+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 2(92) 30 april 2021 year
Rubric: Software engineering
Authors: Gumerov E. A., Alekseeva T. V.

Купить статью

Download the first page

Cyber-physical systems are a means of effectively managing industrial applications of the Internet of things. Physical layer cyber-physical system implements the control devices of the industrial Internet of things and intelligent algorithms digital system level provide management and information security applications. Effective management and information security determine the success of the industrial Internet of things, so the research topic is relevant. The purpose of this article is to develop an optimal architecture of a cyber-physical system based on the principles of data processing at the place of their occurrence and the application of a control action at the place of the problem occurrence. The authors were faced with the task of exploring all the possibilities associated with the application of the proposed principles and developing an optimal application architecture for the industrial Internet of things. In the study proposed the concept of intelligent application of industrial Internet of things, which enables processing of continuously generated data in their source and provides application control action to the location of the problem. The proposed solution: a) increases the information security of the industrial application of the Internet of things (data is not transmitted over the network) and b) prevents an attack on the software of the Industrial application of the Internet of things. The solution can be used by developers of industrial IoT systems to effectively launch and implement projects. Continue...
№ 2(92) 30 april 2021 year
Rubric: IT and education
Authors: Kataev A., Vikulin M.

Купить статью

Download the first page

This article discusses modern server monitoring systems. The subject area under review concerns the control and management of high-performance computing systems (HPC). These systems are used in various branches of science and industry for modeling systems and their behavior in various conditions. The speed of the simulation depends on the applied technical solutions as part of the computing complex. These include the type of internal network, the number and types of computing nodes. For computing nodes, consider such parameters as the architecture and model of the processor, the amount of RAM. The features associated with the implementation of specific mathematical models that affect the speed of calculations are not considered in this article. The paper analyzes the existing market solutions and the main concepts used for the management and monitoring systems of such complexes. The systems under consideration are evaluated from an economic and technical point of view. For the available systems, a full-scale study of the cluster management and status monitoring capabilities is conducted. The set of parameters recorded by the monitoring system is taken based on the general architecture of the HPC and the approach to the administration of server systems. The practical part describes the experience of designing and implementing a promising management system. In the system being created, the main focus is on creating a management system. The justification for the need for a separate software product is given in the text of the article. Implementation issues in a specific program code and system environment are omitted, as they depend on the specific execution of the system. The task of creating your own monitoring system is considered insignificant, provided that existing solutions are available. Continue...
№ 2(92) 30 april 2021 year
Rubric: Algorithmic efficiency
Authors: Baynova M., Sokolov A. M.

Купить статью

Download the first page

The paper proposes an algorithm for automated search and initial analysis of sociological information aimed at studying the territorial identity of city area residents using Internet sources. Communities of social networks, e.g. VKontakte, are considered as the main data source, and websites of topographic objects found in the territories under study are used as auxiliary information sources. It is demonstrated that, in terms of information support, public pages and groups with open or restricted access walls have the greatest potential. The developed algorithm implies selecting relevant groups, finding content concerning area issues, and determining the indices of community activity in discussing territorial problems. The required information is retrieved through the interaction with a social network server with the use of the official Application Programming Interface (API). To identify communities and posts, it is proposed to apply methods of morphological analysis of textual information. The software implementation of the algorithm is described in Python 3.8.5, including original functions for the acquisition of data on communities by their identification numbers, for the formation of a set of urbanonyms for a specified area, and some other ones. The developed program has been used to analyze territorial groups in three areas of Moscow; the results of the analysis enable us to estimate the degree of the territorial identity of their residents. The analysis of the error in the results of automated data collection and processing shows good agreement of these results with manually obtained ones, i.e. the error is 2.6% in the identification of relevant groups and about 3% in the identification of posts on area issues. Therewith, a much higher speed of response and lower labor effort required to perform routine operations allow the algorithm and the implementing computer program to be viewed as an effective tool for sociological research based on data from social networks. Continue...
№ 2(92) 30 april 2021 year
Rubric: Algorithmic efficiency
Authors: Erokhin V., Pritchina L.

Купить статью

Download the first page

The article discusses the problem of detecting and filtering shellcode – malicious executable code that contributes to the emergence of vulnerabilities in the operation of software applications with memory. The main such vulnerabilities are stack overflow, database overflow, and some other operating system service procedures. Currently, there are several dozen shellcode detection systems using both static and dynamic program analysis. Monitoring of existing systems has shown that methods with low computational complexity are characterized by a large percentage of false positives. Moreover, methods with a low percentage of false alarms are characterized by increased computational complexity. However, none of the currently existing solutions is able to detect all existing classes of shellcodes. This makes existing shellcode detection systems weakly applicable to real network links. Thus, the article discusses the problem of analyzing shellcode detection systems that provide complete detection of existing classes of shellcodes and are characterized by acceptable computational complexity and a small number of false alarms. This article introduces shellcode classifications and a comprehensive method of detecting them based on code emulation. This approach expands the detection range of shellcode classes that can be detected by concurrently evaluating several heuristics that correspond to low-level CPU operations during execution of various shellcode classes. The presented method allows efficient detection of simple and metamorphic shellcode. This is achieved regardless of the use of self-modifying code or dynamic code generation on which existing emulation-based polymorphic shellcode detectors are based. Continue...
№ 2(92) 30 april 2021 year
Rubric: Models and Methods
Authors: Bulygina O. V., Ivanova O., Khamidullin R., Zyrianov S.

Купить статью

Download the first page

In the context of the coronavirus pandemic, the importance of disposable tableware and packaging for food has sharply increased. On the one hand, this contributed to an increase in demand for such products, and on the other hand, it strengthened the already intense competition in this market. As a result, manufacturers of disposable tableware faced the vital challenge of finding ways to maintain and expand their customer base. Today, a promising way to solve it is the development and implementation of various product and technological innovations. However, the implementation of such projects is a rather complex process, since it includes not only the creation or modification of production technologies and manufactured products but organizational changes related to all business processes of the enterprise. Practice shows that the human factor plays a special role in carrying out such organizational changes, while the greatest threat to the project is not mistakes in planning and implementation of changes but the resistance of employees. One of the ways to prevent or reduce it is to create a dedicated change support team that is distinguished by its initiative. However, in practice, it is rather difficult to identify such employees who not only want to participate in the implementation of changes but have sufficient knowledge, skills, experience to carry them out. To solve this problem, it was suggested employee behavior modeling, aimed at optimizing the team composition based on a study of various characteristics. The artificial bee colony algorithm modified by the introduction of fuzzy elements (to set the initial search positions) was used for its practical implementation. Continue...
№ 2(92) 30 april 2021 year
Rubric: Models and Methods
The author: CHernov V. G.

Купить статью

Download the first page

In business process management, semi-structured or unstructured tasks are very common. The predominance of qualitative estimates of the parameters of such problems leads to the fact that the initial requirements for the selection of appropriate information technologies can be formulated primarily at a qualitative level. In this situation, estimates in the form of linguistic statements formalized by fuzzy sets can be quite informative. Uncertainty in the initial data, the presence of several alternative solutions make it possible to formalize the problem of choosing information technology for solving semi-structured business problems as a game with nature, which is understood as a certain combination of conditions, for example, the number of users and the intensity of their requests, assessed by fuzzy, linguistic statements. The aim of the proposed work is to develop a method for finding the most appropriate solution in conditions of indistinctness of the initial data that determine the choice on a variety of possible alternative information technologies. The proposed method for finding the best solution differs in that all the necessary initial estimates are set in the form of linguistic statements formalized by fuzzy sets, while the influence of fuzzy values of the probabilities of states of nature is taken into account through point estimates of fuzzy sets formalizing these values, and an integral estimate of possible solutions is obtained by transformation of the original fuzzy estimates of alternative solutions into the form of equivalent triangular fuzzy sets. In addition, the proposed method makes it possible to use various types of membership functions of fuzzy sets that formalize these estimates when setting fuzzy initial estimates for solving the problem, as well as to simplify the comparison of integral estimates of possible alternative solutions obtained in the form of fuzzy sets. Continue...