+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№1(79) January-february 2019 year

Content:

IT business

Market analysis

We employ a contemporary set of sentiment analytics methods for the dataset of Russia-related news texts and compare a variety of sentiment dictionaries as applied to the news texts. In this paper we evaluate the applicability of the AFINN, NRC, Loughran and McDonald dictionaries to determine the impact of the sentiment polarity on the stock and foreign exchange markets. The dictionaries are selected due to their applications in the area of textual analysis and the number of sentiments polarities classes they cover. The empirical basis of the research is the 2,5 million Russia-related news texts, acquired via the Thomson Reuters authorized sources for the period from January 2012 to June 2018. Based on the textual analysis method known as the «bag-of-words» we evaluate the polarity of each of the news texts with the use of all selected dictionaries. The correlation of oscillating polarities and the major stock market indicators is determined. We show that the Russia-related news sentiments demonstrate substantial impact on the stock markets. In addition, the negative news polarities predominantly affect the markets being a major media factor for the market players. The NRC Emotion Lexicon dictionary fits best the sentiment analysis of the Russia-related news.

The competitiveness of a company is influenced by many factors. A person, very often, cannot effectively take them into account and make a balanced solution. This fact negatively impacts on business. One way to correct the aforementioned situation is the usage of artificial intelligence, in particular, Data Mining. Russian companies, unfortunately, rarely use the technology. The purpose of the paper was to demonstrate the capabilities of Data Mining in terms of improving the company’s competitiveness. To the effect, a file with depersonalized client information of a real telecommunications company was used. In addition, the authors analyzed the prognostic abilities of Data Mining methods to identify the one that best suits for the specified subject area. In this paper, using the Orange analytical system, six methods were tested: «Decision Tree», kNN, «Random Forest», SVM, «Neural Network», and «Association Rules». Each of them was tested in two stages. At the first stage, with the fixed values of the «Evaluate» widget settings (see Table 3), the prognostic model of the selected Data Mining method was studied. At the second stage, the values of the «Evaluate» widget settings (see Tables 4 and 5) were changed, and the values of the predictive model settings were fixed (most effective values of the settings from the previous step was used). An F-measure was used to evaluate the model’s performance. As a result, it was found that the «Random Forest» and SVM are the most preferred methods.

IT and education

Training technologies

The use of computer simulation technology in the educational process is the key to improving the quality of education. It affects the relevance of modeling technical systems and processes using the tools of the game engine Unity 3D. Unity is a professional multiplatform game engine and an integrated powerful game editor created from the very beginning to facilitate the creation of animations. This engine is something like a constructor, as there is a great editing environment with a convenient user interface that allows you to create an animation visually. The visual model is a set of software tools that allow you to simulate the work of the object under study and the individual elements that make up it. As such a tool for creating visual models, it is proposed to use the graphical tool Unity, propose to use the graphical tool Unity, designed to create interactive and multimedia applications. The task is to simulate the road crossing and operation of the cameras. This article provides visual tools for developing and visualizing interactive 3D projects in Unity3d in real time, including C# scripts. Demonstration a specific example of a typical situation in Unity3d using C# programming with their analysis. The result of the work is the created scene, which displays the details of this section of the intersection of roads. With the help of this illustration, students develop model thinking and focus their attention on the phenomenon under study.

Educational environment

The article is devoted to the problem of fresh IT-graduate’s unemployment. This problem is not specifically Russian. The increase in the number of students receiving higher education has a significant social impact. However, higher education requires significant investment by both the state and students. The lack of demand for young professionals in the labor market leads to social tensions and the inefficiency of investing budget funds. Using the statistic data, the authors analyze the reasons for career failures of young IT-graduates, despite the fact that there are enough vacancies for them. The graduates’ access the labor market depends not only on the objective economic factors, but also on how they are trained to work in real life. The authors consider various measures taken by the interested parties of this problem — by the state, universities, employers and graduates. The state is trying by legislative measures to reduce the number of budget places or to return the institution of compulsory distribution of graduates. Higher education institutions opened to innovation are trying to reduce the cost of education and attract business to teaching in the basic departments or targeted educational complexes. The employer accepted the fact that every young graduate recruited must undergo retraining before starting work. Students try to find a job and start working during full-time education. The pros and cons of these initiatives are discussed.

Software engineering

Algorithmic efficiency

Author: S. Zhumazhanova

Biometrics is a field of computer science that studies the way of creating computer models of physiological (hand geometry, fingerprints, iris, etc.) and behavioral (signature dynamics, handwriting, gait, etc.) human characteristics for identification of one or several subjects, as well as their psychophysiological state. Thermal imaging methods are perspective from this point of view for monitoring of subjects’ state. The result of recognition of the subject or their state depends on the effectiveness of each stage of the identification system. This article provides an overview of the results of research on the automatic recognition of subjects’ states using thermal facial images, focusing on the used identification features and the most promising decision-making algorithms. Nowadays, «deep» neural networks are becoming popular. Results of research show that this network architecture is not optimal. «Wide» neural networks, built on the basis of various functionals, have advantages over «deep» neural networks. Some proximity measures work more efficiently with features that have a high crosscorrelation, while other functionals focus on its absence. Experimental data confirm the effectiveness of «wide hybrid» neural networks consisting of subnets of various functionals and capable of training from a small number of examples of biometric images. The task that needs to be solved is to test such networks on the identification features of thermal images of the face and neck regions.

In linear structures routing we have the following problem: find the extremal of given functional, i.e 2D or 3D curve, which must consist of a special type elements. The parameters of elements are limited and their number is unknown. At first we must determine number of elements and after this we can find their optimal parameters.In the case of 2D extremal we shall consider a broken line and parabolic spline. The broken line is used as a longitudinal profile of railways and the parabolic spline is used as a longitudinal profile of roads. Initial problem was solved as multi-stage process using the methods of dynamic and nonlinear programming. On each stage we consider the different mathematical models of unknown extremal line: 1. A broken line with short elements similar to longitudinal profile of ground. This model allow us to find the initial approximation of unknown line using nonlinear programming. 2. The result of first stage give us opportunity to find number of elements using dynamic programming. 3. We use a special algorithm of nonlinear programming for solving initial problem with fixed number of elements and the result of second stage as initial approximation. In this article our purpose is to give a new algorithm for transformation a broken line to another line, which is the following spline: straight, clotoida, circle, clotoida, straight and so on.This algorithm is one of the implementations of dynamic programming. It can be used both in the design of new roads and in their reconstruction, as well as in the design of trenches for pipelines of various purposes.

Information infrastructure

In the near future, the development of industry based on the mutual penetration of industrial and information technologies is predicted. For large-scale industry, it is planned to widely introduce cyberphysical systems into factory processes, which are the result of further development of information technologies. At the same time, the introduction of innovative technologies can have both positive and negative effects on the activities of the enterprise (organization), and the task of managing the choice and introduction of new technologies arises, taking into account their features, capabilities, usefulness and consequences of implementation. The purpose of this article is to analyze the development of new technologies — Internet technologies, artificial intelligence, augmented reality, etc., and to substantiate the hypothesis about the possibility of using the concept of cyber-physical system as the basis for the emergent properties of technologies, that is, the emergence of new quality. The proposed concept can be considered as a means to resist undesirable results, since the Cyber-physical system, combining new technologies and the physical element (who make decisions on the selection and implementation of innovations), is developed not as separate technologies, but as a system, which the that involves the control of a complex of technologies, and one can hope that that the physical element, that is the person will retain the control functions. When developing models to analysis and control the choice of innovative technologies on creating cyber-physical systems for specific enterprises and organizations, it is proposed to use systems theory and systems analysis methods.

Laboratory

Models and Methods

Author: O. Tikhanychev

One of the main problems of using automation tools — assessment of the expected effectiveness of their implementation. In full, this issue applies to support automation of decision-making. Currently, there is a fairly wide range of tools to assess the effectiveness of the control system operation, but none of these tools do not provide a comprehensive integrated assessment on the criterion of «cost — effectiveness ». This is a significant problem, which hinders the development of automated decision support systems and their implementation in practice of management. The paper proposes, based on the methods of similarity theory, used to evaluate the effectiveness of management automation device control theory. An example of a practical calculation of management efficiency. Analysis of testing results show the practical applicability of the proposed method of calculation and the ability to use it to evaluate ways to improve the effectiveness of management automation. The proposed method is not just a theory, its practical application is to provide an operative evaluation of options for the development of management automation. Implementing the proposed approach in the long term, serve as an impetus for the practical implementation of decision support systems.

Authors: A. Gavrishev, A. Zhuk

In this paper, the authors continue the experimental analysis of secure communication systems from [5] using other known methods of nonlinear dynamics, namely, using recurrence plots. The time diagrams of the signals transmitted in the communication channel [5] and the corresponding recurrence plots are given. Their similarity to «white noise» is noted (except for the case of a communication system based on chaotic masking, which uses the Rossler attractor as a generator). The obtained data are consistent with the data obtained in [5]. Also, the simulation of communication systems with simple signals on the example of a sine wave was carried out. The analysis shows that the communication systems with simple signals have obvious structure and are potentially detected by recurrence plots. Thus, qualitative analysis based on recurrence plots allows to determine the communication system with simple signals and communication systems based on noise-like signals, as well as to detect the structure for some communication systems based on noise-like signals. However, it does not sufficiently distinguish between classical communication systems based on noise-like signals and communication systems based on chaotic signals. It can be concluded that recurrence plots should be used in combination with other known methods of nonlinear dynamics (time and spectral diagrams, phase portraits, Hurst exponent, maximal Lyapunov exponent, BDS-statistics) and their joint use will allow more adequate analysis of secure communication systems [4, 5].

The article is devoted to the current problem of sharpening the reproduced image. The article describes the processing of image information with the aim of sharpening. To increase the sharpness of the image, it is proposed to use the method of selection of the contour information of the original with its subsequent preservation and combination with the original image. To highlight the contour information offers the choice of the optimal operator for image segmentation. Image segmentation using information extraction operators was carried out in the MATLAB software environment. The work investigated the quality of the Sobel operator, the Prewitt operator, and the laplacian gaussian, since other operators do not meet the necessary requirements for the accuracy of contour reproduction. To assess the quality of work and accuracy of reproduction by the operators of part contours, a test object was created and used, which was created using the Adobe Illustrator software environment. The article presents the main stages of the proposed technique: image discretization, selection of contour information, combination of contour information with the original image. As a result of the work carried out, the criteria for obtaining contour information were determined, at which image sharpness would be enhanced: high resolution of the original source; lack of coarse discretization of contour lines; precise alignment of the contour information with the original image. For the selection of contours, the Sobel operator was chosen as the most accurately selecting contour. For the selected images, the proposed method is applied, prints are obtained. Prints are evaluated by a group of experts. Expert evaluation of impressions shows that the use of methods to improve the sharpness of the image gives unambiguously positive results.

Information security

Data protection

This article is devoted to a preventing of harmful information spreading in social networks. Currently, social networks are widespread. Their popularity is growing every day. For this reason, they can be used not only by managers and marketers for the dissemination of advertising, product promotion, but also attackers for the dissemination of prohibited information. So it is necessary to predict harmful information propagation and intervention. One of the ways to solve this problem is to model social networks. This paper examines the main approaches to social network modeling as well as the domain of their application and practical results. Two approaches: static and dynamic are considered. Static approach suppose an analyses of the structural characteristics of the online networks. Dynamic approach considers changes in networks and characteristics depending on time. Dynamic approach (agent based simulation) may examine the diffusion of information in online social networks more adequately and more precisely. Authors discuss several problems dealing with social networks and several examples of these problems decision. In addition, the simulation toolkit Triad.Net is considered. Simulation toolkit allows to analyze the structural characteristics of social network and to carry out simulation experiment and fulfill an analyses of the dynamic characteristics of online social networks. And in conclusion authors describes a problem of a preventing of harmful information diffusion and discuss how to solve this problem using simulation toolkit Triad.Net.

This article describes a trend of DDoS-attacks development, gives classification of such attacks and specifies some of the most popular types of DDoS-attacks. Also, this work looks statistical methodologies of analysis of malicious traffic, which can be used in modern security provision systems. Methodology, which based on multiple simulations with neurolink models, was chosen as a main in this article. The major problem of this study is to develop an architecture of such models and choose the most perspective with an assessment of the adequacy of this model. The purpose of this article is to gaining results of use neurolink model in case of classification of DDoS-attacks. Thereby, based on the raw data that were obtained through multiple simulations of different types of traffic, we found the most perspective architecture of neurolink model that has both: the least complex learning sample and at the same time provides high quality of classifying traffic. On the basis of results, which were gained as a result of work with developed mathematic model and assessment of its adequacy, we can approve that considered methodology carrying out its purpose, classification of DDoS-attacks, completely, and could be used in security algorithms or that kind of software.