IT business |
|
|
|
|
The current financial and banking crisis has shown that even the largest banks in Russia that meet
all the requirements of the Bank of Russia, nevertheless, fall into crisis situations and suffer losses,
often experiencing insurmountable difficulties in settling debts and deal with creditors. One of the
most common reason is the inability to fulfill obligations is associated with a shortage of cash, so it
is important to monitor the commercial bank’s financial resources dynamics. The point is to study
the bank’s financial resources in dynamics. To solve it, an imitation model of the dynamics of financial
resources of a commercial bank is proposed, which takes into account four main cash flows: income
received under deposit agreements; Income received under loan agreements; Expenses on deposit
agreements; Costs associated with the issuance of loans. The model can be used to assess the
bank’s financial resources in a dynamic provided that it is possible to convert the time series characterizing
receipts and payments to a stationary type. This paper describes a simulation algorithm, describes
a software tool that implements the proposed algorithm, and approves the model. The proposed
model allows to assess the bank’s financial resources in a certain period of time and collect the
descriptive statistics of the distribution of financial resources. On the basis of the resulting characteristics,
we can conclude on the financial stability of the bank, assess the risk of entry into the zone
of financial unreliability (risk zone). To assess the risk of entering the unreliability zone, it is suggested
to use the risk factor for the release of financial resources below the critical level. The proposed
model allows to solve actual problems of evaluation, analysis and management of the financial
potential of a commercial bank.
|
---|---|
IT management |
|
Resource management |
|
|
Optimal asset management algorithm within 20 – 30 years period is proposed for enterprises that
have large tangible and intangible assets’ fleet including buildings, constructions, facilities, land
parcels, constructional projects, equipment units, software systems, data bases, etc. As an optimization
criterion a maximum total discounted profit for the period is selected. The development strategy
which will be selected must satisfy various constraints, reflecting the requirements of customers,
the environment, the regulators, the company’s owners and management. These constraints may
be financial, technical, market, environmental and other. The entire set of possible projects for the
acquisition, construction and commissioning of new assets, renovation and decommissioning of the
existing assets, as well as projects for the repair of assets and compliance with restrictions, actions
and maintenance works is divided into a collection of specially formed portfolios. Inside, all the elements
of the portfolios are ranked. Budgets of formed portfolios serve as control variables. The algorithm
involves the generation of variants of long-term development of the enterprise and iterate
over them in order to find a maximum of the total discounted profit for the whole period. Variants
determine terms of projects’ completion for the acquisition and construction of new assets and reconstruction
of existing ones. Then they are supplemented by the information about projects and
activities of maintenance and repair as well as constraint satisfaction. Each variant is divided into
yearly intervals, for which optimal internal supply chain plans are calculated. Feasibility assessment
of calculated plans is produced using simulation models, special models, models and methods
of predictive analytic. The architecture of the software system that implements the developed
algorithm is proposed.
|
|
The article considers the task associated with the analysis and evaluation of business processes steel
trading company the company’s implementation of shipments from the supplier’s warehouse and optimization
of the transport customer service in the most efficient way as the related services are the
main activities of the company with a software environment that allows you to create and explore a
simulation model of logistics processes. It is expected the implementation of enterprise services for the
provision of transport services and increasing their share in the total volume of shipments of finished
products to customers. In the suggested model of estimation of efficiency of organization of transport
service of the steel trading company subject to the restrictions on the existing capacity, traffic and intensity
of service with the use of computer systems. The model takes into account the dynamics of the
flow of finished product from production to the warehouse of the trader inside the considered transportation
network to further its implementation, shipment and export. The problem posed in the article
is solved by means of economic-mathematical modeling.
|
|
|
|
The paper describes principles of information risk management in conditional access systems
(CAS). The purpose of models is to justify the economical choice of options for an information
system to counter attacks, which in turn is a set of measures to counter attacks.
Proposed three models of constrained optimization and one of unconstrained optimization
system of protection against information attacks, which are a model of linear programming
with binary variables.
|
IT and education |
|
Training IT specialists |
|
|
With the advent of information technology has received big development and implementation of
electronic textbooks in the educational process. For the development of e-textbooks are used by various
software products. The article describes the process of creating electronic textbook, developed in
Microsoft Excel. The choice of this software due to its wide spread because the programs of Microsoft
Office are present in the software on most computers as well as higher and secondary educational institutions,
as well as the possibility of establishing the necessary elements of benefits of programming
in VBA. The electronic textbook includes tasks to transfer numbers from different number systems in
decimal, automatically checking the correctness of the solved tasks and visual process of solving each
task in a multimedia mode. Multimedia display is carried out by using program code that includes a
loop, which displays the contents of the cells with a time delay. This electronic textbook used successfully
in the study of positional number systems in the classroom for Informatics and mathematics. The
main advantage of the textbook is that its development is used widely available software Microsoft
Excel. The generation of the initial data random ensures that the individuality of practical tasks on
each computer in the class. The translation algorithm the number from a given base into a decimal
for each task can be viewed in multimedia mode, which allows you to use the textbook for self-study.
|
Educational environment |
|
|
Access control systems (ACS) currently available on the market are presented as universal. Initially,
they were developed without taking into account the specifics and problems of universities. Moreover,
they are self-sufficient and can be deployed and implemented without any integration with the corporate
information system (CIS) of the university. Many business processes of the university are built on
the assumption that the ACS operates with actual data during the deciding on admission.
The access system of the university when making a decision on admission should have up-to-date
information on the financial balance of residents and students on a contractual basis, acting as a powerful
tool that improves financial discipline, and reduces payment arrears. Development of the ACS as
an integral part of the university’s unified information system is a relevant objective.
The architecture of the ACS of the university in terms of software can be implemented as a centralized
or distributed one. In a centralized architecture, the ACS software is installed on a dedicated
server, in a distributed architecture — directly to controllers (microcomputers). The article discusses
the advantages and disadvantages of the centralized and distributed ACS architectures, it is shown that
the developed ACS contains elements of both architectures.
A library for reading electronic cards using the wiegand protocol is presented. The process of controlling
the turnstile from the microcontroller point of view is described. The scheme of interaction
of microcomputer and microcontroller is given. The mechanism of controller data synchronization
with the central database is considered. The ACS presented in this article was introduced in 2013 and
is now successfully used at the Moscow State University of Food Production, as well as in several
other universities.
At the moment of this article publication there are about 23 million records in the event log, 72 access
control devices (turnstiles, auto barriers, electronic locks) are registered in the territorially-distributed
system. Based on the results of its deployment, the management stated the increase in the efficiency
of the university’s work in a field of personnel discipline, business processes integration, and
time savings due to ease of use.
|
|
While analyzing the contemporary academic environment one can definitely notice the factor
of overloading of teaching stuff, which is reflected in educational process quality. However, there are
many daily and regularly implemented procedures that are basically formalized and thus can be automated.
In this paper typical technological schemes for carrying out key activities, such as preliminary
classes control checks and final testing, which allow reducing the time spent on their preparation,
carrying out and processing the results are proposed. As the main support tool, an «intelligent»
file based on a regular table editor, where ordinary data tables reflecting current educational process
status are extended with software structures that perform the execution of technological procedures
is used. The experience obtained while using the technology together with its supporting tool demonstrated
their suitability as a mean that noticeably saves time losses and at the same time letting teacher
organize and support his curriculum data. Some numerical estimations and conclusions based on the
results of the approach applying and recommendations for potential uses are given.
|
Software engineering |
|
Software development technologies |
|
|
The design and implementation of the command management module in Unix-systems became necessary
while working on the program of migration of a company’s IT infrastructure to free software.
The migration program should automatically configure the GNU Linux / UNIX servers and transfer
the necessary data from servers running the Windows operating system to new servers. To solve the
described task of automatic server configuration, а special module has been developed that generates
a command queue depending on the name and version of the target operating system and the list of
required roles. Proceeding from the fact that this component can be used in other projects, it was decided
to realize it as a separate library and release it under a free software license.
The described library can build GNU Linux/UNIX command queue and execute them locally or
remotely in correct order. At the description, you can see application area, choice of means of implementation,
class structure description and techniques used. The research is based on the classical
works [1 – 3] and develops the results published in the articles [4, 5].
|
Laboratory |
|
Decision support systems |
|
|
The article analyzes the current status of the description of the subject area of decision support systems
in terms of decision support algorithms. It was concluded that the current situation is determined
by the absence of well-established views on the standard algorithms of decision-making support, it
slows down the process of creating and putting into practice management decision support systems.
In order to regulate the domain held formalized description of management decision-making process
and introduced the concept of «small» and «extended» decision-making cycles. By «small» cycle suggested
understand search for the optimal solution in a given target function and constraints. By «extended
» refers to the cycle Search nontrivial solution, which can not be obtained without modifying
the objective function or the removal of the restrictions. On the basis of the approach proposed to abolish
the definition of an automated decision-making system and to clarify the classification of such systems.
The proposed algorithmic approach fully corresponds to the current understanding of an automated
decision support system in the modern sense, and will accelerate the process of implementing
such systems in management practices.
|
Models and Methods |
|
|
The concept of supply chain management is based on the idea that coordinating the activity of supply
chain members will reduce costs and increase the satisfaction of end-customers. It assumes that
supply chain members should not compete with each other, they should compete with other supply
chains. The supply chain can be described as a complex system hence it’s become complicated to analyze
how one or another action will effect on the supply chain. Simulation of supply chains is used
for understanding and predicting systems behavior. One of the possible solutions to implement a simulation
of such complex system as supply chain based on usage of multi-agent systems. Multi-agents
due to distributed nature are well suited for modeling interaction of supply chain members. The usage
of multi-agent systems in the simulation aimed at a creation of some system that simulates the
execution of a real world scenario. This paper presents a model for multi-agent supply chain simulation.
Agents of the multi-agent system in proposed model are represented supply chain members, like
suppliers, producers, distributors, retailers. Each agent gets materials or goods from upstream supply
chain node and sends goods to the downstream node. It calculates current inventory level. Supply
chain performance in proposed model is measured by a profit of supply chain members. This model
can be reused multiple times for measuring how changes in supply chain member’ behavior will result
in the whole supply chain.
|
|
In this paper, the authors, on the basis of a software package ScicosLab, carried out a simulation
of the apparatus for protection against imitation of controlled objects with high structural security of
carrier signals with new set of chaotic signals. In the result of a simulation, when changes in the parameters
of a chaotic signal, based on qualitative indicators representing time and spectral diagrams
found that the simulated apparatus for protection against imitation of controlled objects with high
structural security of carrier signals in general copes with the task of encryption (the output signal has
a noise-like appearance) and recovery of the information signal (source information signal and the
recovered information signal have almost identical appearance). The distinctive feature of this apparatus
for protection against imitation of controlled objects with high structural security of carrier signals
is the possibility of using different chaotic signals that are recorded in rewritable drives chaotic
sequences. This fact allows to significantly increase the security of the radio link from unauthorized
access by third parties and opens the way for application of this technology not only in wireless fire
alarm, but in other areas as wireless security systems. In the authors’ opinion, further research in this
area should be conducted in the field of studying the applicability of other classes of chaotic signals
for the transfer of a protected communication and use of various pseudo-random sequences limited
by the range [ –1; 1] as an information signal.
|