IT management |
|
Performance management |
|
|
This article describes the construction of an expert-diagnostic system (EDS) for analyzing the precrisis
enterprises state of the metallurgical complex using growing pyramidal networks. The development
took into account the analytical results of the main trends in the metallurgical complex of the
Russian Federation development. The use of growing fuzzy pyramidal networks is justified quite reasonably.
The features of computer technology for obtaining expert opinions are considered. Scheme
for combining MatLab modeling software with an expert diagnostic system in the Caché DBMS is
given. The diagram of the main classes in the expert-diagnostic system is considered. Designing and
developing an expert diagnostic system is a technically complex and time-consuming process, involving
the use of intelligent methods for analyzing weakly structured expert information. Therefore, the
search for solutions that reduce the complexity and complexity of the process of design and practical
development of EDS, is currently one of the priorities of the developers involved in this specific area.
Using a growing fuzzy pyramid network based on various financial and economic indicator's analysis
of an industrial enterprise, it is possible to promptly determine the time to reach the pre-crisis state and
develop further actions with the specified enterprise aimed at overcoming crisis situation.
|
---|---|
Software engineering |
|
Algorithmic efficiency |
|
|
The article deals with the problem of protecting information from the threat of unauthorized access
(theft, destruction, modification). A method of biometric authentication by keystroke dynamics using
an artificial immune system is proposed. Keystroke dynamics is a characteristic dependent on the
time and state of the operator. A feature of the approach is the use of a new architecture of computing
elements (detectors) at the core of the immune system. The detector is a separate measure of proximity,
which determines the distance to the template in the space of only a part of the possible features.
All detectors differ in “interaction interfaces” with a recognizable sample (a set of processed features)
and the principle of sample processing (each detector can be based on a separate measure of proximity).
In the aggregate, the detectors verify the biometric samples for belonging to the classes “Own”
or “Alien”. The developed artificial immune system (network) is capable of self – learning, each authentication
increases the reliability of its solutions. Also, an artificial immune network can determine
the degree of aging of the template and the fact that the user is authenticated in an altered functional
state. This information can be used in the implementation of access control procedures. The experimentally
achieved reliability indicators for solutions EER = 1.5–4% (depending on the state of the
subject). The comparison of the obtained result with the world level in this area has been carried out.
|
Network Technologies |
|
|
The article discusses the features of the permissions system in the BlockSet project. Its principles
is shown both from the position of administration and from the position of its internal organization.
The authors have shown the possibility of implementing access control of various levels of complexity
with simple and accessible tools of the BlockSet project. In the classical development of a dynamic
web-application, the obvious solution is often to write the business-logic of permissions as part of the
server side itself, that is, such code will be written in advance taking into account the specificity of
the resource being developed, will have opportunities, the need for which was described in advance
and, perhaps, can afford the disadvantages, the presence of which will not be so critical due to the fact
that it was determined in advance again which aspects of the final system would not be so important.
The complexity of developing such system for big projects like BlockSet lies precisely in the fact that
the requirements are not known in advance. And considering the paradigm of flexibility of this project,
it is necessary to take into account all, or almost all possible requirements for creating such systems
and create tools for their implementation. To solve the problem of flexibility, the stored permissions
are located directly in the database itself so that each piece of information can be associated
with a separate set of permission properties. For storage of such a complex structure PostgreSQL is
used. It uses composite data types that allow avoiding high productivity costs when storing structures
in the JSON form when creating additional entities. Thus, all attributes except primary keys are composite
and consist of a block of information value of the required data type and two blocks of rights:
dynamic dynamic_p, described below and static static_p, the data type that stores an array of strings.
Due to the possibility to set a separate set of permissions for each piece of information, the necessary
flexibility is achieved. However, if we’ll take an analogy with users and groups, permissions set
for each cell is a very time-consuming and inefficient practice in most situations. To refer to a group
of blocks, there are simultaneously block-interfaces and dynamic permissions. The usage example is
very simple. With the task to create a forum, it may often be necessary to manage all the posts of the
same topic simultaneously. The permission system in the BlockSet project allows describing in detail
the distinctions between operations and rights over various pieces of information between users and
groups, which corresponds to the project’s paradigms on flexibility and low entry threshold, and also
significantly optimizes the development process.
|
Algorithmic efficiency |
|
|
Lighting devices represent a wide group of lighting products, the main role of the optical system
is to perform the redistribution of light from a light source. Optical calculation of such systems is reduced
to tracing the light rays emitted by light sources, based on their geometric models. The analytical
approach can be used only for very simple forms of optical systems. For the demanded LED lighting
devices, lenses and reflectors are used as optical elements. They allow to obtain various radiation
patterns of LEDs. However, their shape can be very complex. In this case, to simulate the propagation
of radiation in the form of ray tracing, it is advisable to use specialized algorithms. For ray tracing, a
preliminary approximation of the surface by triangular elements is needed, as a result a triangulation
grid is obtained. The search algorithm for the intersection of the ray with the surface is reduced to a
sequential enumeration of all the triangles that make up the optical system of the device, and checking
for the intersection of the ray with the current triangle. The algorithm consists in repeated simulation
of random ray trajectories in the studied medium. The article is also devoted to the description
of the developed algorithm for ray tracing in the optical system and aspects of its implementation in a
C# program. The described algorithm is accompanied by listings and schematic images. This method
allows you to simulate the interaction of light rays with the optical system of the light device and to
obtain the desired light distribution.
|
Information infrastructure |
|
|
The article is devoted to the study of various methods of payment fraud in online trading, which
are most common in recent years. The paper describes the features of various types of fraud, effective
and popular programs to prevent fraud in online trading, and investigates the characteristics of the
programs to track suspicious transactions. The article is intended to form an idea of the most common
methods of payment fraud in online trading and a set of measures to prevent them.
The development of modern information and computer technologies affects all spheres of human
life and activity. And even traditional trading is increasingly shifting towards online trading, leading
to various ways of scamming online trading. Fraud in trade is called payment fraud, which refers
to any kind of illegal or improperly executed transaction. Payment fraud is a long-standing problem.
For quite a long time, the favorite method of fraudsters was the theft of a Bank card and subsequent
purchases using this card. This is still happening, but a relatively new type of fraud — online trading
fraud — is becoming more common. There are many schemes of fraud in online trading, some of
which can be called advanced and difficult to prevent, so it may seem that the losses of online stores
in connection with the activities of scammers are inevitable. But modern transaction monitoring technologies
and an advanced authentication system can allow companies from the online trading sector
to minimize these losses.
This article analyzes the different ways of fraud in online trading, their main features. The purpose
of this work is to identify methods of detecting fraud in online trading and develop a set of measures
that can help to track and prevent this fraud. The object of the study are the processes of fraud.
The subject of the study is the methods of fraud detection, and measures to track and prevent fraud.
|
|
About 40 years ago, scientists began to think about the consequences of combining quantum mechanics
with a classic Turing machine. Today, before our eyes, a new era is emerging in the field of
information technology, based on the power of quanta. In the paper a brief bibliometric analysis of
the development of research in the field of quantum information processing for the period 2000-2017
is presented. The main global players (countries and groups of countries), as well as sources of sponsorship
of published results are identified. The twists and turns in course of ongoing scientific rivalry
are shown, including benchmarking of Russia against its main competitors. It was established that,
despite the seemingly high level of confidentiality, extensive international cooperation is typical for
research in the field. Considered domestic research landscape. A significant concentration of research
in metropolitan research centers, which is characteristic for this emerging field has been shown; identified
the ten most productive domestic organizations, as well as the scientists who made the largest
publication contribution. The intensity and characteristic structure of international co-authorship
links of Russian scientists, as well as the main domestic and foreign sources of research support are
revealed. Information for analysis is obtained from the most authoritative in the world polythemic database
Science Citation Index Expanded.
|
Simulation |
|
Actor modeling |
|
|
The article discusses some new results obtained in the problem solving process of developing new
tools for assessing the viability of large innovative multiprojects in the metallurgical industry for the
new metal products issue. Accordingly, methods have been created for predicting the performance indicators
of enterprises participat-ing in such multiprojects. The results obtained are important to development
of economic-mathematical and instrumental methods for analyzing the effectiveness of
in-novation in the dynamic environment. A model has been created for the implementation of a large
innovative multiproject as part of the new metal production creation with the ability to carry out this
project stages by several participants. An assessment was made of the various components of the metallurgical
enterprises innovation potential and their external environment using dynamic growing pyramidal
networks and Kalman filtering. A computer actor-simulation model for implementation of
the organizational stage of production in the metallurgical complex has been developed. An organizational-
computational procedure and an information system for decision-making support to managing
a large innovative multiproject in the metallurgy and approving technical tasks for its subprojects. An
organizational-computational procedure and an information system for decision-making support to
managing a large innovative multiproject in the metallurgy and approving technical tasks for its subprojects.
The created economic and mathematical tools were used to develop recommendations for
the implementation of an innovative project carried out at the stage of semi-finished production for
future metal-made products.
|
Laboratory |
|
Models and Methods |
|
|
Industrial high-performance routers are essential components for building secure networks for remote
control and monitoring of industrial facilities. The main function of the router is to read the packet
headers of network protocols received and buffered on each port, and decide on the further route for
the packet to follow its network address, including the network number and node number. This article
discusses the mathematical model of the processing of segments in the router (switching node). In a
fully accessible switching circuit, any input can be connected to any output if the latter is in the idle
state (not busy servicing any call). In incomplete schemes, this condition is not fulfilled, all inputs
and outputs are divided into groups, and certain groups of inputs have access (connectivity) to certain
groups of outputs. If the description of the switching node from the specified positions requires only
knowledge of the number of inputs and outputs, then the description of the switching system of incompletely
accessible circuits indicates the number of groups of inputs and the ability to access certain
groups of inputs to certain groups of outputs.
|
|
The article is devoted to the current problem of the study of moiré formation in the reproduction
of information using software methods. As a result of the study, the structures that cause the greatest
appearance of moiré when rastering the image of the test object were identified. Also, the main regularities
were revealed: strong noise of raster structures leads to loss of the image of the test object; the
spectra of fields with noticeable moiré formation are modified due to the appearance of extra harmonics,
independent of the semantics of the image; the more clearly and noticeably moiré in the image, the
more the spectrum view changes, in which additional spectral lines appear; the smaller the difference
between the optical density of the background and the optical density of the stroke, the more structural
transformations caused by the interaction of the lattice and raster structure. On the basis of the
study, the following conclusions were formulated: the use of an irregular raster structure leads to the
absence of moiré in the image, blurring on the spectrum; the appearance of moiré when rastering the
test object with stochastic structures indicates the presence of a regular component in them. In addition,
the field was identified, while maintaining the bar structure, periodicity, lionachescu on the spectrum.
|
|
The main direction of increasing the efficiency of computeraided design and, in particular, the design
of Railways is the development of scientific methodology for the application of new technologies
in the design. The purpose of this work is to expand the capabilities of computeraided design (CAD)
systems by using three-dimensional terrain models to assess the volume of soil in the process of construction
of the roadbed of the railway section. Despite the presence of a sufficiently large number of
CAD in the design of the roadbed, the methods used in them for calculating the volume of excavation,
do not take into account the peculiarities of changes in the parameters of the railway, especially on the
curves in the plan and profile. A significant disadvantage of the known methods of estimating the volume
of excavation is that they do not take into account the influence of complex geometric shapes of
the construction of the railway roadbed. In addition, these systems do not have methods for processing
three-dimensional terrain models built on the results of aerial photography using laser scanning
technology. Since the methods for calculating the volume of excavation work on three-dimensional
models of the terrain is quite time-consuming, their implementation should be carried out using computeraided
design (CAD), which requires the development of appropriate mathematical and software.
Three-dimensional terrain model using gives more accurate results in the calculation of the volume
of excavation compared to the results obtained using geodetic plans of the terrain. At the same time,
the use of three-dimensional models in CAD can improve the performance of design work, as well as
reduce the likelihood of errors at the design stage. Further increase in the efficiency of three-dimensional
CAD for earthworks can be achieved through the use of reference and guidance materials as input
data, as well as through the introduction of expert systems based on the experience of designers.
|
Information security |
|
Data protection |
|
|
The relevance of the work lies in the need to create security systems for critical information infrastructure
of the Russian Federation, first of all — the process control system of critical and potentially
dangerous objects, computer incidents in which can lead to catastrophic consequences, including the
death of people. At the same time, such a security system should not have a negative impact on the
APCS, and both systems should be functional at the same time. The problem lies in the lack of methods
for integrated assessment of compatibility of means of information protection and control systems for
engineering systems of safety of objects of critical information infrastructure. A method of assessing
the compatibility of information security and APCS by cross-testing using programs and test methods
used in the acceptance of such systems. The practical results on the evaluation of compatibility of information
security tools with process control systems of different vendors in the course of testing on
the stands of process control systems manufacturers and industrial enterprises. Information security
equipment manufactured by JSC InfoWatch: InfoWatch ASAP, InfoWatch Traffic Monitor, InfoWatch
EndPoint Security on the equipment / software of the following vendors were tested: Schneider Electric,
Klinkmann, Siemens, «modular Tornado systems», AMT-Group. The methodology used for the compatibility
testing of information security tools and control systems understandable to the producers,
and they have taken. The compatibility statements published by the manufacturers of the APCS hardware
and software confirm this. Potential customers and engineering companies that produce, implement
and provide technical support for APCS are also actively involved in the tests.
|