main| new issue| archive| editorial board| for the authors| publishing house|
Ðóññêèé
Main page
New issue
Archive of articles
Editorial board
For the authors
Publishing house

 

 


ABSTRACTS OF ARTICLES OF THE JOURNAL "INFORMATION TECHNOLOGIES" N. 5, 2014

To the contents

B. G. Kukharenko, M. O. Solntseva

Clustering Objects under Control by Similarity of Their Multidimensional Trajectories

For clustering multidimensional trajectories polynomial regression method with parameter leaning by the Expectation-Maximization algorithm is in use. The method based on polynomial regression is characterized by the joint clustering and continuous alignment of curve sets in time and space. Efficiency of the clustering method is demonstrated by analysis of flight tracks in airport space.
Keywords: data analysis, multidimensional trajectories, clustering, polynomial regression, Expectation-Maximization algorithm

P. 3—7


A. S. Mokhov, V. O. Tolcheev

The Development of High-Precision Classification Methods for Bilingual Text Documents

The main problem of the article is an increase of an accuracy of bilingual text classification. We develop and research profile methods and compare them with "classic" methods. Our results confirm that profile methods permit to increase an accuracy of bilingual text classification. Combining profile-classifiers in an ensemble we get the best results.
Keywords: text Mining, methods of bilingual text classification, profile methods, ensemble of classifiers, accuracy (and error) of classification

P. 8—13


V. I. Levin

The Methodology of Optimization in Condition of Uncertainty by Determination Method

Existing approaches to system optimization (optimal design) under uncertainty are considered. The exact formulation of constrained optimization problem with interval uncertainty of the objective function and constraints parameters is given. The mathematical theory of intervals comparison including precise definition of minimum and maximum ranges is stated. On the base of this theory the determination method is formulated and justified which allows to solve problem by reduction to a two fully certain constrained optimization problems of same type.
Keywords: optimization, uncertainty, optimization with interval uncertainty, determination method

P. 13—21


S. A. Inyutin

Peculiarity Calculation Characteristics for Computer Modular Value

Research iteration methods calculation position characteristics for computer modular formats at parallel reconfiguration calculation systems.
Keywords: multiprocessor systems, modular calculation process, figure characteristic for computer formats, complexity calculation fault tolerance, cellular algorithm of the routing

P. 22—27


A. V. Vishnekov, E. M. Ivanova, V. A. Filippov

The Data Transfer Environment Choice in the Local Area Networks Design

The local networks development is one of the most frequently solved today tasks in the field of information technologies. The article considers the main stages of the local computer network development as a number of separate multicriteria partial solutions of selection tasks. We propose a new approach for the base project variant selection and for private solutions, based on the methods of the decision-making theory. The authors detail the decision of these problems on the basis of the analytical hierarchy method and the ELECTRE method. The article describes two usage examples of these methods for the solution of a problem of types of communication lines selecting on user's criteria.
Keywords: project, computer networks, decision making

P. 27—32


S. V. Dvornikov, V. V. Cvetkov, A. A. Ustinov

The Condensation of the Motion when Coding of the Mobile Scenes by Method of Fission of the Coded Frames on the Separating Groups

The development of the known method of the optimum, encoding three-dimensional fragment of the mobile scenes, having other degree in transportability, on count of the change of their size is described. The purpose of the new method consists in reduction the external difference of the frames difference inwardly each groups of the frames. This reduces the numbers significant factor three-dimensional transformation. The reduction of the factor of the transformation enlarges the factor to compression is proved. The active method of the optimum amount of the determination, separating area is motivated. The algorithm of the decision of the problem to sections in the base of the method of casual searching for of the best result is offered. Results of simulation modeling are introduced.
Keywords: method of the optimum coding, three-dimensional fragment of the mobile scene, factor to compression, differences between frames

P. 33—40


N. V. Chichvarin

The Choice of Methods of Protection Design Documents from Unauthorized Access

The basis of publications are the results of research on the choice of the method and means to protect the design documentation from unauthorized access. A model of the information security threats. The results of the analysis of cryptographic features, computed and digital steganography. The methods and computer steganography suggested their use for archival storage of archival data in the information subsystem of CAD. In the analysis also takes into account the essential features of the structure of the project documentation, defining the selection or synthesis of a steganographic algorithm.
Keywords: protection of the design documentation, unauthorized access, the model of information security threats, computer steganography, CAD, steganographic algorithm

P. 41—48


A. Yu. Dolgopyatov

Recovery of Remote Data

In article possibility of recovery of remote data is considered. Conditionally refusals of a hard disk can be broken into some parts: refusal of mechanical part, failure of electronics, defects of a surface, failure of file system. Unlike many programs, only some can restore faulty sectors of the most hard disk according to all set section or in the set range. Some protocols, knowing technology of magnetic reversal of a surface, only nullify faulty sectors.
Keywords: winchester, casual distortion, loading record, damage of file system, servometka

P. 48—51


V. M. Artuschenko, T. S. Abbasova

Effective Protection from External Interference Conductivity Channel Structured Cabling Transmission High-Speed Data Applications

The analysis of protection of the electrotechnical cables "twisted couple" for data transmission in the range of frequencies of 100...500 MHz, from external electromagnetic influences is carried out; the graphic dependences, allowing to provide electromagnetic compatibility at construction and operation of the structured cable systems for data transmission of high-speed protocols are received.
Keywords: external electromagnetic effects; electromagnetic compatibility; structured cabling systems

P. 52—56


E. D. Aved'yan, V. E. Lugansky

Methods for Improving the Accuracy of Filling Gaps in Tables Based on the Modified CMAC Neural Networks

The present work, in which the problem of filling gaps in tables is solved using modified CMAC neural networks (CMAC NN), develop the results obtained in [1]. In the role of the modified CMAC NN act two layer CMAC NN and CMAC NN based on the least squares method. Modified NN solve the problem of reconstructing missing data with higher accuracy than it does the classical CMAC NN. It is shown that the preference should be given to the CMAC NN based on the least squares method for which the accuracy solution is higher than for two-layer CMAC NN.
Keywords: filling gaps in table, CMAC NN based on the least squares method, two layer CMAC NN, computer simulation

P. 58—65


A. V. Myshev

Architecture of Virtual Flow Computing System Streaming Based on Information Model of Neural Networks

In the work the architecture (structure) of a virtual flow computing system of new generation computer system, which allows for a new paradigm of computational intelligence and make access to these new intelligent computing power through non-conventional neural networks is considered. Mathematical and logical foundations of the paradigm allow to realize the benefits of new computer systems identified on the basis of information models of neural networks and innovative design principles and implementation of various forms of computing that allow the synthesis of the impact of the mechanisms of parallelism, virtualization and intellectualization of information on the dynamics of the objects of the computing environment.
Keywords: virtual computer systems streaming, computing, computing environment, information model of neural networks, multi-layer modular design

P. 65—72

To the contents