Cybernetics and programming - rubric Question at hand
по
Cybernetics and programming
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Journal "Cybernetics and programming" > Rubric "Question at hand"
Question at hand
Chernyshev Y.O., Ventsov N.N., Dolmatov A.A. - Development of an approach operating with the triangular expression of fuzzy numbers based on the PSO-algorithm. pp. 1-7

DOI:
10.7256/2306-4196.2017.2.22429

Abstract: The object of studies involves intellectual algorithm for solving optimization problems. It is known that for the same type of project procedures some cases require exact solutions, while others allow for approximate solutions. For this reason the issue of managing the exactness of the approximate solutions is so topical. An approximate solution may be regarded as some sphere of dots, each of them being a possible problem solution.  It is supposed that at the early stages of solving optimization problems, it is possible to operate fuzzy ranges, while gradually narrowing the search area. The authors offer an approach, which complements the well-known algorithm of particle swarm optimization with the possibility to process fuzzy numbers with the triangular expression. The current multi-agent methods for the adaptive search for the optimization solutions are developed towards improvement of the interaction among the agents.  For example, the well-known particle swarm optimization methods (PSO) is based upon the idea of population and it models the behavior of the birds in a flock or fish in a shoal. At the same time classic bio-inspired methods for finding solutions usually operate with clear solutions. The authors have developed the  modification of the PSO algorithm thanks to performance of a number of known operations with the fuzzy numbers involving triangular expressions. The special feature of this approach is organization of the intellectual searching process  in a fuzzy solution space. Its  originality is due to the development of the method for the movement of an agent (group of agents) within the area formed with the triangular expression of fuzzy numbers. This approach allows for searching for solutions in fuzzy spaces, operating with the variables of the "close to X" type, avoiding the linguistic analysis.
Agibalov O.I., Ventsov N.N. - Assessing Time Dependencies of the Genetic Algorithm Carried Out on CPU and GPU pp. 1-8

DOI:
10.25136/2644-5522.2017.6.24509

Abstract: The subject of the research is the problem of choosing the most efficient hardware architecture to execute a stochastic population-based algorithm. The object of the research is the genetic algorithm carried out using the central processing unit (CPU) or graphics processing unit (GPU). In their research the authors give results of a computational experiment aimed at comparing time dependencies of the genetic algorithm executed on the central processing unit or graphics processing unit based on the number of chromosomes used. The authors also compare the overall time of task solutions and time necessary to initialize CPU and GPU. Due to the fact that it was impossible to obtain the precise time assessment of the genetic algorithm, the authors have developed a loose time assessment of GPU-algorithm for 3000 chromosomes. The research method is based on the experimental assessment of time dependencies of the genetic algorithm executed using CPU or GPU based on the number of species in the population. The computational complexity of the genetic algorithm for both types of processing units is approximately O(n)-O(n2). Based on the results the authors have stated that in cases when the population is 2000-2500 chromosomes, the genetic algorithm should be better executed using CPU and when the population exceeds 3000-4000 chromosomes it is better to execute it using GPU. Such unclarity of efficiency frontiers is caused by the stochastic nature of the genetic algorithm. It should be also noted that these frontiers for choosing the most efficient hardware architecture are right exclusively for solving the above mentioned task. The results will be different for simpler tasks and other hardware and software conditions. The present research focuses not only on the numerical assessment of efficiency frontiers but on whether such crossing point can be defined or not. 
Tymchuk A.I. - On the choice of gray levels in the problem of texture segmentation of images based on the luminance dependence matrices pp. 1-9

DOI:
10.25136/2644-5522.2018.3.26170

Abstract: The object of research is the method of textural image segmentation based on the construction and use of luminance dependence matrices. The subject of the study is the influence of the number of reference gray levels used for computations on the speed and quality of image segmentation. Particular attention is paid to the process of constructing brightness dependency matrices, as well as texture attributes, which are calculated on their basis. In the article the author conclude that the choice of the size of the brightness dependence matrix (the number of gray levels) is certainly an important aspect in solving the image segmentation problem, since it directly affects the segmentation quality and program speed. The research methodology is based on the analysis of the method of textural image segmentation based on luminance dependence matrices, testing the segmentation algorithm based on this approach for various input parameters and analysis of results. The main conclusion of the study is the conclusion about the selection of the best number of gray levels in solving the segmentation problem in terms of productivity and segmentation quality. This conclusion is made on the basis of analysis of the results of the program, which implements the algorithm of image segmentation. The analysis was carried out with respect to the time spent on constructing the matrices and calculating the texture attributes, and also with respect to the value of each texture feature separately. The novelty of the study is to determine the number of reference levels relative to the speed and quality of segmentation.
Chernyshev Y.O., Ventsov N.N., Pshenichnyi I.S. - A possible method of allocating resources in destructive conditions pp. 1-7

DOI:
10.25136/2644-5522.2018.5.27626

Abstract: The subject of research is the approach to the allocation of resources in terms of possible destructive conditions.The object of the research is a model of decision-making processes of a distributional nature under the conditions of possible destructive influences. The authors consider the issues of modeling the processes of resource flow distribution under the conditions of possible undesirable effects. It is shown that the use of relative fuzzy estimates of resource transfer routes is more expedient than modeling the entire resource allocation area in terms of the time complexity of the decision-making process, since, based on statistical and expert assessments, route preferences can be quickly determined from the point of view of guaranteed resource transfer under destructive impacts. The research method is based on the use of set theory, fuzzy logic, evolutionary and immune approaches. The use of fuzzy preference relations reduces the time to build a model, and the use of evolutionary and immune methods to speed up the search for a solution. The main conclusion of the study is the possibility of using relative fuzzy estimates of the preferences of the used routes when organizing the allocation of resources. An algorithm for the allocation of resources in the context of destructive influences is proposed, a distinctive feature of which is the use of information about previously implemented resource allocations in the formation of a set of initial solutions. Verification of the solutions obtained is supposed to be carried out using the method of negative selection - one of the methods of modeling the immune system. Modification of existing solutions is advisable to produce, for example, using the methods of evolutionary modeling.
Chickrin D.E., Egorchev A.A., Briskiy D.V., Zakirov R.I. - Methods for obtaining and processing data from a bundle of downhole modules obtained by vertical seismic profiling in the software for controlling the complex for receiving seismic signals in a well pp. 1-10

DOI:
10.25136/2644-5522.2018.6.28091

Abstract: The object of research in this article is a system for receiving seismic signals in a well, carried out by the method of vertical seismic profiling. The subject of the research is data processing methods from a bunch of downhole modules obtained by vertical seismic profiling in software for controlling and controlling a hardware-methodical complex for receiving seismic signals in a well. The authors consider in detail such aspects of the topic as the complexity and speed of seismic data processing algorithms obtained from borehole and surface modules. The authors use the following scientific methods, namely: mutual correlation in the time and frequency domains. The novelty of the results are the conclusions that in the considered complex the correlation in the spectral region provides a gain in the number of operations on the correlation in the time domain. The calculation in the time domain gives a more accurate result, since the Fourier transform on the final sample gives distortions even when using window functions. To obtain a correlogram of the same length in the calculation method in the time domain, it is necessary to register and process a larger amount of data than when using the calculation method in the spectral domain.
Dobrynin A.S., Purgina M.V., Koinov R.S. - Parametric model of the active element of a multi-agent organizational system pp. 1-6

DOI:
10.25136/2644-5522.2019.4.31118

Abstract: The subject of research is the parametric model of the active element (agent) of a multi-agent organization system proposed by the authors. This model can be used to build specific regulatory models of activities in organizations based on the preferences and interests of work performers. Unlike most models of the theory of management of organizational systems, where profit issues are highlighted, the proposed model is focused on the comprehensive consideration of the interests of employees of multi-agent systems. The key idea shared by the authors of this publication is that the evolutionary approach to the development of large and complex systems is preferable to the revolutionary one, since it increases the stability of systems and also contributes to the targeted and long-term development of unique staff competencies. The key difference between the considered model and the previously described in the corresponding literature on management theory is the use of the hypothesis of “economic behavior” as an equal factor in relation to other no less important characteristics of human activity, such as professionalism, experience, transfer of accumulated knowledge to the younger generation.
Potapov D.R., Artemov M.A., Baranovskii E.S., Seleznev K.E. - Review of Constructing Key-Value Data Containers to be Used in Self-Adapting Data Containers pp. 14-45

DOI:
10.25136/2644-5522.2017.5.23557

Abstract: The article is devoted to existing methods of constructing associative data containers that can be used in self-adapting data containers. Construction of associative containers is a topical issue due to the growing popularity and frequent use of such containers in the spheres of NoSQL and BigData. The present article provides a review and analysis of sorted-out and hashed containers such as various kinds of trees, SSTable, hash-tables, etc. In addition, the authors of the article also analyze the scope of application of these structures. The article is of reviewing nature and aims at analysis and comparison of existing methods of key-value data containers construction. Despite the fact that this topic is widely presented in the academic literature, at the present time there are no works that would be fully devoted to the systematic review and analysis of key-value data containers construction. As a result of the research, the authors have defined the main spheres of application of data containers when using self-adapting associative data containers. 
Vavilov V. - Analysis of RQ-systems operating in semi-Markov environment with return of requests pp. 18-36

DOI:
10.25136/2644-5522.2019.1.28838

Abstract: The object of this research is RQ-systems (retrial queueing systems, systems with repeated calls) with the simplest incoming flow of requirements, waiting in orbit, return of requests and functioning in a random (semi-Markov) environment. The systems in question are models of a wide class of real service systems in which an application, upon completion of a successful service, can leave the system permanently or, after a certain period of time, return to the system for repeated maintenance. Examples of such systems are banks, where a customer who has repaid a loan can reapply for a new loan, employment centers, where customers can reapply in search of new work, etc. The efficiency of such systems depends on a number of factors, the nature of which can be defined as random (random semi-Markov environment). In this article, the author presents a mathematical modeling of the class of systems under study. The research tool of the systems under consideration is the mathematical apparatus of the theory of mass service. The proposed mathematical model of RQ-systems with the return of applications in a semi-Markov medium is investigated by the method of asymptotic analysis of markovized systems. The scientific novelty of the work lies in the fact that for the first time a mathematical model of an RQ-system functioning in a semi-Markovian environment with called applications was proposed and its asymptotic analysis was performed. The asymptotic average of the normalized number of customers in the system, the deviation from the average is found, the main probability-time characteristic is obtained - the probability density distribution of the values of the process of changing the system states.
Smirnov M.V. - Methodology for the formation of programs to improve international police cooperation pp. 27-35

DOI:
10.25136/2644-5522.2018.1.25072

Abstract: The subject of the study is the system of international police cooperation. The author focuses on the methods of comprehensive assessment of the activities of law enforcement agencies and methods of forming programs of activities that improve the activities of law enforcement agencies in the system of international police cooperation. The article gives information on various projects of the International Criminal Police Organization - Interpol, examines the assessment of the activities of law enforcement agencies and suggests a mechanism for estimating on the basis of matrix convolution indicators. The author sets forth the methodology for the formation of an optimal program of projects by the example of organizing the participation of a law enforcement agency in six projects in two areas of international police cooperation. To develop a mechanism for comprehensive assessment of the activities of law enforcement agencies, the author used the method of integrated assessment of development programs, applied in the science of management of socio-economic systems. To create an optimal program of projects, the author used the method of dichotomous programming. The main conclusion of the research is that the methodology for the formation of an optimal program of measures allows to increase the level of international police cooperation. A special contribution of the author is a critical approach to the existing system of assessing the activities of law enforcement agencies and the development of a mechanism for integrated assessment of the aggregate directions of international police cooperation based on the matrix convolution of indicators.
Surma I.V. - The modern information society and topical issues of knowledge pp. 30-46

DOI:
10.7256/2306-4196.2015.3.15001

Abstract: The article deals with the fact that at the present time knowledge is, on the one hand, the information used for decision making and on the other, as assets, directly involved in the production of tangible or intangible benefits thus becoming a commodity. The author highlights that in this way an traditionally managed organization, for which the most important resource is the capital, turns into a knowledge oriented organization. So the main factor of competitiveness of a country today is the ability to acquire and use knowledge. The article also reveals a fundamental difference between the information society and the knowledge-based society. The author points out, that shift from the first type of society to the second type requires very responsible approach to the creation of knowledge and its dissemination. The article uses the most comprehensive and integrated approach to measuring "the economy based on knowledge", developed by UN experts. The approach is based on the four basic elements, including dynamic innovation infrastructure and innovation systems. A key conclusion of the article in the fact that approach to knowledge as an asset is the basis of a modern the knowledge-based economy.  Asymmetry of knowledge between organizations is a key factor for competitive advantage. The processes of integration and significant pace of changes in technology so greatly influence the characteristics of the processes of globalization that global knowledge economy emerges. The author notes, that changes take place not only in ways of managing, but also in fields of culture and public relations, including the corporate culture of the organization and human resource management.
Tymchuk A.I. - Textural signs in the problem of segmentation of aerial photographs based on luminance dependence matrices pp. 31-39

DOI:
10.25136/2644-5522.2018.6.28395

Abstract: Computer image analysis is an automatic image processing, in the process of which the definition and classification of objects located on the image takes place. One of the most important stages of this analysis is image segmentation, by means of which, based on a set of characteristics (color, texture, brightness, etc.), the initial image is divided into many non-intersecting areas. The importance of the stage lies in the significant impact of segmentation on the final result of the analysis.The object of the research is the method of texture segmentation of the image based on the construction and use of luminance dependence matrices. The subject of the research is the effect of textural features on the quality of image segmentation. Special attention is paid to the calculation of the textural attributes and segmentation evaluation criteria.The research methodology is based on the analysis of texture segmentation of images using empirical evaluation criteria and reference segmentation. The main conclusion of the study is the conclusion about the choice of a set of textural features that showed the best segmentation results. This conclusion was made on the basis of the analysis of the values of the selected criteria for assessing the quality of segmentation. The textural segmentation of images and the evaluation criteria were performed on the basis of the developed program in the C ++ programming language. The novelty of the study is in the analysis of textural characteristics regarding the quality of image segmentation, made on their basis.
Bashmakov D.A. - Accuracy of Pixel Predication in Background Areas of Digital Images as Part of Stegoanalysis Performed Using the Weighted Stego Method pp. 38-47

DOI:
10.25136/2644-5522.2018.2.25706

Abstract:  The subject of the research is the accuracy of predicting pixels of background areas of static digital images using the Weighted Stego Image method as part of passive resistance to data transmission channels that use the method of embedding the spatial domain of static digital images with a significant share of homogeneous background in the least significant bit. In his research Bashmakov analyzes the dependence of the accuracy of defining the length of an embedded message on the accuracy of pixel prediction of the image background area. The author focuses on an original algorithm Weighted Stego Image and a number of modifications thereof including the AWSPAM version. He analyzes the formula for calculating an embedded message length and the relationship between its accuracy and the accuracy of pixel prediction. The pixel prediction accuracy is viewed as an error distribution between the predicted and actual values. The accuracy of the stegoanalysis algorithm is viewed as the share of false-positive classifications given the share of correct classifications. The author demonstrates that information about surrounding pixels is not enought for an accurate prediction of pixel and proves that there is a certain relationship between the accuracy of pixel predition and accuracy of an embedded message length, or, in other words, accuracy of the classification using the Weighted Stego method. The author also demonstrates that the AWSPAM algorithm can predict pixels with the highest accuracy compared to the original algorithm prediction function and other modifications thereof.
Polyanichko M.A. - Using technical indicators to identify insider threats pp. 40-47

DOI:
10.25136/2644-5522.2018.6.27970

Abstract: Detecting insider threats and countering them is a complex task faced by information security experts in both the commercial sector and government organizations. Modern organizations depend on information technology and their information assets, which makes the problem of confronting insiders all the more urgent. Identification of insiders can be carried out by introducing a complex of both technical and organizational measures. The article proposes the use of data from the work logs of information protection software and other monitoring tools to identify insider threats and highlights a set of indicators indicating the presence of suspicious employee actions. The set of technical indicators (indicators) proposed in the article can be used to build a system of logical rules or fuzzy inference rules that allow identifying insiders in an organization. The introduction of mechanisms for analyzing the proposed indicators will improve the efficiency of the information security administrator and will help prevent incidents related to the implementation of insider threats.
Iureva R.A., Timko A.S., Vedernikov K.A., Maltseva N.K. - On the Question about Wireless Data Transfer Technology in Telediagnostic System Line Construction pp. 46-53

DOI:
10.25136/2644-5522.2017.5.24057

Abstract: The authors of the present article examine current and developing technologies of wireless data transmission used to construct telediagnostic system lines based on the example of a cyberphysical production system of Diakont. The authors describe advantages and disadvantages and evaluates efficiency of technology implementation. The rationale of the research is caused by the fact that the authors provide an analysis of prospects and challenges of implementing wireless lines which will allow to increase the speed of data transmission and diagnostic procedure remoteness from the feed end at the account of reducing the weight of a connecting cord. The analysis methods used by the authors include: theoretical analysis of current findings in the sphere of wireless connections used in cyberphysical telediagnostic systems, in particular, those that are used to control the state of pipelines. Modification of the robot for wireless data transmission is based on fixing bridges and antennas on an explosion-proof delivery system and pipe face (feed end). Modification of the eplosion-proof delivery system implies adjustment of the installation, circuit design and software. The authors emphasize the need to develop a new type of a signal conditioner lid with high-frequency connectors as well as a new antenna lid on the drivers block. Theoretically speaking, there are technologies allowing to convert to wireless data transmission inside an installation in order to perform the pipeline inspection. The main question today still remains the one about electromagnetic compatibility and noise immunity. For this purpose it is necessary to purchase equipment that would satisfy each standard in particular and to arrange tests for electromagnetic compatibility, carrying capacity, action radius, etc. 
Korobeinikov A.G., Gatchin Y.A., Dukel'skii K.V., Ter-Nersesyants E.V. - Compatibility of borosilicate and fluorosilicate glass layers in the manufacture of optical fiber pp. 47-54
Abstract: Domestic manufacturers of optical fibers are facing the problem of acquisition of raw materials and reagents abroad, which becomes more and more acute - the price is rising, and customs procedures do not contribute to the revival of domestic production of optical fibers made of quartz glass. Consumption of fibers in Russia exceeds the 3.5 million km per year, while the consumption of 1 million km per year is a "critical point" after which is economically feasible to produce the optical fibers at its own factories. This situation has forced to go back to the establishment of the optical fiber production in Russia. Hence the importance of the finding a ways to manufacture quartz optical fiber with a minimum range of reagents used is hight. The solution of this problem is possible only on the basis of substantial modernization and simplification of technological process of manufacturing the optical fiber, so that on the basis of a limited number of domestic materials and reagents to produce fibers that are not inferior counterparts of leading foreign manufacturers of quality, but differ with advantageous cost.
Alekseev I.V. - Modern state and main tendencies in development of internet technologies in the field of marketing pp. 47-58

DOI:
10.7256/2306-4196.2015.3.15364

Abstract: The article is devoted to internet technologies in the field of marketing under conditions of informational environment. The subject of the study is the state and main development trends in this area. The aim of the article is to study appliance of internet technologies in the field of marketing. The purpose of this research is to define a vector of progress in the development of ideas about internet technologies by analyzing scientific sources, and to highlight their role in the activity of enterprises by comparing the basic and massive stages of development of internet technologies. For this research the author studies sources on the topic of marketing in internet. The author concludes that taking into account the growing influence of internet technologies to the consumer market, companies need to focus on creating marketing mix within its structure. Studies of changes in economic environment highlight the urgency of expanding the role of internet marketing and its adaptation to the constant innovation and technological solutions. The implementation of the united development of the company's marketing and internet marketing is a necessary condition for building a successful business model.
Aksenova O.Y., Ovsyannikova E.A., Pachkina A.A. - The Use of Means of Three-Dimensional Graphics in the Planning of Reclamation Works pp. 54-63

DOI:
10.25136/2644-5522.2017.5.24365

Abstract: The subject of this research is the ability to effectively use tools of three-dimensional graphics in planning reclamation of the waste land in mining industry. The object of the research is the used square cut "Kedrovsky" in Kemerovo. Special attention is paid to the task of reviewing the effectiveness and necessity of use of means of three-dimensional computer graphics in the planning of reclamation works. The authors of the article propose a solution to the issue of land restoration at the design stage of measures to restore the earth's surface through a three-dimensional computer graphics, in particular, visualization of disturbed area before and after reclamation that allows to clearly see the planned result, to choose and to scientifically substantiate an economically viable technology, and to ensure high environmental and social effects of the planned reclamation of the earth's surface. The methodology of the research is addressing the question of land reclamation by using the experimental-theoretical method through three-dimensional computer graphics. The main conclusion of the research is the comparative characteristics of time periods of the stages of remediation using three-dimensional computer graphics and applications, which shows that in the first case, time is significantly reduced for the final evaluation of the design solutions, which allows to clearly see the restored earth's surface after a maximum 5 months from the start of design, whereas without the use of a three-dimensional possibilities of computer graphics the visual results of restored landscape will be obtained through at least 2.5 years.
Iureva R.A., Vedernikov K.A., Andreev Y.S. - Engineering and Technological Solutions in the Process of Developing Robotlike Inspection Systems for Controlling Conduit Pipes pp. 56-63

DOI:
10.7256/2306-4196.2016.6.20982

Abstract: Intratubal diagnostics is part of a set of non-destructive control methods allowing to define internal defects of conduit pipes by the means of technical diagnosis. The main goals of intratubal diagnostics are to define defects in the conduit pipe metal, welded joints, conduit pipe geometry, types of defects, their location and position inside a conduit pipe. To achieve these tasks, a cyber physical system certain requirements set for is usually developed. The present article is devoted to a group of companies 'Diakont', one of the world leaders in the sphere of high technological solutions of security arrangements and increasing efficiency in nuclear, petroleum and thermal power industries. The purpose of the present research is to analyze engineering and technological solutions used in the process of developing a robotlike complex for intratubal diagnostics at 'Diakont' company. The rationale of the research is caused by the growing demand for cyber physical systems related to explosion safety and low cost. Thus, creation of a cyber physical system for controlling conduit pipes is a challenging task. As a result of peculiarities of the environment where intratubal diagnostics are performed, there are strict explosion safety requirements for details and parts of the diagnostic suite. Moreover, the system must have a number of engineering specifics aimed at passing shaped objects, inclined and vertical parts of conduit pipes. The authors' contribution to the topic is their analysis of existing technological solutions made in the process of developing cyber physical systems for controlling conduit pipes.   
Basin N.A., Ermakova L., Shendrikov A. - The development of subsystems of the automated scheduling the movie renting system of a cinema center. pp. 71-84

DOI:
10.7256/2306-4196.2015.6.17108

Abstract: The object of research is the process of scheduling the movie renting system of a cinema center. The subject of research is the development of a automated scheduling subsystem which allows to minimize the idle time of a cinema center. When making a schedule it is important to take into account a number of restrictions of movie rental companies, exclude the possibility of simultaneous display of one film in different cinema rooms (with the exception of films, which are very popular with the lack of availability in other cinema rooms), ensure that the best show time goes to the movies with the box office sales. When developing a subsystem of automated scheduling the authors used method of deduction, in which a conclusion about a common set studied attributes is made based on a variety of partial signs, method of analysis and method of mathematical modeling. The main result of the research is the developed software solution based on 1C:Enterprise for automated scheduling the movie renting system of a cinema center while taking into account existing criteria and restrictions. Novelty is that based on the list of movies specified by the user the subsystem forms a mathematical entity of an objective function and limitations of the system and transfers it to an optimizer. As the result while making a schedule the user uses only the information system of a cinema center. For the end-user it is not necessary to deal with the interface to other programs and modules, as well as the mathematical notation of the objective function and the constraints of the system. Currently the automated scheduling subsystem is integrated in the work process of the network of cinemas "Planeta Kino" and has been successfully used for a year.
Borovskii A.A. - Prospects for the use of machine learning techniques in processing large volumes of historical data pp. 77-114

DOI:
10.7256/2306-4196.2015.1.13730

Abstract: In relation to the problems of development of information-analytical platform “The history of modern Russia” the author researches analytical capabilities of the modern methods of machine learning and perspectives of its’ practical use for processing and analyzing large volumes of historical data. The article reviews different strategies of applying machine learning techniques taking into account peculiarities of the studied data. Special attention is given to a problem of interpretability of different types of results, obtained using the machine learning algorithms, as well as the ability to recognize trends and anomalies. As a methodological basis of the research the author uses a theory of information systems, database theory, induction, deduction, comparative, systematic, formal logic, and other methods. The author concludes that the algorithms of machine learning can be used to effectively solve a large class of problems, related to the analysis of historical data, including finding hidden dependencies and patterns. It is noted that establishment of large-scale digital repositories of evidence of historical events makes it possible to examine and analyze the data as a specific time series allowing to investigate the change of state of the social system in time.
Borodin A.V. - On import substitution in creation of distribution of exact time systems in multiservice computer networks pp. 78-97

DOI:
10.7256/2306-4196.2015.2.14036

Abstract: The article deals with processes of design and creation of the secure wide area network (SWAN). Object of research is the subsystem of distribution of exact time of SWAN. Existence of the specified subsystem is the basic requirement from the point of view of safety of functioning of a network. Means of registration of events in SWAN, systems of the analysis of protocols of events, intruder detection systems is only a small list of subsystems of SWAN which can't exist without service of exact time. On the other hand, the specified service can be considered as the SWAN client service. In this quality the service of exact time in computer networks from year to year becomes more and more demanded. At the same time it is not a secret that as the sources of exact time in modern SWAN the production of the western countries are used. Thus, in view of categories hi-tech of the specified products, the corresponding production isn't taken out to the countries of Asia. Respectively today in this sphere there are certain difficulties at selection and the order of the equipment.  Considering above told, author in detail considers such aspects of import substitution regarding creation of services of exact time of SWAN, as existence of available basic sources of exact time in the Russian Federation, presence of domestic producer of the equipment in the relevant market, economic aspects of consequences from realization of possible import substitution. The special attention is paid to the standard configurations of sources of exact time in SWAN which are based on the equipment of a domestic production. The article is based on set of results of the researches of the domestic market of radio electronics conducted by author. As sources of information the Internet publications and phone calls to the sales departments of a number of producers were used. When forming the purposes of market researches the standards in the field of protocols of distribution of exact time over the Internet-protocol and also some researches of the author were used. The main conclusion of the conducted research is ascertaining of possibility of use as sources of exact time in SWAN of the complexes constructed on the equipment of domestic producers. A special contribution of the author to the research of a subject is development of recommendations for domestic producers regarding correction of their market behavior. Novelty of the research is in the use of the concept of total cost of ownership when comparing various scenarios of creation of subsystems of distribution of exact time in the computer networks which are based on the Internet-protocol.
Galimov A.A. - Development of an ontological model of publications pp. 98-106

DOI:
10.7256/2306-4196.2015.2.14569

Abstract: Activities of publishing organizations, as well as researches is closely related to publication. Currently, there are some complex Semantic Publishing and Referencing Ontology (SPAR) ontologies in free access, designed to work with publications. However, this complex is English-based and designed to work with foreign sources of literature. Direct translation of the complex into Russian does not solve the problem of working with Russian publications. The paper presents an ontological model of knowledge, built on the basis of Russian standards regulating the main types of publications in the Russian Federation. To describe the classes and slots the author selects main types of publications, most commonly used in scientific research. Ontology developed in Protégé ontology editor. The article evaluates the competence of the ontology and show its capabilities for analyzing scientometric indicators, filling a variety of reports and ratings, make a bibliographic records.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.