Ýëåêòðîííûé æóðíàë Êèáåðíåòèêà è ïðîãðàììèðîâàíèå - ¹3 çà 2013 ã - Ñîäåðæàíèå, ñïèñîê ñòàòåé. ISSN: 2644-5522 - Èçäàòåëüñòâî NotaBene
ïî
Cybernetics and programming
12+
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Journal "Cybernetics and programming" > Contents of Issue ¹ 03/2013
Contents of Issue ¹ 03/2013
Theory, software and languages of concurrent computing
Korobeinikov A.G., Kutuzov I.M. - Obfuscation algorithm pp. 1-8

DOI:
10.7256/2306-4196.2013.3.9356

Abstract: The paper deals with the algorithm of Chenxi Wang’s, shows are the main disadvantages of this algorithm. The authors suggest the ways of modification to improve it. The algorithm of Chenxi Wang's is one of the most famous. The input data for the algorithm is the usual procedure, written in high level language. The authors describe the three stages of obfuscation of any such procedure. In the classic version of Chenxi Wang's the algorithm has poor stability. The authors suggest ways to improve stability of the algorithm, present modified version of the algorithm and reviews results of its implementation. The authors compare the source code and the resulting code and conclude that it is almost impossible to establish their functional identity and the logic of the program code is very difficult to understand using obfuscated source. Sometimes this can be done using the examples run of the resulting source code. This implies that after eliminating the shortcomings the algorithm is quite effective.
Knowledge bases, intelligent systems, expert systems, decision support systems
Korobeinikov A.G., Grishentsev A.Y., Svyatkina M.N. - Using intelligent agents for magnetic measurements for railway infrastructure monitoring pp. 9-20

DOI:
10.7256/2306-4196.2013.3.8737

Abstract: The paper proposes the use of the intelligent hybrid meta-agent for solving a problem of intellectualization management and information systems in rail transport. In order to ensure the safety and risk management for harmful natural and man-made situation in rail transport the authors propose to use intelligent software for management and informational support. The article reviews general structure of intelligent environment as hybrid cognitive agent consisting of four main parts. The main obstacles to the creation of intelligent monitoring systems are: lack of finance support, absence of knowledge base on pre-threshold facilities, nonexistence of specialized software and hardware. Modern sensor networks combined in multi-agent system where each individual sensor is a single agent, with its local knowledge base possess the necessary characteristics. Multi-agent system formed by multiple interacting intelligent agents can be used to solve these problems that are difficult or impossible to solve with a single agent. The article shows variants of construction of logical models of interaction between the sensors using the apparatus of multi-valued logic and bilattices.
Forms and methods of information security administration
Bogatyrev S., Dobrynin S.S. - Information base of banks cost analysis pp. 21-42

DOI:
10.7256/2306-4196.2013.3.9166

Abstract: The paper presents the results of the use of the world's leading information products, received after over 6 years in the analytical work. The authors consider quality software products used in the cost analysis of banks and show the possibilities of modern information systems and banking analyst. Experience in the use of modern analytical bank software is systematized by several criteria that are important to the user. Each software product was rated on the five-point system based on the views of the authors and their colleagues: university lecturers and professional financial analysts on eligibility. For the first time a rating table of modern analytical software products of leading world manufacturers of specialized information and the software operating on the Russian market was compiled. The authors analyzed availability of products at current rates at the moment and the possibility of remote access, evaluated user interface and the ease of handling produced data, frequency of software updates and relevance of information, openness to users and promotion in the Russian media market.
Methods, languages and forms of human-computer interaction
Korneenko D.A., Kashin S.V., Kuropatkina A.E. - Criteria for evaluating information and psychological stability of IT-specialist pp. 43-54

DOI:
10.7256/2306-4196.2013.3.8313

Abstract: The article focuses on the stress structure in IT and reviews a set of psychological techniques used to evaluate stress tolerance and personal qualities of a person. The authors select criteria for evaluation of informational and psychological stability of IT-specialist. Special attention is given to the importance of evaluation of informational and psychological stability of IT-specialist and building a technique of evaluation. The authors review the main stages of stress development: mobilization, frustration and deformation. These stages have common characteristics. However along with them there are individual differences in responding to stress factors. Depending on the level of stress tolerance and the ability to withstand stress for a long time authors identify three basic types of personalities. These types differ by the time during which a person can maintain the stability of the temporary pressure of chronic stress conditions, characterized by individual threshold of stress tolerance. The article presents criteria of informational and psychological stability of IT-specialist. These criteria form a necessary complex for further development of a technique of evaluation of informational and psychological stability of IT-specialist.
Systems analysis , search, analysis and information filtering
Gurevich I.M. - Physical Informatics - a new synthetic scientific direction pp. 55-74

DOI:
10.7256/2306-4196.2013.3.9133

Abstract: Ursul A.D. in 1968 in the book "The Nature of information. Philosophical essay” predicted that the methods of information theory will study the properties of space and time, what is still mainly engaged in physical theories (eg, special and general theory of relativity, Einstein). Interpenetration of physics and information theory in the development of computer science formed a synthetic discipline " Physical Informatics". Since 1989 to the present day I. M. Gurevich systematizes knowledge of complex systems and information methods of their research based on the laws of Informatics and carries out research of complex systems on the basis of these laws. The main results of this author are: the statement of the existence of laws of nature more general than physical- Laws of Informatics, that define and limit physical phenomena and processes and are prior to physical laws; formulation of the Laws of Informatics; evaluation of the amount of information in the universe. Work of the author and foreign scholars justify the primacy of information law (Laws of Informatics).
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.