methodology of development and implementation technologies of computer modeling under conditions and uncertainties are stated and formulated (of fuzzy problems). A basis of a developed method make: the theory of virtual lattices, models of active memory and processes with local information interaction in the virtual information environment of modeling. Solutions of modeled problems are under construction in the form of complexes on cellular topology of quantum discrete spaces (lattice, graphs).

12. The method of parallel logical inference of consequences for propositional calculus [№2 за 2012 год]
Authors: Агалаков Е.В., Страбыкин Д.А., Томчук М.Н.
Visitors: 10148
A method for new facts obtaining from the current knowledge base and incoming facts is offered. A substantial and a formal statements of the problem, a formal description of the inference procedure and a description of the offered method are considered. The method operation is illustrated by an example of consequences inference.

13. Method of conceptual design of information systems software [№2 за 2012 год]
Authors: Butenko D.V., Ананьев А.С., Попов К.В.
Visitors: 14306
Here describe the method for designing new information systems, which allow you to create non-trivial projects. In general, these technologies are based on existing needs, allow us to formulate requirements to the functional structure of the future system, to define its principles of operation and to provide options for technical and parametric solutions. For example, the conceptual design methodology automated system which performs the expertise psycho semantic audio products.

14. Method of construction the security model of automated systems [№2 за 2012 год]
Authors: Zhukov V.G., M.N. Zhukova, Золотарёв В.В., Ковалев И.В.
Visitors: 17072
Proposed a method of constructing security model for automated system in the protected execution. Considered the work stages at security model building. Shown the generalized scheme of a software system of automated security model building.

15. Methods reactivate the application [№2 за 2012 год]
Author: Удовиченко А.О.
Visitors: 9940
New software rejuvenation methods exploiting virtualization is proposed in the paper. The methods focus on server rejuvenation independent of software aging sources and without request loss. Results of the experiments are provided proving the efficiency of the proposed method set.

16. Mechanisms of evolution of organizational process systems [№2 за 2012 год]
Authors: Vinogradov G.P., Palyukh B.V.
Visitors: 10533
The problem of synthesis of the evolution of the control mechanism of organizational and technological system that uses a person's ability to self-organization. A model of the system containing agents capable of self-organization. The behavior of self-organizing agents, is an algorithm for constructing a set of preferred states.

17. Models of inference in the expert systems of psycho-physiological diagnostics [№2 за 2012 год]
Author: Ермаков А.Е.
Visitors: 8536
The different models of straight inference of diagnostic conclusion are considered in the class of the expert systems of psychological and physiological diagnostics, created within the framework of the problem-oriented computer-aided technology, and also features of organization of calculations in these expert systems at the use of the examined models of conclusion.

18. Method of construction the security model of automated systems [№2 за 2012 год]
Authors: Zhukov V.G., M.N. Zhukova, Стефаров А.П.
Visitors: 18022
Proposed a method of constructing the violator’s model of unauthorized access in to the auto- mated system. Considered a procedure for classifying violator’s, which performs unauthorized access to automated system.

19. Model of weakly goal-setting in a structured environment [№2 за 2012 год]
Authors: Богатикова В.Н., Vinogradov G.P., Kuznetsov V.N.
Visitors: 11186
The problem of generating alternatives to the project for semi-structured environments, which combines the steps and tselepolaganiya tseledostizheniya that allows understanding of the subject area of the project each of its members. The model of participant selection, which allows to predict its behavior. On the basis of the model proposed by the formality of behavior participant in the process of achieving the objectives of the project.

20. Model for calculating the capacity of the automatic warehouse [№2 за 2012 год]
Authors: Русяев А.С., Русяева Т.О.
Visitors: 11998
The software is developed for design of the storage capacity. Besides, this programme, which is intended for the modeling and optimization of mechanical assembly production, could be used in various working conditions and requires no special qualification of the operating staff. Software has friendly suitable and standart Window`s interface and works under Win9x/NT/Me/2000/XP operation systems.

← Preview | 1 | 2 | 3 | 4 | Next →