ИНФОРМАЦИОННЫЕ СИСТЕМЫ И ТЕХНОЛОГИИ

  • Publisher Федеральное государственное бюджетное образовательное учреждение высшего образования "Приокский государственный университет"
  • Country Россия
  • Web https://www.elibrary.ru/title_about_new.asp?id=28336

Content

ALGORITHM FOR OBTAINING COMPARISON FUNCTIONS FOR AUTOMATIC FINDING OF PARAMETERS OF METHODS FOR FORECASTING THE STATE OF OBJECTS OF ADMINISTRATIVE MONITORING

KONYuXOVA O.V., LUK'YaNOV P.V., UZhARINSKIJ A.Yu.

In article questions of finding a linear relationship between the parameters of forecasting methods and the characteristics of output data sets of administrative monitoring are considered. The algorithm that solves the problem of linear regression, which determines the weights and the set of characteristics of output sets of administrative monitoring data that affect the formation of the parameters of prediction methods, is presented.

APPLICATION OF SYSTEM-DYNAMICS METHOD IN MULTI-AGENT DECISION SUPPORT SYSTEM ENGINEERING

MASLOBOEV A.V.

A new approach to development of multi-agent information systems based on system-dynamics method application has been proposed. These systems are intended for decision-making support in the field of regional-scale complex heterogenic hierarchical and network-centric organizational structures control. Application of system-dynamics models provides forecasting horizons variability within the framework of unified modeling environment. That allows simulation scenarios spectrum expansion of varied situations and provides efficiency enhancement of the decision support system dataware and operability of system setting within the situational characteristics for specific control problems.

AUTOMATED MONITORING SYSTEM FOR FRUIT-BEARING TREES

PILIPENKO A.V., SMIRNOV V.A.

In the article, the authors present a system for automating the sorting of fruits by size and evaluation of their appearance. The algorithm of the system, a description of its work, the implementation of the algorithm in the LabView environment is presented. The analysis of the accuracy of recognition of the presence of darkening and spots on apples with the help of the developed system of machine vision has been carried out.

COMPARISON OF SATELLITE AND MOBILE WIRELESS NETWORKS

KADY'RBAEVA A.R.

Every year more and more satellites appear in the Eath’s orbit. Each of them performs a certain function: solving navigational problems, studying the meteorological situation of the Earth, its geophysical fields, constant environmental monitoring, space exploration, and support for satellite wireless communication. It is the satellite wireless network in comparison with the mobile wireless network of the last generations that will be considered in this article.

DEVELOPMENT OF MODELS DECISION SUPPORT ON CONTROL OF BALANCING LABOR MARKETS AND EDUCATIONAL SERVICES IN THE CONSTRUCTION INDUSTRY

MAMATOV A.V., PUTIVCEVA N.P., UDOVENKO I.V.

In this article, on the basis of expert assessments, factors affecting the imbalance between labor markets and educational services in the construction industry have been identified. A model is developed in the form of a system of equations that makes it possible to determine the direction of influence of the selected factors with subsequent graphic interpretation. Graphical visualization of models in the form of graphs is presented. On this basis, scenarios of socio-economic development of the region in this area are defined (optimistic, realistic and pessimistic scenarios).

IMPROVEMENT OF BUSINESS PROCESS MANAGEMENT SYSTEM AT ENTERPRISE

IVANOVA I.A., SAPOZhNIKOVA K.V.

The subject of the study are the organizational and economic relations that arise when improving the management of business processes of the organization. The purpose of the study is to study methodological approaches and develop practical recommendations for improving the management of business processes by optimizing approaches and tools in accordance with the needs of the company as a competitive advantage in the long term. Given the inadequacy of the methodological and practical skills of managing business processes in the practice of domestic events, this article discloses the content of the concept of "Business Process", analyzes the theoretical and methodological aspects of managing the business processes of an industrial enterprise, provides an assessment of the process management system based on the example of the Saransk FKP «Mechanical Plant», identified problems and developed recommendations for their solution, justified the use of reengineering based on the introduction of information technology for process management: EPC, ARIS Express, Bizagi Process Modeler.

METHOD OF PROTECTING DISTRIBUTED NETWORKS THROUGH THE FORMATION ABOUT INFORMATION EXCHANGE

BURXOVECKIJ A.S., BUXARIN V.V., KAZAChKIN A.V., KARAJChEV S.Yu.

In computer networks can be implemented threats to information security through the use of interconnection protocols. During the implementation of the attack, the intruder receives information about the parameters of the main characteristics of the computer network, revealing its infrastructure, the number and type of network elements, the software used on them. Traditionally, the system of false objects is considered as a resource security system that is used to implement the mechanisms to mislead the attacker with the purpose of obstruction and preventing attacks on the target distributed computer networks, by imposing a specially prepared false information. The method of protection of distributed computing networks due to the formation of false information exchange, which increases the security of distributed computing networks due to the formation of false network traffic, taking into account the characteristics of authorized information flows, the presence of which will significantly increase the analysis time of network traffic by the intruder.

MODEL OF REAL-TIME FLOW PACKET TRANSMISSION IN A MOBILE AD HOC NETWORK

KISELYoV V.E., KISELYoVA E.D., LAZAREV S.A., POL'ShhIKOV K.A.

The article proves the relevance of research related to ensuring the quality transfer of real-time information streams in Mobile Ad-Hoc Network. Has been developed an analytical model, based on the application of probability graphs theory that makes it possible to calculate the probability of real-time stream transferring with an acceptable quality depending on the number of packets in the stream, packet loss probability and the number of packets received required to recover information lost during transfer. Are presented results of the computational experiments allowing to determine the maximum number of information real-time stream packets transferring with acceptable quality.

ON ACCOUNTING OF SIZES OF TRAVELED OBJECT IN ROUTING PROBLEM

BUXAROV D.S.

In the article is described the method of size accounting of traveled object. This method combined with meshless routing method towards define the more restrictions for required route. For each routing iteration throughout probable route’s segments are examined on crossing with an obstacle on the set area. If traveled object come in contact with an obstacle on current iteration, the examined route segment is removed from the set of probable variants. Computational experiment based on a model data is satisfied.

ON THE QUESTION OF VERIFICATION OF THE ADEQUACY OF THE IMITATION MODEL OF THE DECENTRALIZED MANAGEMENT SYSTEM OF THE PROCESS OF NETWORK PLANNING BASED ON INTELLECTUAL AUTONOMOUS AGENTS

KUCAKIN M.A., LAPKO A.N., LEBEDENKO E.V., RYaBOKON' V.V.

The article considers the simulation model of the system of decentralized management of the network planning process, developed within the framework of probabilistic and temporal characteristics of network graphs in the form of Gantt charts. As verification of the imitating model under investigation, the article presents a check of the presented solution for adequacy by comparing two samples. Based on the chosen Pearson's criterion, a conclusion is made about the hypothesis put forward.

PUBLIC-KEY CRYPTOGRAPHY BASED ON THE PROBLEM OF INTEGER PROGRAMMING IN NETWORKS INTERACTION

KAShhENKO M.A., LIPATNIKOV V.A., LOBAShEV A.I.

In case of using remote databases, data confidentiality may be compromised due to vulnerabilities on the side of the remote store provider.The problem of developing a post-quantum cryptosystem that preserves the confidentiality of encrypted messages and meets the requirements for the speed of the encryption and decryption algorithms is actual. Quantum computers are capable of destroying most, if not all, traditional cryptosystems that are widely used in practice. Objective. Development of post-quantum encryption algorithm to ensure confidentiality in the interaction of the information network with remote data storage at a given encryption rate and data decryption. Methods used. A cryptographic system based on lattice theory is proposed. Its security relies on the complexity of the integer programming problem, or rather, on a particular case of this problem - the problem of solving integers of a system of linear equations Ax=b,x∈{0;1}. Matrix A has sizen×m, n

STATEMENT OF THE PROBLEM CONTROL ASSET CONDITION MONITORING SYSTEM AND ACCESS CONTROL TECHNOLOGY VIRTUAL INSTRUMENT

OREShIN A.N., OREShIN N.A, SMIRNY'X V.A., ChEREPKOV S.A.

Formulated in mathematical terms, the problem of optimal control of the technical condition of the objects of the access control system (ACS), the solution of which is proposed to reduce to a consistent solution of three problems aimed at optimizing the organization of the control process, verification of the measuring complex of the automated control system and assessment of the technical condition of ACS objects.

THE METHOD OF ALLOCATION OF QUASISTATIONARITY BASED ON THE ANALYSIS OF AUTOCORRELATION DEPENDENCIES IN THE SPEECH SIGNAL

ERYoMENKO V.T., LOZBINEV F.Yu., TRUBICY'N V.G.

This article presents a method of allocation of quasistationarity for the analysis of the speech signal encoding lipreader. The proposed method can be used for effective coding of speech signals in infocommunication systems with variable transmission rate.

USED IN RECOGNITION HANDWRITTEN SIGNATURES’ FEATURES SELECTION

ANIKIN I.V., ANISIMOVA E'.S.

The key to a handwritten signature recognition process is the selection of signature attributes, based on which the signatures are compared with each other. A variety of methods exist today recognize different sets of different features are used. Formed the basis of a set of attributes determines the effectiveness of the recognition system. This article provides a kit for the detection of various features of fuzzy dynamic signature characteristics. That fuzzy features allow to deal with blurred signature character. In this regard, the choice of fuzzy traits contributes to effective recognition of handwritten signatures, as evidenced by the results of experiments on the collection of signatures MCYT_Signature_100.

A METHOD FOR ASSESSMENT OF INFORMATION SECURITY RISKS IN INTERCONNECTED INFORMATION INFRASTRUCTURES

ИМАМВЕРДИЕВ Я.Н.

В работе предлагается метод количественной оценки рисков информационной безопасности во взаимосвязанных информационных инфраструктурах электронного правительства. В существующих методологиях риски рассчитываются по отдельным инфраструктурам и, как правило, взаимозависимости инфраструктур не учитываются. Взаимозависимости позволяют рискам безопасности перейти в разные инфраструктуры и оказать потенциально значительное влияние на них. Предложенный метод построен на основе актуарного подхода, широко используемого для оценки операционных рисков в финансовых организациях. Даются рекомендации по обоснованному выбору соответствующих функций распределения при моделировании частоты потерь и размера потерь. Экстремальные потери моделируются обобщенным распределением Парето.

This content is a part of the Automatics and Computing collection from eLIBRARY.
If you are interested to know more about access and subscription options, you are welcome to leave your request below or contact us by eresources@mippbooks.com

Request

Unfortunately, we have no right to provide any kind of access to this resource in the territory of Western Europe. In any case, we will process your request and contact you with possible variants of solution.