ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 4 at 2016 year.

Order result by:
Public date | Title | Authors |

11. Algorithmical power of some fragments of computational tree logic [№4 за 2016 год]
Authors: A.V. Dukhovneva, M.N. Rybakov, D.P. Shkatov
Visitors: 4755
In the paper we consider the Computational Tree Logic CTL and study computational complexity of the decision problem for its finitely-many variable fragments. We give a polynomial-time algorithm solving the decision problem for the variable-free fragment of CTL. We also give a polynomial-time algorithm which embeds the fragment of CTL with the modalities

12. Program system of structural and parametrical synthesis of an information security system [№4 за 2016 год]
Authors: Zhukov V.G., M.N. Zhukova, A.S. Timokhovich, D.S. Volkov
Visitors: 9743
The article is devoted to the solution of an important problem of structural and parametrical synthesis algorithm development for an information security system on the example of creating a protected automated system. This algorithm allows generating several possible options of an information security system considering requirements of state standards in the field of information security, standard and methodical documents of the Federal Service for Technical and Export Control of Russia and the Federal Security Service of Russia. Besides, each architecture of an information security system assumes using rather large number of information security means. It complicates the task because of various options of information security system created architecture implementation. The paper considers only certified means of information security for implementation within the constructed architecture of information security system. Such problem of optimization has a set of features and restrictions. Classical optimization methods in this case aren't applicable. The analysis of various schemes of application of an optimization genetic algorithm which has proved itself when solving similar problems of optimization. However, application of a classical genetic algorithm is impossible because of features of requirements of standard and methodical documents, regulators in the information security area, structures of information security system and a component in the form of information protection means. A set of algorithm modifications is carried out. They allow applying the developed algorithm when solving real practical tasks. The developed algorithm with modifications is implemented as software. Software operation is tested at various versions of requirements to the created information security system. The efficiency of structural and parametrical synthesis of an information security system when using the developed software is 84 % at average.

13. Single screw extruder engineering with artificial intelligence elements [№4 за 2016 год]
Authors: Zubkova, T.M., N.А. Mustyukov, М.А. Tokareva
Visitors: 8442
Market fierce competition makes the extrusion equipment manufacturers offer advanced and new technologies for a wide range of products every year. Therefore, production must be flexible, adjusting to different configurations of products, raw materials and types of productivity depending on current needs of the market. The complexity of the extrusion process does not allow figuring it out by conventional methods without using automation design (SAPR). The reduction of engineering process complexity of single screw extruders based on flexible SAPR organization is a current issue. The study developed a method of building SAPR screw extruders based on the integration and configuration of its subsystems. The created software system is the SAPR core and includes the integration of the components (a third-party CAD/CAE-systems, designed processes mathematical models, user interface components, engineering tools), data management, native software modules connection, designed to analyze the process of extrusion and optimization of technological and geometrical parameters of screw extruders. SAPR framework for screw extruders allows engineering the extruders; automating the adjustment of geometrical parameters and data preparation for analysing the structure; to carry out a simulation extrusion process; to optimize design and technological regimes; to manage extruder design data, extrusion process and simulation results. The developed software system helped to creat a new press extruder and improve the homogenization of the material being processed. The constructions are protected by patents of the Russian Federation. The proposed method of geometrical parameters optimization of the extruder-based adaptive methods enhances the search for new and improvement of existing designs. The article reflects the results of the grant № 14-08-97031 performed with the financial support of the Government of the Orenburg Region and Russian Fundamental Research Fund.

14. KLEE for automatic testing programs in C/C++ [№4 за 2016 год]
Authors: A.G. Zykov, I.V. Kochetkov, V.I. Polyakov
Visitors: 8800
The article considers the problems of automation of software functional error testing. This kind of bugs is extremely difficult to find and reproduce without code execution. This problem is relevant due to ever-growing software complexity. It leads to increasing duration, complexity and cost of software testing and verification. The purpose of the research is to analyze symbolic execution (evaluation) system basic features and their application in finding functional bugs and software testing in general. In particular, the article discusses the KLEE system in detail. This system is a symbolic virtual machine with environment emulation that executes parallel symbolic processes. It is based on analyzing a program LLVM byte-code. The article deals with KLEE architecture, components set, operation principles, features and some other aspects. Novelty of this research is in the consideration of alternative methods of using symbolic execution tools. They are developed based on using their basic features. There is testing with reference program, problem solving (for example, finding a way in a labyrinth) and restoring an algorithm flowchart. The article presents KLEE testing statistics (code coverage, bugs count, etc.) of COREUTILS 6.11 package, where there were found several serious bugs that had been missing for over ten years.

15. Software modeling of stochastic temperature fields in stf-electron mod technical systems [№4 за 2016 год]
Author: Kandalov P.I.
Visitors: 8546
The article presents the software package “STF-ElectronMod” to simulate a steady-state stochastic 3D temperature fields in technical systems Experience has shown that the actual temperature fields of technical systems have uncertainty interval nature. This is due to the interval factors determining the thermal regime of the technical system. These factors include: the design parameters of technical sys-tems with statistical techno logical manufacture spread; factors arising in the operation of technical sys-tems ( power consumption, heat flows, internal environment parameters); environmental factors (temperature, medium, refrigerant, flows velocity, etc.). However, now modeling of temperature fields of technical systems is being conducted under the assumption of determinacy. This means that all thermal condition parameters are considered accurately known This article describes a structure of the designed software system STF-ElectronMod for modelling of interval stochastic temperature fields in technical systems under uncertainty of input determining data. The method and algorithm are based on the author's developments according to a matrix-topological method, the software complex three-dimensional deterministic modeling of temperature fields of technical systems, as well as Monte-Carlo method. The application of the method and algorithm for modeling interval stochastic temperature fields is considered on the example of a complex electronic system.

16. Memory subsystem components performance evaluation for heterogeneous Systems-on-Chip [№4 за 2016 год]
Authors: A.O. Klyuchev, A.A. Antonov
Visitors: 7161
Specialized computer system design based on heterogeneous platforms within modern methodologies assumes a system platform model that contains information about the characteristics of its individual components. A memory subsystem is considered as a key communication element of current architectures, so its performance evaluation is one of the most important characteristics that determine the overall system performance. The tendency of multiple heterogeneous components integration within the systems and networks on-chip (including the cache memory hierarchy level) introduces new problems for computational platforms modeling, since in-system datapaths that connect the computational elements with cache memory hierarchy components become technologically inaccessible for direct measurements, while the publicly available documentation typically poorly describes the system’s internal organization. Existing methods of indirect evaluation of cache subsystem components’ performance do not guarantee the compliance of cache memory model being implied with the real behavior of the system under exploration. The article proposes the method of indirect selective performance evaluation of individual cache subsystem components. The method provides a set of techniques for verification of evaluation selectiveness using information about the actual amount of requests to the individual cache subsystem components. The paper explores feasibility of the method using several actual instances of heterogeneous computer systems and provides the results of its approbation for Intel Core i7 processor and custom computational platform for real-time heterogeneous measurement systems design.

17. Automated digital processing of images in solving the problem of magnetic defectoscopy [№4 за 2016 год]
Authors: Korobeynikov, A.G., V.I. Polyakov, M.E. Fedosovsky, S.A. Aleksanin
Visitors: 8667
The methods that are based on the analysis of dispersion of magnetic fields near defects after magnetization of these products allow determining the existence of defects in a surface coat of steel details, for example cracks. In areas with continuity violation there will be a change of a magnetic flux. One of the most known methods of magnetic fault detection is the method of magnetic powder. In this case we apply magnetic powder (a dry method) or magnetic suspension (a wet method) on a surface of a magnetized detail. When using luminescent powders or suspensions, defects are more visible on the images of the studied details. Therefore, there is a possibility of automated image processing. The paper presents an automated procedure of choosing image processing methods. It also provides an example of processing a steel detail image aiming to detect its defects by means of shining lines, which appear after applying a wet method. Software implementation if the proposed approach is in MATLAB. The authors determine ways and methods that might be included in the abovementioned procedure to improve it.

18. Methodological aspects of information system life cycle management based on functional standardization tools [№4 за 2016 год]
Author: O.V. Lukinova
Visitors: 8588
The paper presents a methodology for managing the life cycle of information systems. It synthesizes tools and models of functional standardization, open system theories, management consulting, and basic standards in management of information system life cycle. The paper also describes the basics and a conceptual model showing the relationship between problems to be solved using the methodology framework. The problems are the following: construction of a business process model using management consulting; information system model development in accordance with the OSE/RM model (Open System Environment / Reference Model) and its standardization using a functional profile; choosing a life cycle type, development of its respective model and profiling. The paper investigates different types of a life cycle, focusing on a purchase system life cycle including a set of integrated public services in addition to a local component (deployed at a customer site). The structural representation of the information system target components together with its security system is shown in terms of the OSE/RM model. The article also describes a conceptual model of a protection mechanism (which is a base element of a protection system functional structure).

19. Graphical modeling of technological process as a support tool for designing of control algorithm [№4 за 2016 год]
Author: A.V. Paramonov
Visitors: 6177
The main stage of program development for PLCs in automated control systems is designing a control algorithm. One of the problems we meet at this stage is that the algorithm is often described in a potentially incomplete or inconsistent verbal form. Existing formal tools of algorithm description require a person who designs the algorithm to know formal theories. The aim of this work is to obtain a tool to design algorithms, which would be available for all participants in the development of programs and ensures completeness and consistency. To achieve this goal the author proposes using a graphical model of processing stations as a tool to design the algorithms. The paper describes the rules for designing models. The paper also proposes a method of algorithm presentation on a model with maintenance of completeness and consistency, which makes the designing process available to a person who designs the algorithm. The article provides the rules to describe the algorithm using the model in the form of decision tables. However, the ideas may be used for other forms, such as a finite-state automaton. The hierarchical structures and relational model are used as a basis for graphical models.

20. The directions of implementation of automated system means for electronic systems development [№4 за 2016 год]
Authors: Potapov A.N., V.A. Dikarev, Dopira R.V., Abu-Abed, F.N., Martynov D.V.
Visitors: 7106
The article considers the issues implementing software tools of an automated system of electronic systems development. The authors propose an architecture of the automated system’s structural configuration. To determine the existence of conflicts when applying radio-electronic complexes (REC) and simulators it is proposed to add radio-monitoring means and means of assessing simulator adequacy to the automated system of electronic systems development. Radio-monitoring means can identify the signs of a conflict when applying electronic systems. The paper shows the developed structures of automated means for defining the substantial components of training exercises and curricula. The authors offer a professionally-oriented program complex of the automated system of electronic systems development. Experimental studies of the adequacy of simulation results in specialized simulators “Marka – RS” and integrated simulators “Repeater” in the air traffic control (ATC) in the near zone from an aerodrome in order to correct determine the level of skills and rational planning of operators’ training identified a new level of automated systems of electronic system operators’ training in the air traffic control. The developed tools in the form of models, block diagrams, mathematical, algorithmic support and software for subsystems in the automated system of electronic systems development have not only a scientific novelty, but also practical significance and feasibility.

← Preview | 1 | 2 | 3 | Next →