+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Journal archive

№5(77) September-october 2018 year

Content:

IT business

E-commerce

Practice shows that at the same time, as traditional retail sales decline, the e-commerce market has been growing steadily since 2007. The efficiency of this distribution channel depends on the chain of connected business-processes of delivery from the supplier to the final buyer. Without proper coordination of these processes, efficient retailing is difficult. The retail trade procedures are based on the integrated interaction of information technology, large data technologies, Internet Things and newly emerging technologies. This article provides an overview of the e-commerce market, the role of IT in it, the practice of using IT in the channels for the provision and distribution of goods, and the actual requirements of customers for the services of the reseller. On the basis of the obtained data on the current practices of IT architecture management, it is necessary to develop reference models for retail enterprises. At the moment, there are developed reference models of companies in the field of retail sales, taking into account the use of the mentioned information technologies and services, such as IoT and Big Data. After analyzing the results of the work done, it is possible to develop reference architecture models using modern Internet technologies Things and Big Data based on the development of integration platforms and applicable to any information systems and services providers based on the best retail practices.

IT management

Performance management

New tasks of human resource management require the analysis of huge volumes of semistructured text information. Methods of text processing and machine learning can significantly improve its effectiveness in case they take into consideration the features of tasks to be solved. The article describes actual analytical problems of human resource management, characteristics of information support of these problems, shortcomings and assumptions of frequently used methods of both classes in the tasks context. An example of applying test processing and machine learning methods in the task of compliance assessment is given in the article as well.

IT and education

Educational environment

The article highlights the importance of personnel training for digital economy. A list of the most demanded soft skills necessary for future jobs in industrial sector has been formed according to the results of foreign and Russian research. The list includes complex problem-solving, social, process and systems skills, and cognitive abilities. The research conducted by the authors is focused on the soft skills formation and development, which is relevant both for employers and universities which train specialists. For training of the skills mentioned above such interactive forms of learning as case study, round table and computer business simulator are suggested. The article studies the experience of practical usage of each of these forms in the discipline of «Business Informatics» in bachelor’s and master’s degrees programs, gives some examples and specifics of application. By modeling the processes of interactive classes, the link has been established between the activities performed by students and certain skills formation. The specification of interactive activities has made it possible to work out a differentiated approach for formation of soft skills of the future and recommend such interactive forms of training students for their further development. In this case soft skills are formed in line with acquisition by students of competences stipulated by the educational standards of higher professional education.

Software engineering

Algorithmic efficiency

Author: E. Kasatkina

When building a logistics system of any organizational structure, the problem of determining the optimal routes for cargo transportation is solved. The paper presents the formulation of the logistics routing problem, which as a criterion of optimization is considered to minimize transport costs included in the cost of the final product. A complex routing algorithm based on the application of a genetic algorithm in which the formation of the initial population is carried out using a modified A-star algorithm and the Yen method is developed. As a result of testing the developed algorithm, the optimal values of the algorithm parameters are obtained, at which the performance and high computational efficiency are achieved. The developed algorithm is implemented in the program «Information and analytical control system of fuel supply of the region with alternative fuels». The routing algorithm was used in the construction of the optimal logistics system of fuel supply of the Udmurt Republic to transfer the distributed heat supply system to renewable energy sources. With the help of this algorithm, the optimal routes of transportation of wood raw materials from the points of accumulation of raw materials to the points of fuel preparation and the optimal routes of transportation of fuel from the points of fuel preparation to heat sources for the distributed heat supply system of the Udmurt Republic are constructed.

The actual voltage steady-state load characteristics are necessary for effective and reliable operational management of electric power systems. The actual voltage steady-state load characteristics for connection allow to calculate the values of active and reactive power from the applied voltage in a steady-state mode at a constant frequency. This will allow accurately predicting consumption schedule of electricity, increasing the static stability and loading power lines. One of the main difficulties in updating the voltage steady-state load characteristics is the lack of tools for processing voltage and power measurements. The author’s algorithm and the architecture of its software implementation are proposed in the article, allowing to automate the process of obtaining actual voltage steady-state load characteristics. The developed algorithm is based on data mining methods such as cluster analysis, filtering, regression analysis and others. The software product is designed in accordance with the provisions of the service-oriented architecture and has a decomposition by layers, where each layer has its own functionality. The results of the software calculations can be used in any software products that support the CIM standard. In addition, the possibilities of integrating the developed software with corporate applications used by SO UРS are discussed. Preliminary considerations on this issue were addressed in the report [1]. This report is devoted to the description of the software.

Information infrastructure

Author: Y. Lipuntsov

Information exchange is the basis for the development of the digital economy. It is based on infrastructure that will be a provider of up-to-date data on basic objects and dictionaries for transactions with these objects. Currently, a large number of projects and initiatives are being implemented in the digital economy. Information assets are a key factor of development in all spheres of social and economic activity of the digital economy. The digital economy requires a purposeful work with data where all information exchange participants should be involved: ministries, departments, companies and other organizations. The paper shows the principles by which you can build an agreed policy in the data field, in particular by using data model templates. This article is based on the Russian and international experience in creating an information eGov infrastructure for delivery of government and corporate e-services. The article uses the experience of creating a such infrastructure in the public sector of the European Union, the United States, and the corporate sector. The article describes the main approaches to creating data templates in a digital economy. The use of templates will allow you to quickly create models, easily read them, avoid global errors at the operational level of management. The templates will allow the coordinate policy in the goal-setting level, linking the individual strategies at the upper level management.

The study of tasks and methods of automated text rubrication was conducted and their prospects for the analysis of unstructured electronic text documents were evaluated taking into account the peculiarities of appeals received from citizens to the authorities. The architecture of the information system of automated analysis of such documents is developed. It implements the proposed multi-model approach to the rubrication based on the integrated use of intelligent and probabilistic-statistical methods. The procedure of processing citizens’appeals received by the authorities using the document management system and the developed information system is given.

Laboratory

Models and Methods

Author: A. Veselov

The paper presents the results of experimental studies of the effectiveness of the application of distributed models in comparison with their monolithic analogs. As a basic model, models based on the mathematical apparatus of Petri nets are used. In particular, special expansion of ordinary, temporary Petri nets with inhibitory arcs, oriented to modeling of digital devices of automation and computer facilities. A description of the indicators used to evaluate the effectiveness of monolithic and distributed models is given. The advantages and disadvantages of these types of models are discussed. The short description of this model, indexes for assessment of effectiveness and conditions of carrying out an experiment is given. Analysis of effectiveness of the distributed models allowed to select two feature. The first is that, in process of increase in their size, the efficiency factor of the distributed models continuously increases. At the same time, models with the smaller number of hierarchical levels are more efficient. The second feature is that, in process of further increase in the sizes of the distributed models, the effectiveness on speed of models with a large number of hierarchical levels becomes not only equal, but to exceed effectiveness of models with their smaller quantity. It is shown, that high-speed performance of the distributed models can be two orders more, and time of their loading is tens times less, than similar indices at monolithic models.

Author: A. Gavrishev

In this paper, the author uses the software package ScicosLab to conduct experimental modeling of common secure communication systems and their experimental analysis using known methods of nonlinear dynamics (time and spectral diagrams, phase portraits, Hurst exponent, maximal Lyapunov exponent, BDS-statistics). As a common secure communication systems was chosen as the communication system based on direct spread spectrum communications, system on the basis of the noise signals, the proposed Shagarova A. A., communication system based on chaotic masking and communication system based on chaotic modulation, represented by apparatus for protection against imitation of controlled objects with high structural security of carrier signals. As a result of researches it was established that: BDS-statistics explicitly identifies communication systems on the basis of classical approaches of formation of noise-like signals and their derivatives; communication systems on the basis of classical approaches of formation of noise-like signals and their derivatives possess positive maximal Lyapunov exponent and thus possess chaotic properties; the obtained quantitative values of BDS-statistics, maximal Lyapunov exponent, the Hurst exponent indicate that communication systems based on chaotic signals in general are more preferable for secure communication systems than communication systems based on classical approaches to the formation of noise-like signals and their derivatives; of the considered communication systems based on chaotic signals, the system based on chaotic modulation is more preferable for secure communication systems, since it has the highest maximal Lyapunov exponent, which is an indicator of greater protection against unauthorized access than the considered analogues, as it is indicated by the obtained values of BDS-statistics.

Information security

Data protection

The task of determining information security state of objects using the information of signals of electromagnetic emissions of individual elements of devices of cyber-physical systems was investigated. We consider the main side channels of information with which it is possible to monitor the state of the system and analyze the software and hardware environment. Such «independent» methods of monitoring allow analyzing the state of the system based on external behavioral characteristics within the framework of conceptual models of autonomous agents. The statistical characteristics of signals allowing to identify changes in the state of local devices of systems are considered. Was described an experiment aimed at obtaining statistical information on the operation of individual elements of cyberphysical systems. The efficiency of the neural networks approach for solving the described classification problem, in particular, two-layer feed-forward neural networks with sigmoid hidden neurons was investigated. The results of the experiments showed that the proposed approach is superior to the quality of detection of anomalous states by classification based on internal indicators of the functioning of the system. With minimal time of accumulation of statistical information using the proposed approach based on neural networks, it becomes possible to identify the required state of the system with a probability close to 0.85. The proposed approach of the analysis of the statistical data based on neural networks can be used for definition of states of information safety of independent devices of cyber-physical systems.