Институт проблем информатики Российской Академии наук
Институт проблем информатики Российской Академии наук
Российская Академия наук

Институт проблем информатики Российской Академии наук



«Systems and Means of Informatics»
Scientific journal
Volume 24, Issue 4, 2014

Content | About  Authors

Abstract and Keywords.

A METADATA MODEL FOR SEMANTIC SEARCH OF RULE-BASED WORKFLOW IMPLEMENTATIONS

  • N. A. Skvortsov
  • A. E. Vovchenko
  • L. A. Kalinichenko
  • D. Yu. Kovalev
  • S. A. Stupnikov

Abstract:  Development of workflows and accumulation of open methods by scientific communities assumes their specification in open environment and their search to use them for problem solving. In this work, the Rule Interchange Format (RIF) dialects are used for workflow specification. Workflow elements are annotated with metadata to make their search in a subject domain possible.
The metadata model required for semantic search includes description of workflow skeleton structure, binding of workflow elements with concepts of the domain, quality and provenance requirements to data and methods. Metadata are defined in terms of corresponding ontologies. Search for workflow implementations in a collection of methods for construction of a workflow on the basis of existing relevant components is demonstrated by an example.

Keywords:  rule-based workflows; metadata; semantic search; ontology

METHODS FOR MAPPING OF COLLECTIONS PRESENTED IN NONTRADITIONAL DATA MODELS INTO THE INTEGRATED REPRESENTATION

  • S. A. Stupnikov
  • A. E. Vovchenko

Abstract:  The paper considers transformations of collections presented in nontraditional data models, such as graph, triplet, and key-value models, into the integrated representation in the relational data model. The context of the paper is the development of the combined virtual and materialized environment for integration of heterogeneous collections of (un-, semi-)structured data.
The proposed techniques constitute the basis for materialized integration of information resources in relational data warehouses over Hadoop.

Keywords:  database integration; graph data models; RDF; NoSQL; data collections transformation

BUILDING A SIMULATION MODEL FOR SOLVING SCHEDULING PROBLEMS OF COMPUTING RESOURCES

  • M. G. Konovalov

Abstract:  Scheduling of computing resources is a set of management actions on reception and distribution of applications coming into the computer processing system. Emerging challenges lie in optimization problems that are of a great variety of productions and often difficult decisions. In many cases, significant support is provided by a simulation model that implements a specific layout jobs on resources and created, as a rule, again for specific application. The article proposes an approach to building such simulation models, based on development of some ideas of the theory of communicating processes. The paper provides a fragment of a simulation model that covers many common features of scheduling of computing resources. The model is designed to create a software system that solves a variety of scheduling problems arising in computing systems.

Keywords:  scheduling; simulation model; communicating processes

RECENT WORKS IN THE FIELD OF MODELING INFORMATION FLOWS IN CONTEMPORARY HIGH-FREQUENCY FINANCIAL APPLICATIONS

  • V. Yu. Korolev
  • A. Yu. Korchagin
  • I. A. Sokolov
  • A. V. Chertok

Abstract:  Some results of recent studies in the field of modeling information flows in contemporary high-frequency financial systems and applications are discussed. In particular, the microscale model proposed by the authors is considered. Within the framework of this model, the order flows are described by doubly stochastic Poisson processes (also called Cox processes) which take account of the random character of intensities. To study the evolution of the limit order book (the current list of all active buy and sell orders), the models are proposed for the processes of number of orders imbalance and order flows imbalance having the form of two-sided risk processes, special compound Cox processes. These processes are sensitive indicators of the current state of the limit order book and provide the possibility to interpolate dynamics of the market between price changes, say, to trace toxicity of the order flow. The paper presents a review of main results obtained by application of these models.

Keywords:  financial markets; high-frequency financial systems; limit order book; number of orders imbalance; order flows imbalance; doubly stochastic Poisson process; compound Cox process; normal variance-mean mixture; twosided risk process; separation of mixtures; EM-algorithm; generalized variance gamma distribution; generalized gamma distribution; generalized hyperbolic distribution; generalized inverse Gaussian distribution

PROPERTIES OF WINDOW DISPERSION INCREMENTS OF A MYOGRAM AS A STOCHASTIC PROCESS

  • M. Sh. Khaziakhmetov
  • T. V. Zakharova
  • O. V. Shestakov

Abstract:  One of the most rapidly progressing directions in the modern medicine is brain activity research. There is a set of techniques of carrying out experiments in this area. One of the approaches is the so-called method of caused potentials: a testee repeats some actions and his brain activity and some auxiliary signals are registered for further analysis. The authors of this paper and their colleagues published several papers about algorithms of reference points localization by a myogram (and some other signals) for the experiment with finger movements. Accuracy of detection of these points is critical for processing a magnetoencephalogram - signal average by multiple epochs centered by them is computed to find a sensor with the best response (it should be closer to the source of activity than other). In this paper, some theoretical aspects of these algorithms such as a myogram and increment of its window dispersion as random processes are discussed.

Keywords:  window dispersion; window dispersion increments; myogram; mag- netoencephalogram

THE PROPAGATION METHOD BY MEANS OF AN ATTACK OF THE 'MAN-IN-THE-MIDDLE' TYPE IN THE DHCP PROTOCOL

  • M. V. Levykin
  • M. I. Tronenko
  • I. V. Shidlovsky-Moskvin

Abstract:  The research of the up-to-date malicious software conducted by the authors detected that one of the main methods of their expansion is the attack to the Dynamic Host Configuration Protocol (DHCP) made in order to organize the "man-in-the-middle" scheme. However, the result of such attack is of probabilistic nature and it depends on the difference between the speeds of response of antagonistic and legal (licensed) DHCP servers. The present paper describes the concept of expansion by means of the "man-in-the-middle" attack in the DHCP protocol and its limitations, imposed by the DHCP protocol. Examination of the DHCP protocol and limitations imposed on the expansion concept in it leads to creation of the new method which executes the attack of the "man-in-the-middle" type. This new method of unavoidable attack on the DHCP protocol excludes the probability of its failure and is the main result of the present research.

Keywords:  DHCP protocol; man-in-the-middle; local area net (LAN); guaranteed method of propagation; malicious code

INFLUENCE OF EXTERNAL MEMORY FEATURES OF SUPERCOMPUTERS ON PARALLEL PROGRAMS EXECUTION

  • O. S. Aladyshev
  • E. A. Kiselev
  • G. I. Savin
  • P. N. Telegin
  • B. M. Shabanov

Abstract:  The article considers usage of external memory in supercomputers. Methods of analysis of program interaction with memory hierarchy are described.
The article provides a technique to study the profiles of parallel programs with external memory supercomputer interaction. The technique is based on the use of the Ganglia open source resource monitoring software and logs of the SUPPZ batch system. The developed technique was used for collection and analysis of JSCC users' jobs profiles. The applications were chosen to illustrate the variety of input-output patterns in the user's job. The article presents the results of studying users' programs profiles, which were collected on the MVS- 100K supercomputer installed in JSCC RAS. Program classification based on the patterns of interaction with external memory is considered, statistics are presented. The key problems of using the external memory supercomputer system are described.

Keywords:  supercomputers; profiling of parallel programs; external memory; I/O operations

ADJUSTABLE VARIABLE-LENGTH CHARACTER ENCODING SCHEME - ACE

  • I. M. Adamovich
  • D. V. Zemskov

Abstract:  The article describes ACE (Adjustable Character Encoding) - a variable-length character encoding scheme, which is capable of encoding the full range of UCS (Universal Coded Character Set, ISO/IEC 10646) code points as sequences of one to four octets (8-bit code units). The main reason of creating this encoding was to increase, in comparison with UTF-8 (Unicode Transformation Format, 8-bit), the number of code points encoded as one-octet code unit sequence, thus allowing more compact representation of texts containing characters of a chosen national alphabet, and also to increase the capability to preserve binary representation of encoded characters of such alphabet to match their binary values in a single-byte code table. This encoding retains such properties of the UTF-8 encoding as statelessness (the representation of an encoded character does not depend on the values of previous characters), selfsynchronization (none of the valid code sequences can occur inside the other one, nor inside any adjacent sequences across their boundaries), and the possibility to locate the beginning or the end of a code sequence at any place of encoded text.

Keywords:  character encoding scheme; UCS; program localization; UTF-8

METHODS OF OPTIMIZATION OF SNOOPING CACHE COHERENCE SYSTEMS

  • B. Z. Shmeilin

Abstract:  During development of multiprocessor systems, an important task is maintenance of consistency (coherence) of data local cache processors. To ensure consistency of data, each processor in the system checks other processors on the presence of shared data in their cache by sending requests on network processors. However, a significant part of such requests is redundant, which increases network traffic and energy consumption when checking address tags. This article provides an overview of various methods of eliminating redundant requests in snoop-based coherence systems. The final section provides comparative characteristics of these methods and recommendations for the effective use of each method.

Keywords:  multiprocessor systems; snoop-based coherence systems; page table; translation lookaside buffer

TO A NEW CONCEPT OF INFORMATIZATION OF EDUCATION

  • V. V. Vikhrev
  • A. S. Christochevskaya
  • S. A. Christochevsky

Abstract:  The authors consider problems of using the information- communication technology in education (informatization of education). The results of three phases prognosticated in the first concepts of informatization of education are analyzed. It should be noted that there are no radical changes in the education system yet, though there is progress in informatization of the society as a whole. The authors consider four stages of informatization of education: computerization, multimediazation, internetization, and electronization. Taking into consideration a new form of state system in Russia, stabilization of economic and social processes, and adoption of a new education law, the authors base the necessity for developing and approving a new concept of informatization of education. According to this concept, it is necessary to analyze the results of fulfilling prior concepts (the latest one was presented in 1998), take into consideration peculiarities of the current electronic stage, when extensive factors are gradually substituted by intensive ones. Of course, the explosive character of "mobile Internet revolution" should be taken into account. This concept should also consider the role of informatization for people with special education needs. Criteria of usage of information and communications technologies in education should be developed as well. The paper provides wide discussion of the new concept.

Keywords:  informatization of education; concept of informatization of education; mobile revolution; Internet security

ON THE MECHANISM OF IMPLEMENTATION OF COEVOLUTIONARY MODEL OF THE DEVELOPMENT LIFE CYCLE OF COMPUTER PROGRAMS FOR LEARNING

  • V V Vikhrev

Abstract:  The article considers the situation in the key sector of education informatization (i. e., the field of education software development), determines the range of problems faced by the main sector, and suggests an appropriate approach to solving the most serious problem by using Internet services. A computer program is an element that turns a universal device of information and communication technologies into an education tool. The quality of training process depends on the quality of programs and, consequently, is defined by the state of affairs in the field of software development. Meanwhile, this sector of education informatization is studied poorly. A quick analysis of the discourse elements of participants in the education informatization process demonstrates that the external picture does not correspond to the real relations within the sector. An astute analysis leads to the conclusion that from the very beginning of informatization, the industry has kept largely on the initiative of individuals and small teams of enthusiasts. Under the conditions of chronic underfunding, the energy of enthusiasm has become a major resource for development. The active inclusion of teachers into the process of school informatization has created a distorted picture of teacher's place in the industry of software development.
The function of development engineer has been placed on teachers. But their activities should only supplement the work of programmers. Therefore, the cooperative system of development for engineers' and teachers' labour based on the coevolutionary model (i.e., the interrelated software development and its application in the specific pedagogical technologies) can help allocate duties right in the process of education software development. For teachers, this system can provide advisory data. For development engineers, the system can become a means of a further research in the subject area and can become a support tool of the stages of education software development life cycle that primarily suffer from underfunding. The system is implemented on the basis of Internet services.

Keywords:  informatization of education; software development; educational software; coevolution; collective intelligence

CHARACTERISTICS OF NATIONAL SECURITY INDICATORS IN THE CONTEXT OF ITS INFORMATION MONITORING

  • G. V. Lukyanov
  • D. A. Nikishin
  • G. F. Verevkin
  • V. V. Kosarik

Abstract:  The article is devoted to problems of methodology of creation of the system of monitoring and indicator assessment of national security of the Russian Federation. The main attention is paid to development and justification of the requirements for indicators which are used for national security assessment.
The purpose of this research is to develop a methodological basis for studying completeness and adequacy of the metrics used in the system in order to form a generalized assessment of national security of the Russian Federation in the medium and long terms. Application of the major components of the program- target approach using the developed methodology enables the use of monitoring tools to assess compliance of the results of activities in the sphere of national security, as well as attracted to this activities resource with the aims and objectives of national security provision.

Keywords:  monitoring of national security of the Russian Federation; information monitoring; indicator assessment; output indicators; outcome indicators

SOME APPROACHES TO FORMING REGULATORY AND TECHNICAL BASE FOR CREATION OF UNIFIED INFORMATION SPACE OF RUSSIA

  • A. A. Zatsarinny
  • E. V. Kiselev

Abstract:  Targets of forming and developing the Russian Federation unified information space are determined relying on federal level regulatory and legal documents. The article defines the generalized composition of the unified information space based on aggregation of information resources and information infrastructure of the country. Authors created the definition of a Member of the space as a principle producer and customer of information resources. The article identifies three main problems of creating and using a unified information space considering the real conditions of informatization of the country. Based on the systemic approach, the article determines general principal theses regarding creation and usage of a unified information space. The article formulates the approach and proposals for documentation of a unified information space as a megasystem including seven absolutely new types of documents. The results can serve as the basis for further investigations concerning creation and interaction of information resources associated with the unified information space of the Russian Federation.

Keywords:  unified information space of Russian Federation; information resources; information infrastructure; centralization; integration; information security; providing telecommunication; systemic approach; megasystem; regulatory and technical document

ONTOLOGY SUPPORT OF CONTINUITY OF IT-SERVICES IN INFORMATION AND TELECOMMUNICATIONS SYSTEMS

  • 1. 1. Bystrov
  • S. I. Radomanov
  • V. N. Veselov

Abstract:  The article discusses the possibility of using ontologies to manage processes to ensure continuity of operations and accessibility of IT-services under conditions of disruption of information and telecommunications system (ITS) functioning by internal and external negative factors. The article provides a basic set of concepts that describe properties of ITS components, processes, situations, scenarios, and relations between them when restoring the native mode of support of it services.

Keywords:  ontology; information and telecommunications system (ITS); continuity of operations and accessibility of IT-services; systematic approach; subject area; concepts

INFORMATIZATION OF THE NORMALIZED ECONOMIC MECHANISM: E-SERVICES FOR RESOURCE PLANNING

  • A. V. Ilyin
  • V. D. Ilyin

Abstract:  The article describes basic concepts of the normalized economic mechanism (NEM) and online services representing a special part of software which should become the base of informatization. The first active service implements an innovative method of cost planning taking into account priorities of expense items. The widest area of the service usage is budgeting, although the service allows flexible and dynamic planning of any resource costs.

Keywords:  informatization; economics; normalized economic mechanism; e-service; resource planning