ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 4 at 2012 year.

Order result by:
Public date | Title | Authors

21. Complex of the programs and algorithm of calculation of the fractal dimensions and a linear trend of the time series [№4 за 2012 год]
Authors: Крылова О.И., Цветков И.В.
Visitors: 15405
One of the upcoming trends of modeling of complex systems is application of a multifractal dynamics method. The multifractal dynamics models are based on the description of the dynamics of processes represented by multifractal curves. The whole observation time period is got into intervals with defined values of a linear trend characterizing the trend of the value of interest. On each interval, for time series values, a fractal dimension D should be defined. This work offers a new algorithm of computation of a fractal dimension D of the time series envelope in the form of a piece linear function. Computation of the fractal dimension of the time series envelope is based on calculation of the time series envelope length while grouping initial data by different ways. In order to improve computation accuracy, the algorithm uses a trend channel development procedure and rationing of first-calculated fractal dimension values based on the results obtained for the specially generated stochastic time series inside the trend channel.

22. Controlling in the process management [№4 за 2012 год]
Author: Фёдоров И.Г.
Visitors: 11453
The interpretation of process management as pure process model re-design, limit our capability to control the process. Model modification is an essential but not the only way of process management. This article suggests to distinguish between management of an enterprise with the use of business processes and the controlling of the process itself. The first is a holistic management approach focused on aligning all aspects of an organization with the wants and needs of clients. The second is an effort to maintain normal operation of the process. We will distinguish three levels of process controlling. The level of operational control implements the concept of proactive BPM. Its main idea is to exclude managers from the routine duties to manage the process instance. Their involvement happens only in cases where it is really necessary. The proactive management requires special process logic. The level of a tactical controlling is carried out through the manipulation of additional layers and aspects of the process models that are not covered by the process map, modeled with BPMN. Thus it is possible to achieve, for example, the optimal allocation of human resources involved in the process. Finally, a strategic management level involves improvement of the process model and is applicable only if the first two levels are no longer able to achieve their goals or there was a radical change in the business. The analysts and developers of the business processes management systems need to be aware of and possess the techniques of process' controlling. A BPM system developer must know and master the methods of process’s management and include necessary patterns of operational and tactical control in the process model. We assume that this recommendation can help a developer make an executable process model a controllable and can help your organization achieve high productivity and efficiency with a minimal changes of their process model.

23. Matrix-topological method for mathematical and computer modeling of temperature fields in electronic modules: programming complex STF-ElectronMod [№4 за 2012 год]
Authors: Madera A.G., Kandalov P.I.
Visitors: 11566
New approach is considered for mathematical and computing modeling for three-dimensional temperature field for EM and its elements, founded on matrix-topological method for mathematical and computer modeling. The method allows to realize the calculations of temperature field for complex electronic systems EM with provision for their real constructive particularities. Computer modeling realized in programming complex STF-ElectronMod for personal and supercomputers. Programming complex has a developed user shell, results of modeling introduced in the manner of distribution colour isotherm of the designs. Designed of the programming complex shown its efficiency and adequacy results.

24. Implementation method for interactive monitoring systems based on flexible workflows [№4 за 2012 год]
Authors: Вышенский С.В., Дубенская Ю.Ю., Григорьев П.В.
Visitors: 10732
Implementation method is proposed for flexible interactive monitoring systems applicable to practically significant cases where the information about the original system goes into monitoring system irregularly, intermittently, with delays or in violation of chronological order. The method also addresses a situation when the original system consciously violates the technological discipline. The monitoring system is constructed using workflow technology. A violation of the original workflow is described with a supplementary workflow. The monitoring system creates a tracking token, which is coupled to the token of the original system. The workflow for the tracking token is specified in a high-level language, and is a simple function of the workflow of the original system. To allow for flexible transitions the system has a special mode of operation. The proposed system is able to reconstruct the history of each instance of the source workflow, analyzing scattered messages from the original system and has some tolerance to the loss of these messages.

25. Method and code protection software against unauthorized analyze [№4 за 2012 год]
Authors: Shudrak M.O., Лубкин И.А.
Visitors: 9126
The article consider, relevant issue in software protection against unauthorized analyze. In the article authors analyze the existing equipment of binary code protection, descript algorithm of machine instruction analyze with the design of the intermediate language that descript such instructions. The article describes about technique of binary code decompilation and its application possibility in information security sphere. The main object of this work is to develop an efficient algorithm for the binary code analyze. To achieve this goal it is necessary to solve a number of tasks: to develop an effective mechanism for the low-level command analyze with algorithmic representations and conduct testing of the resulting methods. In the second part describes the mechanism of polymorphic code generation, architecture and software interface with the result description. The result was an effective method of reverse engineering and algorithmic representations of binary code linear plots, tested with such tasks as: software protection against unauthorized analysis and analysis of obfuscated code threats. The results show the effectiveness of the proposed technique because increased: the number of operations in the code area, input and output resources and resulting formulas which will inevitably lead to increase resources required to explore this part of the code, and it’s increase the code security against research.

26. Methods and instruments for subject-oriented components of learning systems [№4 за 2012 год]
Authors: Редькина А.В., Редькин А.В., Карпов Л.Е., Аношин Д.А.
Visitors: 9840
Present article describes methods and instruments to create interactive modules which are integrated in elearning management systems to support additional capabilities of learning systems. Interactive modules which support problem solving are subject-oriented. Development of problem-solving support module requires modeling of knowledge domain. Present article suggests approaches to modeling of a knowledge domain based on object-oriented analysis and ontologies. A number of software modules based on object-oriented analysis were developed in SFU: an editor for blockschemes of algorithms for programming course, generator of algebraic and logic expressions for algebra and mathematical logic course, simple chemical formulas editor. Knowledge domain of these subjects is has strict boundaries and allows to present task-solving process in machine-processed form. An integration of already existing and specifically developed systems, the discovery of common principles of building subject-oriented components allows to simplify the development of e-learning support software. The main task is to support publishing theoretical materials along with task-solving support modules in an integrated environment of e-learning system. The problem of interactive software modules portability between different e-learning systems is considered in the present article. Key specifications which are used in e-learning environments are examined: IMS Learning Tools Interoperability, which strictly defines methods for interaction of IMS-certified e-learning systems; SCORM – Sharable Content Object Reference Model. An example of a portable interactive module is the generator of algebraic and logic expressions.

27. Users group access rights in eduroam – federated user identity management system For research and educational networks [№4 за 2012 год]
Authors: Ovsyannikov, A.P., Овсянникова Т.В., Овчаренко С.А.
Visitors: 11554
The paper describes a federated identity management infrastructure based on eduroam. This technology enables secure authentication using single netid for network and resources access in eduroam federation. Major protocols and technologies for transparent user authentication are covered. A way of authorization, based on membership in institutional groups and individual user membership is proposed. For user authentication a service provider sends an authentication request contained the encrypted user name and password to user's institute RADIUS server (identity provider). Identity provider is determined by the domain user name/ The authentication request is passed through th eduroam hierarchy of proxy RADIUS servers. If the service provider provides special access for a certain group of users, it also sends a request to group identity RADIUS-server. A request passes through a hierarchy of group RADIUS servers for group membership checking. Eduroam federation and group RADIUS servers hierarchies are based on the domain name system. The implementation of these mechanisms requires a slight modification of service provider RADIUS server for group support and do not require changes of the identity provider and eduroam federations RADIUS servers. Group support is fully compatible with the existing eduroam infrastucture, the both types of RADIUS servers with and without group support can operate simultaneously.

28. Models and methods of coordinated management in multi-agent systems [№4 за 2012 год]
Authors: Kuznetsov V.N., Klyushin A.Yu., Кузнецов Г.В., Mutovkina N.Yu.
Visitors: 9309
The problem system analysis of models and methods coordinated management in multi-agent systems is formulated. This systems are intellectual active systems. Matter of theory multi-agent systems are uncovered. Character of methods coordinated management is presented as totality of formalize and not formalize methods of system analysis. Basic classis of conduct models in systems man–machine of coordinated management and adoption decisions are presented. Fuzzy algorithms are elaborated, which are realizing of group by investigation of operations with computers and model of conduct of intellectual active system. This system is interactive system man-machine of modeling coordinated optimization in diffuse conditions.

29. Tuning execution of parallel programs [№4 за 2012 год]
Author: P.N. Telegin
Visitors: 10384
The article describes issues related to development of optimization methods for tuning programs for distributed memory parallel computers. Optimization tuning of parallel programs for given hardware is discussed. Tuning means choice of parameters of the parallel program for specific hardware. Parameters are the scheme of parallel execution and distribution of work among processors or cores. We consider execution of program with pre-made parallel decomposition and determined pseudolinear sections, including simple operation, branching structure, loops and unstructured regions with a single input and output. Program decomposition and its execution in flow, dynamic and static schemes is described. Three ways to estimate execution time of program fragments are investigated: time prediction, profiling, user assertion. Effect of magnification in predicting execution time of program fragments is described. The ratio of communication time operations time in processors is large, thus a careful program analysis to make a decision on parallel execution is required. Scheduling parallel loops is described. Formulas for efficiency estimation of the loops executions for different schemes and different transferred data sets are presented. The described method performance estimations was implemented in the automatic parallelization tool Ratio. Parallel program utilizing dynamic scheme was built using by Ratio parallelization tool and executed on MVS-100K supercomputer. The comparison of predicted and actual acceleration for application program is given.

30. A fuzzy cognitive map as a tool to model innovation at the regional level [№4 за 2012 год]
Authors: Palyukh B.V., Какатунова Т.В.
Visitors: 16263
For developing strategic innovative programs for regional industry and improve implementation of major investment projects, the technique of modeling innovation using multilevel fuzzy cognitive model to determine the relative impact of performance strategies of socio-economic development and innovation strategies of the regional industry. Two basic features of modeling innovation using fuzzy cognitive maps as a special directed graphs, nodes (concepts) which are the characteristics of the socio-economic development and regional industry. The first feature modeling innovation necessitates the definition of traditional indicators of system interaction graph nodes: consonance, dissonance, mediated by the mutual influence of nodes on each other, etc. The second feature is caused by the weight of arcs between nodes in the graph (the concept) changes over time, so that can change not only the value but also the nature of influence. A new kind of fuzzy cognitive maps with the uncertainty of system characteristics, wherein the relationship between the concepts of the influence of the graph are fuzzy sets. Accounting for the negative impact of concepts achieved by broadening the base set for these fuzzy sets on negative values. A simplified two-level cognitive model of management of innovation processes in the regional industrial complex of the Smolensk region. It is shown that the use of the changing relationships between concepts of cognitive maps will extend the scope of the unit of cognitive modeling for management innovation and improve the validity of the provisions of innovative strategies and programs for the development of the region.

← Preview | 1 | 2 | 3 | 4 | 5 | 6 | Next →