по
Software systems and computational methods
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > Policy of publication. Aims & Scope. > Council of Editors > Editorial board > About the journal > Requirements for publication > Peer-review process > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal
MAIN PAGE > Journal "Software systems and computational methods" > Contents of Issue № 02/2024
This issue is currently being formed. All articles presented on this page have already been included in this issue, are considered published, and will remain unchanged in the final version of the issue along with other metadata of the articles.
Учредитель: Даниленко Василий Иванович, w.danilenko@nbpublish.com
Главный редактор: Морозов Михаил Николаевич, кандидат технических наук, mikhail.n.morozov@gmail.com
Contents of Issue № 02/2024
Software for innovative information technologies
Alpatov A.N., Bogatireva A.A. - Data storage format for analytical systems based on metadata and dependency graphs between CSV and JSON pp. 1-14

DOI:
10.7256/2454-0714.2024.2.70229

EDN: TVEPRE

Abstract: In the modern information society, the volume of data is constantly growing, and its effective processing is becoming key for enterprises. The transmission and storage of this data also plays a critical role. Big data used in analytics systems is most often transmitted in one of two popular formats: CSV for structured data and JSON for unstructured data. However, existing file formats may not be effective or flexible enough for certain data analysis tasks. For example, they may not support complex data structures or provide sufficient control over metadata. Alternatively, analytical tasks may require additional information about the data, such as metadata, data schema, etc. Based on the above, the subject of this study is a data format based on the combined use of CSV and JSON for processing and analyzing large amounts of information. The option of sharing the designated data types for the implementation of a new data format is proposed. For this purpose, designations have been introduced for the data structure, which includes CSV files, JSON files, metadata and a dependency graph. Various types of functions are described, such as aggregating, transforming, filtering, etc. Examples of the application of these functions to data are given. The proposed approach is a technique that can significantly facilitate the processes of information analysis and processing. It is based on a formalized approach that allows you to establish clear rules and procedures for working with data, which contributes to their more efficient processing. Another aspect of the proposed approach is to determine the criteria for choosing the most appropriate data storage format. This criterion is based on the mathematical principles of information theory and entropy. The introduction of a criterion for choosing a data format based on entropy makes it possible to evaluate the information content and compactness of the data. This approach is based on the calculation of entropy for selected formats and weights reflecting the importance of each data value. By comparing entropies, you can determine the required data transmission format. This approach takes into account not only the compactness of the data, but also the context of their use, as well as the possibility of including additional meta-information in the files themselves and supporting data ready for analysis.
Forms and methods of information security administration
Sharipov R.R., Yusupov B.Z., Martynov A.M., Zaripova R.S. - Developing the Methodology for the Effective Placement of Security and Fire Alarm Systems pp. 15-29

DOI:
10.7256/2454-0714.2024.2.41036

EDN: ZNJPJH

Abstract: The article focuses on security and fire alarm systems (SFAS) as means of ensuring the safety of facilities, viewing them as integrated complexes for promptly detecting potential threats. The main emphasis is on detectors, including their classification and role within the system. The article examines various configurations of SFAS and ways of connecting and processing signals from detectors, allowing for an evaluation of how these factors affect the system's effectiveness. The lifecycle of SFAS is described, highlighting the importance of each stage from design to operation. The article provides an overview of regulatory documents, emphasizing the importance of compliance with standards and requirements when implementing SFAS. Recommended for security professionals and individuals interested in delving into this topic. Additionally, the article addresses issues related to the placement of SFAS and their impact on system effectiveness. It analyzes vulnerabilities arising from irrational placement of components and presents a methodology for optimizing placement to enhance security. The methodology is described step by step, considering input and output processes at each stage. The authors conduct practical testing of the methodology in an educational laboratory with an installed SFAS, identifying placement errors and formulating recommendations for correction. The article is beneficial for professionals in the design and installation of SFAS, as well as for those seeking to improve the level of protection of facilities, accentuating the critical importance of proper component placement.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.