Ёлектронный журнал  ибернетика и программирование - є3 за 2019 год - —одержание - список статей - ISSN: 2644-5522 - »здательство NotaBene
Cybernetics and programming
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Journal "Cybernetics and programming" > Contents of Issue є 03/2019
Contents of Issue є 03/2019
Mathematical models and computer simulation experiment
Karimov T.I., Karimov A.I., Butusov D.N., Sol'nitsev R.I., Bulakhov A.V., Sigaeva M.S. - Delta-operator in the design of digital systems on low-bit computers pp. 1-14


Abstract: The use of low-bit computers is a well-known way to reduce the cost and energy consumption of embedded control and signal processing systems. At the same time, the construction of adequate digital models of dynamic systems on low-discharge computers is hindered by a number of problems associated with the influence of the rounding error of the coefficients. To increase the accuracy of the representation of discrete systems, instead of the traditional z operator, alternative discrete operators can be used, in particular, the δ operator. This mathematical apparatus, in addition, makes it possible to synthesize discrete systems that cannot be realized with a short grid length by standard methods. This article discusses the methodology for using the δ operator in the construction of digital systems on low-bit hardware platforms. The theoretical results obtained are proved analytically and supported by experimental results. The criteria and the preference region for the δ-operator in comparison with the z-operator are shown. The paper considers issues related to the implementation of discrete systems using the δ-operator on low-bit computers with a floating point. In the course of the work, it was found that the accuracy of the machine representation of numbers (digit capacity of the calculator) does not affect the choice of a method for implementing a discrete system. The key parameter when choosing a discrete operator is the sampling rate. A generalized criterion is formulated, which allows one to choose the preferred discrete operator by the type of continuous system and the required sampling frequency.
Automation of manufacturing and production planning
Sosnin P., Kulikova A., Namestnikov A. - Controlled formation of concepts with fuzzy meaning in architectural modeling of systems with software pp. 15-28


Abstract: The subject of the research is ontological modeling of concepts (concepts) that are of fuzzy significance, the uncontrolled use of which usually leads to problems with the success of the development of systems that use software intensively (Software Intensive Systems, SIS). The object of the study is the reification of SIS quality characteristics that relate to typical concepts of this type. Particular attention is paid to the requirements of those persons of the project environment (stakeholders), whose diverse interests usually add uncertainty to the requirements for the developed SIS, but must be taken into account in the project without fail. The paper proposes a coordinated application of architectural modeling methods and fuzzy logic for evaluating quality characteristics, which should be computable and controlled during the design process. The novelty of the study is determined by the inclusion in the structure and content of concepts with a fuzzy value of new components that register the dynamics of their formation during the design of a certain SIS so that for each of these concepts the current value of its content allows you to control the achieved value of the degree (level) of professional maturity of the concept. New components are the expansion of the attributes of the concept and the operational computational connection of attributes with the normative work flows, the groups of which are consistent with the levels of professional maturity of the conceptualization of the concepts in the project.
Levina T.M., Popov A.S., Filippov V.N. - Control system of the database of service of cars at the industrial enterprise pp. 29-37


Abstract: At any oil and gas enterprise employs a large number of motor vehicles. Each mode of transport is maintenance, which includes a wide range of works, both large and small. And to control all the maintenance of a large fleet businesses need a software solution that would ensure its control and data processing speed. The basic solution of the problem are less effective than standardized solutions developed with interoperability with corporate information systems.It is proposed to develop a database management system for record-keeping: the work done; spent materials and spare parts. Also it can be used in the determination of additional awards for the employee, you can determine what works for database work performed.A conceptual model for building complexAutomated Information Systems and Algorithmsinteraction of various modules of the system: the database and MS Excel.The model of permanent users remote access to the resources of vehicle maintenance management system.The model of differentiated user access (authentication mechanism) to the system.
Forms and methods of information security administration
Derendyaev D.A., Gatchin Y.A., Bezrukov V.A. - Determining the influence of the human factor on the main characteristics of security threats. pp. 38-42


Abstract: The human factor is considered in the work from the point of view of threat of influence on information security problems. A review of the expert assessment of security threats over different years showed that the growing influence of the human factor is increasing all the time. The article outlines a number of security threats that are most affected by the human factor, which occupy leading positions in general statistics. The method of calculating the influence of the human factor on the main characteristics of information security threats is given: probability and criticality. The study was based on work with the probability of occurrence and criticality of unrelated threats to information security with the presence of the human factor. The paper reviews the expert assessment of information security threats, which consisted in identifying the most likely and critical threats to information security with the presence of a human factor. The above method of calculating the impact of the human factor on information security threats helps to understand how critical the impact of the human factor is, to clearly distinguish its influence and to trace the level of its impact, which is absent in most modern threat assessment methods due to the consideration of information security threats in general, without taking into account one or another factor .
Software for innovative information technologies
Abramova O.F. - Visualization of the web-system user behavior pattern pp. 43-52


Abstract: Usability evaluation of web information systems is relevant and useful both for developers and for customers. One of the most important ways of evaluating the performance of information web-systems can be considered to estimate the so-called behavioral factors. Almost all currently used methods involve significant financial and time investments, but also depend on the number and level of knowledge of the participants specifically recruited focus groups. This is a rather laborious process, not always bringing the expected result with a clear evaluation and recommendations for improving the conversion of web-system. Therefore, the maximum visualization of the results of the assessment will significantly increase the information content and reduce the complexity of the evaluation of the system under study. For example, visualization of the pattern of behavior of user of the web-system. The display of the list of visited pages and the pages from which the user came to the website, will assess a few important indicators: the depth of view, the source of referrals to the site, as well as to simulate and evaluate the pattern of user behavior in the system. Moreover the clarity and the simplicity of the resulting circuit allows to use it both for professionals and owners of web-based systems. The article is devoted to description of methods for identifying usability problems of web systems, as well as description of how the program works to identify and visualize the behavior pattern of the user of based graph.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.