ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 4 at 2016 year.

Order result by:
Public date | Title | Authors

1. Automated digital processing of images in solving the problem of magnetic defectoscopy [№4 за 2016 год]
Authors: Korobeynikov, A.G., V.I. Polyakov, M.E. Fedosovsky, S.A. Aleksanin
Visitors: 8659
The methods that are based on the analysis of dispersion of magnetic fields near defects after magnetization of these products allow determining the existence of defects in a surface coat of steel details, for example cracks. In areas with continuity violation there will be a change of a magnetic flux. One of the most known methods of magnetic fault detection is the method of magnetic powder. In this case we apply magnetic powder (a dry method) or magnetic suspension (a wet method) on a surface of a magnetized detail. When using luminescent powders or suspensions, defects are more visible on the images of the studied details. Therefore, there is a possibility of automated image processing. The paper presents an automated procedure of choosing image processing methods. It also provides an example of processing a steel detail image aiming to detect its defects by means of shining lines, which appear after applying a wet method. Software implementation if the proposed approach is in MATLAB. The authors determine ways and methods that might be included in the abovementioned procedure to improve it.

2. Algorithmical power of some fragments of computational tree logic [№4 за 2016 год]
Authors: A.V. Dukhovneva, M.N. Rybakov, D.P. Shkatov
Visitors: 4747
In the paper we consider the Computational Tree Logic CTL and study computational complexity of the decision problem for its finitely-many variable fragments. We give a polynomial-time algorithm solving the decision problem for the variable-free fragment of CTL. We also give a polynomial-time algorithm which embeds the fragment of CTL with the modalities

3. Analysis of integration levels of heterogeneous information system components [№4 за 2016 год]
Authors: O.V. Schekochikhin, P.V. Shvedenko
Visitors: 11854
Integration uncoordinated enterprise information systems is by far the most efficient way to build a unified information environment in the enterprise. To implement such a paradigm shift we need an integrating tool class. This paper analyzes the basic levels of heterogeneous information systems integration. There is an author's classification of integration levels, as well as the variants of information systems interaction depending on integration goals. The authors analyze the integration options at the broker level, the data level, the service level and at the level of meta information interpretation. The proposed classification is an attempt to highlight the key information systems integration options in terms of practical implementation. The paper shows the examples of successful implementation of integration tasks on each of the proposed levels. It also considers the strengths and weaknesses of each integration option. The broker level is useful in the case when a source code of integrated applications is available and there is an opportunity to add a required integration module. Integration at the data level can be recommended for information systems and data circuits that allow us to construct a single consistent data structure. The main advantages of the service level is the ability to reuse them, loose coupling of services, a lack of necessity in a single database or repository. When working at the level of meta-information interpretation it is possible to quickly reconfigure the meta-information in data integration from a new source. The classification makes it possible to determine the most rational set of tools and methods to create an integrated system with specified characteristics. The authors believe that the most promising way of integration of control information systems components, which requires further study and improvement, is the integration of specialized systems at the service level.

4. User interface architecture for interaction with multi-agent environment [№4 за 2016 год]
Author: Sidorov I.A.
Visitors: 9482
The paper discusses an approach to the development of user interface to interact with a multi-agent environment, which is intended to solve resource-intensive tasks and includes a lot of loosely-coupled multivendor computing resources. Nowadays, there is a lack of toolkits which allow creating and using this kind of multi-agent environment, with a focus on a certain subject area. In addition, in the existing toolkits they do not pay enough attention to a graphical user interface, in which different categories of users (administrators, developers, and end users) can interact with the multi-agent environment. This paper proposes an original architecture of the user interface based on the promising concept of Agent-as-a-Service to implement the interaction between users and agents of the environment. The proposed architecture is based on the principle of building a thick client, in which components of a web-application are loaded into user’s web-browser, and further web pages generation is performed dynamically on the client side. The architecture of a web application is designed using MVC scheme (model-view-controller), where a web-application model of data, user interface (view) and logic (controller) are divided into three weakly dependent components that allow modifying any component with minimal effect on the other. The presented approach to the development of the user web interface has several advantages: it reduces the load on an agent’s node, increases the response time of a web interface, enhances portability and embeddability of user interface components in various subsystems of a multi-agent environment, facilitates testing and support of web applications, and solves a number of safety problems.

5. The monitoring of information trends system’s architecture based on the free software [№4 за 2016 год]
Authors: S.A. Belyaev, А.V. Vasilev, S.A. Kudryakov
Visitors: 8488
The article describes a software system designed to identify sources of information trends in the analysis of publications on news sites, social networks and blogs. The main feature of the system is the construction of a graph of information dissemination in the Internet. The authors prove the relevance of this problem, despite the presence of ready-made solutions, which scan data in the Internet. The paper also focuses on a problem of exponential increase in the volume of information requiring processing. The article describes a model to formalize the process of analyzing information trends and marked differences from published approaches to solving this problem. The authors propose basic steps for automation solutions based on this model. Special attention is paid to the possibility and validity of using software products with open source code for solving individual subtasks. To build the system the authors offer a layered architecture that demonstrates the possibility of rational use of free software and give a sequence of operation of the system. On the basis of the architecture and the proposed model there is developed software that provides the solution to the problem of monitoring information trends. The results of testing based on several news sites. The paper proposes some approaches for further development of the solution.

6. Graphical modeling of technological process as a support tool for designing of control algorithm [№4 за 2016 год]
Author: A.V. Paramonov
Visitors: 6168
The main stage of program development for PLCs in automated control systems is designing a control algorithm. One of the problems we meet at this stage is that the algorithm is often described in a potentially incomplete or inconsistent verbal form. Existing formal tools of algorithm description require a person who designs the algorithm to know formal theories. The aim of this work is to obtain a tool to design algorithms, which would be available for all participants in the development of programs and ensures completeness and consistency. To achieve this goal the author proposes using a graphical model of processing stations as a tool to design the algorithms. The paper describes the rules for designing models. The paper also proposes a method of algorithm presentation on a model with maintenance of completeness and consistency, which makes the designing process available to a person who designs the algorithm. The article provides the rules to describe the algorithm using the model in the form of decision tables. However, the ideas may be used for other forms, such as a finite-state automaton. The hierarchical structures and relational model are used as a basis for graphical models.

7. Extraction of metadata from the full-text electronic materials written in russian using Tomita-parser [№4 за 2016 год]
Author: R.S. Suleymanov
Visitors: 9097
Publishing information in digital libraries requires metadata extraction after transforming initial material into e-text. This procedure is time-consuming in case of performing it manually. This paper considers metadata extraction using Tomita-parser method, which is software designed to extract facts from a natural language text. To ensure the most accurate extraction there were formulated spatial grammars for analyzing full-text books in Russian and a list of metadata for publication was made. Designed spatial grammars were tested on 100 editions, the analysis served as a base for observing a number of consistent patterns. The algorithm has been optimized with regard of derived patterns. This allowed improving the efficiency of automatic data extraction. The authors determined a need for manual data processing, such as removing repetitive information and data reduction to general view before publishing. The optimized algorithm helped to conduct a large-scale experiment of metadata automated extraction from 10,000 publications. Its results were compared to manually extracted data. The proposed method allows extracting correctly up to 86,7 % of meta-data with further 4% which can be used after adjustment. The biggest problem (21 % of data were extracted incorrectly) has been discovered in the names of the materials due to the lack of a clear structure. As for clearly structured information (such as ISBN and rubricator codes) the percentage of correct extraction approaches 100 %. However, despite the speed increase and easiness of metadata extracting, it was proved that it is impossible to completely eliminate a human from the process.

8. Memory subsystem components performance evaluation for heterogeneous Systems-on-Chip [№4 за 2016 год]
Authors: A.O. Klyuchev, A.A. Antonov
Visitors: 7152
Specialized computer system design based on heterogeneous platforms within modern methodologies assumes a system platform model that contains information about the characteristics of its individual components. A memory subsystem is considered as a key communication element of current architectures, so its performance evaluation is one of the most important characteristics that determine the overall system performance. The tendency of multiple heterogeneous components integration within the systems and networks on-chip (including the cache memory hierarchy level) introduces new problems for computational platforms modeling, since in-system datapaths that connect the computational elements with cache memory hierarchy components become technologically inaccessible for direct measurements, while the publicly available documentation typically poorly describes the system’s internal organization. Existing methods of indirect evaluation of cache subsystem components’ performance do not guarantee the compliance of cache memory model being implied with the real behavior of the system under exploration. The article proposes the method of indirect selective performance evaluation of individual cache subsystem components. The method provides a set of techniques for verification of evaluation selectiveness using information about the actual amount of requests to the individual cache subsystem components. The paper explores feasibility of the method using several actual instances of heterogeneous computer systems and provides the results of its approbation for Intel Core i7 processor and custom computational platform for real-time heterogeneous measurement systems design.

9. An information model of LibMeta semantic library [№4 за 2016 год]
Author: Ataeva O.M.
Visitors: 9245
The article considers libraries as information systems that provide the core functionality for working with data. The technology development determines the concept of both the library and its resources, which are not limited only by bibliographic records and their electronic submission now, but also bring the semantics of these resources to the front. Based on new opportunities offered by advances in technologies, a library user receives additional opportunities to work with digital library resources using descriptions of their range of interests in subject area terms based on standards with dictionaries, thesauri and ontologies. This allows organizing and describing his own collections, as well as his own resources, detailing a resource description and their area of interest by clarifying its terms. The paper considers basic requirements for such libraries and describes the developed system information model. A feature of the system is the ability to integrate data from sources integrated in the LOD cloud.

10. A mathematical model of computer network antivirus protection [№4 за 2016 год]
Authors: N.A. Semykina, I.V. Shavykina
Visitors: 10420
One of the effective approaches to analyzing computer systems in the context of active computer viruses is mathematical modeling. Its advantage is in fast modeling of various scenarios for particular parameters of a computer network. Computational results obtained by these models allow analyzing viruses’ behavior in networks consisting of any number of elements. The article considers a mathematical model of computer network protection from a malicious code based on MSEIRS model. This model is multifaceted and global as it takes into account many factors influencing a network state: timing of infection for specific viruses and network treatment using an antivirus, medium immunization rate and involuntary computer shut down. The selected control criterion characterizes the best state of the system, when most hosts are immune to the impact of network viruses. The paper presents the discrete approximation of the optimal control problem. The result of the research model is a developed program that allows you to competently evaluate the security of the network and to use effective methods of dealing with malicious code if necessary. The authors conducted and analyzed computational experiments. For this they considered two cases: a progressive virus transmission in time and network (epidemic) and the absence of significant numbers of infected computers’ fluctuations.

| 1 | 2 | 3 | Next →