ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 1 at 2013 year.

Order result by:
Public date | Title | Authors

1. Integrated toolkit for organization of the problem-oriented distributed computing [№1 за 2013 год]
Authors: Oparin G.A., Novopashin A.P., Feoktistov A.G.
Visitors: 11754
In this paper the approach to integrated use of tools for organization a distributed computing within the single environment for design, create and using problem-oriented software is represented. Problem-oriented software operates in the integrated cluster system. The characteristics of integrated cluster system are considered and the technological scheme of computing problems solving in this system is suggested. The integrable tools are listed: the non-procedural programming environment SyKruS for synthesis of parallel programs taking into account constraints on used resources of computer system and programming modules run-time, the toolkits DISCOMP and ORLANDO TOOLS for development of problem-oriented software in a homogeneous and heterogeneous distributed computing environments respectively, the toolkit DISCENT for cluster Grid development, the toolkit SIRIUS for modeling of problem-oriented software. The integration of tools is based on the cluster system model developed by the authors. The examples of problems solved with the use of above-listed tools are represented. The distinctive feature of represented approach is coordinated use of methodology of development parallel and distributed software packages, multiagent technology for the computing process management and integrated modeling (conceptual, simulation and seminatural) problem-oriented software.

2. Integration of the OLAP technology and fuzzy sets for processing of uncertain and inexact data in decision support systems [№1 за 2013 год]
Authors: Eremeev, A.P. , Еремеев А.А.
Visitors: 12636
Possibilities of the intelligent data mining for decision support systems by means of integration of the OLAP technology and fuzzy logic are considered. The given integration allows implementing measures for complex multidimensional analysis of big data volumes, their dynamics and trends. It is noticed that although the OLAP technology does not be a needed attribute of modern data warehouses, at present this technology is actively applied, in particular, for data analyses storing in warehouses. Such concepts from the fuzzy set theory as a fuzzy cut, fuzzy set to set an accordance index are used. The necessary formal definitions are given and the corresponding illustrations are presented. The work is performed for analyses and operating ill-definite (ambiguous) information (data and knowledge).

3. Prototype of the diagnostic decision support system on the basis of integration bayesian belief networks and the Dempster–Shafer method [№1 за 2013 год]
Authors: Eremeev, A.P. , Хазиев Р.Р., Зуева М.В., Цапенко И.В.
Visitors: 13033
Possibilities of the application and program implementation of formal means integrating capabilities of expanded Bayesian belief networks and Dempster–Shafer’s method are considered. This means are oriented towards using in intelligent decision support systems for the help to experts at diagnostics of difficult problem situations. Unlike traditional Bayesian belief networks, the application of perspective multilevel (difficult-structured) networks, more convenient for complex problem research and representing expert data, is offered. Integration allows to use at diagnostics both expert data, and numerical (probabilistic) data obtained in the result of measurements. Joining Bayesian belief networks and Dempstera–Shafer's method allows to estimate ratios between possible outcomes (situations) and to specify their probabilities. The offered approach is implemented in the prototype of the intelligent decision support system for diagnostics of difficult diseases of vision.

4. Artificial world's: spatial organization principles [№1 за 2013 год]
Author: Kol’chugina, E.A.
Visitors: 9804
The artificial world is a specially organized computing environment where the development and improvement of the populations of competing artificial organisms realized as mobile software agents take place. The basic principles of such an environment play the defining role in the process of artificial organisms's formation. The spatial organization of artificial world is very important for mobile software agents’s populations evolution because of the influence on optimal strategy choice of agents's movements. It also define the rules and possibilities of agents’s interactions. In this paper the spatial organization of the agent-oriented artificial world’s models is considered. As a rule, the space in artificial world’s models is considered as a cellular, and models in general belong to one of two main classes: cellular automata or multidimensional Turing machines. The space in the given model is also considered as cellular, but the principle of hierarchical multilayer organization of each single cell is entered. According to this principle, each cell is an infinite set of layers, and each layer is identified by non-negative integer number. This allow to easily separate artificial organisms according to their species and functional purpose on hierarchically organized levels. The hierarchical organization make possible for organisms belonging to higher levels to control the organisms at lower levels. In the offered model the artificial organism can leave in each cell the labels similar to feromon traces of the insects in real world. This labels are accessible for organism and are necessary for making subsequent choice of moving direction. The example illustrating the influence of the model's space topological properties on the organism's speed of moving (dif-fusion) and the winning strategy of movement, is given.

5. Fuzzy inference architecture for soft computing optimizer of knowledge bases [№1 за 2013 год]
Authors: Сорокин С.В., Nefedov N.Yu., A.G. Reshetnikov, Ulyanov, S.V.
Visitors: 12013
Software architecture of fuzzy inference subsystem for soft computing optimizer is considered. Proposed architecture is based on segregation of interface of algorithms, interested in active rules, to separate interface. Fuzzy inference algorithm is implemented as a template method; its primitive operations are implemented in concrete realizations of fuzzy inference models and fuzzy rule bases. Algorithm is also configurable by the object which will receive a list of active rules. Performance of soft computing optimizer is demonstrated on the task of intelligent control system for unstable dynamic object. This control system exhibited better robustness, comparing to systems created with other state-of-the-art tools.

6. Web service optimization using caching [№1 за 2013 год]
Authors: Melnikov I.I., Demidenkov K.A., Evseenko I.A.
Visitors: 6745
The paper describes a method for accelerating network data transfer through combination of caching, selective compression and encryption and a WAN-accelerator based on this method. The accelerator contains a client part and a server part. It encapsulates the data channel and caches data on the client and server side. Special hashes are used to synchronize cached data on the client and server side. If some data cached on the client side and some data cached on the server side are the same, a response will be extracted from client cache and won’t be waited from the server. Data can be quickly and effectively com-pressed by the methods of selective compression used in the accelerator if necessary. The WAN-accelerator encrypts data to improve data transfer security. WAN-accelerator server part cache asynchronous update helps to cut latency time of a response from a web-service caused by computational complexity and transaction time. Usage of the accelerator can be an effective solution for the problem of client application speed acceleration when a client application requires permanent communication with a web-service. The WAN-accelerator is an independent program module that doesn’t require integration with an existing web-service and its modification. It is transparent for a web-service and a client application. Especially it is useful for an organization that has a host system for data processing and management that contains one or more servers with data access through web-services and many clients on a great distance from them.

7. Web service optimization using caching [№1 за 2013 год]
Authors: Melnikov I.I., Demidenkov К.А., Evseenko I.А.
Visitors: 14167
The paper describes a method for accelerating network data transfer through combination of caching, selective compression and encryption and a WAN-accelerator based on this method. The accelerator contains a client part and a server part. It encapsulates the data channel and caches data on the client and server side. Special hashes are used to synchronize cached data on the client and server side. If some data cached on the client side and some data cached on the server side are same, a response will be extracted from client cache and won’t be waited from the server. Data can be quickly and effectively compressed by the methods of selective compression used in the accelerator if necessary. The WAN-accelerator encrypts data to improve data transfer security. WAN-accelerator server part cache asynchronous update helps to cut latency time of a response from a web-service caused by computational complexity and transaction time. Usage of the accelerator can be an effective solution for the problem of client application speed acceleration when a client application requires permanent communication with a web-service. The WAN-accelerator is an independent program module that doesn’t require integration with an existing web-service and its modification. It is transparent for a web-service and a client application. Especially it is useful for an organization that has a host system for data processing and management that contains one or more servers with data access through web-services and many clients on a great distance from them.

8. Automated technology conformance evaluation of the text’s [№1 за 2013 год]
Authors: Кузнецов Л.А., Кузнецова В.Ф.
Visitors: 10789
Considered matching the content of information sources in natural language. Developed a comparison technology based on formalization of texts in the form of probabilistic models, the amount of information is estimated by entropy, and a measure of similarity is the amount of mutual information. Described the technology of text formalization by decomposition of the text in random semantic components, which reflect the probability of semantic nuances of information sources. Identifying closeness of texts semantic content based on the compliance of the morphological and syntactic language objects and their semantic roles. Compared texts are requested to be provided in the form of formal systems of similar morphological and/or syntactic objects, which is associated with a certain semantic role. Semantic proximity of texts may be assessed by proximity of introduced systems of semantic components. Representation of the text in the form of a formal system allows the use of statistical tools for quantitative assessment of their proximity. Proper representation of the text in the form of morphological and syntactic systems can be performed using automated systems analysis and parsing texts in which formalized the existing rules of the language. Provided the examples of implementation this technology and evaluation its adequacy.

9. Functional comparison of complex information security systems [№1 за 2013 год]
Author: Стюгин М.А.
Visitors: 10802
In our study we define the problem of determining the performance of security systems using index of the first and the second kind errors. To define these criteria, we are given the system value function – a function for which system strives and for which performing this system was created. Real systems have the infinite set of input parameters, so we can not determine them only by defining characteristics of set required. Through the adding new characteristics, we can approximate system designed to system required. It is expedient to introduce into security systems two system value functions: one of them would define the system behavior and another one – the system efficiency function. Using these two functions, we can introduce index of the first and the second kind critical errors. There was given an algorithm of security system design using these characteristics on an example of a Web-security management system. According to this algorithm, the input parameter set of security system at first expands to reduce errors of the first kind and then narrows through the introducing characteristics to reduce errors of the second kind. Additionally, some existing complex Web-security management systems have been compared to each other: German product PHP-IDS and Russian series of programs ReflexionWeb.

10. Conceptual framework of building security code analyzer [№1 за 2013 год]
Authors: Markov A.S., Фадин А.А., Tsirlov V.L.
Visitors: 14952
The problems of software security audit automation and support of decisions about software defects are considered. A comparative analysis of known static code analyzers is done. The applicability of static signature analysis (on pattern) to identify defects and vulnerabilities are justified. The principles of construction and structure of the security code analyzer that combines syntactic and semantic code analysis are proposed. The requirements for the signature database are described. The algorithm of the operation of the security code analyzer is given. The efficiency of the proposed solution in terms of adding new languages and programming environments as well as new classes of security defects is shown. The example of the security parser code that demonstrates its effectiveness in identifying a broad class of defects and vulnerabilities is done.

| 1 | 2 | 3 | 4 | Next →