Journal influence
Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)
Bookmark
Next issue
№4
Publication date:
09 December 2024
Journal articles №1 2013
1. Integrated toolkit for organization of the problem-oriented distributed computing [№1 за 2013 год]Authors: Oparin G.A. (oparin@icc.ru) - Institute of System Dynamics and Control Theory SB of the Russian Academy of Sciences; Novopashin A.P. (apn@icc.ru) - Institute of System Dynamics and Control Theory SB of the Russian Academy of Sciences, Ph.D; Feoktistov A.G. (agf@icc.ru) - Matrosov Institute for System Dynamics and Control Theory of Siberian Branch of Russian Academy of Sciences;
Abstract: In this paper the approach to integrated use of tools for organization a distributed computing within the single environment for design, create and using problem-oriented software is represented. Problem-oriented software operates in the integrated cluster system. The characteristics of integrated cluster system are considered and the technological scheme of computing problems solving in this system is suggested. The integrable tools are listed: the non-procedural programming environment SyKruS for synthesis of parallel programs taking into account constraints on used resources of computer system and programming modules run-time, the toolkits DISCOMP and ORLANDO TOOLS for development of problem-oriented software in a homogeneous and heterogeneous distributed computing environments respectively, the toolkit DISCENT for cluster Grid development, the toolkit SIRIUS for modeling of problem-oriented software. The integration of tools is based on the cluster system model developed by the authors. The examples of problems solved with the use of above-listed tools are represented. The distinctive feature of represented approach is coordinated use of methodology of development parallel and distributed software packages, multiagent technology for the computing process management and integrated modeling (conceptual, simulation and seminatural) problem-oriented software.
Keywords: organization and integration tools, problem oriented software, distributed computing
Visitors: 13759
2. Integration of the OLAP technology and fuzzy sets for processing of uncertain and inexact data in decision support systems [№1 за 2013 год]
Authors: Eremeev, A.P. (eremeev@appmat.ru) - National Research University “MPEI” (Professor), Ph.D; (eremeev@appmat.ru) - ;
Abstract: Possibilities of the intelligent data mining for decision support systems by means of integration of the OLAP technology and fuzzy logic are considered. The given integration allows implementing measures for complex multidimensional analysis of big data volumes, their dynamics and trends. It is noticed that although the OLAP technology does not be a needed attribute of modern data warehouses, at present this technology is actively applied, in particular, for data analyses storing in warehouses. Such concepts from the fuzzy set theory as a fuzzy cut, fuzzy set to set an accordance index are used. The necessary formal definitions are given and the corresponding illustrations are presented. The work is performed for analyses and operating ill-definite (ambiguous) information (data and knowledge).
Keywords: fuzzy sets, OLAP technology, data warehouse, intellectual system
Visitors: 14770
3. Prototype of the diagnostic decision support system on the basis of integration bayesian belief networks and the Dempster–Shafer method [№1 за 2013 год]
Authors: Eremeev, A.P. (eremeev@appmat.ru) - National Research University “MPEI” (Professor), Ph.D; (ruslan.haziev@gmail.com) - ; (visionlab@yandex.ru) - , Ph.D; (sunvision@mail.ru) - , Ph.D;
Abstract: Possibilities of the application and program implementation of formal means integrating capabilities of expanded Bayesian belief networks and Dempster–Shafer’s method are considered. This means are oriented towards using in intelligent decision support systems for the help to experts at diagnostics of difficult problem situations. Unlike traditional Bayesian belief networks, the application of perspective multilevel (difficult-structured) networks, more convenient for complex problem research and representing expert data, is offered. Integration allows to use at diagnostics both expert data, and numerical (probabilistic) data obtained in the result of measurements. Joining Bayesian belief networks and Dempstera–Shafer's method allows to estimate ratios between possible outcomes (situations) and to specify their probabilities. The offered approach is implemented in the prototype of the intelligent decision support system for diagnostics of difficult diseases of vision.
Keywords: problem situation, diagnostics, decision support, intellectual system
Visitors: 15383
4. Artificial world's: spatial organization principles [№1 за 2013 год]
Authors: Kol’chugina, E.A. (kea@pnzgu.ru) - Penza State University (Professor of the Department of Mathematical Support and Computer Application), Ph.D;
Abstract: The artificial world is a specially organized computing environment where the development and improvement of the populations of competing artificial organisms realized as mobile software agents take place. The basic principles of such an environment play the defining role in the process of artificial organisms's formation. The spatial organization of artificial world is very important for mobile software agents’s populations evolution because of the influence on optimal strategy choice of agents's movements. It also define the rules and possibilities of agents’s interactions. In this paper the spatial organization of the agent-oriented artificial world’s models is considered. As a rule, the space in artificial world’s models is considered as a cellular, and models in general belong to one of two main classes: cellular automata or multidimensional Turing machines. The space in the given model is also considered as cellular, but the principle of hierarchical multilayer organization of each single cell is entered. According to this principle, each cell is an infinite set of layers, and each layer is identified by non-negative integer number. This allow to easily separate artificial organisms according to their species and functional purpose on hierarchically organized levels. The hierarchical organization make possible for organisms belonging to higher levels to control the organisms at lower levels. In the offered model the artificial organism can leave in each cell the labels similar to feromon traces of the insects in real world. This labels are accessible for organism and are necessary for making subsequent choice of moving direction. The example illustrating the influence of the model's space topological properties on the organism's speed of moving (dif-fusion) and the winning strategy of movement, is given.
Keywords: cellular spaces, multi-agent systems, artificial life
Visitors: 11885
5. Fuzzy inference architecture for soft computing optimizer of knowledge bases [№1 за 2013 год]
Authors: (sergey@tversu.ru) - ; Nefedov N.Yu. (nefnukem@gmail.com) - Dubna Internacional University for Nature, Socitty and Man; A.G. Reshetnikov (reshetnikovag@pochta.ru) - Dubna State University, Institute of the System Analysis and Control (Associate Professor); Ulyanov, S.V. (ulyanovsv46_46@mail.ru) - Dubna State University – Institute of System Analysis and Control, Dubna, Joint Institute for Nuclear Research – Laboratory of Information Technology (Professor), Ph.D;
Abstract: Software architecture of fuzzy inference subsystem for soft computing optimizer is considered. Proposed architecture is based on segregation of interface of algorithms, interested in active rules, to separate interface. Fuzzy inference algorithm is implemented as a template method; its primitive operations are implemented in concrete realizations of fuzzy inference models and fuzzy rule bases. Algorithm is also configurable by the object which will receive a list of active rules. Performance of soft computing optimizer is demonstrated on the task of intelligent control system for unstable dynamic object. This control system exhibited better robustness, comparing to systems created with other state-of-the-art tools.
Keywords: intelligent control systems, software architecture, fuzzy sets, fuzzy conclusion
Visitors: 14346
6. Web service optimization using caching [№1 за 2013 год]
Authors: (mel_igor@mail.ru) - ; (sdk@mail.by) - ; (327igor@rambler.ru) - , Ph.D;
Abstract: The paper describes a method for accelerating network data transfer through combination of caching, selective compression and encryption and a WAN-accelerator based on this method. The accelerator contains a client part and a server part. It encapsulates the data channel and caches data on the client and server side. Special hashes are used to synchronize cached data on the client and server side. If some data cached on the client side and some data cached on the server side are the same, a response will be extracted from client cache and won’t be waited from the server. Data can be quickly and effectively com-pressed by the methods of selective compression used in the accelerator if necessary. The WAN-accelerator encrypts data to improve data transfer security. WAN-accelerator server part cache asynchronous update helps to cut latency time of a response from a web-service caused by computational complexity and transaction time. Usage of the accelerator can be an effective solution for the problem of client application speed acceleration when a client application requires permanent communication with a web-service. The WAN-accelerator is an independent program module that doesn’t require integration with an existing web-service and its modification. It is transparent for a web-service and a client application. Especially it is useful for an organization that has a host system for data processing and management that contains one or more servers with data access through web-services and many clients on a great distance from them.
Keywords: optimisation, хеш-код, кодирование, компрессия, кэширование, web service, WAN-акселератор
Visitors: 8289
7. Web service optimization using caching [№1 за 2013 год]
Author: Melnikov I.I. (mel_igor@mail.ru) - Belarusian-Russian University; Demidenkov К.А. (sdk@mail.by) - Belarusian-Russian University; Evseenko I.А. (327igor@rambler.ru) - Belarusian-Russian University;
Abstract: The paper describes a method for accelerating network data transfer through combination of caching, selective compression and encryption and a WAN-accelerator based on this method. The accelerator contains a client part and a server part. It encapsulates the data channel and caches data on the client and server side. Special hashes are used to synchronize cached data on the client and server side. If some data cached on the client side and some data cached on the server side are same, a response will be extracted from client cache and won’t be waited from the server. Data can be quickly and effectively compressed by the methods of selective compression used in the accelerator if necessary. The WAN-accelerator encrypts data to improve data transfer security. WAN-accelerator server part cache asynchronous update helps to cut latency time of a response from a web-service caused by computational complexity and transaction time. Usage of the accelerator can be an effective solution for the problem of client application speed acceleration when a client application requires permanent communication with a web-service. The WAN-accelerator is an independent program module that doesn’t require integration with an existing web-service and its modification. It is transparent for a web-service and a client application. Especially it is useful for an organization that has a host system for data processing and management that contains one or more servers with data access through web-services and many clients on a great distance from them.
Keywords: optimisation, caching, FEC, compression, caching, web service, wan-accelerator
Visitors: 16490
8. Automated technology conformance evaluation of the text’s [№1 за 2013 год]
Authors: (kuznetsov@stu.lipetsk.ru) - , Ph.D; (kuznetsov@stu.lipetsk.ru) - , Ph.D;
Abstract: Considered matching the content of information sources in natural language. Developed a comparison technology based on formalization of texts in the form of probabilistic models, the amount of information is estimated by entropy, and a measure of similarity is the amount of mutual information. Described the technology of text formalization by decomposition of the text in random semantic components, which reflect the probability of semantic nuances of information sources. Identifying closeness of texts semantic content based on the compliance of the morphological and syntactic language objects and their semantic roles. Compared texts are requested to be provided in the form of formal systems of similar morphological and/or syntactic objects, which is associated with a certain semantic role. Semantic proximity of texts may be assessed by proximity of introduced systems of semantic components. Representation of the text in the form of a formal system allows the use of statistical tools for quantitative assessment of their proximity. Proper representation of the text in the form of morphological and syntactic systems can be performed using automated systems analysis and parsing texts in which formalized the existing rules of the language. Provided the examples of implementation this technology and evaluation its adequacy.
Keywords: semantic similarity of text’s, entropy, information theory, mathematical text model, components expansion of text, semantic components, probabilistic model, conformance evaluation technology of texts, text
Visitors: 13273
9. Functional comparison of complex information security systems [№1 за 2013 год]
Author: (styugin@rambler.ru) - ;
Abstract: In our study we define the problem of determining the performance of security systems using index of the first and the second kind errors. To define these criteria, we are given the system value function – a function for which system strives and for which performing this system was created. Real systems have the infinite set of input parameters, so we can not determine them only by defining characteristics of set required. Through the adding new characteristics, we can approximate system designed to system required. It is expedient to introduce into security systems two system value functions: one of them would define the system behavior and another one – the system efficiency function. Using these two functions, we can introduce index of the first and the second kind critical errors. There was given an algorithm of security system design using these characteristics on an example of a Web-security management system. According to this algorithm, the input parameter set of security system at first expands to reduce errors of the first kind and then narrows through the introducing characteristics to reduce errors of the second kind. Additionally, some existing complex Web-security management systems have been compared to each other: German product PHP-IDS and Russian series of programs ReflexionWeb.
Keywords: Web application security, protection against, black box, system analysis, infosecurity
Visitors: 12989
10. Conceptual framework of building security code analyzer [№1 за 2013 год]
Authors: Markov A.S. (mail@cnpo.ru) - Bauman Moscow State Technical University (Senior Researcher, Professor), Ph.D; (a.fadin@cnpo.ru) - ; Tsirlov V.L. (vz@cnpo.ru) - Bauman Moscow State Technical University (Associate Professor), Ph.D;
Abstract: The problems of software security audit automation and support of decisions about software defects are considered. A comparative analysis of known static code analyzers is done. The applicability of static signature analysis (on pattern) to identify defects and vulnerabilities are justified. The principles of construction and structure of the security code analyzer that combines syntactic and semantic code analysis are proposed. The requirements for the signature database are described. The algorithm of the operation of the security code analyzer is given. The efficiency of the proposed solution in terms of adding new languages and programming environments as well as new classes of security defects is shown. The example of the security parser code that demonstrates its effectiveness in identifying a broad class of defects and vulnerabilities is done.
Keywords: undeclared possibilities, attack, security flaws, signature analysis, static analysis, security code review, security software
Visitors: 17055
| 1 | 2 | 3 | 4 | Next → ►