IT business |
|
Internet marketing |
|
|
Advertising spreads very fast on social networks, forums and similar communication sites. In 2013,
the online social media tools were used by 38.3 per cent of companies, and this number is constantly
growing. This article deals with the online marketing, social networking and brand concepts.
It analyses specific characteristics of a brand and social networking as well as their significance.
Based on the example of the brand Vytautas, the success factors of the brand on social networks
are set. Consumer opinions on the importance of social networks for promoting the brand are
assessed. The analysis employs the following methods: the biometric Eye Tracking analysis and
multiple criteria assessment method.
|
---|---|
Business information systems |
|
|
Effective development of nowadays business must be based on scientific knowledge and sciencebased
solutions, which are designed to properly integrate electronic and mobile business models
into enterprises current traditional activities. IT-based development should be followed by rightly
identified characteristics of electronic, mobile business and participants in this area, analysed
strategy aspects and identified the role and importance of business model in this context. The aim
of this article is to analyze the effective electronic and mobile business integration to traditional
business aspects from the strategic point of view. To achieve this goal, the main characteristics of
e- and m-business were identified, information technology-based business strategies and business
model classification were analyzed. Research methodology employed: systematic literature analysis
and synthesis, grouping, graphic information visualization techniques.
|
IT management |
|
Performance management |
|
|
The main goal of this article if analyze possibilities of implication of distributed information systems
in government regulation multifaceted phenomena, the impact of which can only be done by indirect
methods. This is an important field for further research the integration of monitoring systems, algorithmic
computational problems in the individual subsystems and their integration. In particular, the
necessity of using such systems for the analysis of the impact of instruments of state control development
of the route network of regular air transport the analysis of civil aviation activities, the results
of which indicated that the directions constituting more than 40% of passenger traffic route network
2007, currently not served. All of this suggests the need to evaluate specific directions from a position
in accessibility to the population. Thus, when designing distributed systems, it is necessary not
only to identify subtasks research, but also to determine the particular objects of study. As a result
of the application of multivariate classification algorithm with training it was revealed that Russian
airlines use 4 types of business models in the choice of the route network and only 3 of them can
have a substantial impact on the state route network that must be taken into account in the selection
of monitoring sites.
|
IT and education |
|
Training IT specialists |
|
|
The paper discusses the issues associated with the design and development of professional standards
in Russia. Describes the creation of professional standards, the main directions of their development,
practical application, the automation status of this activity. It is noted that in modern society
are changing the main structural components of professional identity — the content of activities, processes,
experience, strategies for professional advancement. «Professional resistance» is replaced
professional mobility. Therefore, the role of professional standards that describe the requirements
for knowledge, skills and specialist skills. In professional standards in the it sector must take into account
peculiarities of this sector is the rapid development, virtuality and the multilevel character of
the objects of it professionals, the presence of other groups of standards affecting the use of information
technology — it standards, educational standards and other Necessary monitoring changes
in the it and timely revision of professional requirements. Requires additional structuring elements of
the content of professional standards. In particular: development of standardized classifications of
skills-based typing of objects and subjects of employment; submission of professional standards in
the form of information modules model characterizing the competence of the specialist, and the use
of the principle of «modularity» of the content of professional standards which allow reuse information
elements, in various professional standards. The content of professional standards will become
more uniform due to the standardization of semantic elements. It will form a «professional vertical
control of the integrating mechanism of the modern state.
|
Software engineering |
|
Algorithmic efficiency |
|
|
Increasing complexity of software products also increases the demands on their usability. The article
focuses on the software product’s usability evaluation based on the user’s activity data. There are
different types of user’s activity data and visualization methods for them, the choice of which depends
on the data composition and specificity. One of the most popular is a point data, such as mouse clicks
and movements. The commonly used visualization method for point data is a heat map — graphical
representation of data where the individual values contained in a matrix are represented as colors.
Authors suggest using the heat map as a mathematical model of the user’s activity, what allows formalizing
the user’s interaction with the software interface. However, there are no formal methods, described
in scientific sources, for constructing heat maps based on the point data of the user’s activity.
Authors propose the formal method for constructing such kind of heat maps. The proposed method allows
constructing heat map taking into account data density and expert-defined parameters to achieve
the desired clarity of visualization. In addition, described method was implemented in free software.
|
Network Technologies |
|
|
The paper discusses the problem of design and development for mobile services using wireless
tags. As wireless tags here we consider mobile phones and other devices that support Bluetooth.
Any Bluetooth device (Bluetooth node) in so-called discoverable mode we consider as wireless tag.
Our model defines how to link user defined content to wireless tags. In this model, Bluetooth devices
let define the context-dependent data available to mobile users in the proximity. Dislike the specialized
Bluetooth tags (beacons), our model does not require the preliminary scene preparation. Any
mobile device with Bluetooth support can play a role of wireless tag. The proposed scheme covers
all stages of the life cycle of mobile services: how to create a tag (tags), how to bind data to them
and how to view data associated with tags. So, ordinary mobile phone is enough to create a data
channel. Our article discusses potential applications of the proposed model. The typical examples
are classifieds. One mobile user creates some announce and makes it available (readable) for other
mobile users in the proximity (in the vicinity of the author). By the same manner we can create any
commercial content (advertising) and make it available for visitors in malls, café, etc.
|
Laboratory |
|
Study of processes and systems |
|
|
It shows the influence of pipeline systems for reliability, cost-performance and industrial security
enterprises of the chemical industry and other industries. It shows the role of system maintenance
and repair, as well as integrated logistics support in ensuring the capacity for work of industrial piping
systems. The drawbacks of maintenance and integrated logistics support using disparate software
tools are shown. To eliminate these drawbacks authors offered of the approach to integrated logistic
support for the life cycle of pipeline systems of industrial enterprises based on the theory of artificial
intelligence, modern methods of mathematical modeling and logistics resource saving in the field
organization of production. Developed the following heuristic computational tools computerized integrated
logistics support industrial piping systems: logic and information life-cycle model of pipeline
systems, which mimics the procedure logistic support of piping systems, as complex organizational
and technological decision-making procedures; frame and productional models represent unformalized
knowledge about the technical and structural characteristics of the pipeline; heuristic-computing
algorithms of calculation of the technical and structural characteristics pipeline systems. Developed
heuristic-computing tools allow to automate integrated logistics support life cycle of pipeline systems
and to organize the interaction of all its subjects in a single information space.
|
|
Information security risk management includes periodic evaluation of the quality of practice giving
reduce to risks and returning risks for an acceptable level. Generally quantitative and qualitative indicators
of detected risks are used in forming enterprise information security budget. It is suggested to
solve the problem of forming information security budget by evaluation of the enterprise information
assets and using game theory and strategic approach. The probabilities of reflection of unauthorized
access to enterprise information resources became the elements of the payoff matrix of two-player
antagonistic game. The probability of reflection of the attacks to information assets is described by
the function with two arguments: 1) average probability of attack in a certain economic field; 2) value
of invested funds to improve the information asset security. This approach allows distributing the
total amount of funds allocated to provide enterprise information security in selected information assets
areas. It is offered to find the solution of the antagonistic game with the use of linear optimization
methods. The mixed strategies obtained by solving the antagonistic game are used to determine
the amount of funds invested in security of different information assets. The model developed in this
paper represents the combination of strategic two-player antagonistic game and a game of a single
player against nature in terms of risk, which is solved by using the Bayesian information criterion.
|
Models and Methods |
|
|
The article discusses actual issues in the application of automated control systems to optimize
the process of investment projecting at the enterprise. Investment projecting is an important aspect
of the activities of an entity in the modern economy. To solve the optimization problem of investment
projecting is proposed to use a network of economic-mathematical modeling. The rationale for applying
the methods of network management to optimize investment activity. Shows a gradual process
of forming a network model that includes the entire sequence of complex operations, investment
projecting, such as: collection of baseline data, marketing analysis, financial analysis, sensitivity
analysis, building financial models, generation of alternatives, analysis and selection of the optimal
project. Given the detailed description and the graphical representation of the selected processes
and the resulting network model. Possibilities of application of information technologies for solving
problems network modeling and implementation of adaptive control model. Automation can be done
using the visual object-oriented programming in high-level languages, Delphi, C++, C#, Java,
JavaScript,
PHP, Perl, etc.
|
|
Various mathematical and statistical models can be used as basis for constructing scoring systems.
These models can be obtained by linear regression, logistic regression, discriminant analysis,
decision trees, neural networks, and others. The article describes an example of constructing a model
of behavioral skroring in the banking sector, based on a neural network program IBM SPSS Statistics.
Also this article presents the technique of modeling, sequence of network settings in the dialogs procedures
of the program SPSS, code syntax for the implementation of the considered algorithm, and
the simulation of results. These results can be used in the educational process for laboratory work
and workshops in teaching methods in neural network modeling program SPSS, as well as independent
research. The purpose of writing this article is to review the methodological aspects and step
alogoritma constructing a neural network program IBM SPSS Statistics 22 for example, behavioral
scoring in the banking sector. Under the behavioral scoring understood mathematical model by which
on the basis of a set of known characteristics of the object of study (independent variables) projected
a certain desired characteristics (dependent variable), the value of which is not known researcher.
|
Theoretical approach |
|
Mathematical methods |
|
|
Аn original approach to find a maximum-size independent set in a fuzzy graph is presented together
with the necessary formalization technique. The approach is oriented at practical usage in
applied artificial intelligent systems using fuzzy logic and modal logic concepts. The problem may
be encountered in face recognition with some possible distortions. The vertices stand for the points
in the face image with approximately similar color and brightness. Obviously, in the case of image
distortion the arcs in the graph may be assigned with the values in 0,1‑diapason. A fuzzy graph contains
some nodes (arcs) with indefinite measure of their belonging to the graph. The situation may
appear when no constrict classifying rules exist as explained in the paper. One can use a measure
of 0.5 to interpret indefiniteness. This an interpretation enables one to apply modal logic for problem
formalization and solving. The modality of the type «possible» is interpreted by the 3‑valued formula
with truth value not less than 0.5; the modality of the type «necessary» is interpreted by the 3‑valued
formula with the truth value equal to 1. The approach represented in the paper may be interesting
for the researchers engaged in the recognition and classifying problems.
|
|
For the construction of the calculating machines full functional sets of logic functions are used.
In the full functional sets even thought one of the functions is to be a nonmonotonic function. So the
aim of the article is to construct the effective approach to the definition of the belonging algebra logical
functions to the class of the monotonic functions. The approach is suggested proposes using
groups of logical variables as numbers where the digits of numbers are the mentioned logical variables.
Then the values of the functions are examined at the fixed positions with the fixed numbers.
If all function meanings are true then the function is a monotonic one. In the other case we have
a nonmonotonic function. This approach enables us to check the belonging of the algebra logical
functions to the class of the monotonic functions without commensurable checkings of the groups of
logical variables. The quantity of the commensurable chekings may be equal to N = 22n – 1 where n is
the quantity of the variables in one group. So the approach is proposed is rather effective.
|
Information security |
|
Software and hardware systems |
|
|
Developers of modern data protection software do not pay enough attention to false positive problem
while calculating checksum of its files and other data delivered using insecure data transport.
That leads to major problem, if attacker can replace checksum or replace process of getting data
from file, then most of antiviruses and other very important software will be compromised. Authors
of that article developed software for assessing the stability of data protection against different attacks.
Method that shows possibility to compromise large amount of systems based on specific of
operation system’s file request operations. Software was also developed and tests show that many
important utilities such as md5, sha256 (for FreeBSD) and cverify. exe, vipnethashcalc-tool. exe (both
of them certified in Russia as data protection software) are not protected against false errors while
calculating checksums. Errors appear in 100% test cases. In addition, tests were made for software
called «FIKS 2.0.1» witch have special license from Federal Service for Technical and Export Control
of Russia (FSTEC). That software also unprotected against false errors and tests proves that.
|