+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 3(69) 30 june 2017 year
Rubric: Resource management
The author: Gol`chevskij Y. V.

Купить статью

Download the first page

Research of software development cost estimation methods is the aim of the paper. The ability to estimate the cost of the software is necessary for all parties of the evaluation process. The customer should estimate the financial costs of the acquisition or development. The developer have to quickly determine the cost of the development and price of the product. But the estimation can be quite difficult because of the different amounts of initial information. Software as a part of the IT-market was researched. Existing methods of the software cost evaluation were observed. Strengths, limitations and recommendations for some software cost evaluation techniques were presented. The scheme of selecting the appropriate evaluation methods and the scheme of a combined approach to product cost estimation under different amounts of initial information were described.
Continue...
№ 3(69) 30 june 2017 year
Rubric: Models and althorithms
The author: Bajnev V.

Купить статью

Download the first page

The article describes the optical system for the light-emitting diodes. Analyzed the features of the secondary use of the optical elements in the form of lenses and prisms for different LED emission patterns in space. Formulated the requirements imposed on the optical elements. The paper considers the problem of designing modern lighting devices and optical systems. Analysis of the development of lighting devices shows that the main stage in their development is the calculation of the optical system, the results of which largely determine the lighting fixtures and functional characteristics. Application and development of specialized software for the calculation and simulation of lighting devices significantly facilitates and speeds up the process of their design. The paper presents a mathematical model developed by the software system, described in the hierarchical structure of the simulation geometry of lighting devices. Building an extended triangulation grid facilitates the approximation of smooth surfaces of the optical element and the photometric body. The software package is carried out modeling of LED optical systems and luminaires based on them using surface models, ray tracing and calculation of photometric body.
Continue...
№ 3(69) 30 june 2017 year
Rubric: Models and althorithms
The author: Dunayev A.

Купить статью

Download the first page

The classical problem in computer vision, image processing, and machine vision is that of determining whether or not the image data contains some specific object, feature, or activity. Such problem is also called image recognition problem. An original approach to graph isomorphism problem is defined, which is used in images recognition system. A specificity of the suggested approach is based on the usage of graph structure hashing mechanism. Graph hashing is based on such invariant graph characteristic as the shortest distances between the nodes. An application implementing this approach was developed. Developed application can read an image of symbol into a graph and compare graphs by solving the graphs isomorphism problem. Presented approach was tested on graphs of different types, also on big graphs with more than 100 nodes, and gave a correct answer. A big advantage of this approach is the possibility to store hash-codes in database, since hash-code consists of decimal numbers. It gives an opportunity to create a database of different images, such as faces, symbols, signs. Decimal numbers comparison is very fast, that’s why a quick search can be performed in the database of images. In conclusion, this approach can be successfully used for solving many kinds of image recognition problems.
Continue...
№ 3(69) 30 june 2017 year
Rubric: Artificial intellect
Authors: Chernenkiy V., Gapanyuk Y., Kaganov Y., Revunkov G., Terekhov V.

Купить статью

Download the first page

The article is devoted to the hybrid intelligent information systems (HIIS) description using metagraph approach. The generalized structure of HIIS is proposed based on the modules of «consciousness » and «subconscious». To implement the generalized structure of HIIS it is proposed to use holonic multi-agent system (MAS). The structure of such a MAS can be described using metagraph approach. Using metagraph model it is possible to describe the structure of both static and dynamic agents to implement HIIS. Metagraph approach is one of the variants of the description of «networks with the emergence». The emergence in metagraph is achieved through the use of metavertices. It is shown that unlike the metagraph, the hypergraph is not fully «networks with the emergence». Hypernetwork fully contains the possibilities of describing the «networks with the emergence». The emergence in hypernetwork is achieved through the use of hypersimplex. Metagraphs compared to hypernetworks provides a more simple and flexible description of the «networks with the emergence». Metagraph data model, including the agents, can be presented in the predicate form, which has the property of homoiconicity. The predicate representation of data and agents allows agents of higher levels to modify the structure of the agents of the lower levels, which is an important feature of the development of HIIS. As an example of metagraph approach usage it is possible to describe the structure of a perceptron neural network. The model of neural network may be represented in metagraph form. To create, change, learn and execute the neural network different metagraph agents are used. The proposed metagraph approach may be considered as complex model for HIIS development.
Continue...
№ 3(69) 30 june 2017 year
Rubric: Software development technologies
Authors: Strakhov A., Strakhov O.

Купить статью

Download the first page

The article summarizes authors’ experience of application of information technologies to support the life cycle of complex technical systems (CTS), accumulated independently in the field of creation and administration of such technologies in various industries, from the viewpoint of quality management [1]. Products related to the category of CTS have a number of significant features which make higher demands on the organization of their life cycle (LC). The creation of CTS is usually done interacting collection of companies and organizations that require appropriate management of their work at various stages of the life cycle. Expenses for creation of CTS pays off due to their use over a long service life. Integrated indicator of CTS quality may serve as an indicator of the effectiveness of CTS in the appointment during his lifetime. With the exception of the stage of operation (which is realized the beneficial effects from the use of the product), the remaining stages of the lifecycle are costly. The effectiveness of the lifecycle management of CTS largely depends on the choice of means and methods of process management and lifecycle resources. In scientific and technical literature and promotional materials of some firms are approved on the application of homogeneous PLM systems [3, 4]. The analysis of the structure of events and resources in the lifecycle of CTS (see Fig. 1 and Fig. 2) shows that the effective application of homogeneous PLM systems is impossible. An integrated life-cycle management system of CTS should be based in a geographically distributed heterogeneous information networks, which is a collection of autonomous problem-oriented information systems, developing independently, provided preserve information compatibility.
Continue...
№ 3(69) 30 june 2017 year
Rubric: Data protection
The author: Tumbinskaya M. V.

Купить статью

Download the first page

Nowadays, users of social networks (Social Network) are increasingly using them to promote businesses, distribute advertisements for goods and services, leisure, hobbies, personal communication and information exchange, thus being an open source of information for intruders. Attackers use various ways to implement attacks, one of which is the dissemination of targeted information. Successful distribution of targeted (unwanted) information entails the implementation of the attack scenario and the achievement of the target of the attacker. In this regard, the attackers have an interest in involving the so-called social networking community leaders (users who have a high level of trust, influence among a large number of community users) who are able to successfully implement a part of the attack scenario of the attacker. The article attempts to formalize a generalized algorithm for the distribution of targeted information in social networks: a set of initial data and the results of the algorithm work are presented — parameters for implementing attack scenarios, the variation of which will allow it to be detailed. The technique of protection from the targeted information distributed in social networks is offered, which will allow to increase the level of protection of personal data and personal information of users of social networks, reliability of information. The results of the research will help to prevent threats to information security, to counteract attacks by intruders who often use competitive intelligence and social engineering methods by applying countermeasures, develop a model of protection against targeted information and, on its basis, implement special software for integration into virtual social networks.
Continue...