Systems and Means of Informatics scientific journal
Volume 25, Issue , 2015
APPLICATIONS OF ORTHOGONAL EXPANSIONS FOR ANALYTICAL MODELING OF MULTIDIMENSIONAL DISTRIBUTIONS IN STOCHASTIC SYSTEMS ON MANIFOLD.
Abstract: Problems of accuracy and sensitivity estimation for algorithms of the analytical modeling method (AMM) based on the multidimensional orthogonal expansions method (OEM) and quasi-moments (QMM) in stochastic systems on manifolds (MStS) with Wiener and Poisson noises are considered. Equations for multidimensional OEM and QMM are given. Problems of reduction of the number of equations for OEM and QMM are discussed. For typical reliability and security problems, equations for OEM and QMM sensitivity functions of the first order are deduced. The results are the basis of the symbolic software tools in MATLAB-MAPLE. A test example for scalar stochastic systems with cybic nonlinearity and multiplicative Gaussian noise is given. Some generalizations are presented.
Keywords: accuracy equations; analytical modeling method (AMM); one- and multidimensional density expansions; orthogonal expansions method (OEM); quasi-moments method (QMM); sensitivity equations; stochastic system on manifold (MStS)
Abstract: Problems of accuracy and sensitivity estimation for algorithms of analytical modeling methods (AMM) based on one- and multidimensional initial moments methods (IMM) and central moments method (CMM) in stochastic systems on manifolds (MStS) with Wiener and Poisson noises are considered.
Keywords: accuracy IMM and CMM equations; analytical modeling method (AMM); central moments method (CMM); Hermite polynomials; initial moments method (IMM); one- and multidimensional distribution density; sensitivity IMM and CMM equations; stochastic system on manifold (MStS)
ON THE METHOD OF CALCULATING THE STATIONARY DISTRIBUTION IN THE FINITE TWO-CHANNEL SYSTEM WITH ORDERED INPUT.
Abstract: This paper considers a queueing system with ordered input and two servers (labelled by numbers 1 and 2). Each server has a buffer of finite capacity in front of it. Queues capacities are different. Customers arrive according to a Poisson process with constant rate. Upon arrival, a new customer goes to the server with label 1 or, if it is busy, occupies a place in the queue in front of it. If upon arrival a customer sees the queue in front of the server 1 full, it goes to the server with label 2 or, if it is busy, enters the queue in front of it.
Keywords: queueing system; special functions; two-dimensional Markov chain; joint distribution
BUILDING SUPERPOSITION OF DEEP LEARNING NEURAL NETWORKS FOR SOLVING THE PROBLEM OF TIME SERIES CLASSIFICATION.
Abstract: This paper solves the problem of time series classification using deep learning neural networks. The paper proposes to use a multilevel superposition of models belonging to the following classes of neural networks: two-layer neural networks, Boltzmann machines, and autoencoders. Lower levels of superposition extract informative features from noisy data of high dimensionality, while the upper level of superposition solves the problem of classification based on these extracted features. The proposed model was tested on two samples of physical activity time series. The classification results obtained by the proposed model in the computational experiment were compared with the results which were obtained on the same datasets by foreign authors. The study showed the possibility of using deep learning neural networks for solving problems of physical activity time series classification.
Keywords: classification; time series; deep learning neural networks; model superposition; feature extraction
Abstract: The paper is devoted to research of existence of information system security architecture. The authors assume dynamical changes in the distributed information system in which along with valuable information resources, there can be high-risk components. Process of consecutive synthesis of secure architecture at which there is the compromise with initial requirements for security is constructed. Consistency of requirements of local security policies and a security policy in the integrated system is automatically reached. The methodology of creation of the protected information system with unsecure components is suggested in practice. In the paper, the elements of known security policies are applied: Multilevel Security (MLS), Role-Based Access Control (RBAC), etc. Known mechanisms and security protocols which define the trust to the whole system are used whenever it is possible. In the constructed secure architecture, it is necessary to use additional mechanisms of security - security servers. Functionalities of some types of security servers are constructed by standard methods. When the analysis of semantics is necessary, the requirements to the security server raise.
Keywords: information security of information system; valuable information resources; security policies; architecture of the distributed information system
PROBLEMS OF INTERACTION OF THE MALICIOUS CODE AND PROTECTION PROGRAMS IN ARCHITECTURE OF MODERN OPERATING SYSTEMS.
Abstract: The paper considers the interaction between malware and security software environments of modern operating systems. In particular, a number of aspects which are related to the software module that provides an opportunity for sustainable and undetectable presence of the offender in computer systems is considered. A number of statements is made about relationships between the technologies used in security software and ensuring "invisibility" of the executable malicious code. The possibility of undetectable rootkit presence in modern security software is shown on practice. In addition, the mechanism of system calls and drivers subsystem of Windows NT is analyzed. Furthermore, necessary practical requirements for implementation of security software are developed. The model of random restriction of malicious software for security software is constructed.
Keywords: information security; security software; malicious software; rootkit; antivirus; technologies of hiding execution code
Abstract: The geographical standards developed by the leading organizations on standardization are discussed. Experience of realization of geointeroperability shows that the problem of geointeroperability is in large extent a problem of standardization. Acceptance of standards for maintenance of interoperability is the main part of management of an information infrastructure. Potential users of geodata wish that cooperating decisions of various applications improve economic productivity and quality of decision-making, and express need for use of geoinformation standards which work irrespective of a computing platform and language, providing competitiveness of development.
Keywords: geographical standards; geodata; semantic geointeroperability; ontology; Semantic Web
Abstract: It is natural for a human being to use variety of opinions, complementarity and collaboration of knowledge for decision making in collective intelligence. Families, tribes, teams, companies, parties, armies, countries acting together demonstrate higher-quality intellectual behavior in complex situations insuperable for individuals. However, the skills of collective intelligence are ignored in the practice of intellectual decision support systems. The paper introduces a new approach to improvement of quality of supervision systems by means of a new class of decision support systems - virtual heterogeneous collectives - the combination of methods and technologies of distance expert interactions for collective decision support, from one side, and methods and technologies of hybrid intelligence systems for individual decision support at round desk in the conditions of information multiplicity, from the other side. The practice of development of the elements of the proposed approach demonstrates its potentiality.
Keywords: artificial heterogeneous collective; hybrid intelligence system; decision support systems; group decision support systems; non-game virtual worlds; social software
EVALUATING THE EFFECTIVENESS OF METHOD FOR CONTROLLING THE DELIVERY OF NETWORK PACKETS ON RECEIVER .
Abstract: This article contains the results of the simulation congestion control algorithm based on receiver window. Use of this algorithm makes it possible to reduce packet loss in network up to 3 times. Decrease of average size of receive window reduces the likelihood of a successful hijack attack up to 2.5 times. This method is recommended for local and metropolitan area networks, the limited round trip time is 3-5 ms.
Keywords: receive window; congestion control; data-driven interaction; protocol optimization; hijacking
Abstract: The article continues a series of works which are devoted to complex systems efficiency evaluation. The automated system efficiency evaluation using Analytic Hierarchy Process (AHP) is considered. The article shows the main peculiarities and advantages of the method. A technique of automated systems efficiency evaluation using AHP is developed. A core of the technique is representation of the task as a hierarchical structure of some levels, herein it is a three-level structure. The indexes showing efficiency at each criteria level of automated systems evaluation are suggested. The main steps of calculation by the technique are presented. The formulas for calculation of particular and general efficiency indexes are given. The article makes some propositions concerning qualitative (lingual) evaluation of the result via application of analytic mark to the normalized fundamental scale. The article presents an example of applying the technique for the distributed system of state situational centers concerning their current and planned state.
Keywords: automated system; efficiency; index; criteria; alternative; timeliness; reliability; information completeness; hierarchy; situational center
REGARDING SOME APPROACHES TO CREATION OF THE REGULATORY AND TECHNICAL BASE CONCERNING REQUIREMENTS TO ARCHITECTURAL DEVELOPMENT OF INFORMATION SYSTEMS OF RUSSIAN INFORMATION SPACE MEMBERS .
Abstract: The article continues the topic about regulatory and technical base forming for creation of information systems of organizations which are members of the Russian Federation Unified Information Space (RF UIS). The article shows generalized requirements to systems including main principles of systems creation project development, systems necessary properties, necessary documentation, potential development of information systems, requirements to mathematics and natural modeling during systems creation and operation, requirements to automated management of systems working, providing of information security, rationality in finances of project during system roll-out, maintenance and upgrade, providing of continuity, directed evolution and efficient use of investments, emphasized value of organization problem solution during the lifecycle. Propositions of the article are oriented to practical using as a science and methodical base for creation of regulatory and science base of RF UIS members information systems development.
Keywords: Russian Federation Unified Information Space (RF UIS); RF UIS member organization; systemic approach; UIS member system architecture; secured information resources; centralization; integration; information security; telecommunication provision
SOME APPROACHES TO ANALYTICAL DATA INTEGRATION OF EXISTING AND PROSPECTIVE DECISION SUPPORT SYSTEMS .
Abstract: The article discusses the analytical data integration in the creation of integrated decision-making support systems. It shows examples of the relevance technology exchange data analysis. On the basis of the existing foreign and domestic experience, the article proposes approaches to the structure and methods of forming an information model of analytical data in the environment of the interaction of a distributed control system. The article develops the ways of formalizing the analytical data with all components of the control area distributed system management, including target setting, controlled objects, and resources controlled and uncontrolled factors. This includes five stages of analytical data: (i) estimation of parameters of unobserved (hidden) elements of the environment; (ii) operational analysis of the situation by comparing with the previous period; (iii) to assess the situation to determine the degree of complexity of the situation - regular, critical, or emergency; (iv) forecasting changes in the environment; and (v) directly support the processes of managerial decision-making. Formalized description of the main types of analytical data makes it possible to generate their XML model for two levels of control systems - strategic and tactical.
Keywords: decision support; distributed control system; analytical data; information model
Abstract: The article presents a part of the methodology for informatization of the normalized economic mechanism. Informatization is considered as improvement of documenting economic activity on the basis of the system of property statuses.
Keywords: normalized money; system of property statuses; normalized economic mechanism; trading with direct lending
Abstract: The article is devoted to normative-legal and methodological bases of creation of systems of monitoring and indicator assessment in the sphere of national security. It reveals normative legal acts and information as well as reference documents in the design and operation of such systems. Based on the existing organization of national security in the Russian Federation, a possible embodiment of an integrated functional structure of the information system of monitoring and indicator assessment including a list of the main categories of its data is proposed. The article also contains a description of the subsystems and functional blocks corresponding to an information system with emphasis on the methodological framework of the monitoring and evaluation of national security.
Keywords: national security; strategic planning; information monitoring; indicator evaluation; information resources; data model
Abstract: Text surfing is described as a separate subclass of such important part of biographic investigation as Internet search. Text surfing is the search of useful information, the character of which cannot be foreseen, and therefore, the appropriate web search query cannot be formulated. The technology of automatic fact extraction is proposed for text surfing. The implementation of such technology is described. Special attention is paid to the problem of anaphora resolution, when the interpretation of an expression depends on another expression in the context. A new hierarchical view of a biographical fact is proposed and analyzed.
Keywords: biographic investigation; facts extraction from texts; anaphora resolution; hierarchy of facts
Abstract: This work contains the description of the educational and research software complex intended for analysis of computing aspects of research of Bayesian models in the queueing theory and the reliability theory. The complex carries out calculation of various probabilistic characteristics of system loading parameter, "not loss" call probability and average length of queue, such as the distribution function, density, the moments and quantiles, for models in the queueing theory (for a set of a priori distributions of parameters of the input flow and service), and also calculation of average reliability of the complex modified system for models in the reliability theory (for a set of a priori distributions of average coefficient of "efficiency" and "defectiveness" of the device correcting errors in the system). Some analytical results are given showing the idea of the tasks solved by the software complex. The detailed description of the structure of the program complex with examples of various features of functioning is given.
Keywords: information and communication systems; complex modified systems; mass service theory; reliability theory; Bayesian approach; software complex
|Phone of the Center: +7 (499) 135-62-60E-mail of the Center: email@example.com