ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 1 at 2016 year.

Order result by:
Public date | Title | Authors

21. Development of typical scenarios of interactive training sessions using new electronic training aids [№1 за 2016 год]
Author: Shustova N.А.
Visitors: 8722
The article is devoted to development of scenarios for computer training programs. Classes that use these programs should have a certain structure. A script for a computer training program is a complicated methodically verified program consisting of three interconnected parts called scores. One score is for a teacher, two others are for students. Each score is constructed according to the structure of a training session and has its own content. A script is divided on scores due to methodical recommendations for trainings and psycho-physiological factors of each participant of a learning process (a teacher and a student). At the same time it is important to comply with the principle of necessity and residual feed of information for a student. Development of a script in such triune form will make computer training sessions more effective.

22. Using Global-EAM and “2P-Kadry” to manage productive capacity of the enterprise [№1 за 2016 год]
Authors: Razinkov P.I., Razinkova O.P.
Visitors: 7283
The article considers the issues of software application to improve the productive capacity management in an enterprise. Improving the efficiency of using productive capacity of an enterprise is one of the most important factors of production crisis prevention. Development of production crisis depends on generatation and efficiency of using fixed assets, labour and other resources. The effectiveness of generatation and use of capacity, workforce and fixed assets is affected by external and internal factors. Their number and impact increases. Thus, it is not only necessary to consider the impact of external and internal environmental factors, but to model these processes. It will identify characteristics of the structural components of fixed assets, labor and other elements of the productive capacity of an enterprise. Modeling will allow more detailed analyzing element properties and predicting their possible behavior in different situations, under external and internal environmental factors. To solve these problems the authors prove the need to use Global-EAM and “2P-Kadry”. They can significantly increase the efficiency of using productive capacity of an enterprise.

23. Problems of network traffic statistics processing to detect intrusion in existing information systems [№1 за 2016 год]
Author: Efimov A.Yu.
Visitors: 11420
The article focuses on the problems of collecting and analyzing network traffic statistics to detect intrusion in information systems. Network traffic statistics is considered at the IP Packets flow level. The article considers two possible approaches to collecting such network traffic statistics. They are: collecting statistics at network key points and collecting statistics directly at network nodes. The author compares these approaches in the context of an intrusion detection system implementation into existing information systems. He also shows that the approach to collecting statistics at the key points of network depends on a network topology, while the approach collecting statistics directly on network nodes does not. The paper demonstrates that generation of summary network statistics for both approaches requires a resource-intensive operation (flow deduplication). It makes it necessary to use high-performance equipment. In the case of statistics collection directly at network nodes the author suggests a method for significant reducing of requirements to computing resources to form network summary statistics. This method eliminates the need for deduplication by monitoring network traffic only in one direction at all network nodes and external data links. The paper justifies that the incoming network traffic is effective for this purpose. It is shown that this method allows detecting several types of intrusion in local area networks both from external intruders and insiders without many resources. Cases of illegal network connections are also considered.

24. The problems of ship navigation safety assessment indicators [№1 за 2016 год]
Authors: Kushnarev A.G., Mikhalsky V.A.
Visitors: 6365
The article describes calculation methods of ship navigational safety parameters and indicators. It shows that the method implemented in navigational tables MT-2000 and the Instruction for navigation equipment INO-2000 is outdated. It contains methodological inaccuracies and has low efficiency. Such shortcomings are typical for ship navigation in general. The authors suggested developing the Rules of solving navigation probabilistic problems without marked discrepancies. They also suggested creating an integrated textbook, which should contain methods for solving navigation probability problems and cover sections of several disciplines to further algorithmization of rules for their machine implementation.

25. A software suite as a development training facility [№1 за 2016 год]
Author: Stolyarchuk V.A.
Visitors: 6225
The article describes the development process of an open source training CAE Sigma in a higher education institution aimed to train developers of CAE-based applications. For educational purpose the system development is considered to be continuous and never-ending process, in which the created suite is an object of design and an endless source of problems for students. The paper considers an aggregated list of issues and problems directly related to studying the method of finite elements, as well as features and algorithms of CAE systems that can be solved by students in order to modify and improve a software system. The authors briefly describe the suite, its structure, the calculation unit work scheme, as well as sub-systems that provide and facilitate system modification by the students during their learning process. The authors also note the disadvantages of the initial basic system that initiate the development of an advanced version of the suite, as well as the positive aspects of the implemented approach to teaching students. By virtue of the ability to import the geometric model from CAD-systems like AutoCAD and Solid Edge to the Sigma system and to export generated source data to AnSys and Nastran CAE-systems, the described suite considered to serve as the initial stage of commercial CAD/CAE-systems studying. The possibility to compare different CAE-system calculation results with identical source data is an incentive for students to more in-depth studying the finite element method and CAE-systems’ algorithms.

26. Development of access control model for the standard medical information system [№1 за 2016 год]
Authors: Olennikov E.A., Zakharov A.A., Olennikov A.A., Shirokikh A.V., Varnavsky V.V.
Visitors: 9444
The article describes a model developed by the authors to protect the security of data in medical information systems. At the beginning of the article is formulated and substantiated the idea that the use of health information systems in the classical models of safety significantly complicates the procedure of access rights settings to the data and makes the process very time-consuming. First of all it is connected with the need to provide access only to the data of the patient, who needed medical attention at any given time to carry out their professional duties. This requirement implies the need for constant adjustment of access rights of users of medical information systems. Thus, the security administrator workload increases substantially, and as a result increases the likelihood of error setting permissions. The solution to this problem the authors see the development of a new security model that takes into account the specifics of the organization to access data in medical information systems. The following is a detailed description of the developed model, which takes into account additional features such as access time, the current relationship between doctor and patient, the status of the patient, the degree of privacy and so on. It describes the basic elements of the operators of the model. Considered in detail the implementation of the procedure for determining access rights to protected objects. In conclusion, the authors conclude that the use of the developed model of security to protect the data in medical information systems allow to automate the process of assigning permissions and significantly reduce the workload of the security administrator.

27. A specialized ship dynamic positioning system [№1 за 2016 год]
Authors: Garmatenko I.S., Kushnarev A.G.
Visitors: 5796
The article considers an approach to providing ship positioning in commission using automatic identification systems (AIS) with the assessment of the possibility to increase the accuracy of designated position retention when implementing a centralized measurement method. It also considers an approach to developing the structure of a ship automated control system that provides automated control of the ship during joint maneuvers. The approaches are based on the fact that currently it is possible to determine a ship's place continuously and accurately according to satellite radio navigation systems. This provides an efficient navigation support for activities of forces through automated processing and providing navigation data to a user. At the same time, capacity and high-speed data exchange is an important issue in activities of forces. It is essential in the process of managing the Navy forces and means in a rapidly changing environment and increasing in information flows. The practice of the Navy demonstrated the need to create a remote control system for tactical objects. It should solve the problems of determining geographical coordinates of its units and providing these data for users with a possibility to broadcast data including a space segment when a direct link is absent. The use of AIS in vessel traffic management systems operation showed significant advantages that are associated with the defini-tion of a place and motion parameters of maritime objects and ensuring their safe movement without collision. An AIS can be used as a prototype of a ship automated control system.

28. Tactical simulator complexes for naval combat training [№1 за 2016 год]
Authors: Ilin V.А., Sokolov S.N., Pakhomov E.S., Shuvanov А.D.
Visitors: 10579
Based on analyzing types and content of the Navy combat operations the article justifies the structure of hardware and software tactical simulators for training combat units in ship command posts, submarines, homogeneous and heterogeneous naval tactical groups. The composition and structure of tactical training complex hardware should reflect the structure of real naval command posts. It should also adjust to real ships projects and a manning chart of combat units, command posts and control posts with their workstations. The content of combat actions and naval combat define the requirements for special software of simulators. Special software of tactical training complexes is a set of models of resources, objects, the environment, combat actions, training information models of workstations and trainers’ software.

29. Tactical trainers of anti-submarine aviation suites [№1 за 2016 год]
Authors: Sikorsky S.T., Tsukanov A.A.
Visitors: 9598
Flight crew training using flight simulators is essential in order to ensure safe operation of aircraft and helicopters, and the effective implementation of their tasks. Flight simulators are particularly valuable in military aviation as they allow simulating a real combat situation with no restrictions. This is very difficult to simulate in a peaceful time. The article discusses general theoretical issues related to feasibility and development of tactical aircraft system trainers for naval aviation. These simulators are designed for aircrew tactical training so that a crew could use aircraft systems independently and in cooperation with other forces in a unified information-modeling environment. Exercises are carried out at training complex using a method of “virtual” tactical exercises both as unilateral using “computer power” and as “dueling situations”. Weapon simulators and military equipment are in a modeling system, which ensures their operation in one information field. It allows soldiers to act as they would act in real combat conditions. The article considers possible structural schemes of tactical simulators for similar and different types of aircraft systems.

30. A simulator training system for modeling a virtual reality with combat employment of weapons and ship equipment [№1 за 2016 год]
Authors: Losev E.F., Kuznetsov I.V.
Visitors: 11993
The development of modern training facilities is one of the most important tasks in improving the quality of the crew training for future ship projects. The article explains the innovative approach to solving the problem of increasing the efficiency of training service members of newly formed crews of new ship projects based on using a simulator training system, which models a virtual reality with combat employment of weapons and ship equipment. The authors examine the various aspects of applicating such simulators, emphasize advantages and disad-vantages of using them both in training centers and in ship conditions. The article deals with the prospects of us-ing and developing modern simulator training systems (created in a variety of design and production organiza-tions) that implement virtual learning environment.

← Preview | 1 | 2 | 3 | 4 | Next →