Simulation systems
Reference:
Magamadov R.S., Molodchenkov A.I. —
Development of a method for assessing the interaction of employees using social network analysis
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 1 - 22.
DOI: 10.7256/2454-0714.2018.3.26588 URL: https://en. nbpublish.com/library_read_article.php?id=26588
Read the article
Review:
The article is devoted to the development of methods for assessing the effectiveness of work collectives on the basis of social networking technologies. The main purpose of the methods being developed is to assess the effectiveness of employee interaction in the work processes. Various methods for analyzing social networks are considered, a number of key metrics have been obtained on the basis of which analytical and visual models of social networks have been built - sociograms. The paper briefly presented the main characteristics and principles of the social network, the technological process and their components. the review of the basic mechanisms of working with these concepts was conducted, and the notion of analysis of social networks and its main types was studied. Next, 4 basic types of metrics obtained in social network models of different work processes for measuring performance were formalized and described in detail. In the course of the work social networks and their graphical, numerical display on the basis of real log files of events of various organizations from different spheres were constructed. Models and calculations were carried out within the framework of ProM software. Based on the constructed social networks, the main types of metrics were obtained and analyzed, their comparison was made for different types of events, different spheres of companies. Based on the comparison of results, the main advantages and disadvantages of the effectiveness of the organization of the working process of the companies and individual participants in the process, in particular, were revealed.
Keywords:
efficiency, technological process, node, networks, analysis, social network analysis, work of employees, interaction, metrics, log file
References (transliterated):
Process mining: Event logs [Elektronnyy resurs]. Rezhim dostupa: http://www.processmining.org/logs/start (Data obrashcheniya: 10.03.2018)
W. M. P. van der Aalst and K. M. van Hee (2002), «Workflow Management: Models, Methods, and Systems», MIT press, p. 359. Cambridge, MA.
G. I. Nazarenko, E. B. Kleymenova, L. P. Yashina, A. I. Molodchenkov, S. A. Payushchik, M. A. Konstantinova, M. V. Mokin, V. A. Otdelenov, V. A. Sychev. Razrabotka ontologii tekhnologicheskikh kart vedeniya patsientov mnogoprofil'nogo statsionara pri modelirovanii meditsinskikh tekhnologicheskikh protsessov // Iskusstvennyy intellekt i prinyatie resheniy. — 2014. — ¹ 2. — s.68–77.
W. M. P. van der Aalst and B. F. van Dongen (2002), «Discovering Workflow Performance Models from Timed Logs», in Y. Han, S. Tai, and D. Wikarski (ed.), International Conference on Engineering and Deployment of Cooperative Information Systems, vol. 2480 of Lecture Notes in Computer Science, pp. 45–63. Springer-Verlag, Berlin.
W. M. P. van der Aalst, Hajo A. Reijers, Minseok Song
Telecommunication systems and computer networks
Reference:
Yas'kevich E.V. —
Algorithms for wireless communication to mobile stations sharing a broadcast channel
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 23 - 34.
DOI: 10.7256/2454-0714.2018.3.26695 URL: https://en. nbpublish.com/library_read_article.php?id=26695
Read the article
Review:
The subject of the study are algorithms for the interaction of mobile stations for sharing a wireless channel with a wireless access network with token access. The object of the study is a wireless network with token access. The author considers in detail such aspects of the topic as combining the technologies of local computer networks: the IEEE 802.11 wireless technology standard (Wi-Fi technology) and Token Ring Token ring technology, describing the interaction of mobile stations for sharing a common broadcast channel. The research methodology combines methods of system analysis, informatics, reliability theory, queuing theory theory, information-logical design, mathematical modeling. The main conclusions of the study are the algorithms of wireless interaction of mobile stations for sharing a broadcast channel, providing a reliable (by the criteria of limited delay and reserved bandwidth) communication, reducing the number of retransmissions due to the fact that each station in turn uses the channel for equal periods and is forced to abandon the right to transfer after the expiration of the time allocated to it and provide resistance to node failure and automatic recovery from failures.
Keywords:
communication reliability, computer network, broadcast channel, network ring technology, wireless communication, marker access, mobile station, wireless network, local area network, wireless interaction
References (transliterated):
Vishnekov A.V., Ivanova E.M. Primenenie metodov podderzhki prinyatiya resheniy pri postroenii setey dostupa // Informatsionnye tekhnologii. 2017. T. 23. ¹ 9. S. 627-634
Larkin E.V., Bogomolov A.V., Privalov A.N., Dobrovolsky N.N. Relay races along a pair of selectable routes // Vestnik Yuzhno-Ural'skogo gosudarstvennogo universiteta. Seriya: Matematicheskoe modelirovanie i programmirovanie. 2018. T. 11. ¹ 1. S. 15-26.
Adzhemov S.S., Tereshonok M.V., Chirov D.S. Optimizatsiya algoritmov poiska ustoychivykh grupp abonentov sistem mobil'noy radiosvyazi // T-Comm: Telekommunikatsii i transport. 2009. ¹ S1. S. 129-130.
Larkin E.V., Bogomolov A.V., Privalov A.N. Metodika otsenivaniya vremennykh intervalov mezhdu tranzaktsiyami v algoritmakh szhatiya rechevykh soobshcheniy // Nauchno-tekhnicheskaya informatsiya. Seriya 2: Informatsionnye protsessy i sistemy. 2017. ¹ 9. S. 23-28.
Larkin E.V., Bogomolov A.V., Gorbachev D.V., Antonov M.A. O priblizhenii potoka sobytiy k puassonovskomu v tsifrovykh sistemakh upravleniya robotami // Izvestiya Tul'skogo gosud
Telecommunication systems and computer networks
Reference:
Kokoreva E.V. —
Quality analysis of the fourth generation mobile communication systems service indicators
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 35 - 44.
DOI: 10.7256/2454-0714.2018.3.26920 URL: https://en. nbpublish.com/library_read_article.php?id=26920
Read the article
Review:
The article presents the results of analytical modeling of mobile communication systems 4G. The purpose of this study is to evaluate QoS performance in an LTE network channel. As a simulation tool, the mathematical apparatus of queuing networks (SEMO) was chosen, which proved its effectiveness for calculating the characteristics of infocommunication systems of various purposes and of any dimension. The author examined various research methods, further on the basis of the evolutionary system architecture of LTE, a conceptual, algorithmic and programming model was developed in the form of a closed homogeneous SemOI and its characteristics were calculated. The mean value analysis method was adapted to obtain network quality parameters with LTE technology. During the simulation, the probabilistic-temporal characteristics of the service process in the fourth-generation mobile communication systems were obtained: the transmission delay and the network capacity for a different number of active users, represented in the form of dependency curves from the input load. The results can be used both for designing new ones and for efficient traffic management in existing mobile networks.
Keywords:
LTE, delay, mobile systems, QoS, quality of service, queuing systems, queuing networks, modeling, Mean Value Analysis, throughput
References (transliterated):
Kokoreva E. V. Obzor metodov vychisleniya kharakteristik odnorodnykh zamknutykh setey massovogo obsluzhivaniya [Elektronnyy resurs] // Sovremennye nauchnye issledovaniya i razrabotki. 2016. T. 3, ¹ 3. S. 50—59. URL: http://olimpiks.ru/d/1340546/d/vypusk_3.pdf (data obrashcheniya: 15.07.2018).
Kokoreva E. V. Otsenka pokazateley kachestva obsluzhivaniya v mobil'nykh setyakh chetvertogo pokoleniya // Elektronnye sredstva i sistemy upravleniya. 2017. ¹ 1. S. 167—170.
Reiser M., Lavenberg S. Mean-Value Analysis of Closed Multichain Queueing Networks // Journal of the ACM. 1980. Vol. 27 (2). P. 313—322.
Chandy K. M. The Analysis and Solutions for General Queueing Networks The Analysis and Solutions for General Queueing Networks // Proc 6th Annual Princeton Conference on Information Sciences und Systems, Princeton, March 1972. P. 224—228.
Buzen J. Convolution Algorithms for Closed Queueing Networks with Exponential Servers // Communications of the ACM. 1973. Vol. 16 (9). P. 527-531.
Gordon W., Newell G. Closed Queueing Syst
Quality aspects and improving the margin of reliability of software systems
Reference:
Dobrynin A.S., Koynov R.S., Kulakov S.M., Purgina M.V. —
On the practical application of flexible mechanisms of software development
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 45 - 53.
DOI: 10.7256/2454-0714.2018.3.26877 URL: https://en. nbpublish.com/library_read_article.php?id=26877
Read the article
Review:
The subject of the study are life cycle models and approaches to software development in the face of significant time and financial constraints. A software development workflow is considered using a flexible methodology and an iterative life-cycle model. The objects of research are modern approaches to the development of software and increasing the efficiency of labor through the proposed incentive mechanisms, based on customer requirements. The authors also pay attention to the organization of labor in software development. We used the methods of system analysis, approaches to collective decision-making under uncertainty, including survey methods and expert assessments. The authors propose an incentive mechanism for software developers working in an iterative model of an incomplete life cycle. An important result of the study is the conclusion about the effectiveness of the incentive approach, based on the implemented functionality in the current iteration of the development. The presented approach allows an objective assessment of the contribution of each developer to the solution of individual project tasks.
Keywords:
unit testing, iterative model, testing, incentive mechanism, development, software, life cycle, agile development, development management, stimulating the developer
References (transliterated):
Rassel Dzh. Zhiznennyy tsikl programmnogo obespecheniya / Dzh. Rassel // Bookvika Publishing, 2012. 89 s.
Beck Kent. Test-Driven Development By Example. Addison-Wesley Professional, 2002. — 240 p. — ISBN-10: 0321146530 ISBN-13: 978-0321146533.
Dobrynin A. S. Model' nepolnogo zhiznennogo tsikla programmnogo obespecheniya / A. S. Dobrynin, R. S. Koynov, S. M. Kulakov // Vestnik AGTU. Seriya: Upravlenie, vychislitel'naya tekhnika i informatika. – 2015. – ¹ 2.-S. 65-69. – Bibliogr.: s. 69 (9 nazv.). – Rezhim dostupa: http://library.sibsiu.ru.
Martin R. S. Agile software development / R. S. Martin, Dzh. V. N'yukirk, R. S. Koss // Principles, Patterns and Practicies Principles, Patterns and Practicies. M.: Vil'yams, 2004. 752 s.
Cohn Mike. Scrum: Succeedind with Agile: Software Development Using Scrum (Addison-Wesley Signature Series). M.: Vil'yams, 2011. 576 s. URL: http://www.jot.fm/books/review7.pdf.
Burkov V.N., Korgin N.A., Novikov D.A. Vvedenie v teoriyu upravleniya organizatsionnymi sistemami / Pod red. chl.-korr. R
Automation of manufacturing and production planning
Reference:
Pogrebniak G. —
Development of a methodology for modeling parametric libraries of gears and links as a means of design automation
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 54 - 63.
DOI: 10.7256/2454-0714.2018.3.26583 URL: https://en. nbpublish.com/library_read_article.php?id=26583
Read the article
Review:
The subject of this article is to increase the level of automation of engineering design in CAD systems. The object of study are gears and links in engineering products. The relevance of the work is due to the need for integrated solutions aimed at reducing the amount of work and time spent in the design and simulation of gears and links in engineering products in order to improve the efficiency of engineering design. The author focuses on the problem of increased complexity in the design of gearing profiles. The article describes the general methodology for modeling parametric libraries in the design of gears and links in engineering products. The main result of the work is the developed methodology for modeling parametric libraries of gears and links. The technique is presented in the form of a phased sequence of actions, divided into eight stages. In the development process, we used the method of parametric modeling of gears and links and the method of direct programming in CAD.
Keywords:
interface, database, variable, mechanical engineering, parametric modeling, gearings, parameterization, computer aided design, profile, user dialogue
References (transliterated):
ZAO «Top Sistemy». T-FLEX CAD. Dvukhmernoe proektirovanie i cherchenie // Rukovodstvo pol'zovatelya/-Moskva, 2016.-S. 1235.
ZAO «Top Sistemy». T-FLEX CAD. Trekhmernoe modelirovanie // Rukovodstvo pol'zovatelya/-Moskva, 2016.-S. 1235
Pogrebnyak G.E. Razrabotka metodiki parametricheskogo modelirovaniya zubchatykh peredach i zatsepleniy v izdeliyakh mashinostroeniya s tsel'yu povysheniya effektivnosti inzhenernogo proektirovaniya // Kibernetika i programmirovanie. – 2018. – ¹ 2. – S. 56-65.
Pogrebnyak G.E. Primenenie parametricheskogo modelirovaniya pri proektirovanii zubchatykh peredach i zatsepleniy v izdeliyakh mashinostroeniya // Razvitie tekhnicheskikh nauk v sovremennom mire: materialy III mezhdunarodnoy nauchno-prakticheskoy konferentsii. – Voronezh, 2016. – S. 7–9.
Pogrebnyak G.E. Razrabotka metodiki parametricheskogo modelirovaniya zubchatykh peredach i zatsepleniy v izdeliyakh mashinostroeniya v srede «T-FLEX CAD 3D» s tsel'yu povysheniya effektivnosti inzhenernogo proektirovaniya // Aktual'nye voprosy sovremennoy informatiki: materialy VII vseross
Knowledge Base, Intelligent Systems, Expert Systems, Decision Support Systems
Reference:
Shachneva A.V. —
Analytical review of the main classes of modern models of information impact assessment, including in social networks
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 64 - 70.
DOI: 10.7256/2454-0714.2018.3.26401 URL: https://en. nbpublish.com/library_read_article.php?id=26401
Read the article
Review:
The author considered in detail the main classes of modern models of information impact assessment. The subject of research is economic-mathematical methods, which include elements of approaches and results, the theory of fuzzy sets, the theory of probability, the theory of decision making and operations research and the theory of Markov chains, in the context of application to modeling the influence of information on economic processes. The purpose of the study is to analyze in detail the existing domestic and foreign models of information influence. The methodology and methodological apparatus of the research is represented by the developments and theoretical concepts presented in the works of domestic and foreign authors in the field of economic and mathematical modeling, probability theory and mathematical statistics. The novelty of the research lies in the fact that, based on the analysis of existing models of information impact, it was possible to develop approaches to the construction of mathematical models of the influence of information effects on economic processes. Also highlighted areas for further work to improve the existing models of information influence in order to further more effective assessment of information impacts on economic processes.
Keywords:
targeted informational impact, Markov chains, SOCIAL NETWORK, simulation models, information management, optimization models, information impact, decision theory in economics, models of information influence, modeling
References (transliterated):
Eguffluz V., Klemm K., Epidemic Threshold in Structured Scale-free Networks// Physical Review Letters. – 2002. – ¹89.
Goldenberg J..Libai B., Muller E. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth// Marketing Letters, August 2001, Volume 12, Issue 3, pp 211–223 ;
Kempe D., Kleinberg J., and Tardos E. Maximizing the Spread of Influence through a Social Network/ Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Morris S. Contagion// The Review of Economic Studies, Volume 67, Issue 1, 1 January 2000, Pages 57–78
Pastor-Satorras R., Castellano C., Van Mieghem P, Vespignani A. Epidemic processes in complex networks// Rev. Mod. Phys. 87, 925, 2015;
Wu F., Huberman B., Adsmic L., Tyler J. Information Flow in Social Groups// Physica A, 337:327-335, 2004.
Barbashi A.L. Seti bez masshtabov// V mire nauki. Scientific American.2003. ¹8 C.55-63;
Gubanov D.A., Novikov D.A., Chkhartishvili A.G. Sotsial'nye seti: modeli
Knowledge Base, Intelligent Systems, Expert Systems, Decision Support Systems
Reference:
Naikhanova L.V., Naikhanov N.V. —
Calculating the measures of semantic connectivity based on wiki projects
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 71 - 80.
DOI: 10.7256/2454-0714.2018.3.26473 URL: https://en. nbpublish.com/library_read_article.php?id=26473
Read the article
Review:
The object of study of this work is a measure of semantic connectivity of texts, the subject of study is an algorithm for calculating the measure of semantic connectivity of texts. The article focuses on the method for determining the hybrid measure of the semantic connectivity of two concepts. This method underlies the algorithm for computing the similarity of two texts. Wiki projects (Wikipedia and Wiktionary) are used as sources of knowledge. Sharing them allows covering a much larger number of words as compared to using one of the wiki projects. The method uses the well-known Wikisim measure. This measure is simple, but has good performance. In the classic Wikisim method, only Wikipedia is used, so it is adapted for Wiktionary. The methodology of the work is based on modeling the process of extracting high-quality knowledge from Wiki projects - the individual work of independent volunteers. The novelty of the research lies in combining the two sources of knowledge of Wikipedia and Wiktionary and creating on their basis a new hybrid measure of semantic relatedness of concepts. The main conclusion of the work is that the combination of formal (Wiktionary) and informal (Wikipedia) sources of knowledge can lead to a better assessment of semantic connectivity between text units. The described method can be applied in economics, sociology and politics to clarify people's opinions on issues of interest.
Keywords:
text, Wiktionary, Wikipedia, WikiProject, knowledge source, relatedness hybrid, semantic relatedness, word, concept, frequency response
References (transliterated):
Zesch T., Muller C., Gurevych I. Using wiktionary for computing semantic relatedness // In Proceedings of the 23rd National Conference on Artificial Intelligence (IAAI-08 - Chicago). – 2008. – Vol. 2. – P. 861– 866.
Morris J., Hirst G. Non-classical lexical semantic relations // In Proceedings of the HLT-NAACL Workshop on Computational Lexical Semantics (CLS ’04 - Boston, Massachusetts). - 2004. - P. 46–51.
Milne D., Medelyan O., Witten I. H. Mining Domain-Specific thesauri from Wikipedia: A case study // In 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI ’06 – Hong Kong, China). – 2006. – P. 442–448.
Michael S., Ponzetto S. P. Wikirelate! computing semantic relatedness using Wikipedia // In Proceedings of the 21st national conference on Artificial intelligence (AAAI ’06 - Boston, Massachusetts). - 2006. - Vol. 2. - P. 1419– 1424.
Sánchez D., Batet M. Semantic similarity estimation in the biomedical domain: An ontology-based information-theoretic perspective // Journal of B
Data encryption and data protection
Reference:
Lyapustin A., Kolesnikova S., Mel'nik D. —
Security Model Based on a Multi-Agent System
// Software systems and computational methods.
– 2018. – ¹ 3.
– P. 81 - 90.
DOI: 10.7256/2454-0714.2018.3.26575 URL: https://en. nbpublish.com/library_read_article.php?id=26575
Read the article
Review:
The article is devoted to the urgent problem of ensuring the security of heterogeneous information platforms using a multi-agent threat detection system. The object of the study is a multi-agent platform. The authors pay special attention to such aspects of the topic as: security of multi-agent platforms, management of threat detection agents, interconnection between different threat detection agents, vulnerability in multi-agent platforms. Trends are being considered for the development of new distributed security models. The paper presents a multi-agent architecture for security services, as well as a general scenario for deploying security in multi-agent threat detection systems. The paper presents a multi-agent architecture for security services, as well as a general scenario for deploying security in multi-agent threat detection systems. Using a multi-agent system approach to a security model that provides control from the sender using the mobility and extensibility characteristics of the agent. The multi-agent protection system model for heterogeneous information platforms provides an improved approach for online communications, providing flexible mechanisms for the comprehensive protection of heterogeneous information platforms that can satisfy various security requirements and provide better control over the data to its sender.
Keywords:
threat detection agent, heterogeneous information platforms, multiagent platform, intelligent protection system, threat detection, information security, analysis systems, detection algorithms, agent platform, multi-agent system
References (transliterated):
Roth V. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection /In: Proceedings of the 5th International Conference on Autonomous agents, 2001
Grimley M.J., Monroe B.D. Protecting the integrity of agents^ an exploration into letting agents loose in an unpredictable world //Communications of the ACM. – 1999.-Vol.5. – P. 10-17.
Barker W.C. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher.-National Institute of Standards and Technology (NIST), 2008.
A Security Scan Tool returns “SSL Server Support Weak Encryption Vulnerability”.-http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384688.
Schneier B. Description of a New Variable-Length Key, 64-bit Block Cipher. – Cambridge Security Workshop Proceedings, 1994. – P. 340-346.
Wheeler D., Needham R. TEA, a Tine Encryption Algorithm. – Cambridge Security Workshop Proceedings. – 1994.-¹809. – P. 363-369.
Schneier B., et al. Twofish: A 128-bit Block Cipher /In: 1st AES Conference, 1998.
Lang