|
|||
Systems and Means of Informatics scientific journalVolume 24, Issue 4, 2014Content Abstract and Keywords About Authors A METADATA MODEL FOR SEMANTIC SEARCH OF RULE-BASED WORKFLOW IMPLEMENTATIONS
Abstract: Development of workflows and accumulation of open methods by scientific communities assumes their specification in open environment and their search to use them for problem solving. In this work, the Rule Interchange Format (RIF) dialects are used for workflow specification. Workflow elements are annotated with metadata to make their search in a subject domain possible.
Keywords: rule-based workflows; metadata; semantic search; ontology
METHODS FOR MAPPING OF COLLECTIONS PRESENTED IN NONTRADITIONAL DATA MODELS INTO THE INTEGRATED REPRESENTATION
Abstract: The paper considers transformations of collections presented in nontraditional data models, such as graph, triplet, and key-value models, into the integrated representation in the relational data model. The context of the paper is the development of the combined virtual and materialized environment for integration of heterogeneous collections of (un-, semi-)structured data.
Keywords: database integration; graph data models; RDF; NoSQL; data collections transformation
BUILDING A SIMULATION MODEL FOR SOLVING SCHEDULING PROBLEMS OF COMPUTING RESOURCES
Abstract: Scheduling of computing resources is a set of management actions on reception and distribution of applications coming into the computer processing system. Emerging challenges lie in optimization problems that are of a great variety of productions and often difficult decisions. In many cases, significant support is provided by a simulation model that implements a specific layout jobs on resources and created, as a rule, again for specific application. The article proposes an approach to building such simulation models, based on development of some ideas of the theory of communicating processes. The paper provides a fragment of a simulation model that covers many common features of scheduling of computing resources. The model is designed to create a software system that solves a variety of scheduling problems arising in computing systems. Keywords: scheduling; simulation model; communicating processes
RECENT WORKS IN THE FIELD OF MODELING INFORMATION FLOWS IN CONTEMPORARY HIGH-FREQUENCY FINANCIAL APPLICATIONS
Abstract: Some results of recent studies in the field of modeling information flows in contemporary high-frequency financial systems and applications are discussed. In particular, the microscale model proposed by the authors is considered. Within the framework of this model, the order flows are described by doubly stochastic Poisson processes (also called Cox processes) which take account of the random character of intensities. To study the evolution of the limit order book (the current list of all active buy and sell orders), the models are proposed for the processes of number of orders imbalance and order flows imbalance having the form of two-sided risk processes, special compound Cox processes. These processes are sensitive indicators of the current state of the limit order book and provide the possibility to interpolate dynamics of the market between price changes, say, to trace toxicity of the order flow. The paper presents a review of main results obtained by application of these models. Keywords: financial markets; high-frequency financial systems; limit order book; number of orders imbalance; order flows imbalance; doubly stochastic Poisson process; compound Cox process; normal variance-mean mixture; twosided risk process; separation of mixtures; EM-algorithm; generalized variance gamma distribution; generalized gamma distribution; generalized hyperbolic distribution; generalized inverse Gaussian distribution
PROPERTIES OF WINDOW DISPERSION INCREMENTS OF A MYOGRAM AS A STOCHASTIC PROCESS
Abstract: One of the most rapidly progressing directions in the modern medicine is brain activity research. There is a set of techniques of carrying out experiments in this area. One of the approaches is the so-called method of caused potentials: a testee repeats some actions and his brain activity and some auxiliary signals are registered for further analysis. The authors of this paper and their colleagues published several papers about algorithms of reference points localization by a myogram (and some other signals) for the experiment with finger movements. Accuracy of detection of these points is critical for processing a magnetoencephalogram - signal average by multiple epochs centered by them is computed to find a sensor with the best response (it should be closer to the source of activity than other). In this paper, some theoretical aspects of these algorithms such as a myogram and increment of its window dispersion as random processes are discussed. Keywords: window dispersion; window dispersion increments; myogram; mag- netoencephalogram
THE PROPAGATION METHOD BY MEANS OF AN ATTACK OF THE 'MAN-IN-THE-MIDDLE' TYPE IN THE DHCP PROTOCOL
Abstract: The research of the up-to-date malicious software conducted by the authors detected that one of the main methods of their expansion is the attack to the Dynamic Host Configuration Protocol (DHCP) made in order to organize the "man-in-the-middle" scheme. However, the result of such attack is of probabilistic nature and it depends on the difference between the speeds of response of antagonistic and legal (licensed) DHCP servers. The present paper describes the concept of expansion by means of the "man-in-the-middle" attack in the DHCP protocol and its limitations, imposed by the DHCP protocol. Examination of the DHCP protocol and limitations imposed on the expansion concept in it leads to creation of the new method which executes the attack of the "man-in-the-middle" type. This new method of unavoidable attack on the DHCP protocol excludes the probability of its failure and is the main result of the present research. Keywords: DHCP protocol; man-in-the-middle; local area net (LAN); guaranteed method of propagation; malicious code
INFLUENCE OF EXTERNAL MEMORY FEATURES OF SUPERCOMPUTERS ON PARALLEL PROGRAMS EXECUTION
Abstract: The article considers usage of external memory in supercomputers. Methods of analysis of program interaction with memory hierarchy are described.
Keywords: supercomputers; profiling of parallel programs; external memory; I/O operations
ADJUSTABLE VARIABLE-LENGTH CHARACTER ENCODING SCHEME - ACE
Abstract: The article describes ACE (Adjustable Character Encoding) - a variable-length character encoding scheme, which is capable of encoding the full range of UCS (Universal Coded Character Set, ISO/IEC 10646) code points as sequences of one to four octets (8-bit code units). The main reason of creating this encoding was to increase, in comparison with UTF-8 (Unicode Transformation Format, 8-bit), the number of code points encoded as one-octet code unit sequence, thus allowing more compact representation of texts containing characters of a chosen national alphabet, and also to increase the capability to preserve binary representation of encoded characters of such alphabet to match their binary values in a single-byte code table. This encoding retains such properties of the UTF-8 encoding as statelessness (the representation of an encoded character does not depend on the values of previous characters), selfsynchronization (none of the valid code sequences can occur inside the other one, nor inside any adjacent sequences across their boundaries), and the possibility to locate the beginning or the end of a code sequence at any place of encoded text. Keywords: character encoding scheme; UCS; program localization; UTF-8
METHODS OF OPTIMIZATION OF SNOOPING CACHE COHERENCE SYSTEMS
Abstract: During development of multiprocessor systems, an important task is maintenance of consistency (coherence) of data local cache processors. To ensure consistency of data, each processor in the system checks other processors on the presence of shared data in their cache by sending requests on network processors. However, a significant part of such requests is redundant, which increases network traffic and energy consumption when checking address tags. This article provides an overview of various methods of eliminating redundant requests in snoop-based coherence systems. The final section provides comparative characteristics of these methods and recommendations for the effective use of each method. Keywords: multiprocessor systems; snoop-based coherence systems; page table; translation lookaside buffer
TO A NEW CONCEPT OF INFORMATIZATION OF EDUCATION
Abstract: The authors consider problems of using the information- communication technology in education (informatization of education). The results of three phases prognosticated in the first concepts of informatization of education are analyzed. It should be noted that there are no radical changes in the education system yet, though there is progress in informatization of the society as a whole. The authors consider four stages of informatization of education: computerization, multimediazation, internetization, and electronization. Taking into consideration a new form of state system in Russia, stabilization of economic and social processes, and adoption of a new education law, the authors base the necessity for developing and approving a new concept of informatization of education. According to this concept, it is necessary to analyze the results of fulfilling prior concepts (the latest one was presented in 1998), take into consideration peculiarities of the current electronic stage, when extensive factors are gradually substituted by intensive ones. Of course, the explosive character of "mobile Internet revolution" should be taken into account. This concept should also consider the role of informatization for people with special education needs. Criteria of usage of information and communications technologies in education should be developed as well. The paper provides wide discussion of the new concept. Keywords: informatization of education; concept of informatization of education; mobile revolution; Internet security
ON THE MECHANISM OF IMPLEMENTATION OF COEVOLUTIONARY MODEL OF THE DEVELOPMENT LIFE CYCLE OF COMPUTER PROGRAMS FOR LEARNING
Abstract: The article considers the situation in the key sector of education informatization (i. e., the field of education software development), determines the range of problems faced by the main sector, and suggests an appropriate approach to solving the most serious problem by using Internet services. A computer program is an element that turns a universal device of information and
communication technologies into an education tool. The quality of training process depends on the quality of programs and, consequently, is defined by the state of affairs in the field of software development. Meanwhile, this sector of education informatization is studied poorly. A quick analysis of the discourse elements of participants in the education informatization process demonstrates that the external picture does not correspond to the real relations within the sector. An astute analysis leads to the conclusion that from the very beginning of informatization, the industry has kept largely on the initiative of individuals and small teams of enthusiasts. Under the conditions of chronic underfunding, the energy of enthusiasm has become a major resource for development. The active inclusion of teachers into the process of school informatization has created a distorted picture of teacher's place in the industry of software development.
Keywords: informatization of education; software development; educational software; coevolution; collective intelligence
CHARACTERISTICS OF NATIONAL SECURITY INDICATORS IN THE CONTEXT OF ITS INFORMATION MONITORING
Abstract: The article is devoted to problems of methodology of creation of the system of monitoring and indicator assessment of national security of the
Russian Federation. The main attention is paid to development and justification of the requirements for indicators which are used for national security assessment.
Keywords: monitoring of national security of the Russian Federation; information monitoring; indicator assessment; output indicators; outcome indicators
SOME APPROACHES TO FORMING REGULATORY AND TECHNICAL BASE FOR CREATION OF UNIFIED INFORMATION SPACE OF RUSSIA
Abstract: Targets of forming and developing the Russian Federation unified information space are determined relying on federal level regulatory and legal documents. The article defines the generalized composition of the unified information space based on aggregation of information resources and information infrastructure of the country. Authors created the definition of a Member of the space as a principle producer and customer of information resources. The article identifies three main problems of creating and using a unified information space considering the real conditions of informatization of the country. Based on the systemic approach, the article determines general principal theses regarding creation and usage of a unified information space. The article formulates the approach and proposals for documentation of a unified information space as a megasystem including seven absolutely new types of documents. The results can serve as the basis for further investigations concerning creation and interaction of information resources associated with the unified information space of the Russian Federation. Keywords: unified information space of Russian Federation; information resources; information infrastructure; centralization; integration; information security; providing telecommunication; systemic approach; megasystem; regulatory and technical document
ONTOLOGY SUPPORT OF CONTINUITY OF IT-SERVICES IN INFORMATION AND TELECOMMUNICATIONS SYSTEMS
Abstract: The article discusses the possibility of using ontologies to manage processes to ensure continuity of operations and accessibility of IT-services under conditions of disruption of information and telecommunications system (ITS) functioning by internal and external negative factors. The article provides a basic set of concepts that describe properties of ITS components, processes, situations, scenarios, and relations between them when restoring the native mode of support of it services. Keywords: ontology; information and telecommunications system (ITS); continuity of operations and accessibility of IT-services; systematic approach; subject area; concepts
INFORMATIZATION OF THE NORMALIZED ECONOMIC MECHANISM: E-SERVICES FOR RESOURCE PLANNING
Abstract: The article describes basic concepts of the normalized economic mechanism (NEM) and online services representing a special part of software which should become the base of informatization. The first active service implements an innovative method of cost planning taking into account priorities of expense items. The widest area of the service usage is budgeting, although the service allows flexible and dynamic planning of any resource costs. Keywords: informatization; economics; normalized economic mechanism; e-service; resource planning
|
Phone of the Center: +7 (499) 135-62-60E-mail of the Center: ipiran@ipiran.ru | RUS |