IT business |
|
Business information systems |
|
|
The relevance of the study is due to the need to ensure the effective functioning of innovative regional
industrial clusters, including the innovation-active industrial enterprises and organizations of
innovation infrastructure. This article is based on a proposal for integration of information resources
of all participants in a complex innovation process with the use of innovation management decision
support in clusters of a specified type. A leading approach in the study is the controlling methodology
application, allowing to identify the main internal and external environment factors to select rational
tools of information management support in innovative regional industrial clusters.
The article presents the model of information exchange between integrated innovation process participants
in the innovation territorial industrial clusters in the implementation of controlling functions,
which are coordinated by the center of the controlling cluster. The model identified the main functional
areas of the controlling system, corresponding to six cycles of a complex innovation process, as well
as four levels of controlling information processes in the cluster: controlling content, controlling applications,
controlling processes, controlling of cluster complex information integration and its region
localization. As an example, such issue as the task of classification and selection of innovative proposals
(including open innovation) for their further use by the cluster enterprises based on four types innovative
filters was solved by the proposed controlling information flows system.
The article can be useful for creating regional information systems providing information support
of management processes in territorial innovation industrial clusters.
|
---|---|
|
Business entities performance is inextricably linked with information resources sharing today. This
problem can be solved by information systems integration. Often IT is not company’s core function
and information system integration is carried out using IT-outsource. Architecture patterns choice and
information system development project management are keys in this case. This article suggests relevant
to modern conditions information systems integration architecture patterns. Information system
life cycle stages and information systems development project stages interrelation model taking in the
account information risks influence is suggested for effective information system development project
management. Decision support system architecture is suggested for information risks minimization
during information systems development project. Suggested results practical utilization is assumed
towards the development of business entities information system integration project management.
|
IT management |
|
Resource management |
|
|
Research of software development cost estimation methods is the aim of the paper.
The ability to estimate the cost of the software is necessary for all parties of the evaluation process.
The customer should estimate the financial costs of the acquisition or development. The developer
have to quickly determine the cost of the development and price of the product. But the estimation
can be quite difficult because of the different amounts of initial information. Software as a part
of the IT-market was researched. Existing methods of the software cost evaluation were observed.
Strengths, limitations and recommendations for some software cost evaluation techniques were presented.
The scheme of selecting the appropriate evaluation methods and the scheme of a combined
approach to product cost estimation under different amounts of initial information were described.
|
Software engineering |
|
Models and althorithms |
|
|
The article describes the optical system for the light-emitting diodes. Analyzed the features of the secondary
use of the optical elements in the form of lenses and prisms for different LED emission patterns
in space. Formulated the requirements imposed on the optical elements. The paper considers the problem
of designing modern lighting devices and optical systems. Analysis of the development of lighting devices
shows that the main stage in their development is the calculation of the optical system, the results
of which largely determine the lighting fixtures and functional characteristics. Application and development
of specialized software for the calculation and simulation of lighting devices significantly facilitates
and speeds up the process of their design. The paper presents a mathematical model developed by the
software system, described in the hierarchical structure of the simulation geometry of lighting devices.
Building an extended triangulation grid facilitates the approximation of smooth surfaces of the optical
element and the photometric body. The software package is carried out modeling of LED optical systems
and luminaires based on them using surface models, ray tracing and calculation of photometric body.
|
|
The classical problem in computer vision, image processing, and machine vision is that of determining
whether or not the image data contains some specific object, feature, or activity. Such problem
is also called image recognition problem. An original approach to graph isomorphism problem is
defined, which is used in images recognition system. A specificity of the suggested approach is based
on the usage of graph structure hashing mechanism. Graph hashing is based on such invariant graph
characteristic as the shortest distances between the nodes. An application implementing this approach
was developed. Developed application can read an image of symbol into a graph and compare graphs
by solving the graphs isomorphism problem. Presented approach was tested on graphs of different
types, also on big graphs with more than 100 nodes, and gave a correct answer. A big advantage of this
approach is the possibility to store hash-codes in database, since hash-code consists of decimal numbers.
It gives an opportunity to create a database of different images, such as faces, symbols, signs.
Decimal numbers comparison is very fast, that’s why a quick search can be performed in the database
of images. In conclusion, this approach can be successfully used for solving many kinds of image
recognition problems.
|
Software development technologies |
|
|
The article summarizes authors’ experience of application of information technologies to support
the life cycle of complex technical systems (CTS), accumulated independently in the field of
creation and administration of such technologies in various industries, from the viewpoint of quality
management [1]. Products related to the category of CTS have a number of significant features
which make higher demands on the organization of their life cycle (LC). The creation of CTS is
usually done interacting collection of companies and organizations that require appropriate management
of their work at various stages of the life cycle. Expenses for creation of CTS pays off due
to their use over a long service life. Integrated indicator of CTS quality may serve as an indicator
of the effectiveness of CTS in the appointment during his lifetime. With the exception of the stage
of operation (which is realized the beneficial effects from the use of the product), the remaining
stages of the lifecycle are costly. The effectiveness of the lifecycle management of CTS largely depends
on the choice of means and methods of process management and lifecycle resources. In scientific
and technical literature and promotional materials of some firms are approved on the application
of homogeneous PLM systems [3, 4]. The analysis of the structure of events and resources
in the lifecycle of CTS (see Fig. 1 and Fig. 2) shows that the effective application of homogeneous
PLM systems is impossible. An integrated life-cycle management system of CTS should be based
in a geographically distributed heterogeneous information networks, which is a collection of autonomous
problem-oriented information systems, developing independently, provided preserve information
compatibility.
|
Artificial intellect |
|
|
The article is devoted to the hybrid intelligent information systems (HIIS) description using metagraph
approach. The generalized structure of HIIS is proposed based on the modules of «consciousness
» and «subconscious». To implement the generalized structure of HIIS it is proposed to use holonic
multi-agent system (MAS). The structure of such a MAS can be described using metagraph approach.
Using metagraph model it is possible to describe the structure of both static and dynamic agents
to implement HIIS. Metagraph approach is one of the variants of the description of «networks with
the emergence». The emergence in metagraph is achieved through the use of metavertices. It is shown
that unlike the metagraph, the hypergraph is not fully «networks with the emergence». Hypernetwork
fully contains the possibilities of describing the «networks with the emergence». The emergence in
hypernetwork is achieved through the use of hypersimplex. Metagraphs compared to hypernetworks
provides a more simple and flexible description of the «networks with the emergence». Metagraph
data model, including the agents, can be presented in the predicate form, which has the property of
homoiconicity. The predicate representation of data and agents allows agents of higher levels to modify
the structure of the agents of the lower levels, which is an important feature of the development of
HIIS. As an example of metagraph approach usage it is possible to describe the structure of a perceptron
neural network. The model of neural network may be represented in metagraph form. To create,
change, learn and execute the neural network different metagraph agents are used. The proposed metagraph
approach may be considered as complex model for HIIS development.
|
Simulation |
|
Theory and practice |
|
|
The problem of the exhaustion of mineral resources is one of the most important global environmental
and economic problems of mankind. The problem progresses, which is not surprising, since
the availability of natural resources limited, but the demand for them is growing.
In this paper presented a simulation model of the salt reserves exhaustion, which depending on the
number of input data can be used to simulate the salt extraction process with displaying the dynamics
of the exhaustion of these reserves in tabular and graphical data by years, and also to see how will
be changed along with this parameter wells productivity, the number of wells put into operation, the
number of conserved wells and many other important parameters.
To develop the model was used available materials about the salt deposits in Ishimbai area. Presented
such input data as salt reserves, the number of commissioned wells, the average productivity of the
well, the planned annual percentage commissioning, the planned annual percentage of conservation.
The model is created in the well-known simulation modeling software program iThink with iconic
cognitive maps. It includes three basic sub-models «Salt reserves», «Wells» and «Productivity», that
mainly determine the overall structure and state of the model. Presented the analysis of the resulting
model by software iThink that allows to judge the sustainability, adequacy and efficiency of the model.
The studies are very important for business planning, especially at this time when more and more
difficulties arise with the extraction of some minerals due to their significant exhaustion.
|
Laboratory |
|
Models and Methods |
|
|
The orthogonal packing problem is a problem related with the founding of the optimal placement
of a given set of small orthogonal items (objects) into a set of large orthogonal items (containers).
This problem is a well-known NP-completed problem that has many applications in industry and economics.
To solve the packing problems usually are applied various approximation algorithms that are
based on the heuristic methods of optimization. To provide the effectively work of an optimization algorithm
is necessary to minimize any delays related with construction of a placement according to solution
obtained by the algorithm. For this purpose were investigated the causes affecting the speed and
quality of placement generation by the given solution in a form of a sequence of objects to be placed
into containers. The paper is presented an effective model of orthogonal objects management which
provides the possibility of constructing orthogonal packings of arbitrary dimension in solving of all
optimization problems of orthogonal packing and rectangular cutting. This model is the fasted compared
with other known models for objects management. In paper are given algorithms of placement
and deleting objects. The deleting objects algorithm may be used in future in realization of the algorithm
for the local improvements of the obtained placement. The efficiency of the proposed model is
demonstrated on the standard three-dimensional orthogonal packing test problems.
|
Information security |
|
Data protection |
|
|
Complexity of computer information systems at present does not allow an overall verification to
ensure absence errors and vulnerabilities at the development stage. Consequently, the more complex
is the system, the more it is subjected to the information security risks. Recently there have been several
approaches to solving the security problem for complex information systems. The paper presents
a generalized algorithm for development of systems secure from research. The algorithm includes
methods for blurring system parameters and methods based on the moving target technology. Both
above methods are versatile and can be implemented for typical solutions as well as for unique algorithms
applicable to hardware-software solutions. The algorithm includes detection of critical components
which when compromised may be a security threat. The search for sources of randomness
and parameters, which can be used for building a blurring process or a self-complication process for
a computer information system. A system’s protection from research prevents attackers from gathering
information sufficient for exploiting vulnerabilities, while the system’s vulnerabilities are not eliminated.
A method for quantitative evaluation of changes in the security level of information systems is
presented. The method is based on changing the set of potential attacks after implementation of the
methods for protection against research. Analysis of the results achieved by implementation of the
DKAuth password authentication technology and the BSRouter network security software and hardware
complex showed the decreased potential for successful attacks by 25% and 12.26% accordingly.
|
|
Nowadays, users of social networks (Social Network) are increasingly using them to promote businesses,
distribute advertisements for goods and services, leisure, hobbies, personal communication
and information exchange, thus being an open source of information for intruders. Attackers use various
ways to implement attacks, one of which is the dissemination of targeted information. Successful
distribution of targeted (unwanted) information entails the implementation of the attack scenario and
the achievement of the target of the attacker. In this regard, the attackers have an interest in involving
the so-called social networking community leaders (users who have a high level of trust, influence
among a large number of community users) who are able to successfully implement a part of the attack
scenario of the attacker. The article attempts to formalize a generalized algorithm for the distribution
of targeted information in social networks: a set of initial data and the results of the algorithm
work are presented — parameters for implementing attack scenarios, the variation of which will allow
it to be detailed. The technique of protection from the targeted information distributed in social
networks is offered, which will allow to increase the level of protection of personal data and personal
information of users of social networks, reliability of information. The results of the research will
help to prevent threats to information security, to counteract attacks by intruders who often use competitive
intelligence and social engineering methods by applying countermeasures, develop a model
of protection against targeted information and, on its basis, implement special software for integration
into virtual social networks.
|