Issue 4 (2021)
System Analysis, Control and Information Processing
Annotation: In Part 1 probabilistic methods for solving problems of predictive processing of monitoring data are considered. The methods help to do effective use the capabilities of artificial intelligence (AI). The approach includes probabilistic models and methods t hat allow predicting the probability of "success" and/or the risk of failure for complex objects and systems, ways to solve the problem of justifying proactive measures to counter threats and effective risk management. The achievable effects are explained by the example of the interpretation of the properties of probability distribution function constructed in the models and applicable in the proposed methods.
Keywords: method, model, monitoring, probability, risk, system, technology
Annotation: The purpose of the work is to study the area of applicability and inapplicability of non-sequential algorithms. The content of the concept of sequence is revealed. Its polysemy and application in programming are shown. The difference between sequential and non-sequential programs is shown. An analogy with deterministic and non-deterministic calculations is given. The pr inciples of operation of sequential programs are described. Situational and subsidiary algorithms are considered as non-sequential algorithms. The example of the IF-THEN-ELSE construct shows the difference in its implementation in sequential, situational a nd subsidiary programs. The article shows that the use of non-sequential algorithms and methods allows solving a greater number of problems that sequential programs do not solve. The article gives the criteria for applicability of situational and subsidiar y algorithms
Keywords: algorithms, computations, sequence, logical sequence, sequential computations, situational computations, subsidiary computations, information construction, conditional construction
Computing Systems and Elements
Annotation: This work is devoted to the formation of promising directions for system engineering development, providing for its implementation the use of a risk-oriented approach in the life cycle of complex systems. The main steps for the implementation of the formulated promising directions are proposed, their essence is explained. The application to the national priorities in the field of information and economic security and scientific and technological development according to the "National Security Strategy of the Ru ssian Federation" defines the tasks for the effective solution of which it is reason able to implement the proposed promising directions .
Keywords: method, model, risk, system, system engineering
Methods and Systems of Information Protection
Annotation: The issues of using analytical models for assessing security against unauthorized access and maintaining the confidentiality of information are considered. Based on the methods of recovery theory and approximation of the distribution functions used by two-parameter distributions, a mathematical apparatus has been developed for assessing the security of information from unauthorized access. The proposed theoretical provisions for security assessment extend the well-known standardized calculation methods usin g one-parameter approximation of distribution functions, are quite universal and can be useful to a wide range of specialists.
Keywords: models, standard, recommendations, confidentiality, information protection, recovery processes, distribution function, approximation, unauthorized access
Methods and Means of Control in Organizational Systems
Annotation: This article examines a set of data on taxi rides in the metropolis in order to determine the factors that affect the price of the trip. Machine learning models are used: linear regression, polynomial regression, decision trees, ensemble learning, and the random forest method. During the comparison, it turned out that the optimal model is begging . A method for determining the predictive estimate of the cost of a trip is obtained.
Keywords: taxi service cost forecasting, machine learning model, linear regression, polynomial regression, decision tree model, random forest method, ensemble learning, begging, boosting
System Programming
Annotation: This article describes the process of implementing technological documentation using SQL queries in the product lifecycle management system (PLM system). The life cycle of the product is described in detail and the concept of a single information space of the enterprise is formulated. A detailed algorithm for the development and implementation of the report in the product lifecycle management system and an example of the implementation of an SQL query are given.
Keywords: PLM system, product lifecycle, documentation export, SQL queries, manufacturing enterprises, unified information space of the enterprise
Issue Archive
№ 3
2024
№ 2
2024
№ 1
2024
№ 4
2023
№ 3
2023
№ 2
2023
№ 1
2023
№ 4
2022
№ 3
2022
№ 2
2022
№ 1
2022
№ 4
2021
№ 3
2021
№ 2
2021
№ 1
2021
№ 4
2020
№ 3
2020
№ 2
2020
№ 1
2020
№ 4
2019
№ 3
2019
№ 2
2019
№ 1
2019
№ 4
2018
№ 3
2018
№ 2
2018
№ 1
2018
№ 4
2017
№ 3
2017
№ 2
2017
№ 1
2017
№ 4
2016
№ 3
2016
№ 2
2016
№ 1
2016
№ 4
2015
№ 3
2015
№ 2
2015
№ 1
2015
№ 3
2014