+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№2(80) March-april 2019 year

Content:

IT management

Resource management

Authors: G. Ross, A. Emelyanov

The analysis of the problems arising while creating new information technologies for forecasting economic processes of financial bubbles controls based on simulation models is carried out. The need to develop such technologies is caused by the growing influence of financial bubbles in the economy, primarily digital, which use artificial intelligence and the Internet utilizing raw data. The proposed information technology is justified by theoretically grounded models as well as decision-making methods and techniques. The proposed approach is based on the theory of equilibrium random processes and nowadays approaches for measuring and managing financial bubbles are suggested. In particular complex simulation model of economic agents based on technology of an evolutionary-simulation model approach is introduced. This approach provides the framework within which a set of interconnected simulation models and algorithms for optimizing the risks in the dialogue mode is used. To calculate a financial bubble share an indicator SFB (share of financial bubble) that measures the share of the secured portion in the nominal value of a currency or security is suggested. This indicator can be used as a basis for information technology for managing financial bubbles. Finally, some solutions of the current Russia economic problems based on financial bubbles control are considered.

Market analysis

The work is devoted to the analysis of the modern market of mobile applications for business. The purpose of this study is to identify promising technologies for developing mobile applications for business, to study the directions for the development of mobile business applications. For this, the state of the market at the moment, its development and prospects were considered. The analysis of the dynamics of the development of the Russian and global market of mobile business applications has been carried out, the most significant developments in this field today have been considered. The main advantages and disadvantages of existing solutions are identified. According to the results of the analysis, a universal approach was proposed that allows the use of mobile applications in conjunction with desktop information systems to improve overall business performance. The demand for this study lies in the fact that currently there is an active digitization of society, increasing the mobility of members of society, as well as the need for new and modern technological solutions. The scientific novelty of the work is to justify a new approach to the development of mobile applications for use in conjunction with existing systems for automating business processes and business functions, which consists in separating the data presentation tools in a mobile application from the business logic of interacting systems. The proposed approach to the development will allow the use of the mobile application in different directions and areas of activity, since it provides flexible customization for any end user requests. Due to the potentially large interest from users, the proposed approach will reduce the price for a single application — due to the expected popularity of the product and the breadth of its distribution.

IT and education

Educational environment

Author: S. Petrov

The purpose of the article is to provide the reader with general information about the capabilities and interrelationships of the program modules that are part of the «Orders» system, developed and implemented at the National Research University «Moscow Power Engineering Institute» (MPEI), to automate the preparation and approval of orders. The text refers to the growth of the russian market of electronic document management systems (EDMS), as well as an increase in the interest of universities in the solutions of such a plan. The examples of the most popular EDMS and projects of their implementation are given. The references to examples of universities own developments as applied to the problem of electronic document circulation are given. The workflow specifics of orders are noted, consisting in the need to automatically generate the text of the document, and after coordination to update the related data in the information systems (IS) of the enterprise. These features make it difficult to use the «boxed» EDMS presented on the modern market. As a solution to the problem, the software system «Orders» and its constituent modules are considered: template editor, route editor, order editor. The template editor is used to create templates for order paragraphs, the description of which includes components (text template), parameters (user-defined fields), executors (instructions for updating data), and operations (auxiliary functions). The route editor provides the formation of valid routes for order coordination. The order editor uses the prepared templates and routes, dynamically forms the user interface for entering parameters, allows to generate an order text and to pass an order along the route, and executes instructions that make changes to the IS according of the order. Separate copies of the presented solution cover three IS functioning in MPEI for several years. This fact confirms the theoretical and practical significance of the developed mechanisms.

Software engineering

Software development technologies

Author: N. Prokimnov

An approach to the construction of a technological scheme, data base and application support for organizing the processes for inventory and cataloging of the book fund as well as for managing use of the fund items is proposed. There are situations occurring in real life where some practical conditions may affect applicability of the methods commonly used for solving the underlying tasks. One of the restrictions deals with a situation when the fund owners need to developing bibliographic description of their library books written on different languages assume participation of external experts with knowledge of the language of publications. The proposed technology options for the implementation of this task complemented by a description of the principles of building an application that meet the established requirements provide the necessary support for the work of specialists involved in the preparation of the filing cabinet and further work with the reader contingent. Although the principles described in the paper were realized on MS Access they should be generally valid for other platforms.

Algorithmic efficiency

Algorithms of visualization of numerical data characterizing the state of objects and systems of various nature with the aim of finding hidden patterns in them using convolutional neural networks are presented. The algorithms used methods for obtaining images from numerical data on the basis of the discrete Fourier transform of time series fragments, as well as on the basis of the application of visualization using three-component system diagrams, if such a three-component representation of the system is possible. The software implementation of the proposed algorithms was performed in the Linux environment in the Python 3 language using the Keras open neural network library, which is a superstructure above the TensorFlow machine learning framework. For the learning process of the neural network, a Nvidia graphics processor was used that supports the technology of the CUDA parallel computing software and hardware architecture, which significantly reduced the learning time. The proposed approach is the recognition States of the objects according to their visualized data are based on the recognition of no boundaries or forms of the figures in the images and their textures. Also presented is a program that generates sets of images to implement the process of learning and testing convolutional neural networks in order to pre-tune them and assess the quality of the proposed algorithms.Keywords: Internet, Internet security, parental control applications, user security, information security, Internet threats.

Authors: G. Semenov, P. Keyno

The article describes the problems of scheduling systems development. The authors demonstrate complexity of feasible schedules generation for comprehensive technological databases. The study concluded that the task belongs to the class of non-polynomial complexity. The article formalizes the task to plan as a single mathematical model. Particular emphasis was placed on the fact that the mathematical model should have the property of practical problem solving. The main task is to minimize the project development time, and the main goal is to uniform loading of each resource in a complex system. This article proves that exact solution of mathematical optimization is not effective since it demands huge amount of computational resources. Authors demonstrate that genetic algorithm implementation allows to find approximate feasible solution. The authors concluded that it is acceptable to use hybrid algorithms to solve the problem. It is proposed to use heuristic methods to further improve the resulted mathematical model. Article also demonstrates how these modules are integrated into technological data visualization systems developed by them. The PrPlan software package allows interacting with existing systems in the enterprise and includes process data uploading interfaces. It can group process operations of the same type and ensure generation of technological solutions based on prototypes. The developed mathematical model and software will significantly optimize the technological processes in production and ensure a high level of stability in the performance of each operation. It enforces a significant economic growth and increase the efficiency of the enterprise in general. The developed mathematical model was successfully tested in practice in the developed PrPlan software package. Additional optimizations that can be implemented in the model can be equally well made in the algorithm of the software system. This will allow us to make changes quickly, without disturbing existing processes.

Network Technologies

Author: Y. Lavrenkov

The article discusses the design of a neural network system to determine the position of a source of information signals. Determining the coordinates of an unknown source is an important procedure in improving the efficiency of wireless electronic communications systems. Solving the problem requires overcoming a number of difficulties associated with the optimal reception of signals from sources, placement of elements of information transmission systems, and relative complexity of the meter, which includes means for converting incoming signals. The method of information processing is based on the use of systems having a variety of spaced reception points organized as a complex of receivers for remote data transmission. After passing through the group of functional blocks, the preprocessed signal from each receiver enters the computational module, which is based on a heterogeneous neural network. The neurocontroller is made of three types of neural blocks forming a threelayer neural network structure. The first layer is composed of oscillator neurons to maintain the constant functioning of two other types of neurons, the organization of which requires constant stimulation for the functioning of the entire network. The second type and third type neural network modules are designed as signal processing devices adding and cutting off harmonic components. The substantiation of the applied learning algorithm is performed and the effectiveness of the designed neural network information processing system is shown.

Laboratory

Models and Methods

The article characterizes and interprets the concepts introduced in the theory of the information field A.Denisov and the discrete version of this theory, which name– the informational approach to the analysis of systems: sensual information (perception information, element base, data), logical information (essence or information potential) and their logical intersection, which in theory A.Denisov corresponds to the category of information complexity, content, meaning. It is shown how these concepts arose in the theory of the information field as a result of two laws of reflection — sensory and logical, as they are interpreted in a discrete version of the theory. It is considered how the reflection of objects or processes goes through several stages. During their passage, the term “information” is used all the time, but until a more specific name of the perceived and / or transformed essence corresponding to a particular decision–making process is found. Understanding this process makes the available measures of information possible to more accurately use, as well as the mating terms “data (J) – concepts (H) –knowledge (C)”. Such approach allows to determine the measures which can be entered for measurement of the selected stages of information transformation based on deterministic and probabilistic approaches, choosing them taking into account specific objectives and the conditions of application of the theory of A.Denisov.

Theoretical approach

Artificial Intelligence

Author: O. Kultygin

Lately, more and more people are talking about the introduction of neural networks, artificial intelligence systems, and machine learning into various spheres of human activity. This involves new projects such as unmanned vehicles, DNA sequence decryption programs, vacuum cleaning robots, spacecraft robots, robots for functioning in harmful environments, human speech recognition systems, and human speech synthesis. But most often manufacturers of smartphones talk about using artificial intelligence in their new products. Currently, many smartphone manufacturers compete with each other in the market for goods and services, fighting for customers, seeking to draw attention to their products; they are conducting advertising campaigns in which they claim that their products have artificial intelligence. A processor with a neuromorphic module emulating artificial intelligence functions allows machine learning to be used and makes the smartphone as responsive as possible to user habits. A neuromorphic module can predict which applications the user will soon need, loading them into memory in advance and optimizing their work. That is, the advertised artificial intelligence is reduced only to setting up the user's habits using neural-like devices — neural networks. Now most of the portable devices that use machine learning, have a lack of capacity to run artificial intelligence programs, so they resort to using cloud servers. But the use of artificial intelligence programs that work autonomously can significantly improve the performance of smartphones, reduce the time delay between the user's request and the device's response to this request.

Information security

Data protection

Author: D. Denisov

In modern conditions of blurring the boundaries between the virtual and the real world, as well as the transition of virtual threats into reality, the issues of user security on the Internet are becoming increasingly important. This is especially true for children and adolescents who are at high risk because of their young age, lack of skills in safe behavior on the Internet, and lack of understanding of what moral and/or physical harm this or that information can cause. Therefore, parental control applications that extend and complement the capabilities of information security tools on the user's devices are in increasing demand. Basically, such applications provide: monitoring and limiting time of operation of the device, monitoring and restricting access to sites (by age restrictions, by type of sites, by forbidden words, black or white lists) and applications on the device, tracking the user's movements (for mobile devices), monitoring online, generation of various reports and statistics on the use of the device and Internet resources, remote control of the device. The article provides a comparative analysis of such applications, discusses the functional features of some of them, provides recommendations for the selection of parental control applications based on user requests, as well as determines the prospects for their development.