IT business |
|
Business information systems |
|
|
The article considers the issues related to the integration of information from various sources for
complex application in solving problems of financial institutions. Approaches are suggested for use
in data warehouses organize information from external sources: open data, Internet, state of automation
systems, etc. emphasizes the importance of using financial institutions structural beginning,
shared meanings, redistributable formed in the present state automation. An example of such a system
is the system of interdepartmental electronic interaction that enables the financial institution to
get automated information from state and municipal agencies. Another example is also introduced
in Russia a unified system of identification and authentication, providing a legally confirmed authorization
of users of automated systems. It is noted that in a society based on such systems form some
external to the financial organization master data management environment, which must be effectively
used by financial organizations to obtain new functionality automation and additional structuring
information in their data warehouses. Discusses the potential use of financial organizations open
data generated in the present time, various organizations in the initiative order, and published various
state and municipal agencies of Russia. The article also considers the interaction of financial institutions
and service it service it company, including the use of the process approach to develop,
support, and development of automation for financial institutions.
|
---|---|
Market analysis |
|
|
which was created on a request from an overseas firm, processes chats, blogs, and forums to provide
as output generalized negative and positive scores as well as specific subjectivity terms associated
with the product’s name given in user’s query. The system is based on the highly structured
ontology and linear grammar. The ontology consists of syntactic and semantic terms ad their subcategories,
groups and classes. Semantic terms are those ones expressing subjectivity and having
either positive or negative semantic orientation. Syntactic terms do not express subjectivity but
can modify the intensity of polarity of semantic terms. The relation between semantic and syntactic
terms is defined as a binary relation and groups with symmetric, asymmetric, and inverse relations
between syntactic and semantic terms are distinguished. Semantic terms are assigned scores from
1 (–1) to 9 (–9). The paper suggests differentiating between formal and linguistic ontologies. Linear
grammar comprises rules that allow mapping ontology terms onto the names of products and generate
phrases with semantic and syntactic terms. The overall system’s efficiency measured in terms
of recall and precision of information retrieval achieves 86%.
|
IT management |
|
Performance management |
|
|
The article analyzes the approaches to the formation of information system of knowledge management
in public administration of this important branch of transport civil aviation. In particular, it is
shown that the application of algorithmic elements of knowledge management, including lifecycle
management of knowledge — use of existing concepts and the creation of new knowledge, allows
to increase the objectivity and transparency when making decisions regarding the regulation of development
of the airport network.
For example, data analysis of the dynamics of passenger flows using the tools of analysis of principal
components and discriminant analysis, and also applications in public administration such
concepts as creating an airport network on the basis of a system of airports-hubs shown that existing
approaches of choice has a significant limitation. Therefore, the information of a knowledge
management system should include information about how theoretical modeling and algorithm data
mining tools.
|
IT and education |
|
Educational environment |
|
|
The article defines the objectives, principles and priorities of Informatization of University
of Technology, on which to base long-term prospects of corporate information infrastructure.
On the basis of the analysis determined the main directions and priorities of Informatization.
It is based on that needs to be developed new learning theories such as constructivism,
learning without time and space boundaries. Traditional circuit training is outdated and needs
to be replaced with new and progressive forms. Needs to be developed new learning theories
such as constructivism, learning without time and space boundaries. To improve the quality
of education and training of highly qualified specialists for industrial and economic structures
of the country, it is necessary to intensively use new educational information technologies.
The article shows that to improve the quality of education and training of highly qualified specialists for
industrial and economic structures of the country, it is necessary to intensively use new educational
technologies. Basis must be information technology, which is one of the most important factors determining
the development of modern society. The development and application of information and
communication technologies clearly show that the Informatization of high school, is a key condition
for the subsequent accelerated development of science, economy and culture. Today, highly skilled
workers shape economic and social development level of the country. Therefore, the Informatization
of higher and secondary professional education is becoming very important element of Informatization
of Russia. The transition to a qualitatively new level of education is particularly necessary Technological
University, brings together in a single educational complex: University, College and technical
school. It is therefore necessary to determine the objectives, fundamental principles and priorities
of the University Informatization, on which to base long-term prospects of the corporate information
infrastructure necessary concept of the University.
|
Software engineering |
|
Information security |
|
|
Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One
of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the
vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary
control unit that carries control commands that may be intercepted, viewed or tampered with. Currently,
there are many ways of ensuring information security of the radio channel. However, there are
no methods for assessing signaling radio bearer security from unauthorized access. The purpose of
this paper is to provide a method of quantitative and qualitative evaluation of security radio signals
from unauthorized access. The analysis showed that at present there are no perfect valuation techniques
protected from unauthorized access. In addition to the drawbacks of each method individually,
many of them have a common negative feature is the fact, not security assessment is comprehensive
and focused on one or more threats to information security. The authors proposed a method
of quantitative and qualitative evaluation of security against unauthorized wireless access, including
automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained
evaluated radio alarm security against unauthorized access three different wireless car alarms that
have different methods of protection against threats such as browsing, interception and substitution.
The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized
access different: a comprehensive assessment of security wireless alarm radio from unauthorized
access, simple math, simple software implementation and adequate representation of the probability
of different types of wireless alarm counter threats to information security in the radio channel.
|
Laboratory |
|
|
|
|
The analysis of social engineering systems allowed to build fuzzy cognitive model of assessment
of its man-made elements to arrive at an informed judgment about the need for control actions to
bring the State of the social subsystem to the specified level. The set of control actions is implemented
through the use of institutional mechanisms, motivation and information management. You must
ensure that the level of motivation is not greater than the optimum value, and the intensity of institutional
measures was below critical. To calculate the value of concepts at the lower levels of the hierarchy
model can be used as an additive vector measure up, because in this case, the values of some
concepts can be offset by other values. For the top level of appropriate application of convolution,
because the multiplicative if at least one of the concepts of {«level of motivation “; «Psychophysical
capabilities; «Competence»} «variable linguistic factor» is set to «Low», then the integral evaluation
of the level of effectiveness of the man-made element should be taken as equal to «Low». Evaluation
of the concept of “ Level motivation» may correspond to the values of the negative term-many
of the linguistic variable. Assessment of the status of the subject in this case will also take «negative
» values. Content that can be interpreted as the potential destructive impact of man-made element
on the system-«insider threat».
|
Study of processes and systems |
|
|
The problem of estimating the wind energy potential of the region in view of the terrain with the
assistance of software tools for modeling and calculation is formulated. Currently there are no readymade
software solutions for the implementation of the whole set of terrain and wind flow modeling
procedures. A description of the difficulties encountered in the integrated use of heterogeneous
software solutions for the problem of evaluation of wind power potential in the areas is given. The
authors propose a methodical approach to search places efficient allocation of wind power plants,
considering the use of software products. Methodical approach consists of three stages — preliminary
analysis of the terrain, terrain modeling, simulation of wind flow. Approbation of the methodical
approach to the creation of simple terrain models, as well as with the creation of a model of the real
terrain near the Ayan village of Khabarovsk Territory is conducted. Application of methodical approach
allows to realize computer airflow simulation over the terrain and thus solve important practical
problem of defining the sites of effective placement of wind turbines. According to calculations
at these sites the wind speed increases substantially: from 5 to 8 meters per second. This allows to
take this areas for further analysis.
|
Models and Methods |
|
|
The Bunge–Wand–Weber ontology is widely used in object-oriented development of IT applications.
It shows how a real world objects are mapped to the ontology concepts. Wand and Weber suppose
that the ontological expressiveness of a modeling language used to describe the world around
us, can be assessed by investigating the mapping from a set of language primitives to a set of constructs
of the proposed ontology. One of the main success factors of the use of modeling language
or notation is its ability to provide a set of modeling primitives, which can be directly mapped to the
relevant concepts of Bunge–Wand–Weber ontology. However, the existing Bunge–Wand–Weber ontology
is not fully suitable for describing business processes. The analysis shows that the ontology
misses the concept of time, the mapping of logical operators of modeling language on the concepts
ontology remains unclear, ontology contains no concept necessary to map a performer of process
operations. The paper proposes to clarify the distinction between internal and external events, thus
introduce a category of time; adds the concept of the actor who initiates the start of the execution or
completion of the process operations; change the definition of the transformation, adding the meaning
of unit of work that doesn’t change the object, but rout it to the next operation thus allowing to
map logical operators. As a result of the proposed adaptation the Bunge — Wanda — Weber ontology
becomes adequate to the task of business processes modeling.
|
|
The article presents a unified object system metamodel, developed by the author and used them
in the development of large software systems over the past few years. This paper is the development
of the material, briefly presented in the article «The Concept Creation Service Corporate Information
Systems of Economic Industrial Energy Cluster», published in the Applied Informatics journal in № 6
from 2014. The urgency of the problem is reasonable overview of existing work presented in this article.
The article presents the latest to date version of the metamodel and describes the main constituent
elements. Attention is paid to the hierarchy of metaclasses used in the simulation application
domain entities. Also considered metaclass hierarchy representing the different types of atomic and
class attributes. Attention is given to the description and dynamic (behavioral) component by implementing
the methods and events classes. Finally, conclusions are made about the future development
work. Behavioral characteristics are implemented through various validation rules. The article
deals with the decisions relating to the management of visibility and accessibility of the individual
elements of graphic controls. All elements of the metamodel was tested under a variety of complex
database applications. Further development of this paper is the development of custom UML-profile
that allows to simplify the process of designing the program and database structure. This profile can
be used in teaching students the design and implementation of software.
|
Mathematical tools |
|
|
In the study of dynamic processes is necessary realistic and objective causal analysis of events.
Such analysis is possible due to application of mathematical and computer simulation methods. Existing
methods of modelling, quantification and forecasting typically require large volume of the original
data, which is not always available, especially when the simulated indicator depends on several
variables, and they underestimate the possibility of extremely rare events that violate distribution pattern
of this indicator. The purpose of this paper — development of a new minimax method estimating
of dynamic patterns for rectangular grid of values of independent variables, mathematical study
of a new method of modeling, the establishment of an effective algorithm, demonstration of application.
Are stated and proved the properties of the solution of the problem which is implementation of
tools modeling technique, that allowed develop an algorithm in the form of step by step instructions,
which is easily implemented in any software environment. In the article demonstrated examples of
implementation of the algorithm, in particular, reviewed its application to assess the dynamic trends
for the purpose of data compression and prediction of missing values in the sample. Proposed a minimax
model of multiple regression and its realization for estimation of parameters of autoregressive
depending. Mathematical justification and obtained the properties of the new model allowed to develop
effective, from the viewpoint of availability of the software implementation in real-time, algorithm.
|
Point of view |
|
Methodology of science |
|
|
This article is devoted to a problem of creation of the program systems (PS) organizing the information
search (IS), and providing high rates of efficiency for the mass user (not the expert in the field of informational
technologies). Researches weren’t limited by the review of achievements in practice of creation
PS_IS, and also in the corresponding scientific and engineering disciplines. The subject of researches
is the process of achievement of mutual understanding in communication between two subjects. Such
researches completely correspond to the character of researches in the scientific direction of artificial
intellect. It points out the essence which allocates from the process of communication between subjects,
and it is explained the concept corresponding to it and it is offered to call «initial identification». Consideration
of process of initial identification allowed to reveal the main contradiction in a problem of creation
PS_IS. In the process of communication (and respectively in IS) the subject operates with all known set
of concepts and uses thus as gained recognition (simple or compound) names of concepts, and the
names formed directly in the course of communication. However in a natural language only 83.000 concepts
are called by simple unique names (in a word). Compound names called incomparably more concepts,
they make only insignificant part of concepts with which the subject operates in communication.
Thus, the dominating part of algorithms of II is connected with application of quickly named concepts.
It is shown that process of an operational name is feasible only with use of the model of knowledge
approached to gnoseological model. And it is also specified that after some time in computer
systems emergence of such models of knowledge is possible.
For the new technology of IS the organization of access of each concrete tag of a concrete concept
to its names in base of names is offered. That makes a basis of the organization of base of simple
and compound names. Also other characteristics of the organization of the dictionary at triune
essence are provided.
Such concept as»construction of sentence» is offered for a broad use in scientific practice interpretation
of which corresponds to interpretation of the concept «sense of the sentence» with explanations,
which allow to draw sense from sequence of alphanumeric symbols.
A great place in this work takes consideration of algorithms of formation and recognition of sentences
(that is II). Many situations of II suspension are revealed and described. It is noted that completeness
of such situations, and also algorithms of permission of the concrete situations and scenarios
of interactive interaction providing finishing II up to the end make the essence of works on
formation of the specification on design of PS realizing new technology of IS.
In conclusion it is pointed out that the declared subject due to its scale can’t be opened in one article
in details (scrupulously) to conform to requirements to the specification on creation of II. It is important that
the complete picture of new technology of IS is given in article and feasibility of such technology is shown.
|