«Systems and Means of Informatics»
Volume 26, Issue 3, 2016
Content | About Authors
Abstract and Keywords.
- I. N. Sinitsyn
- V. I. Sinitsyn
- I. V. Sergeev
- E. R. Korepanov
- V. V. Belousov
- V. S. Shorgin
- E. S. Agafonov
Abstract: The paper describes the instrumental algorithms and software tools for the module "StS-CFRN.Filter" in numerical library "StS-Filter." The module is based on series approximations. It gives the opportunity to synthesize differential and difference normal suboptimal filters for specific nonlinear stochastic systems.
Such StS have the following peculiarities: observation equations do not include Poisson noise and coefficient at Wiener noise does not depend on state variables. Special attention is paid to the software tools based on symbolic and nonsymbolic algorithms. The practical efficiency of the software tools has been illustrated.
Keywords: complex fraction-rational nonlinearities (CFRN); module "StS- CFRN.Filter;" normal approximation method (NAM); numerical library "StS- Filter;" stochastic linearization method (SLM); stochastic systems (StS)
- I. N. Sinitsyn
- E. R. Korepanov
- V. V. Belousov
Abstract: Methodological and algorithmical support for analytical modeling of normal (Gaussian) processes in continuous and discrete stochastic systems (StS) with complex fractional order Bessel nonlinearities (spherical, modified spherical, and Airy) is given. The developed StS support is based on the methods of normal approximation and statistical linearization. For complex fractional order, Bessel nonlinearities series and Hermite representations are used. Special attention is paid to symbolic algorithms and software based on modern computer algebra systems (CAS). A short survey of CAS StS application is given. The test example is devoted to noise immunity of Bessel fraction order oscillator in stochastic media.
Keywords: Airy nonlinearity; Bessel function of fractional order; Bessel nonlinearity; method of analytical modeling; method of normal approximation; method of statistical linearization; modificated spherical Bessel function; normal (gaussian) process; spherical Bessel function; stochastic process; symbolic analytical modeling
- Y. A. Stepchenkov
- A. N. Kamenskih
- S. F. Tyurin
- Y. G. Diachenko
Abstract: The design of digital devices with both reliability and energy-efficiency is one of the important directions of information technologies development. The self-timed circuits have unique properties - width operation range, self-testing for stuck-at faults and energy-consumption decrease. The ability of self-test makes self-repair techniques better and more perspective for self-timed circuits. However, the fault-tolerance is necessary for some fields of application. The key difference between different techniques of reliability improvement is researched in this paper by the example of proposed technical solutions that realize most efficient designing methods. The usage of complex indices provides comparison of designs.
Keywords: self-timed; reliability; fault-tolerance; failsafe feature
- A. A. Grusho
- D. V. Smirnov
Abstract: The paper is devoted to creation of architecture of an information system steady against zero day attacks from the Internet. Justification of security of an information system from zero day attacks is found and the description of conditions under which the required security is provided is given. The architecture of information systems of commercial producers regarding resistance to zero day attacks is analyzed, the model of threats to information systems available in the Internet is described, and the methods of realization of protection of information systems against zero day attacks are developed.
Keywords: information security; zero day attacks; business logic; white lists; black lists; secure architecture; security server
- A. A. Grusho
- N. A. Grusho
- E. E. Timonina
- S. Ya. Shorgin
Abstract: The paper is devoted to the analysis of architectural vulnerabilities of the distributed information systems. Such vulnerability, which cannot be closed by the existing set of mechanisms of information security or for which ways of its closing are unknown, is called an architectural vulnerability in the distributed information systems. The examples of architectural vulnerabilities show that usually, these vulnerabilities are connected with the inadmissible or missed from attention interactions in distributed information systems. For closing or partial closing of architectural vulnerabilities, a special architecture which does not allow directly forbidden interactions was created. For this purpose, it is possible to use methods of restriction of influences of some components of distributed information systems on other components.
Keywords: vulnerabilities of distributed information systems; architectural vulnerabilities; methods of architectural vulnerabilities analysis
- A. A. Grusho
- M. I. Zabezhailo
- A. A. Zatsarinnyy
- V. O. Piskovski
Abstract: The paper is devoted to adaptation of the concept of consistency and management of transactions of data base management systems (DBMS) in application to a dynamic reconfiguration of cloudy computing environments. Definitions of operations and procedures of a reconfiguration of cloudy computing environments are given. Their distinctive feature is to transfer of network from one correct state to another correct state. The anomalies which are found during the work of DBMS and an interpretation of their analogs at procedures of a reconfiguration of cloudy computing environments are presented. The theorem of consistency for processes of a dynamic reconfiguration of cloudy computing environments is also provided.
Keywords: cloudy computing environments, automatic consistent reconfiguration of network, software-defined network, DBMS, anomaly
- I. A. Kirikov
- А. V. Kolesnikov
- S. B. Rumovskaya
- A. V. Barzenkov
- E. V. Petrenko
Abstract: The paper considers a new class of intelligent information systems - virtual heterogeneous collectives of people (through avatars) and virtual models of experts. In such collectives, the means of computer technology are used not only for providing the communication environment, avatar is associated with interface for control by real expert of one of the models from the heterogeneous model field and for displacement the model by itself during solving the tasks in collective. The authors represent the conceptual model of heterogeneous collectives in terms of fine-grained functional hybrid intelligent systems and hybrid intelligent multiagent systems. The paper also considers special aspects of virtual heterogeneous collective participants, relations between them, and their inheritance of fundamentals of artificial heterogeneous collectives and group decision support systems.
Keywords: artificial heterogeneous collective; virtual heterogeneous collective; group decision support systems
- T. V. Zakharova
- M. M. Podlesnyy
Abstract: The paper is devoted to investigation of myogram probability characteristics. This signal represents a record of electrical activity produced by skeletal muscles. It is widely used in medical research, including the determination of reference points in the problem of localization of functional brain areas. The authors propose to take finite scale-location mixtures of normal distributions as a mathematical model of myogram noise. Separation of mixtures is solved by the stochastic EM (expectation-maximization) algorithm and obtained data are used to reveal start points for movements using CUSUM statistics. Finally, the authors compare the new algorithm with the method based on window variance thresholding, which is already used in the MEG center.
Keywords: myogram; mixtures of probability distributions; stochastic EM algorithm; CUSUM statistics
- A. A. Zatsarinny
- Y. S. Ionenkov
Abstract: The article continues a series of works which are devoted to complex systems efficiency evaluation at different stages of the lifecycle. The most famous methods of automated information systems (AIS) efficiency evaluation are considered and their benefits and limitations are shown. The recommendations to AIS efficiency parameters selection at different stages of the lifecycle are presented. The authors suggest an approach to choose the AIS efficiency evaluation method. The areas and conditions of current efficiency evaluation methods applications for certain AIS are determined as well. The practical use of the developed efficiency evaluation techniques is shown.
Keywords: automated system; efficiency; index; criteria; alternative; timeliness; reliability; information completeness; hierarchy
- A. A. Zatsarinny
- V. I. Korolev
Abstract: Situational center is shown as the key system of critical important objects of information-technology (IT) infrastructure. Based on this, the article formulates the principal terms that should be used for solution of the situational centers information security problem. It is justified that creation and management of information resources are part of the basic functions of IT-infrastructure of situational center. In this sense, a situational center is regarded as an accumulative information system with different information sources and forms of its information presentation. It is shown that allocation of processing circuits by security classification is one of the simplest ways to make a primary data input nonconflict in the perimeter of a situational center for their further safe processing. The authors propose an implementation of the architecture where certified superimposed and embedded data protection facilities are used to provide the information security.
Keywords: critical important objects; situational center; information resources; information and technological infrastructure; information security; superimposed and embedded data protection facilities
- I. M. Adamovich
- O. I. Volkov
Abstract: The article focuses on the further development of the technology of such part of biographic investigation automation as texts surfing which is searching useful information, the character of which cannot be foreseen and, therefore, the appropriate web search query cannot be formulated. The faults of such technology based on the T-parser automatic facts extraction system are described and analyzed. The ways of its elimination with the aid of researchers' joint work support tools are proposed. The possibility of using Semantic Web decisions for this purpose was analyzed. The domain knowledge representation form based on semantic network is suggested. The advantage of such form over the hierarchical ontology which is used in Semantic Web is demonstrated. The main terms and principles of the new distributed technology of texts surfing in the biographic investigation with the aid of T-parser using some Semantic Web ideas are described. The implementation of the technology is described. The ways of its development are planned.
Keywords: biographic investigation; distributed technology of texts surfing; semantic network; automatic facts extraction; Semantic Web
- S. A. Vlasova
- N. E. Kalenov
Abstract: Specific applications of computer science methods and media developed for the libraries of the Russian Academy of Sciences are considered.
There are three directions of information-technology implementation in these libraries - automation of technology processes (acquisition, cataloging, indexing, etc.), network technologies for information and library users services (including interlibrary loan), and automation of management processes (optimization of financing, analysis of the usage of materials, and multifaceted statistical analysis of the libraries activities). Examples of specific technological and software solutions developed and implemented in the centralized library system, headed by the Library for Natural Sciences of the Russian Academy of Sciences, are described.
Keywords: information services; automation; network technologies in academic libraries; library management; Internet catalogues
Abstract: The article suggests an approach to the problem of assessing the significance of the results of scientific activity. Definitions of objects of scientific authorship and their significance are introduced. The fundamentals of registration of scientific authorship and copyright protection are expounded.
Keywords: assessment of the scientific result; object of scientific authorship; discovery; invention; rationalization; significance of the authorship object; researcher's copyright
Abstract: The article analyzes the State Federal Educational Standard and Exemplary Basic Educational Programs of basis primary and middle education with the account on contemporary western primary and middle school experience in inclusion into curriculums some aspects on information and media literacy as basic concepts of e-safety. The analysis concludes that, despite the references in each of the individual aspects of the documents, one way or another related to security on the Internet, they lack clearly articulated expectations and clear recommendations on the formation of the necessary skills. Besides, an unexpected result was received. The conclusion was made on the absence of measures for developing in all subjects' programs aimed at creating universal educational actions contributing to the achievement of these metasubject results. A separate chapter in the program that describes the conditions, under which only the results could be achieved, was identified as the evidence of contradictions.
Keywords: media literacy; information literacy; e-safety; state federal educational standard on exemplary basic primary education; exemplary basic educational programs of basis primary education; metasubject results; teaching- learning activities; information technologies; digital literacy