ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2012 year.

Order result by:
Public date | Title | Authors

31. Technology of creation of expert systems for operative diagnostics of the equipment of nuclear power units [№2 за 2012 год]
Author: Башлыков А.А.
Visitors: 11238
The technology of creation of diagnostic expert systems of real time for an assessment of a condition of difficult technological objects is considered. As an example of difficult object the power unit of a nuclear power plant is considered. Two components expert system of not operative and operative contours of diagnosing are allocated and described. Principles of decomposition of the equipment of the power unit are shown. The description of architecture of diagnostic system is provided. The user interfaces of experts and operators of the power unit are described.

32. Lifecycle management for informational business process [№2 за 2012 год]
Author: Loginov I.V.
Visitors: 12083
In the article are viewed business processes of organization for which very importance using of automation and information technologies. For this, named informational, business process suggested approach for administrative management base on using hybrid model on all stages of lifecycle.

33. Search acceleration in indexes based on R-trees [№2 за 2012 год]
Author: Чернов А.Ф.
Visitors: 10501
This article is devoted to modification of index access methods, based on R-trees, in DBMS. The improvementis directed onsearch acceleration with index usage. Modification included two stages. At each stage internal structure changes was made in search tree. As a result efficiency verification was performed for used decisions for various contents of a database.

34. Vulnerability of web content protection of type HTML Guardian [№2 за 2012 год]
Author: Ermakov D.G.
Visitors: 11570
The task of overcoming of protection of information from copying, similar to ProtWare's HTML Guardian, is considered. To solve the task we suggest using standard means of MS Windows: Windows PowerShell scripting language and browser MS Internet Explorer. It is shown that it is impossible to protect a web page content, since the browser receives the non-encoded HTML-code, and there is a simple and fast method to receive this non-encoded code by means of PowerShell.

35. Forming an integral efficiency factor of information system functioning [№2 за 2012 год]
Authors: Semenov S.A., Arzhaev V.I., V.S. Semenov, Моничев С.С.
Visitors: 9724
Offered an approach to creating an integral efficiency factor of information system operation using its abstract-algebraic model.

36. Experimental acknowledgement of consistency of estimations of difficulty of tasks of a test [№2 за 2012 год]
Author: Елисеев И.Н.
Visitors: 9752
The results of numerical experiments confirmed the consistency of maximum likelihood estimates of the latent parameter «difficulty of the task» Rush's dichotomous one-parameter model at the fixed number of tasks of test L of identical test difficulty and indefinitely increasing the sample size of students N. It is shown, that under the same conditions of estimation of level of preparation of n-th student, calculated from the permissible dichotomous response matrix, tend in probability to their original estimates .

37. Expert-modeling systems in the IT-infrastructure management [№2 за 2012 год]
Authors: Христенко Д.В., Loginov I.V.
Visitors: 11049
In this article is viewed model of organization of administration management system for IT-infrastructure of enterprise, based on network of dispersed expert-modeling systems. This structure helps to increase of validity of assessment accepts decisions for administrative management.

38. Electronic training of specialists for the systems of professional development [№2 за 2012 год]
Authors: Кустов В.Н., Новожилова И.В.
Visitors: 10529
The article deals with key issues in the organization of e-learning and the use of distance learning technologies in professional training of specialists in the complex and information security.

39. Legally relevant cross-border electronic interaction is reality now [№2 за 2012 год]
Authors: Кустов В.Н., Кирюшкин С.А., Большаков А.А., Станкевич Т.Л.
Visitors: 7862
The main idea of the article is to present developed DVCS service, its architecture, to describe services provided by DVCS, to define tasks of the system and basic tasks DVCS service subsystems, to show form of user interfaces and to provide software which is necessary for operation DVCS service.

← Preview | 1 | 2 | 3 | 4