+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 6(78) 28 december 2018 year
Rubric: Educational environment
Authors: Shpolyanskaya I. Y., Dolzhenko A., Prokhorova A.

Купить статью

Download the first page

Web technologies and e-marketing provide universities with new opportunities to organize more effective interaction with consumers of educational services. The website of the University becomes an effective marketing tool for attracting consumers of educational services and forming a positive image of the University in the conditions of growing competition. In the process of development and implementation of educational websites, there is a problem of determining the most effective methods of organization and online promotion of websites in order to use them as a marketing tool to attract the greatest number of potential applicants to the University. The main problem that limits the possibility of using the educational website as an effective e-marketing tool is the lack of procedures for evaluating the quality of the portal. The quality of the website is a determining condition for attracting new users and assuring the satisfaction and loyalty of potential and existing consumers of educational services. Therefore, the development of a quality assessment system for an educational website becomes an important requirement in the organization of user feedback for continuous improvement of marketing communications of the educational institution. The article introduces a model for assessing the quality of the University website for effective promotion of educational services, and a method that use expert estimation and fuzzy logic.
Continue...
№ 6(78) 28 december 2018 year
Rubric: Educational environment
Authors: Grachev A., Alekseeva T. V.

Купить статью

Download the first page

This research is dedicated to studying of use of blockchain technology in the education sector. Advantages, requirements and also possible problems which can arise at different stages of introduction of the considered solution are shown in the article. This review is dedicated to very new direction of application of blockchain and is intended for the management of educational institutions and scientists researching the considered technology. The goal of this article is to show the reasonability of integrating blockchain-based platform into education. The current certification system has a number of issues which can be solved by use of the said technology. The basic structure of blockchain provides high reliability and security making it tamperproof. This property is the key solution to the greatest problem of current certification system — the forgery of certificates. The mechanism is transparent which can help build trust with participants. The decentralized ledger technology prevents loss or destruction of certificates effectively solving the other big problem of paper certificates. The platform can help recruiters find suitable workers by providing paid access to student’s grades and achievements database. The worldwide adaptation of blockchain into education sector will allow migrating students to retrieve their certificates and use it in other country. This review shows that the blockchain technology can become a suitable tool for use as an open standard for certification system. The said platform is able to transform education and make it more genuine, united and reliable. It is possible to draw a conclusion on efficiency of a blockchain and to recommend it for use by educational institutions as the transparent and trusted system of registration and verification of the academic achievements. This opens many new opportunities in education.
Continue...
№ 6(78) 28 december 2018 year
Rubric: Algorithmic efficiency
Authors: Obychaiko D., Shikhin V.

Купить статью

Download the first page

The problem of reliability analysis and recovery process of cyber-physical systems (CPS) is under consideration. The approach is based on the division of the life cycle into time slices with reference to the pre-emergency, emergency, restored and predicted states. Working capability restoration of the CPS is executed with respect to extremely critical and critical equipment. Constructed state graphs of the cybernetic component and the physical component are introduced and the differential equations linking the probability of return to a working state with intensities of failures and restorations of various types are formulated. Under the known initial conditions of the probabilities for corresponding states the solution of appropriate ordinary differential equations allows a clear graphical interpretation in the time domain, which shows the changes in the probability of the system components transition from one state to another by time slices of the life cycle of the CPS-system. The developed diagram of decision-making on restoration or replacement of the corresponding component provides to make the reasonable choice of the actions option aimed on working capability restoration. An algorithm for the method implementation is developed and tested via execution of the numerical example related with Automated Parking system as a typical representative of the CPS-systems variety.
Continue...
№ 6(78) 28 december 2018 year
Rubric: Information infrastructure
Authors: Artyuhin V., Chiasnavichius J.

Купить статью

Download the first page

In the Ministry of Emergency Situations, as well as in many other distributed state organizations, collecting and the analyzing of data organized hierarchically. Lower level divisions collect actual data (immediate measurements) about the number of emergencies, human casualties, road accidents etc, summarize (aggregate) them on a regular basis and report higher in the chain of command. The recipients of the information do the same. This process repeats until the resulting data appear in official documents. Such an organization of data flows was realized long ago, when computers and means of communication did not allow quick processing of big data. It was necessary to restrict volume of data received and processed at each administrative level. In fact, elimination of the need to analyze all data coming from all subordinate levels is the single advantage of this model. However, according to the authors, in the 21st century it makes sense to get rid of such model as its numerous shortcomings overwhelm its advantages. The relevance of this article first of all is caused by the initiatives connected to «open data» and «digitalization» of economy. In turn the originality of material consists in systematic listing of the dangers connected to thoughtless aggregation of data and also in presentation of the appropriate general scientific problem in application to specific areas of researches within activities of Emercom of Russia.
Continue...
№ 6(78) 28 december 2018 year
Rubric: Actor modeling
Authors: Bulygina O. V., Emelyanov A., Ross G.

Купить статью

Download the first page

Computer simulation is usually the launch of parallel interacting computational processes, similar to real processes, but in virtual spaces and time. Such a model makes it possible to obtain the metrological characteristics of a real process, a field study of which is either very expensive or impossible because of the receiving irreplaceable damage risk. However, to create a model, sometimes there is no complete set of source data to ensure a satisfactory significance level, and it is necessary to create a model under conditions of uncertainty. In this case, along with programs that receive metrological characteristics as source data, there is a need to include programs that implement artificial intelligence methods to obtain new qualimetric characteristics in the model. In this direction is the development of modern software for hybrid simulation modeling and related modern methods. According to the publications and author’s experience, the most studied area of hybrid simulation modeling is the use of bioinspired algorithms. The using of fuzzy controllers allows you to implement some adaptive methods necessary for simulation models when searching for acceptable solutions and modes of the simulated processes operation, for the sake of which these models are created to control. The most difficult area of hybrid simulation is the use of super-fuzzy logic when conducting interval evaluations of membership functions in the same simulation models that use fuzzy controllers. This direction requires additional experimental research, literally «at the scientific interface» of metrology and qualimetry, using special modeling techniques.
Continue...
№ 6(78) 28 december 2018 year
Rubric: Digital economy
The author: Lozhnikov P.

Скачать статью

Today people are surrounded by a digital environment with which they interact and as a result leave hundreds of «digital traces». The entire amount of generated data is a combination of both primary and secondary information. The program of the Russian Federation on the digitalization of the economy aims to ensure the safety of the data. Electronic Document Management (EDM) systems is a rapidly developing technology in the form of a solution for organizations that provides an efficient way to manage information. The practice of using documents in digital and analog form is called «mixed» document flow. Approaches to the protection of mixed documents are fixed in the legislation of the Russian Federation. The requirements for the implementation of methods to protect information in the information system, including EDM systems, is to ensure the integrity, availability, confidentiality and authenticity of information. Here, the usual password-based security and encryption mechanisms sometimes fail: they can be compromised, falsified, or given to a third party. Unlike tokens or passwords, biometrics connects the concept of «identity» directly with the owner. The question of choosing keys for asymmetric and symmetric encryption, as well as their protection during storage and transmission, is gradually removed. An intellectual and dynamic document additionally contains knowledge about itself and its environment. For such documents, in order to provide security properties, it is necessary to create a method for implicitly hiding of identifier and metadata related to the author and other users of the document.
Continue...