Knowledge bases, intelligent systems, expert systems, decision support systems
Reference:
Shunkevich D.V.
Principles of interpretation of software written on a program language oriented on the knowledge database processing
// Cybernetics and programming.
2014. ¹ 5.
P. 1-13.
DOI: 10.7256/2306-4196.2014.5.13300 URL: https://en.nbpublish.com/library_read_article.php?id=13300
Abstract:
The article reviews a unified logic-semantic model of an interpreter for basic programming languages oriented on the processing of sc-models of knowledge database. The mentioned above model is based on a multi-agent approach. The article is dedicated to a basic language of programming a technology of designing OSTIS intelligent systems, and more specifically, to a model of interpreter underlying this technology based on a multi-agent approach to designing knowledge processing machines. Basic concepts of this article such as sc-agent, abstract sc-agent and so on are reviewed in this article and on the web-site of this technology. The programming language discussed is basic for OSTIS intelligent systems developing technology. The article describes both sc-agents of abstract scp-machine and sc-language of their interaction. The author discusses principles of interpretation of software written on a basic programming language oriented on processing of sc-models of knowledge database. The developed model is based on a multi-agent approach that allows to effectively use the abilities of asynchronous and parallel programming and makes designed model open, that is, there is the possibility of adding new agents into it.
Keywords:
intelligent system , knowledge processing machine, knowledge base , multi-agent system, programming language , interpreted language, OSTIS, multi-agent approach , sc-agent, sc-model
Forms and methods of information security administration
Reference:
Korobeinikov A.G., Grishentsev A.Y., Kutuzov I.M., Pirozhnikova O.I., Sokolov K.O., Litvinov D.Y.
Developing of the mathematical and simulation models for calculation of an estimate of informatization object protection from unauthorized physical access
// Cybernetics and programming.
2014. ¹ 5.
P. 14-25.
DOI: 10.7256/2306-4196.2014.5.12889 URL: https://en.nbpublish.com/library_read_article.php?id=12889
Abstract:
Methods and techniques allowing to calculate quantitative estimates of level of protection from unauthorized physical intrusion for different informatization objects using various means and protection systems are currently being intensively developed. Generally the quantitative evaluation of protection is represented by a set of probability characteristics, the predominant of which is some integral indicator. Therefore, developing mathematical and simulation models for calculating an estimate of informatization object protection from unauthorized physical access is an urgent task. This model then is used as a part of a complex system of information security. To solve this problem the article presented uses methods of information protection, graph theory and probability theory. The results shown in the article were calculated using Maple system of computer algebra. Scientific novelty of the work is: – in creating a mathematical model for calculation the probability of detecting of unauthorized physical access to information by an alarm system; – in bulding of a simulation model for evaluation of level of protection of informatization object from unauthorized physical access; – in developing of a technique of evaluation of full protection from unauthorized physical access for object of informatization
Keywords:
mathematical model, simulation model, neograph, acyclic graph , orgraph, adjacency matrix, weight matrix, Dijkstra algorithm, unauthorized physical access, protection of objects of informatization
Forms and methods of information security administration
Reference:
Zavodtsev I.V., Zakharchenko R.I., Zakutaev A.A.
Analysis of developing tools for neural network modules of management system for information security incidents
// Cybernetics and programming.
2014. ¹ 5.
P. 26-33.
DOI: 10.7256/2306-4196.2014.5.13308 URL: https://en.nbpublish.com/library_read_article.php?id=13308
Abstract:
The article shows the analysis of tools for developing neural network modules of management system for information security incidents, reviews its main features in simulation and testing. Specific attention is given to a comparative analysis in terms of usability and neural network modeling features. Development of domestic control systems for information security incidents still is in the state of research and development projects. This, on the one hand, complicates immediate transfer complex solutions for data protection entirely on the domestic base, but, on the other hand, allows taking into account all the latest scientific achievements in the implementation methodological basis for constructing own management system for information security incidents. This fact determines the need for further consideration of methods and techniques for the construction of management systems for information security incidents. Reviewing features of neuropackages and their comparison in terms of ease of use and range of services for modeling neural network systems allowed to determine that in components and the ability to solve the special case of constructing modules such tools as MATLAB and NeuroSolutions are the most suitable applications, offering a greater set of features and having better technical support.
Keywords:
information security , incident management , neural network module , neural network architecture , neural networks , tools , management system for information security inciden, simulation , testing , comparative analysis
Software for innovative information technologies
Reference:
Urazaeva T.A.
Application package “MultiMIR”: architecture and appliance
// Cybernetics and programming.
2014. ¹ 5.
P. 34-61.
DOI: 10.7256/2306-4196.2014.5.12962 URL: https://en.nbpublish.com/library_read_article.php?id=12962
Abstract:
Evaluation of risks of system development is an urgent task for a for a variety of disciplines such as economics and sociology, technology and ecology, the system studied at the intersection of different disciplines. Often the parameters of such systems are discrete, set of possible states is bounded. The application package “MultiMIR” was designed to evaluate risks of development in such systems. An important difference of “MultiMIR” from other application is in achievement of polynomial computational complexity for some classes of systems, while most analogues offer only exponential complexity. The article describes: purpose of the application, main ideas used as a basis for algorithms, application architecture. The author gives an overview of ways of using the application. The conceptual basis of the theory used in the development of algorithms implemented in “MultiMIR” is in theoretical probabilistic approach. As a specific mathematical apparatus the author has chosen formalism of theory of multisets, which, in author’s opinion, has the richest expressive possibilities for the study in the described the subject area. As a programming system used in the development of the first version of the application the author used VBA-subsystem office with Microsoft Office. The selection of the programming system is dictated by the features and preferences of the primary target of the package: banking and financial analysts. Using “MultiMIR” allowed for the first time to provide accurate calculation of such non-linear measures of risk as expected utility, distorted probability measure, "Value at Risk", and so on for medium and large homogeneous portfolios term financial instruments without involving time-consuming analytical methods. Unlike traditionally used for this purpose Monte Carlo method, approached based on the described above application allows obtaining an exact solution using a comparable amount of CPU resource. “MultiMIR” application can also be used for verification of reliability of the results obtained using Monte Carlo methods considered classical in the financial risk management.
Keywords:
system, visual modeling , risk, risk process, measure of risk, Value at Risk, VaR, homogeneous portfolio , term financial instruments, Monte Carlo method
Mathematical models and computer simulation experiment
Reference:
Gatchin Y.A., Polyakov V.I., Skorubskii V.I., Chebanenko A.A.
Endocrine subsystem model
// Cybernetics and programming.
2014. ¹ 5.
P. 62-69.
DOI: 10.7256/2306-4196.2014.5.13295 URL: https://en.nbpublish.com/library_read_article.php?id=13295
Abstract:
For many years various tools from conventional thermometer to sophisticated measuring instruments were used in medicine to improve the diagnosis of disease. Verification of the effectiveness and safety of diagnostic techniques is the basis of evidence-based medicine. It requires mathematical methods of for assessing the quality of treatment and measuring tools. Diabetes is a massive and incurable disease, however, with self-control, following the recommendations depending on the type of disease and gathering information on the state of the organism the parameters of injections can be calculated to keep the near normal state of health, which is highly important at the pace of modern life. In this article the authors suggest a model of endocrine subsystem of a person with the II-type diabetes. The model is based on the analysis of characteristics of changes of glucose concentration in blood. The model can not be considered exhaustive due to a wide variety of internal and external factors, affecting the subsystem state and therefore influencing general health of the person and reducing the threat of dangerous consequences. However, with a certain objectivity, the model can be used to calculate parameters of external influences (caloric intake and insulin injections) to maintain a normal state of the patient using the mobile means.
Keywords:
diabetes , endocrine subsystem , glucose concentration , automatic control system of a regulatory type, glucose , type II diabetes , simulation , subsystem , disease , analysis
Mathematical models and computer simulation experiment
Reference:
Labkovskaya R.Y., Kozlov A.S., Pirozhnikova O.I., Korobeinikov A.G.
Modeling the dynamics of reed sensors of control systems
// Cybernetics and programming.
2014. ¹ 5.
P. 70-77.
DOI: 10.7256/2306-4196.2014.5.13309 URL: https://en.nbpublish.com/library_read_article.php?id=13309
Abstract:
The article is devoted to developing of methods and algorithms of finding eigen values for analyzing dynamics and stability of reed sensors. Matrix-topological method, PC-oriented, uses a model with lumped parameters to describe the oscillatory processes of microsensors beam elements and reeds contact cores. Replacement of the system with distributed parameters with the equivalent model with lumped parameters is achieved by using the Rayleigh method. This method leads to considering a system with a higher hardness than original, thereby obtaining a higher frequency compared with the actual. The authors developed a matrix-topological model for frequency analysis of geometrically-complex and multilink reed sensors based on the switching to the system with lumped parameters using following methods: electromechanical analogies, method Rayleigh-Ritz method and graph theory. On the example of one of the three constructs of reeds oscillatory systems the authors compare theoretical results of calculation of reed sensors eigen frequencies, gathered using matrix-topological method with corresponding experimentally obtained values with piezoelectric and optical methods of the reed sensors frequency spectra analysis. The correctness of the frequency analysis was achieved using Fourier frequency filters.
Keywords:
eigen values, reed, algorithm, method, microsensor, analysis , dynamics , stability , element, contact core