Journal Archive

Issue 3 (2017)

Computing Systems and Elements
CONCEPTUAL ASPECTS OF BUIDING A TRUSTED HETEROGENEOUS BLOCKCHAIN-ENVIRONMENTS OF A NEW TECHNOLOGICAL STRUCTURE
Annotation: The transition to the new technological structure is connected with the increasing joint use such technologies as blockchain-algorithms of public and private distributed registries for the organization of a trusted environment; networks of things and machines (IoT/IIoT/M2M), neural network pattern recognition methods, case analysis and decision making, storage, processing and transmission of big data; virtual cloud platforms. Their integrated hardware-software implementation based on fully specified components, allows ensuring the necessary level of competitiveness and security of the Russian economy, its optimum development, protecting the in terests of domestic producers, with their own competence and new business models. In these circumstances, specific approaches are required to build heterogeneous trusted environments of a new technological structure, as well as for the development of new r equirement, rules and standards for them.
System Programming
VISUALIZATION OF POUR SPACE IN A DIGI TAL CORE MODEL
Annotation: In exploring and analysis of oil-bearing layers, core study is important. The core is a cylindrical volume of extracted rock. Core study is performed by means of t he microtomography, which allows to obtain X-ray reflection coefficient for any internal point. This coefficient can be used for unambiguous identification of rock or emptiness (pore apace) type. Tomography result rendering provides visual analysis methods for a researcher. This paper propose s the metho d for pore space visualization in selected core area by using of vertex and index buffer technology, which is a part of OpenGL graphic library.
TECHNOLOGY, METHODS AND ALGORITH MS FOR PREPARING AND SYNTHESIS OF MULTITEXTURES IN 3D VIRTUAL SCENES
Annotation: The paper presents a technology for preparing multitextures using modern software, including preparing a quality texture unwrapping, a detailed normal map and a diffuse texture with "baked" soft shadows from ambi ent lighting. Also, a method for multitexturing implementation within the Blend-multimaterial technology used in the 3ds Max system is proposed. The proposed technology, methods and algorithms were successfully tested in GLView visualizati on system develop ed in SRISA RAS .
Methods and Means of Control in Organizational Systems
ARCHITECTURE, MODELS AND ALGORITHMS TO INTEGRATE DISPARATE INFORMATION SERVICES OF E-LEARNING
Annotation: This article presents the architecture, models and algorithms, providing unique integration of disparat e information services of the e-learning into a common information space.
QUALITY RESEARCH OF MOBILE APPLICATIONS
Annotation: Nowadays the mobile apps market is experiencing unprecedented growth. The number of apps is in the millions and the choice of high-quality and safe products is d ifficult. In this regard, the standard and the testing methodology have been developed . This fact enables the assessment of the mobile apps’ quality to rate software products.
PROGRAM COMPONENT OF MANAGING DATA OF TEACHERS OF T HE WORK PORTAL OF THE CHAIR
Annotation: The information support, functions and architecture of the data management component of the teachers of the department's working portal are considered. The structure of the software application for data management of teachers of the department's working portal is given. The algorithm for managing teacher data is described, and the results of load testing are presented.
Methods and Systems of Information Protection
ALGORITHMIC MEANS OF PER COLAT IVE PROCESSES MODELLING IN RANDOM NETWORK STRUCTURES
Annotation: Research ing distribution and clustering of information in randomly topologised social network knots is very relevant task for economy, advertizing, marketing, sociology, political science, etc. This work considers either randomly composed social structures development algorithms or its percolative processes development algorithms in order to define the influence of average communications number on percolation threshold size and also on other important processes .
FUNDAMENTALS THE CRYPTOGRAPHIC GENERATION SYSTEM OF IDENTICAL INFORMATION CONSTRUCTION
Annotation: The paper considers the main approaches aimed at solving the problem of constructing and implementing a cryptographic generation system of identical information from the sender to the recipient. The proposed methodology is based on the fundamental cryptographic Diffie-Hellman algorithm, designed to obtain a common secret and the method of the client side formin g identical data fragments . Algorithmic support is proposed that increases the efficiency and total sys tem performance. Preliminary generation rate estimation with the real instances and measures of counteraction to MITM-attacks are considered.
System Analysis, Control and Information Processing
AN APPLICATION OF PRINCE2 METHODOLOGY TO AN IT PROJECT OF DATA MIGRATION BETWEEN REPOSITORIES
Annotation: The technique of maintaining a big data migration between operational data stores via S AAS guided by PRINCE2 methodology is described here. Applying this methodology allows for a greater effectiveness of the current project, and reduced risks and probabilities of project exceptions.
Previous issue

Issue Archive