×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • A method of collecting data using an oculoscope in the priority areas of sites

    From the point of view of practical value, data collection in priority areas of sites can be used by designers and owners of web resources to increase the conversion component of a web resource. Information about which areas on the site are most interesting to the user can indicate the places where the most important design elements need to be placed. In this paper, we will consider the method of data collection using an oculoscope in the priority areas of sites.

    Keywords: usability, view, website, eye tracker, heat map

  • Methods and tools for load balancing in heterogeneous computing systems

    Currently, there is a rapid development of computing systems, including systems that include various types of devices. Such systems are called heterogeneous or heterogeneous. In addition to traditional processors, such a system may include graphics processing units, programmable gate arrays, and other devices. One of the most pronounced problems of such systems is the complexity of distributing the computational load between the nodes of the computing system. This paper describes the types of balancing and methods for distributing computational load in heterogeneous computing systems. An example of load balancing in a real heterogeneous computing system is described.

    Keywords: heterogeneous system, heterogeneous system, load balancing, load distribution, computing cluster

  • Optimal software development approach using modern tools and methodologies

    Modern software development approaches requires perfect stable infrastructure and processes linked with that. Infrastructure has to be highly available, reliable and provide fast and comfortable tools for deployment, support, upgrade product. This article describes software development approach which is allow to use modern tools and methodologies to improve product quality, speed up its delivery and significantly increase stability. As a result it was considered to use GitLab, Jenkins, Git and Kubernetes technologies as basis of infrastructure and DevOps, CI/CD and IaaC as methodologies and how to introduce it in the company.

    Keywords: GitLab, Jenkins, Kubernetes, Git, DevOps, CI, CD, IaaC, infrastructure, methodologies, software, development

  • Network traffic in WINDOWS operating systems: comparison and analysis of its generation

    The article analyzes network traffic in WINDOWS operating systems, as well as a description of its tools to identify a certain redundancy of network activity. The authors also conduct a comparative analysis of the most common software products that perform the functions of monitoring network traffic.

    Keywords: operating system, detection systems, network protocol, network traffic analysis, networks, sniffer, traffic, network activity

  • The method of improving the quality of single-image video sequences

    The article discusses the causes of the emergence of digital noise in video sequence images. It is proposed to evaluate the effectiveness of noise suppression methods by measuring the peak signal-to-noise ratio. A method is proposed for preliminary improvement of the quality of images in a video sequence for further processing in order to search and recognize objects on a complex background. The originality of the method consists in using the analysis of the contribution coefficient of single images in a video sequence. The results of experiments with images from the USC-SIPI database are presented. The results obtained are not inferior to their counterparts, and surpass them in some indicators.

    Keywords: video sequence processing, video enhancement, object recognition on a complex background

  • Application of blockchain technologies in electronic document management systems: analysis and software implementation

    This article discusses the basic concepts in the field of blockchain technology, analyzes various types of blockchains and algorithms for achieving consensus. The advantages and disadvantages of various technologies are considered, their primary areas of application are determined. It is shown how on the basis of the analysis performed, the types of blockchain and the algorithm for reaching consensus are most suitable for the implementation of an electronic document management system The developed software that implements document protection functions using blockchain technology is presented.

    Keywords: blockchain, transaction, validator, patent law, secured workflow, blockchain classification, public blockchain, private blockchain, consensus algorithm, model Proof by work, model Proof of shares, model Delegated proof of shares, hybrid model Prof of Work

  • The task of implementing the software for the vibration diagnostics system of the gas pumping unit

    Considers issues related to software modeling is an important part in the implementation of the diagnostic system in an existing petrochemical complex. Considered the most popular types of software modeling. The article focuses on the analytical review of software modeling methods, advantages and disadvantages. The stages of software modeling are shown. Using the example of studying the software of the vibration diagnostics system of a gas pumping unit, it is shown the advantage of applying the methods of studying a dynamic discrete system with random delays using a mathematical apparatus that describes a stochastic Petri net and a Markov chain.

    Keywords: technical diagnostics, petrochemical complex, gas pumping unit, automatic control system, simulation, dynamic discrete system with random delays, software, stochastic Petri net, Markov chain, statistical characteristics

  • VoIP techniques

    As with any other technological advancement in use in today’s age, security threats are proving to be the major challenges and risks. Knowledge about these security vulnerabilities presents an avenue of protecting organizational assets against virtual attacks. VoIP phone systems are becoming increasingly popular in today’s society for business and personal purposes. VoIP services are increasingly productive and cheap, thereby, providing adopters a competitive edge. The paper explores a brief overview of VoIP techniques including network components, structure, standards and protocols, data processing techniques and quality of service.

    Keywords: VoIP, VoIP components, VoIP structure, Cybercrime, Computer security

  • Navigator for the price of goods, "Smart purchase"

    The article proposes the concept of mobile Internet service based on a combination of the functionality of applications – aggregators of discounts and navigation applications with GIS technologies. The new application allows a potential buyer to make a list of necessary products, as well as a list of stores where he can buy them at the lowest prices, indicating the routes, time spent and money. The user can choose the most appropriate scenario from the proposed (minimum money, minimum time, the best option). It takes into account the characteristics of the buyer, its financial and transport capabilities, the required list of products, the available variety of stores, factors of attractiveness of stores (prestige, convenience, level of service, availability of Parking, etc.) Mathematical implementation of the service – optimization on graphs (search for the shortest path taking into account restrictions) and simulation of the behavior of customer flows when prices or store locations change.

    Keywords: crisis, cheap goods, promotions, discounts, mobile application, discount aggregator, price navigator, GIS technology, optimization

  • Identification methods of control objects using industrial controllers

    The task of real-time identification of control objects is relevant and in demand at the stages of auto-tuning and self-tuning of regulators. Modern industrial controllers have sufficient computational capabilities to implement adaptive control. The article discusses two approaches to obtaining the impulse transfer function of an object: by the least squares method and directly by the transient response. Least square identification is applicable for a wide class of objects, including oscillatory objects. But this method requires a fairly large amount of computational resources, which imposes a limitation on the speed of the object. The direct identification method for transient response requires significantly less computational resources, but is applicable for aperiodic objects. Algorithms are implemented in the form of programs for industrial controllers and can be used both at the stages of preliminary identification of control objects and at the stages of autotuning typical PID controllers and controllers in the state space.

    Keywords: adaptive control, pulse transfer function, least squares method, transient response, PID controller, programmable logic controller, state variables control, programming language ST, prorgamming language C, CoDeSys

  • Problems of diagnostics of complex oil gas chemical complexes

    The intensification of petrochemical production imposes serious requirements on the operation of all automated production systems. The increase in the degree of automation leads to an increase in the level of aberration of the automated process control system and the entire production as a whole. The use of poorly populated technologies, minimizing the presence and participation of maintenance personnel in the operation of facilities, is achievable only with the use of monitoring and diagnostic systems for the technical condition of equipment and automation equipment.

    Keywords: statistical research, technical diagnostics, diagnosis, differentiation of scientific research in the field of technical diagnostics, decision making, fuzzy logic, neural network, predictive model, uncertainty

  • Algorithmic and software information and training system " Аluminum melt Mixer"

    The developed information and training system is intended for vocational guidance, initial training and advanced training of technological personnel of industrial enterprises associated with batching and pouring aluminum alloys of various brands. The system contains the necessary amount of theoretical information that describes the basic principles of aluminum production using the most well-known technological operations aimed at forming the required metal alloys with a given chemical composition. The functional of the system is close to reality, using only proven empirical data, as well as reliable models of the internal processes of the system, created using commonly known physical, chemical and mathematical laws. The process of interaction with the training system is controlled by an algorithm that monitors the order of execution of the main technological stages of aluminum production. The training system allows you to load previously prepared values ​​or to customize the new initial parameters of the system in the "Administrator" mode, corrected for various restrictions and interference that occur in production. The approach to the training of technological personnel is based on the use of the standard method of learning "trial and error", which allows a multiple search for a solution to the same or other similar technological problems in the formation of a metal alloy with specified chemical characteristics. The user's work with the training system is limited in time and is accompanied by the calculation of the total amount of production costs, taking into account the cost and availability of various technological operations and materials. To verify the results of the solution, an algorithm is used to find the optimal version of the ratio of the initial components of the charge, aimed at obtaining the best solution for the technological problem with the lowest cost of melting the required volume of metal. The search for the best variant of the solution of the technological problem of blending is calculated using the method of sequential optimization, in which the solution of the subtask in the previous step of calculations becomes the basis for subsequent calculations. Thus, the use of the information and training system makes it possible to improve the quality of final finished products, reduce energy costs of production, and reduce the prime cost of smelting each ton of metal by reducing the time indices of production and more rational use of material resources.

    Keywords: information and training system, technological personnel, process modeling, aluminum grade, charge, alloying, chemical composition, cost of production, finished products

  • Automated test control of software systems using neural networks

    The article is devoted to solving the actual problem of improving the efficiency of software testing based on the development of an automated control system for this process. The structure of the created system is proposed, which allows specialists to form the advising effects for the best implementation of each of the software testing stages. Optimization models are presented that ensure the correct selection of the values of various attributes of test plans, test cases, defect reports and other documents created during the testing process. The structure of the neural network and the concept of its application for the most accurate selection of attribute values are described. The research is supported by a stipend of the President of the Russian Federation to young scientists and post-graduate students (No. SP-100.2018.5), which was assigned by the grants Council of the President of the Russian Federation.

    Keywords: software testing, optimization methods, automated control system, neural networks, test coverage

  • Development and use of an automated training system to improve the process of training software testing specialists

    The problem of increasing the efficiency of training specialists in software testing based on the use of an automated training system to control the process of formation of professional competencies is considered. To reduce the labor intensity and increase the efficiency of the testing process, the task is to train the novice specialist in modern testing techniques, including taking into account the experience of real software projects. The use of automation tools can intensify and improve the quality of the learning task. The paper proposes models and algorithms to control the formation of professional knowledge and skills of specialists in testing using modern mathematical methods. The research is supported by a stipend of the President of the Russian Federation to young scientists and post-graduate students (No. SP-100.2018.5), which was assigned by the grants Council of the President of the Russian Federation.

    Keywords: automated training systems, software testing, personnel training, professional knowledge and skills

  • Features of Context-Redefined Language Synthesis for Intelligent Learning Agents (Resource Consumption Behavior Prediction Tasks)

    This work deals with the design and application questions of context-redefined computer languages for new information technologies. Realization problems of such languages are discussed for intelligent learning agents (ILA), which were applied for solving of resource consumption behavior prediction tasks in communal services. The approach is in the application of context-redefined language and it support system for problem solution. We concentrate attention to principal unpredicted changing of source function algorithms. Built-in context-redefined computer language is an essential tool for this kind algorithms support. We interested in context-redefined language synthesis. This language is used for the conditions and methods context forming for every component of intelligent agent. We pay extra attention to methods of constructive function interpretation, which can be varied or can be also changed. This synthesis is based on the interest to prediction system demands and their variations during functioning. The main idea of built-in language synthesis is to use main parts of the algorithm for ILA components with proper modification by means another algorithms and context connection. Due to this connection, the original algorithm can be changed directly or indirectly in the process of ILA functioning. As a result, We have to extract changing parts of component algorithms and organize proper interaction between every part and the context which can change it directly or indirectly. Required adaptive algorithm variation takes place on the base of obtained knowledge. At the same time, the algorithm must be implemented as quickly as possible, and the language must be simple and clear. Algorithm efficiency is based on flexibility and modifiability of the language.

    Keywords: programming languages, embedded languages, context-redefined languages, intelligent agents, computer languages

  • Elements of graphical metalanguage for parallel computing

    A new parallel programming language is being developed. A feature of this language will be that, based on the developed algorithm for solving any problem, it is possible with minimal effort to generate an effective parallel program code for different computation models. Such a parallel metalanguage is based on the dataflow computing model with a dynamically formed context. The graphic version of the metalanguage has the advantage of a clear presentation of information and is much better suited to the nature of human perception. The concept of graphical programming consists in compiling a program from a set of certain objects and connecting them together according to special rules. In addition, each of the objects and the connection between them in the form of a directional line have a set of properties and attributes, which, when compiled, convert them into an object with the necessary logical load corresponding to the program algorithm being created. The article provides a graphical representation and description of such metalanguage elements as “token”, “standard node” and “single-port node”, “node with three standard inputs” and “group symmetric node”, as well as program structures: “group”, “cycle” and ""module"". A whole series of parallel programs was created using a graphical version of the metalanguage.

    Keywords: graphical representation, metalanguage, parallelization of computations, dataflow computing model

  • Network steganography based on ICMP-encapsulation

    The article is devoted to the description of the method of forming steganographic network messages using the ICMP service protocol for their hidden transfer, bypassing restrictions of firewalls and other computer network protection systems. It describes the functions of the ICMP protocol, its advantages when used in steganography tasks, and the specifics of processing ICMP packets by operating systems and intermediate network equipment. Special attention is paid to the practical implementation and application of the proposed method. It describes the network utilities for working with packages and an example of their use for transmitting a hidden message. For the software implementation of the network steganography method, it is proposed to use the C # programming language and the SharpPCap and Packet.NET libraries, for which the article contains examples of use and the necessary parameters for forming packets with steganographic messages.

    Keywords: information security, network steganography, ICMP protocol, TCP / IP stack, encapsulation, SharpPCap

  • The task of preventing malfunction of the technological object of the petrochemical complex based on the analysis of statistical sampling

    The most popular types of statistical analysis are considered. The article focuses on the analytical review of statistical methods, advantages and disadvantages. The stages of a statistical survey of a technological object are shown. Using the example of studying the mechanical part of a gas pumping unit, the advantage of using statistical methods is shown.

    Keywords: statistical analysis, technical diagnostics, petrochemical complex, gas pumping unit, distribution, minimum risk method, minimum error method, minimax method, Neumann – Pearson method, maximum likelihood method

  • Web service for integration into urban environment

    to simplify the process of integration of the user into a new urban environment, it is optimal to use a web service that allows, on the basis of location, to determine the nearest points that are of any informational nature, or grouped lists of interconnected points that form routes. The web service corresponds to the REST (representative State Transfer) architectural style and is developed on the Java 8 programming language platform. OOAP (object-oriented analysis and design) was used as a design methodology.

    Keywords: web service, web application, user, tourism, tourist route, attractions, coordinates, location

  • The Composition of Intelligent Models for the Assessment of Complex Risks and the Approach to Its Fformation

    The outlines of the composition of intelligent models for the assessment of complex risks, consisting of a ways of extracting and formalizing knowledge based on an ontological model, intelligent models for evaluating the process, structural and system aspects of risks are determined. A method of forming a composition of models for the assessment of complex risks, based on the decomposition of the problem of risk assessment into separate requirements, is proposed. The boundaries of the participation of subject matter specialists and / or risk management specialists in setting up, training, adapting and assembling both individual intellectual models and their composition as a whole are determined.

    Keywords: intelligent models, risk management, intelligent model composition, ontological model

  • Development of the mobile application for searching bus transport using the Yandex.timetable API

    Describes the techniques used in the process of creating a mobile application running on the Android OS, to search for intercity bus passenger flights and associated cars, using API provided by Yandex. An aggregator is developed which, upon user request, displays the bus schedule and associated flights with BlaBlaCar. The main approaches that are used today for designing such applications are considered. Describes the tools and libraries that may be needed to solve the problem. The methods given in the article can be useful in developing such mobile applications. Android programming is based on Java programming language so if you have basic understanding on Java programming then it will be a fun to learn Android application development.

    Keywords: Java, Android, parsing, Jsoup, API Yandex

  • Information-analytical computer system of labor protection support in educational institutions

    The article is devoted to the study of the impact of information technology on the organization of labor protection. The applied significance of the research is that modern approaches to the organization of labor protection imply a wide use of information technologies. Informational support of labor protection is an important part of a systematic approach to ensuring safety, improving working conditions and reducing occupational risks. The paper describes the economic efficiency of creating an information and analytical system for labor protection. In the course of the system research, the main functions were identified that should be implemented by the information system using modules. Considered 6 main objectives of the study.This work is relevant due to the fact that the results of the study can be used in higher education institutions to optimize their work. The author analyzed the result of the study, noting the importance of introducing an information and analytical system for labor protection in connection with its practical and economic feasibility for higher education institutions with a large number of employees and, consequently, with a large amount of information that needs daily processing and analysis.

    Keywords: information and analytical system, labor protection, module, injuries, social policy, information technologies

  • Algorithm for AODV routing protocol adaptive parameter configuration

    A wide variety of applications of wireless self-organizing networks and high requirements to their quality make it impossible to create a universal routing protocol that works equally well in all cases. Each time when you deploy a new network, you have to select its parameters, but this is inconvenient and often inefficient. In this article, we propose an add-on algorithm over the AODV routing protocol, which allows you to automatically adapt the protocol parameters to dynamically changing network parameters. The perspective of the proposed approach is shown. The architecture of the neural network allowing to control the routing protocol is proposed, the area of ​​further research is indicated.

    Keywords: AODV, routing protocol, adaptive routing, ad hoc network, parametric adaptation, simulation

  • On the improvement of the algorithm of the computer program for analyzing the dispersion of dust in the air

    The paper describes a microscopic method for determining the dispersed composition of particles, a scheme for analyzing the dispersed composition of particles of various materials, the fundamentals of algorithms used in computer programs for the processing of particulate dispersion and the development of recommendations for their improvement.

    Keywords: computer data analysis, technique, dispersion, particle diameter, dust, dispersed materials, ecology

  • Improving the static program analysis based on explicit call graph

    The aim of the study is to develop static analysis algorithms, to search for all possible sequences of function calls leading to a certain point in the program. To achieve this goal the explicit call graph is analyzed, in which all possible paths between two vertices are searched. The analysis is carried out in two stages: 1) at the preparatory stage, a new graph is constructed based on the call graph, from which excess vertices and arcs are removed; 2) in the second stage, a search is made in the new graph for possible paths from the root node to the given one. Also this paper provides an experimental comparison of the developed algorithms with the closest analogue, the Yen algorithm.

    Keywords: static program analysis, call graph, path searching algorithm, Yen's algorithm, call stack