+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№3(87) June-july 2020 year

Content:

Teacher’s portfolio

IT development

He smart-contract is the main document on the basis of which the functions of the blockchain management system are performed. Ensuring the security of business processes initiated by smart-contracts determines the success of the system and eff e business management, therefore, the research topic is relevant. Working in this area requires high competence in the fi of modern information technologies. They must have a good understanding of the specifi s of working with smart contracts, know modern blockchain systems, navigate security issues, and be able to apply their knowledge in practice. Therefore, the research topic is quite relevant. The purpose of this article is to provide an overview of secure technologies for applying smart contracts, as well as the process of developing smart contracts. The authors were tasked with investigating all vulnerabilities associated with the use of smart-contracts and develop recommendations for developing students‘ competencies in the field of smart contract development. As a result of the study, measures for the safe use of smart contracts in Blockchain management systems were identified, and a laboratory workshop on modeling the process of developing smart contracts was developed. This laboratory workshop is aimed at developing students‘ professional skills in the field of blockchain and smart contracts, which are in demand in today’s digital society. It can be used for conducting laboratory classes in the disciplines of Information systems and technologies, Applied Informatics and Business Informatics. This approach can be used by developers of distributed registry systems to effectively launch and implement projects.

Software engineering

Algorithmic efficiency

This article discusses applied problems, for the solution of which the dynamic programming method developed by R. Bellman in the middle of the last century was previously proposed. This method, based on the use of the optimality principle and the recurrence equations resulting from it, made it possible to reduce the solution of many complex applied problems to the solution of a sequence of simpler problems of the same type. To date, with the help of dynamic programming, many practically important problems have been solved. However, when solving problems of large dimension, especially when developing systems in which the dynamic programming algorithm is built into a repeatedly repeated calculation cycle, the calculation time is unacceptably long even when using modern computers. The problem of increasing the efficiency of dynamic programming continues to be relevant. This is the purpose of this paper. It is established that various implementations of dynamic programming are possible when solving the same applied problems. Authors analyze the possibilities of increasing the efficiency of using dynamic programming with a detailed consideration of the specific features of applied problems, some of which allow obtaining recurrence formulas for calculating the optimal trajectory based on the optimality principle of R. Bellman without enumerating options. It is shown that many applied problems, for the solution of which a dynamic programming method was proposed with the rejection of options for paths leading to a specific state, also allows the rejection of hopeless states in the process of counting. This dramatically increases the effectiveness of dynamic programming both in terms of the used memory size and in terms of counting time. This statement is based on the us of specially designed experimental programs for calculations in order to evaluate the effectiveness of the new algorithm as applied to solving practical problems of both single-criterion and two-criterion ones. Examples of such problems and the corresponding algorithm for solving them are given.

One of the key areas of informatization of public authorities is to develop and implement the systems of automated processing the electronic appeals (applications, complaints, suggestions) of individuals and legal entities that arrive on official websites and portals of government. The rubrication plays an important role in solving this problem. It consists in the appeals’ distribution according to thematic rubrics determining the directions of the activity of departments carrying out processing and preparation of the corresponding response. The results of the analysis of the specific features of such text messages (small size, markup lack, the errors’ presence, thesaurus unsteadiness, etc.) confirmed the impossibility of using traditional approaches to rubrication and justified the feasibility of using data mining methods. The article proposes a new approach to the analysis and rubrication of electronic unstructured text documents arrived on official websites and portals of public authorities. It involves the formation of a tree-like structure of the rubric field, based on fuzzy relationships of differences between the syntactic characteristics of documents. The analysis is based on determining the fuzzy correspondence of these documents by their syntactic characteristics with the values of the clusters’ centers. It is carried out sequentially from the root to the leaves of the constructed fuzzy decision tree. The proposed rubrication method is programmatically implemented and tested in the automated processing and analysis of appeals (applications, complaints and suggestions) of citizens entering the Administration of Smolensk Region. This made it possible to ensure prompt and high-quality updating of rubrics and document analysis under conditions of non-stationary composition of the thesaurus and the importance of rubric words.

One of the key areas of informatization of public authorities is to develop and implement the systems of automated processing the electronic appeals (applications, complaints, suggestions) of individuals and legal entities that arrive on official websites and portals of government. The rubrication plays an important role in solving this problem. It consists in the appeals’ distribution according to thematic rubrics determining the directions of the activity of departments carrying out processing and preparation of the corresponding response. The results of the analysis of the specific features of such text messages (small size, markup lack, the errors’ presence, thesaurus unsteadiness, etc.) confirmed the impossibility of using traditional approaches to rubrication and justified the feasibility of using data mining methods. The article proposes a new approach to the analysis and rubrication of electronic unstructured text documents arrived on official websites and portals of public authorities. It involves the formation of a tree-like structure of the rubric field, based on fuzzy relationships of differences between the syntactic characteristics of documents. The analysis is based on determining the fuzzy correspondence of these documents by their syntactic characteristics with the values of the clusters’ centers. It is carried out sequentially from the root to the leaves of the constructed fuzzy decision tree. The proposed rubrication method is programmatically implemented and tested in the automated processing and analysis of appeals (applications, complaints and suggestions) of citizens entering the Administration of Smolensk Region. This made it possible to ensure prompt and high-quality updating of rubrics and document analysis under conditions of non-stationary composition of the thesaurus and the importance of rubric words.

Software engineering

Routing protocols of wireless self-organizing networks, also called ad-hoc networks, perform the functions of them organization, such as determining connections and building routes between nodes. The quality of the networks of this type is signifi ntly influenced by the selected parameters of these protocols. The use of most of the protocols under consideration suggests that they will be set up immediately before the ad-hoc network is functioning, and they will be saved throughout its exploitation. However, to date, there are no unifi methods for selecting the optimal protocol parameters in practically signifi situations, and the use of arbitrary parameters can caused to a large number of network failures. The purpose of the study is to increase the speed of deployment of ad-hoc communication networks by automating the procedure for tuning protocol parameters, which underlies the organization of data transfer. To solve this problem, a generalized method for determining the parameters of routing protocols was used, based on the heuristic optimization algorithm, Fish School Search (FSS) method. During the study, a software development method for optimizing the configuration of top-level protocols in ad-hoc networks was presented. Using this method, software is implemented that uses a simulation model of wireless self-organizing networks based on the OMNET ++ network simulator. A study was conducted on the effectiveness of using the developed software for setting the parameters of the AODV protocol, which confirmed the high efficiency of the proposed approach in practically significant situations of deployment of wireless communication networks.

Virtual reality

At present, not everyone has the opportunity and desire to visit museums for any reason. Therefore, virtual museums will be able to solve this problem, as almost every resident of the Earth has a compact gadget with access to the Internet. As a result of the analysis carried out, it was revealed that 3D museums are critically small compared to panoramic virtual tours. Therefore, the creation of 3D museums will be actal for several more years. The article presents the stages of creating a 3D museum of musical instruments of the peoples of North Asia. Provides analysis of existing 3D museums, selection of 3D editor and development environment. 3D museums allow for complete freedom to visualize the museum ‘s contents and to make a detailed overview of musical instruments. An even more important reason for choosing this technology is that there may be distortions and disadvantages on spherical panoramas when shooting, such as the photographer ‘s refl on mirror elements or the entire fragment of the panorama has disappeared due to the uneven horizon when shooting. The 3D of this technology will help to rethink the representation of various cultural objects (museums, libraries, exhibitions, etc.), expand ways to perpetuate the main attractions of cities. A cross-platform Unity development environment has been selected to create a 3D museum, allowing the project to be moved to diff system shells in the future using the 3D API WebGL. Blender was used to create 3D objects. Aft downloading the 3D of the museum on web hosting, a user with a modern gadget and a current browser located on the Internet will be able to visit the museum from any corner of the world.

Laboratory

Models and Methods

Modern organizations are forced to operate in a dynamically changing external environment with a high degree of uncertainty, which causes diffi in developing an enterprise strategy. Since most of supporting methods for strategy formulation, created as part of strategic management, have a rigid prescribed structure, they cannot be adapted to make strategic decisions in an environment where the amount of information and relationships that must be considered for effective management has increased many times compared with time when these methods were created. The main purpose of this study is to expand the supporting toolkit for strategy formulation through models and methods generated in such disciplines as knowledge engineering, artificial intelligence, operations research and enterprise modeling. The article considers the process of strategy formulation from the point of view of strategic problem solving and strategic decision-making, which can be considered as working with knowledge - capturing, structuring, transmitting and using them. In the course of the study, an integrative literature review was used, which made it possible to identify a number of models and methods potentially applicable for strategy formulation, and a new formal-logical classification of models and methods depending on the degree of their formalization was developed. The proposed classification allows to identify three main groups of models and methods: informal, semiformal and formal, and it can serve as a conceptual basis for building a methodology for choosing tools for supporting the enterprise strategy formulation and the development of information systems.

Information security

Data protection

Implementation of the infrastructure of modern organizations based on information technology plays an important role in the formation and development of complex management structures. The various tasks that organizations face require continuous and constant growth of quantitative indicators of the eff eness of these organizations as part of the daily tasks of forming and modernizing new activity models. The signifi of this leads to the need to analyze further possible ways to develop the information infrastructure, which is reduced to separate, allocated computer nodes. Information circuits of modern organizations include a large number of computer nodes. These computer nodes are vulnerable to unauthorized attacks. Such attacks lead to deterioration of their basic nodal characteristics. Deterioration aff the economic performance of organizations. The aim of the work is to develop an analytical model of a computer node and to formulate an optimization problem based on it to adjust the node parameters. An approach based on analytical modeling is considered. The approach allows you to adjust the parameters of the computer node. This adjustment can compensate for incoming unauthorized intrusions. The approach is based on the use of queuing systems. A multichannel queuing system with buff is considered. On the basis of its analytical model the optimization problem is constructed. The solution of the optimization problem with the use of known methods allows to obtain the required parameters of the computer node. Their installation is a necessary adjustment to compensate for incoming unauthorized intrusions. The resulting approach allows to control the computer node when changing the input fl w of applications. The performance value determined by the formulas obtained in the article is the optimal performance value of the computer node. This value can be set by the node management tools on it, depending on the intensity values obtained from the node monitoring subsystems.

The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the Russian Federation. To do this, we analyze statistics on information leaks, explore the prospects for implementing new features of DLP systems based on modern information technologies (BigData, IOT, artificial intelligence and machine learning), and consider ways and means of integrating DLP within complex information security systems (SSI) in accordance with the requirements of the main regulatory and methodological documents of the Russian Federation in the fi of information security. To solve these problems, methods of analysis, synthesis, system analysis, formalization, comparison and analogy are used. Import substitution, digitalization of the economy, ensuring the security of critical information infrastructure, as well as the need to control automated systems, communications and users in distributed work in the context of a pandemic that has caused requirements to restrict personal contacts are considered as the main drivers of development for both information security and information technologies. As a result of the analysis, the most priority areas for the development of automated systems for monitoring information flows were identified: analytics, data visualization, system integration, behavioral analysis of threats to information security.

IT-MANAGEMENT

Performance management

Author: D. Isaev

At present, performance management systems are extremely important for enterprises and organizations of diff industries, as a tool for fi the gap between strategic planning and operational activities. Because of indirect and uncertain nature of economic benefi obtained from such systems, traditional investment appraisal methods are inapplicable for evaluating their development programs. Therefore, implementation and adoption of performance management systems require special measures characterizing both fi expenditures related with development programs and non-financial results. For this purpose, a system of measures of performance management systems development is advanced in this article. All the measures are subdivided into three groups - effectiveness (results obtained), economy (financing and resources used) and efficiency (relations between the results and resources). The measures characterizing development results are based on the performance management maturity model that expresses the systems’ maturity according to a set of pre-defi qualitative threshold levels. Various types of values of the measures are applicable on diff stages of the management process. Particularly, targeted values are used as requirements to development programs on the stage of forming potential alternatives and their assessment. Modeled values are related with discrete-event simulation of potential programs, for their comparison and selecting one of them for implementation. Planned values are applied when launching the development program selected. Forecasted values are useful on different stages of the program’s implementation. Finally, actual values are used for summarizing consequences of the program that is partially or fully completed. The significance of the proposed measurement methodology is explained by its role in the general process of performance management systems development.