Issue 3 (2017)
Computing Systems and Elements
Annotation: The transition to the new technological structure is connected with the increasing joint use such technologies as blockchain-algorithms of public and private distributed registries for the organization of a trusted environment; networks of things and machines (IoT/IIoT/M2M), neural network pattern recognition methods, case analysis and decision making, storage, processing and transmission of big data; virtual cloud platforms. Their integrated hardware-software implementation based on fully specified components, allows ensuring the necessary level of competitiveness and security of the Russian economy, its optimum development, protecting the in terests of domestic producers, with their own competence and new business models. In these circumstances, specific approaches are required to build heterogeneous trusted environments of a new technological structure, as well as for the development of new r equirement, rules and standards for them.
Keywords: blockchain, trusted environment, network of things and machines IOT/IIOT/M2M, neural network, data center, cloud technologies, asymmetric cryptography, risk management, hyperconvengence, program-defined networks SDN/SD-WAN, technological structure, rapid prototyping
System Programming
Annotation: In exploring and analysis of oil-bearing layers, core study is important. The core is a cylindrical volume of extracted rock. Core study is performed by means of t he microtomography, which allows to obtain X-ray reflection coefficient for any internal point. This coefficient can be used for unambiguous identification of rock or emptiness (pore apace) type. Tomography result rendering provides visual analysis methods for a researcher. This paper propose s the metho d for pore space visualization in selected core area by using of vertex and index buffer technology, which is a part of OpenGL graphic library.
Keywords: core, pore space, visualization, OpenGL, vertex buffer
Annotation: The paper presents a technology for preparing multitextures using modern software, including preparing a quality texture unwrapping, a detailed normal map and a diffuse texture with "baked" soft shadows from ambi ent lighting. Also, a method for multitexturing implementation within the Blend-multimaterial technology used in the 3ds Max system is proposed. The proposed technology, methods and algorithms were successfully tested in GLView visualizati on system develop ed in SRISA RAS .
Keywords: multitexture, 3ds Max, texture unwrapping, normal map, multimaterial
Methods and Means of Control in Organizational Systems
Annotation: This article presents the architecture, models and algorithms, providing unique integration of disparat e information services of the e-learning into a common information space.
Keywords: architecture, common information space, integration, information service, model, distributed data, distributed process, e-learning
Annotation: Nowadays the mobile apps market is experiencing unprecedented growth. The number of apps is in the millions and the choice of high-quality and safe products is d ifficult. In this regard, the standard and the testing methodology have been developed . This fact enables the assessment of the mobile apps’ quality to rate software products.
Keywords: standard, standardization, mobile apps, quality requirements, qualit y, safety, usability, ease of use, RusQuality, testing methods, research
Annotation: The information support, functions and architecture of the data management component of the teachers of the department's working portal are considered. The structure of the software application for data management of teachers of the department's working portal is given. The algorithm for managing teacher data is described, and the results of load testing are presented.
Keywords: department management system, working portal of the department, client-server architecture
Methods and Systems of Information Protection
Annotation: Research ing distribution and clustering of information in randomly topologised social network knots is very relevant task for economy, advertizing, marketing, sociology, political science, etc. This work considers either randomly composed social structures development algorithms or its percolative processes development algorithms in order to define the influence of average communications number on percolation threshold size and also on other important processes .
Keywords: knots clusteri ng, random topology, random networks organisation algorithms, percolati ve processes, percolation threshold
Annotation: The paper considers the main approaches aimed at solving the problem of constructing and implementing a cryptographic generation system of identical information from the sender to the recipient. The proposed methodology is based on the fundamental cryptographic Diffie-Hellman algorithm, designed to obtain a common secret and the method of the client side formin g identical data fragments . Algorithmic support is proposed that increases the efficiency and total sys tem performance. Preliminary generation rate estimation with the real instances and measures of counteraction to MITM-attacks are considered.
Keywords: Diffie-Hellman algorithm, data transfer, suffix array, cryptography
System Analysis, Control and Information Processing
Annotation: The technique of maintaining a big data migration between operational data stores via S AAS guided by PRINCE2 methodology is described here. Applying this methodology allows for a greater effectiveness of the current project, and reduced risks and probabilities of project exceptions.
Keywords: tailoring, PRINCE2 methodology, data set, dynamic document, IT project, data migration, repository, SAAS, operational data store
Issue Archive
№ 3
2024
№ 2
2024
№ 1
2024
№ 4
2023
№ 3
2023
№ 2
2023
№ 1
2023
№ 4
2022
№ 3
2022
№ 2
2022
№ 1
2022
№ 4
2021
№ 3
2021
№ 2
2021
№ 1
2021
№ 4
2020
№ 3
2020
№ 2
2020
№ 1
2020
№ 4
2019
№ 3
2019
№ 2
2019
№ 1
2019
№ 4
2018
№ 3
2018
№ 2
2018
№ 1
2018
№ 4
2017
№ 3
2017
№ 2
2017
№ 1
2017
№ 4
2016
№ 3
2016
№ 2
2016
№ 1
2016
№ 4
2015
№ 3
2015
№ 2
2015
№ 1
2015
№ 3
2014