IT management |
|
Project management |
|
|
The article presents the features of innovative projects of industrial enterprises that complicate
the process of their management. The main groups of mathematical methods used to manage innovative
projects are identified. The possible directions of further developing mathematical methods in the
field of managing the complex innovative projects at industrial enterprises are determined. Algorithms
of accounting the influence of uncertainty factors on the duration and costs that associate with implementing
the innovation project works are presented. A distinctive feature of these algorithms is the
usage of fuzzy production rules. These rules formulate recommendations for managing these projects
based on the distribution of resources available in the organization depending on the results of each
stage. It allows minimizing the execution time, both individual stages, and the entire innovation project
as a whole. The variant of information support formation is offered that is presented in the form
of a physical model of the database. This model allows storing all the information available in the industrial
organization that necessary to manage these projects. A distinctive feature of this database
is the ability to store information on the impact of uncertainties on the implementation effectiveness
in a formalized form. This information is necessary for the implementing the developed algorithms.
|
---|---|
Software engineering |
|
Software development technologies |
|
|
To solve problems parallel to the data, the computational complexes of the following architecture
are gaining in popularity. The computing system consists of a universal part and m computational elements
on SoC, FPGA, GPU, and so on. Computational elements receive tasks with blocks of size k,
executing them in the future in an offline mode. The computing element may fail due to overheating or
power failure. The probability of this event is known. After failure, we believe that the computational
element is not restored. The larger the block size processed by one calculator, the less likely that the
task will be performed on the remaining calculators. It is necessary to choose the size of the block in
such a way as to obtain a guaranteed probability of completing the task. The article gives a equation
that is suitable for calculations, which makes it possible to estimate the probability of accomplishing
the task. This probability depends on the number of calculators and the size of blocks of elementary
tasks. The results of a computational experiment for some values of computational elements and block
sizes are presented. The equation allows you to select the optimal size of blocks of elementary tasks
for a given probability of solving a problem.
|
|
The authors consider the application of the system approach for building the information space for
the life cycle of the production of medicines. Visualization is provided by models in the IDEF0 notation.
This approach was designed to increase visibility and simplify the perception of complex technological
processes.
The QbD principle is based on the construction of the information shell, which is well-proven and
will be understood by a wide range of readers. To implement it on the basis of a system approach, the
Shuhart-Deming cycle is used, which allows obtaining all the necessary information about the general
concept of the technological processes being built.
The combination of the PDCA cycle and the system approach is given. The system approach opens
the possibility of designing and building a single information space, which is a necessity. The criterial
approach is analyzed and system management models are constructed in Melentiev’s notation.
The article provides reference materials in the form of tables and diagrams that are required to accompany
and explain the process of building individual units and subsystems of the unified information
space being developed.
Developed control systems are based on the initial training and further use of artificial intelligence
subsystems, which is necessary to significantly reduce the number of errors in calculations at all stages
of the formation and application of projected systems. Technologies, which in the modern world are
called artificial intelligence, have long and successfully been used in various fields of life of modern
society. Their implementation should be carried out strictly in stages with strict control. General provisions
and features of control subsystems are also specified in this article.
|
Algorithmic efficiency |
|
|
In this article is considered the NP-hard optimization strip packing problem that is actual in solving
many practical problems of automation and control, in particular, it takes a place in solving such
problems as cutting of materials, calendar scheduling and planning, placement of resources in multiprogramming
systems and a lot of other problems. With the aim to optimize the placement of objects
in a container, the iterative packing compaction algorithm which insures the increasing of the density
of packed objects was developed. In the basis of the proposed algorithm lays usage of six rules
which select several placed objects with the aim of removing them with subsequent more rational filling
of the freed spaces in a container by the deleted objects through a single-pass heuristic algorithm.
The results of carried out computational experiments on the investigation of the packing compaction
algorithm on the standard test instances of the strip packing problem with the given random and optimized
placements are presented. On the average the packing compaction algorithm provides increasing
the density of random placements to 3% and density of optimized placements to 0.4%. The developed
algorithm has been implemented in a general form, which makes it possible to use it not only for
two-dimensional problems as well as for three-dimensional orthogonal packing problems.
|
|
This treatise about the developing a mathematical model and algorithm selection to pick a set of
measures for the ascertainment of a specific technical and economic regime TPP equipment in real-time
using a formal mode. The formal task was: to develop mathematical models and algorithms that allow
a formal way to select a set of activities used to select a certain technical and economic regime for a
TPP management system in real time. To select the arrangement that are used for solving problems of
choice regime of equipment was built instrument based on the use of abstract logic and AND/OR graph.
The conversion Karnaugh maps into AND/OR-graph helps to divide decision parent task into subsidiary
tasks, which is demonstrable for decision-makers. As a result, an algorithm for processing three
generalized scenarios was proposed, which is implemented by an information system for aggregating
and analyzing technical and economic indicators and in which it is possible to implement such an algorithm.
The use of such an approach will reduce costs for expensive experts, distribute responsibilities,
enable operational personnel of TPPs to accumulate, edit and aggregate the knowledge of various
specialists, leading to improved quality of production and financial planning of generating companies.
|
Information infrastructure |
|
|
Assigning a stable, valid throughout the life cycle object a code can significantly simplify information
exchange both in global communities and within a domain. The article describes the methods of
codification, based on the ontological representation of the domain, on the example of Education and
the Stock Market. Two modules of software need the object’s identification: Core components, or master
data, and roles. Unambiguous identification for core components is necessary to link data about objects
used in different domains or application in order to aggregate core component’s attributes. With
the use of codification systems, it becomes possible to compare similar objects from different systems,
as well as create conditions for the application with future technology as the system of distributed
registry blockchain where the identification of an object has a key role. In the digital economy
there are significant changes in the «Role» module — the count of process participants significantly
expands: suppliers, consumers, and other actors. Some part of transactions can be performed by digital
devices. Identification in this case becomes an important element of business processes. Separate
groups of business process actions require a different level of identification. This understanding of the
identification infrastructure involves all stakeholders into a secure environment creation.
|
|
This article solves the heterogenous data mapping problem on real data sources in Situation-Oriented
Databases. In accordance with Polyglot Persistence SODB uses various type of documents. It is necessary
to use external data sources like relational and JSON/XML documents. To manage this diversity of
sources proposed special provision for hierarchical situation model of SODB named as virtual multidocuments.
There are three type of data sources discussed — XML/JSON, Zip-archives, MySQLidocuments
from relational database MySQL. Introduced inversional methods for mapping virtual
multi-documents on real data sources by means of doc-elements. For each functional element three
special modules are recommended to implement with known structures. Implementation technique is
shown on SQLite example and based on three functions SQLite3_doc, SQLite3_load, SQLite3_save.
First SQLite3_doc module defines how to connect to source within model and send a query. Second
SQLite3_load module specifies how to return document is selected from table of relational database
and loaded in virtual multi-document for handling and subsequent saving. In this function interpreter
of SODB creates special DPO-object (DPO — Data Processing Object) within that all handling operations
are performed. DPO-object can concern of several virtual multi-documents. For late stages
must be implemented third function SQLite3_save that performs saving ending result in serverless
SQLite3 database. All proposed functions implemented on PHP example in web-application of SODB.
|
Simulation |
|
Actor modeling |
|
|
The optimization task solution of promoting innovative projects into the regions with
using of a complex simulation model and included modules of bacterial optimization is
considered below. As the object of research, the process of forming an innovative cluster was
chosen. The complex model is implemented in the modeling system «Actor Pilgrim» with the
implementation of the common virtual time, spatial and financial dynamics (money, financial
instruments). The simulation results are tied to topographic information of different scales.
|
Laboratory |
|
Models and Methods |
|
|
The aim of the work is to study the possibility of formalizing the system-object approach «Unit-
Function-Object». To achieve this goal, the ideas of calculating Abadi-Kardeli objects were used in the
formal description of the conceptual provisions of this approach. In terms of this calculus, a special object
is formulated that represents the system as an element of Unit-Function-Object (UFO-element), and
a corresponding graphical representation is proposed. Some algebraic operations with special objects
as UFO-elements are described: connection of objects, association of objects on an input, association
of objects on an exit. The described operations are considered as basic operations of the proposed system
calculus as UFO-elements. They correspond to three structural phenomena and three kinds of objects
from which any structure and system of any complexity can be created: a simple stream (a simple
object), a merger of flows (a merging object), and a branching of the flow (branching object). As
a matter of fact, these operations are reduced to describing in the terms of the Grenander pattern theory
the «image» obtained by constructing a «configuration» of non-derivative objects (graphic formalisms)
and describing non-closed connections. The classification of these elements by their nodes
is proposed, which is based on the basic hierarchy of connection classes used within the system-object
approach. This classification allows us to use a limited alphabetic set of elements when modeling
systems. The developed calculus of systems as UFO-elements provides aggregation of such elements
and facilitates their decomposition. In addition, this calculus allows us to take into account a number
of system-wide regularities. The obtained results show the expediency of constructing a formalized
system theory by expanding and improving the calculus formalizing the system-object approach,
the foundations of which are presented in the work.
|
|
When constructing regression models, the key stage is the model specification, which assumes the
choice of composition and the mathematical form of the relationship between the variables in regression
equation. To date, there is no system of standard recommendations and methods that would form
a rigorous theoretical basis for selecting a model specification. The article is devoted to the problem
of specification of regression models, namely, the subset selection in linear-multiplicative regressions.
Linear-multiplicative regressions are non-linear in factors, but linear in parameters, and reflect the degree
of joint influence of independent variables on the dependent variable. This problem can be formalized
as a problem of partial-Boolean linear programming. Since the solution of such problems requires
the computational capabilities of modern computers, a universal software package was developed
for constructing linear-multiplicative regressions, which can be used in technical studies, economics,
business, sociology, medicine, etc. To demonstrate its work, the problem of volume modeling
passing large-capacity containers at the Zabaikalsk-Manchuria railway checkpoint. At the same time,
the speed of solving such computational problems was tested.
|
Theoretical approach |
|
Decision support systems |
|
|
One of the most important tasks of the mathematical support of any decision support system is the
consolidation of the solutions being developed. At present, there are mathematical methods for consolidating
joint solutions and methods for coordinating decision making. To coordinate the solution
of tasks and the modeling necessary for the application of decision support systems, methods are used
to harmonize the opinions of experts, and to coordinate the application of models and tasks. The latter
is usually divided into methods of programmable and informal coordination. Practice has shown that
existing approaches to coordination of decisions, both subjective and formal, do not provide automation
of decision support. The article proposes to use hybrid approaches to provide a coordinated solution
of problems and modeling. At the same time, it is determined that in the future, with the improvement
of automation tools, informal decision-making methods can be used in decision support systems
as the most promising. First of all, for decision support systems oriented to work with poorly formalized
tasks. The formulation of the task of developing a dispatch model for decision support systems
based on a neural network is formulated.
|
Information security |
|
Data protection |
|
|
The problem of exploitation of program code vulnerabilities is one of the most relevant for ensuring
information systems security. This problem is frequently related to developer errors, to the lack of validation
of input data and to subroutines. Recently, many different solutions for this problem have been
proposed. However, their low efficiency is due to the inability to automatically separate a piece of code
that is useful (from the point of view of the system’s function) from a code or range of values that are
useless in terms of user value as well as those that are vulnerable. A method for analyzing a program
execution based on signatures is proposed in this work. Thus, the input data generate a certain algorithm
signature. Anomalies at the signature level indicate possible exploitation of vulnerabilities. Therefore,
we can launch anomalous activity in a sandbox or correct the program code based on anomalous activity
automatically. The implementation of the proposed technology uses a web server as an example
and exhibits a high efficiency for detecting any remote attacks on the program code. Shortcomings include
a high percentage of false positives. This percentage can be lowered by taking into account additional
analysis of input values, which may be a future development direction of this study.
|