Research of software development cost estimation methods is the aim of the paper.
The ability to estimate the cost of the software is necessary for all parties of the evaluation process.
The customer should estimate the financial costs of the acquisition or development. The developer
have to quickly determine the cost of the development and price of the product. But the estimation
can be quite difficult because of the different amounts of initial information. Software as a part
of the IT-market was researched. Existing methods of the software cost evaluation were observed.
Strengths, limitations and recommendations for some software cost evaluation techniques were presented.
The scheme of selecting the appropriate evaluation methods and the scheme of a combined
approach to product cost estimation under different amounts of initial information were described.
Continue...
|
|
The article describes the optical system for the light-emitting diodes. Analyzed the features of the secondary
use of the optical elements in the form of lenses and prisms for different LED emission patterns
in space. Formulated the requirements imposed on the optical elements. The paper considers the problem
of designing modern lighting devices and optical systems. Analysis of the development of lighting devices
shows that the main stage in their development is the calculation of the optical system, the results
of which largely determine the lighting fixtures and functional characteristics. Application and development
of specialized software for the calculation and simulation of lighting devices significantly facilitates
and speeds up the process of their design. The paper presents a mathematical model developed by the
software system, described in the hierarchical structure of the simulation geometry of lighting devices.
Building an extended triangulation grid facilitates the approximation of smooth surfaces of the optical
element and the photometric body. The software package is carried out modeling of LED optical systems
and luminaires based on them using surface models, ray tracing and calculation of photometric body.
Continue...
|
|
The classical problem in computer vision, image processing, and machine vision is that of determining
whether or not the image data contains some specific object, feature, or activity. Such problem
is also called image recognition problem. An original approach to graph isomorphism problem is
defined, which is used in images recognition system. A specificity of the suggested approach is based
on the usage of graph structure hashing mechanism. Graph hashing is based on such invariant graph
characteristic as the shortest distances between the nodes. An application implementing this approach
was developed. Developed application can read an image of symbol into a graph and compare graphs
by solving the graphs isomorphism problem. Presented approach was tested on graphs of different
types, also on big graphs with more than 100 nodes, and gave a correct answer. A big advantage of this
approach is the possibility to store hash-codes in database, since hash-code consists of decimal numbers.
It gives an opportunity to create a database of different images, such as faces, symbols, signs.
Decimal numbers comparison is very fast, that’s why a quick search can be performed in the database
of images. In conclusion, this approach can be successfully used for solving many kinds of image
recognition problems.
Continue...
|
|
№ 3(69)
30 june 2017 year
Rubric: Artificial intellect Authors: Chernenkiy V., Gapanyuk Y., Kaganov Y., Revunkov G., Terekhov V. |
The article is devoted to the hybrid intelligent information systems (HIIS) description using metagraph
approach. The generalized structure of HIIS is proposed based on the modules of «consciousness
» and «subconscious». To implement the generalized structure of HIIS it is proposed to use holonic
multi-agent system (MAS). The structure of such a MAS can be described using metagraph approach.
Using metagraph model it is possible to describe the structure of both static and dynamic agents
to implement HIIS. Metagraph approach is one of the variants of the description of «networks with
the emergence». The emergence in metagraph is achieved through the use of metavertices. It is shown
that unlike the metagraph, the hypergraph is not fully «networks with the emergence». Hypernetwork
fully contains the possibilities of describing the «networks with the emergence». The emergence in
hypernetwork is achieved through the use of hypersimplex. Metagraphs compared to hypernetworks
provides a more simple and flexible description of the «networks with the emergence». Metagraph
data model, including the agents, can be presented in the predicate form, which has the property of
homoiconicity. The predicate representation of data and agents allows agents of higher levels to modify
the structure of the agents of the lower levels, which is an important feature of the development of
HIIS. As an example of metagraph approach usage it is possible to describe the structure of a perceptron
neural network. The model of neural network may be represented in metagraph form. To create,
change, learn and execute the neural network different metagraph agents are used. The proposed metagraph
approach may be considered as complex model for HIIS development.
Continue...
|
№ 3(69)
30 june 2017 year
Rubric: Software development technologies Authors: Strakhov A., Strakhov O. |
The article summarizes authors’ experience of application of information technologies to support
the life cycle of complex technical systems (CTS), accumulated independently in the field of
creation and administration of such technologies in various industries, from the viewpoint of quality
management [1]. Products related to the category of CTS have a number of significant features
which make higher demands on the organization of their life cycle (LC). The creation of CTS is
usually done interacting collection of companies and organizations that require appropriate management
of their work at various stages of the life cycle. Expenses for creation of CTS pays off due
to their use over a long service life. Integrated indicator of CTS quality may serve as an indicator
of the effectiveness of CTS in the appointment during his lifetime. With the exception of the stage
of operation (which is realized the beneficial effects from the use of the product), the remaining
stages of the lifecycle are costly. The effectiveness of the lifecycle management of CTS largely depends
on the choice of means and methods of process management and lifecycle resources. In scientific
and technical literature and promotional materials of some firms are approved on the application
of homogeneous PLM systems [3, 4]. The analysis of the structure of events and resources
in the lifecycle of CTS (see Fig. 1 and Fig. 2) shows that the effective application of homogeneous
PLM systems is impossible. An integrated life-cycle management system of CTS should be based
in a geographically distributed heterogeneous information networks, which is a collection of autonomous
problem-oriented information systems, developing independently, provided preserve information
compatibility.
Continue...
|
Nowadays, users of social networks (Social Network) are increasingly using them to promote businesses,
distribute advertisements for goods and services, leisure, hobbies, personal communication
and information exchange, thus being an open source of information for intruders. Attackers use various
ways to implement attacks, one of which is the dissemination of targeted information. Successful
distribution of targeted (unwanted) information entails the implementation of the attack scenario and
the achievement of the target of the attacker. In this regard, the attackers have an interest in involving
the so-called social networking community leaders (users who have a high level of trust, influence
among a large number of community users) who are able to successfully implement a part of the attack
scenario of the attacker. The article attempts to formalize a generalized algorithm for the distribution
of targeted information in social networks: a set of initial data and the results of the algorithm
work are presented — parameters for implementing attack scenarios, the variation of which will allow
it to be detailed. The technique of protection from the targeted information distributed in social
networks is offered, which will allow to increase the level of protection of personal data and personal
information of users of social networks, reliability of information. The results of the research will
help to prevent threats to information security, to counteract attacks by intruders who often use competitive
intelligence and social engineering methods by applying countermeasures, develop a model
of protection against targeted information and, on its basis, implement special software for integration
into virtual social networks.
Continue...
|