The article refers to the possibility of using neural network security methods of digital transmission
in wireless networks. Analyzed the organization of information transfer and synchronization signals
by two groups of transmitters operating in different frequency ranges. Organization of the system
involves the transfer of synchronization signals by a group of transmitters with the same characteristics,
but located at certain points in space. As a result, the correct information sequences can be
accepted only if you know the area of the intersection of coverage zones of all clock transmitters.
For protection of the transmitted information, it is proposed to use two neural network structures. The
first neural network is constructed of two modified dynamic neural modules and a neuron with excitatory-
inhibition dynamics. Its main purpose is to produce a background of the information signal,
which is applied to conceal the information transmission, and also does not allow to determine activity
times of transmitting stations. A modified Hungarian algorithm was used to configure the neural
network and identify entry points of feedback signals was used. The second neural network structure
consist of a dynamic digital neuron. One of the structures of a neuron is a block of memory, the
content of its cells completely determines the dynamics of the development of states of the neuron.
Its primary purpose is to generate a unique signal to synchronize the whole wireless network. Configuring
of the neuron was carried out using a random search algorithm with self-learning. The main
purpose of the algorithm was to initialize the memory block of a neural element. The joint functioning
of the two developed neural network structures can protect the transmitted information without
using of scrambling methods.
Continue...
|
|
In the paper we propose a generalized block diagram of an information system of Internet banking,
which reflects the modular architecture of the system, the relationship of users and the control
loop. We propose a system model of information system of Internet banking, the use of which will
help minimize the number of cybercriminals, optimize and improve the comprehensive system of information
security organizations of economic and social development, improve the efficiency of secure
information systems Internet banking, choose the right strategy for the development of Internet
banking services. Model of information system of Internet banking will assess the level of security of
the system, which is determined by solving the problem of decision support in poorly structured domain,
characterized by heterogeneous characteristics. Proposed a set-theoretic model of decision
support in Information Security Management Information Systems Internet banking, allowing accumulate
analytical information about ongoing threats cybercriminals provide automated support for decisions
on matters of neutralization cybercriminals, measures to ensure the protection of confidential
information, facilitate the development of operating influences. The article presents a formalization
of the model cybercriminals, characterized by personal parameters offender and scenarios for the
theft of confidential information in the information system of Internet banking. The basis of the model
laid down by cybercriminals typical images of cybercriminals, who will determine the potential intruder
in the information system of Internet banking. The proposed solutions will increase the power
of information security information system of Internet banking, to increase the efficiency and quality
of management decision-making for the protection of confidential information.
Continue...
|
|
Model-driven engineering approach considers the software project as a set of interrelated models
representing the main artifacts of a development process, such as source code, configurational
files, schemes of data warehouses, user interface, program architecture, etc. A relation between
the models comes either from design dependencies (when one model is generated from another),
or from the actual purpose of the models (when several models describe the same feature of the
system). Both cases imply the related models to be consistent, i. e. the information is one model is
somehow corresponds the information in another. Since the models are being modified, the consistency
relation between them is broken and needs to be restored to maintain the development process.
The article describes the activity called model synchronization, which handles the changes
made to the models and correctly propagates them to the related ones, making them consistent.
The activity is proposed to be built upon the well-defined model transformation techniques, which
consist of a transformation engine and a set of transformation rules. Model synchronization properties
and requirements are defined. Much consideration is given to incremental change propagation,
conflict resolution and change verification. The classification of the model transformation methods
and its vital parts is presented to define the most suitable approach as a basis for further model synchronization
process development.
Continue...
|
|
№ 5(59)
27 october 2015 year
Rubric: Software development technologies Authors: Evdoshenko O., Kravets А., Petrova I. |
Engineers have to use special methods for improvement of value of operational characteristics
(parameters) of the technical device. The design engineer is to carry out the analysis of arrays of scientific
and technical documents in a certain subject subarea for search of such methods. To be guided
in the huge volume of the documents used for the purpose of search of methods to the expert is
difficult, and search and the analysis of each document can be long. The purpose of work is to create
the databases project for storing data of scientific and technical documentation in the structured
view and to organize effective search in this database with use of ontologies. Authors have developed
the logical model of the document and have described stages of database design. Authors created
the ontology for the automated processing of semantics of information and its effective use. Classification
of classes, subclasses is formed. Characteristics are identified that describe these concepts.
Conceptual structure of the ontology is developed and designed in Ontorion Fluent Editor. Process
of creation of classes of ontology, instances of classes and relations between instances is described.
The created ontology is integrated with ontology «generalized methods of improvement of operational
characteristics, system «Intelligence» and allows the user to receive not only information on reception
of improvement of the characteristic (the name, the link to the document), but also detailed information
on the most scientific and technical document.
Continue...
|
№ 5(59)
27 october 2015 year
Rubric: Actor modeling Authors: Emelyanov A., Emelyanova N., Shil’nikova O. |
The objectives of the company, including the improving the quality of processes and products,
changes in the internal and external environment — these are the main reasons for the continuous
modernization of automation with the aim of enhancing the efficiency, automate processes throughout
the enterprise. Vitality — is an opportunity to realize the goal of management information system
(MIS) operation in cases of adverse effects. Mechanisms to ensure vitality while can be very diverse.
For example, it can be generated the new information process, which implements the purpose of
the information system. Such an opportunity will characterize the information system the possession
of properties vitality. Some mechanisms of adaptation, compensation, recognition, reconstruction,
reconfiguration and reengineering are the technological basis of the dynamic functional MIS-system
reorganizations. Obviously, vitality information system may, on the one hand, be considered as its
objective property that depends on the subject, audience, time, and on the other hand — as a characteristic
that they want to give it in the case of artificial formation, such as during the information
operations. At every stage of the life cycle the MIS-system its corresponding version is used. The
new versions bring new defects in the system in addition to the positive properties. Evolution is the
process of structural and functional changes during its life cycle at the system. This article deals with
the evolution model of the management information system in presence of defects, diagnose and
extract them. Modelling of developing information management system and supporting of its working
ability is an actual problem to be solving.
Continue...
|
The article discusses the role of formalization’s methods as a prerequisite for automated analysis of
human social and cultural systems and for development of appropriate research methods and algorithms.
It is describes those goals and objectives for the study of human social and cultural systems,
that can use automated analysis methods based on formalized presentations. The article analyzes
the characteristics and purpose of the two types of formalization: the humanitarian and mathematical.
It describes the mathematical methods of human social and cultural systems formalizing for solving
various classes of problems, such as evaluating the level of development of human social and cultural
systems and analysis of its social efficiency, evaluating the effectiveness of individual organizations
and cultural institutions, forecasting the directions of evolution for human social and cultural systems
and identifying factors, that influence on the human social and cultural systems evolution. The article
describes the author’s model of evaluation of the two types human social and cultural system’s effectiveness:
the sphere of culture and the sphere of national security, that depends from the factors
of the cultural environment. This model is based on the provisions and principles of qualimetry as a
science that studies the methods for measuring the qualitative effects by using of quantitative indicators.
Using the method of regression analysis and real statistical data the author determined the
kind of dependence between these species of human social and cultural systems. When describing
mathematical models of the effectiveness of individual organizations and institutions of culture, that
are elements of the sphere of culture, the author paid special attention to the description of its own
model. This is a universal model for evaluating the effectiveness of organizations and cultural institutions,
based on the concept of monetization of free time, which is spent by individuals to visit institutions
of culture in the conditions of competition between the different sources of information for the
attention of individuals.
Continue...
|