по
Cybernetics and programming
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > List of peer reviewers > Review procedure > Policy of publication. Aims & Scope. > Article retraction > Ethics > Legal information
Journals in science databases
About the Journal

MAIN PAGE > Journal "Cybernetics and programming" > Contents of Issue № 05/2018
Contents of Issue № 05/2018
Question at hand
Chernyshev Y.O., Ventsov N.N., Pshenichnyi I.S. - A possible method of allocating resources in destructive conditions pp. 1-7

DOI:
10.25136/2306-4196.2018.5.27626

Abstract: The subject of research is the approach to the allocation of resources in terms of possible destructive conditions.The object of the research is a model of decision-making processes of a distributional nature under the conditions of possible destructive influences. The authors consider the issues of modeling the processes of resource flow distribution under the conditions of possible undesirable effects. It is shown that the use of relative fuzzy estimates of resource transfer routes is more expedient than modeling the entire resource allocation area in terms of the time complexity of the decision-making process, since, based on statistical and expert assessments, route preferences can be quickly determined from the point of view of guaranteed resource transfer under destructive impacts.The research method is based on the use of set theory, fuzzy logic, evolutionary and immune approaches. The use of fuzzy preference relations reduces the time to build a model, and the use of evolutionary and immune methods to speed up the search for a solution. The main conclusion of the study is the possibility of using relative fuzzy estimates of the preferences of the used routes when organizing the allocation of resources. An algorithm for the allocation of resources in the context of destructive influences is proposed, a distinctive feature of which is the use of information about previously implemented resource allocations in the formation of a set of initial solutions. Verification of the solutions obtained is supposed to be carried out using the method of negative selection - one of the methods of modeling the immune system. Modification of existing solutions is advisable to produce, for example, using the methods of evolutionary modeling.
Parallel algorithms for numerical analysis
Sechenov P., Olennikov A.A. - pp. 8-14

DOI:
10.25136/2306-4196.2018.5.20345

Abstract:
Methods, languages and forms of human-computer interaction
Kukushkin Y.A., Aivazyan S.A. - Methods of automated processing control movements of the operator in applied research the reliability of ergonomics systems pp. 15-23

DOI:
10.25136/2306-4196.2018.5.18178

Abstract: The subject of the study is to optimize systems management ergatic laws based psychophysiological operator capabilities. The complexity of the analysis of control movements of the operator is determined by the fact that the processes of manipulating the body ergatic control system are non-stationary, so you need a digital filtering techniques to eliminate the process of being analyzed low-frequency trend and move on to the analysis of a stationary random process. The technique of the automated processing control operator movements in applied research the reliability of ergonomics systems, testduring ergonomic research on HIL simulator complex. The research methodology combines the techniques of engineering psychology, theory of reliability, ergonomics, spectral analysis, mathematical cybernetics and computational mathematics. The main conclusion of the study is that the analysis of the motions of the control operator must be an integral part of HIL ergonomic research because its results allow for adequate consideration of psychophysiological state and the reserve capacity of the system operator ergatic in managing its operation. This allows you to develop and implement a set of measures aimed at ensuring the proper functional reliability of professional activity ergatic system operator to ensure the safety of its operation.
Systems analysis , search, analysis and information filtering
Myasnikov V.I. - pp. 24-31

DOI:
10.25136/2306-4196.2018.5.18991

Abstract:
Automated systems of engineering process administration
Fedosovsky M.E. - pp. 32-43

DOI:
10.25136/2306-4196.2018.5.27561

Abstract:
Databases
Raikhlin V.A., Minyazev R.S., Klassen R.K. - The efficiency of a large conservative type DBMS on a cluster platform pp. 44-62

DOI:
10.25136/2306-4196.2018.5.22301

Abstract: The results of original research on the principles of organization and features of the operation of conservative DBMS of cluster type are discussed. The relevance of the adopted orientation to work with large-scale databases is determined by modern trends in the intellectual processing of large information arrays. Increasing the volume of databases requires them to be hashed over cluster nodes. This necessitates the use of a regular query processing plan with dynamic segmentation of intermediate and temporary relationships. A comparative evaluation of the results obtained with the alternative "core-to-query" approach is provided, provided that the database is replicated across cluster nodes. A significant place in the article is occupied by a theoretical analysis of GPU-accelerations with respect to conservative DBMS with a regular query processing plan. Experimental studies were carried out on specially developed full-scale models - Clusterix, Clusterix-M, PerformSys with MySQL at the executive level. Theoretical analysis of the GPU-accelerations is performed using the example of the proposed project Clusterix-G. The following are shown: the peculiarities of the behavior of the Clusterix DBMS in dynamics and the optimal architectural variant of the system; Increased "many times" scalability and system performance in the transition to multiclustering (DBMS Clusterix-M) or to the advanced technology "core-to-query" (PerformSys); Non-competitiveness of GPU-acceleration in comparison with the "core-to-query" approach for medium-sized databases that do not exceed the size of the cluster's memory, but do not fit into the GPU's global memory. For large-scale databases, a hybrid technology (the Clusterix-G project) is proposed with the cluster divided into two parts. One of them performs selection and projection over a hashed by nodes and a compressed database. The other is a core-to-query connection. Functions of GPU accelerators in different parts are peculiar. Theoretical analysis showed greater effectiveness of such technology in comparison with Clusterix-M. But the question of the advisability of using graphic accelerators within this architecture requires further experimental research. It is noted that the Clusterix-M project remains viable in the Big Data field. Similarly - with the "core-to-query" approach with the availability of modern expensive information technologies.
Lobanov A.A., Filgus D.I. - pp. 63-75

DOI:
10.25136/2306-4196.2018.5.26513

Abstract:
Data encryption and data protection
Baltaev R.K., Lunegov I.V. - pp. 76-83

DOI:
10.25136/2306-4196.2018.5.27634

Abstract:
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website