IT business |
|
Business information systems |
|
|
The work discusses the features of network planning and management of small-scale discrete manufacturing.
The main aim of the development of network planning algorithm and its implementation
in the automated planning system is to create of the calendar production schedule and make possible
its dynamical adjustment. The calendar production schedule is characterized by frequent transferences
of work, the starting and ending terms, the emergence of new jobs (orders) within the production
cycle etc… Automation of network planning and management processes should be carried out by
the solution of the complex interdependent tasks connected with both reengineering of current planning
processes and network adaptation algorithms for a specific production type and their further program
implementation. The requirements to the content of the information support for the automation
of the Gantt chart construction on the base of network models and the requirements to the appropriate
software product which takes into account features of electronic small scale production. The software
architecture is offered on the base of the executed analysis and the system of automated planning
small-scale production of the electronic equipment is tested. The system makes possible the dynamic
adjustment of the production plan.
|
---|---|
Electronic bank |
|
|
The purpose of this paper is to review the Blockchain-technology and its practical application.
Blockchain essence of technology lies in the decentralised storage system that does not allow to make
adjustments to the already recorded data. The main properties of the technology — decentralised, protection
and preservation of information, Privacy or openness. At the moment, there are several basic
models Blockchain application -private, public and Blockchain-services. At article highlighted several
problems in the current implementation, the practical application of technology Blockchain. The most
common algorithm Proof-of-work with the growth of the volume leads to major energy costs. Low
Blockchain scrutiny of the practical application of technology outside the financial sector of the economy.
In the case of Blockchain in the financial sector, the role of banks and the presence of life will decline
— Blockchain users will be able to perform financial transactions with each other, without intermediaries.
To implement this functionality will require the implementation of Smart Blockchain contracts.
It is proposed to use Blockchain in the following areas: Insurance, taxation, sign transfers, automatisation
of penalties. Blockchain technology perfectly realises functional notary system. The idea
of private Blockchain is ideal for the development of ECM-systems.
|
IT management |
|
Performance management |
|
|
The need for strict selection and prioritization of innovation arises in the mind of the limited own
financial resources. The first task in the definition of optimal set of measures in the framework of a
rolling medium-term plan that delivers the maximum increase to the values of the KPIs of the corporation
under the terms of financial feasibility. The second challenge is scheduling and managing the
execution of medium-term plans, implementation of measures to control target dates to achieve the
required results and funding. To solve such a problem without the development of specific modules of
enterprise information system is not possible. The algorithm of the medium-term plan, taking into account
the needs in co-financing for the state support in the framework of the federal target programs,
is proposed. Describes the information model of the data, giving an idea of the structure of electronic
directories and documents in automated system. The greatest effect from the use of the proposed tools
will be achieved by integration of the described subsystems in management information system with
provision of discharging current data and methods of calculation of KPIs and the delivery of the results
for users.
|
|
This article analyzes the ARIS methodology diagram of an example of diagrams: Cause-and-Effect
Diagram, Value-added Chain Diagram, Communications diagram, Organizational Chart. Present new
approaches to the development of diagrams, templates that allow analysts and designers to carry out
an effective analysis of the subject area. Any study begins with an analysis of business processes and
their compliance with business strategy as a whole. Of special importance is the presence of a common
language perception of the current and final results of this work to make an informed management
decision. The basis for the efficient management of the organization is a formalized description
of its business processes, which is necessary for the analysis of «bottlenecks», the transfer of accumulated
skills, standardization activities, audits, benchmarking. If business processes are not regulated,
which means that work is being done on the basis of established rules and regulations, which are kept
in the minds of employees. If such an arrangement is inevitable loss of various types of resources: financial,
material, labor, time, and others. The company has an effective method of regulation is the
most important factor in the success of any project.
|
IT and education |
|
Training IT specialists |
|
|
In the article actual problems of teaching parallel programming in technical universities in terms
of the formation of the necessary competencies for the successful positioning of the future experts of
IT-trends in the labor market.
Ability to develop software solutions in parallel processing of tasks is a necessary condition for the
formation of the subject competence of students of IT-trends and qualification is an important characteristic
of the modern specialist in applied mathematics, computer science and computer engineering.
However, experience shows that when they begin to study the above questions, parallel programming
is still difficult to understand students as It is significantly different from the usual methods of
logical and structured programming, complementing them with new steps. Thus, there is a need to
develop methodological approaches to the development of competencies in the field of parallel programming
of future specialists in the direction of preparation «Computer Science and Engineering».
The author proposes the following technique practical training:
1. In the first stage, to get acquainted with the construction and architecture of multiprocessor computer
systems, as well as the theoretical study of the major parallel methods for solving problems provided
the use of a software system «Parallel Laboratory» (abbreviated name ParaLab).
2. In the second phase, when students will receive theoretical training is already sufficient in the
field of parallel methods of solving problems, it is proposed to build the simplest computing cluster
on multiple computers on a Microsoft HPC Server 2008‑based.
3. The third step is proposed execution of parallel tasks to create a computing cluster.
Such an approach to the selection and application of methods at different stages of training provides
a systematic and successful absorption of the students practical skills of parallel computing for
high-performance systems.
|
Software engineering |
|
Network Technologies |
|
|
Abstract: The main line of the article is the proof of the concept of BML language. BML is the
main part of BlockSet methodology created for Web-development. The article examines the problem
of software evaluation on that basis. At beginning of the work authors proposes the new model with
complex of criteria. The criteria includes a lot of properties: psychological factors of developers, the
language features, system requirements and so on. Psychological factors includes perception and training
speed. Language features are flexibility, instructions set, complexity, recipe set. The problem is in
difference between of imperative and declarative programming. There are a few methods of evaluation
by criteria listed above suitable for both language paradigms. The «threshold entry» term introduced
and found correlation between volume and quality of source code. Also authors propose term
of «fault probability» related to the complex of typical project faults appeared during project developing.
In the classification of software metrics authors revealed three main characteristics for evaluation:
work amount, style of code, developer effort. Authors applied the hierarchy analysis method to
identify the most important criterion. Due to research authors proposed «recipe set» block for further
study as fundamental criterion for others.
|
|
The complexity of synchronizing local timers on individual nodes of the communication network
is to assess the time needed for an information message with current time stamp for transporting from
the source to the target node. Transportation time depends on the state of information transmission
channels and routing protocols. To estimate the time advance of the package with time stamp it is proposed
to use a distributed neural network architecture, which contains a delay line with taps, which
changes the information part of the temporary package during its movement through the communication
network. To perform time correction at the delivery of the packet to the target node of the neural
network expert that has the ability to increase the complexity of the internal architecture without
loss of stability of functioning of the cascade-correlation neural network. The learning procedure consists
in tuning only added neuroelements, which makes it possible to increase the speed of operation
of the system as a whole. To improve the efficiency of the entire system has been used a method for
compressing data information part of the temporary package with the use of neural network built on
neuroelement made to a summing integrator with losses on the scheme with switching capacitors. A
complex of two trigonometric neural networks performs data compression by considering the most
significant characteristics of the analyzed signal combinations. Analysis of process of functioning of
the cascade-correlation neural network showed the ability to perform correction of timers located in
the network nodes. Evaluation of the averaged dynamics of change of the error counts time in units
of the communication network proved the effectiveness of the proposed synchronization approach.
|
Models and althorithms |
|
|
An important part of modern science and economics are numerical computations in mathematical
models. Their efficiency depends on the effectiveness of the hardware. This, in turn, is related to
parallel computations’ optimizations. A new approach to the optimizations and developing a tool for
parallel computing process optimization are the goals of the ongoing research. These software tool
development principles and other resulted applications are described in the paper. Properties of computer
architecture are suitable for formalization. Parallel algorithms already exist in a mathematical
form. From the two points, two mathematical models are derived: the model of the computational algorithm
and the computer architecture model. Along with other points, here described their properties
and applications. Both models, even though they represent vastly different real-world objects,
are described in the same terms and with the equivalent level of detail and structure. This distinction
from similar works allows developing a new approach to comparative analysis of the algorithm scalability,
as well as algorithm efficiency for a given architecture. These models are used as a basis for
a core module of the software implementation for simulation and optimizing the architecture and algorithm
interactions. In this article, after the computational process simulation description with the
models’ usage, as a midline working result, placed suggestions for practical using the software, proposed
approach and results of those simulations. At the ending, a few practical examples are demonstrated.
The last simulation example is crosschecked with a computational experiment, derived important
conclusions from its results.
|
|
The aim is to develop software for the automation of the work of the magneto-optical device. The paper
describes the developed automated devices for the study of magneto-optical materials. Materials for
this study thin film with a magnetic anisotropy in which the two-dimensional ordered domain structures
can be formed. These materials are transparent in the infrared and visible spectral range and exhibit a
magneto-optical Faraday effect. Domain structures are of interest for the creation of controlled diffraction
gratings, baffles, switches, fiber-optic communication lines, etc. The device can change the external
influence on the sample, analyze and recognize objects (digital images), highlight the region with
the labyrinthine domain structure. External influences may be magnetic and thermal fields. Formation
of ordered two-dimensional domain structures in the material depends on the parameters of the external
field: the pulse duration, intensity, direction, offset voltage, the direction of DC offset, etc. The device
allows you to get the equilibrium labyrinthine domain structure and register settings of external
fields. At present, the developed software is used in conjunction with a magneto-optical device for materials
research at the Department of Radio Engineering, National Research Mordovia State University.
|
|
created in the process of performing research and development work when new products creating. It
is used to reprodutcion or simulate the specific properties of the specified products and is made to verify
the principle of its action and characterization.
The creation of a model in the process of engineering design the measurement system is an important
stage at which the analysis of the achievability of the requirements for the functional purpose of
the system is performed, and searches for ways to meet these requirements. Information obtained at
this stage will help determine the choice of technical means of the system, its composition, type, and
placement of elements. Particular attention is paid to the choice of the software platform, developing
and program debugging.
During the creation of the coordinate-measuring system model mutual relations were determined
between its elements. Operation to achieve the coordinated interaction of technical, methodological,
mathematical and software of the system is realized. The functional part of the system is carried
out to check its ability to perform the assigned functions. The principle of operation of the system is
proved in practice, the methods of the coordinate measurement are worked out, and the technical and
metrological characteristics of the created model are evaluated. The results of this work will facilitate
the development of solutions to the problems that may arise in the process of engineering design and
building coordinate measuring systems in the future.
|
Information security |
|
|
Authentication still remains one of the major problems in information security. There is a large
number of solutions aimed at providing security of authentication. Some of the solutions are intended
to ensure that authentication data are impossible to be compromised by accessing the transfer channel
for authentication data (class A attacks). Other types of security methods protect authentication data in
their storage (class B attacks). Authentication by username and password is currently the most widely
used authentication method. Passwords are stored on a server with implementation of one-way hash
functions. Password hash can be cracked by brute force enumeration, which allows successful class
B attacks. The paper presents a password identification method, which does not involve storing passwords
in one centralized place. Passwords are split in many parts that are stored on separate computers
on the Internet. Assuming that one or several computers of such network are compromised it will not
result in disclosure of any useful authentication data. Hence, remote nodes may be untrusted and all
internet users can become participants of the data exchange. The solution presented in this paper provides
a multiple increase of user password security against class B attacks even should an adversary
succeed in cracking the server and a part of the network nodes. DKAuth is the practical implementation
of the presented technology. The above solutions were tested as an authentication service. The data obtained
evidence that the DKAuth Protocol can be used even in applications with high operation loads.
|
|
The article сonside the issues of information security specific wireless network architecture. An assessment
of the state of information security systems based on indicators of the events intensity that
occur in the process of malicious impact in terms of queuing theory. The analysis of the potential opportunities
for the offender «soft» attacks on a wireless network. The analytic dependence by which
to measure the state of information security elements of a wireless network architecture. Model of destructive
information impact offender information security. The results showing the accuracy of the
assumptions about the exponential distribution law for the duration of service requests network nodes.
|
Laboratory |
|
Models and Methods |
|
|
The development of the methodology of time series analysis has been studied by many researchers.
This G. E. P. Box, G. M. Jenkins, N. N. Taleb, S. Johansen, C. A. Sims, A. Yu. Loskutov,
B. P. Bezruchko, V. B. Bayburin, and many others. One of the effective methods of time series
analysis is the criterion of uniform approximation by Chebyshev, which has not been considered in
the literature in relation to multivalued mappings by using the Hausdorff metric. The paper presents
method of analysis and parameters estimation of a mathematical model of multivalued time
series, composed of ranges of values of a certain indicator using as a criterion of optimality the
maximum of the local Hausdorff distances between ranges of values and the values of the approximating
function.
The aim of this work is to develop a mathematical method of modeling the time series which are
represented by ranges, based on the development of the method of uniform approximation of functions
in case of set-valued maps using the Hausdorff metric, and the creation of effective, from the point of
view of availability of hardware and software implementations in real-time, algorithm.
|