|
||||||||||
|
À. Å. Saak, Associate Professor, e-mail: saak@tgn.sfedu.ru, Southern Federal University Ring Algorithms for Scheduling in Grid Systems by Sets of Tasks Grid systems which have centralized structure of scheduling system are modeled by the resource quadrant. Multiprocessor tasks are modeled by resource rectangles. The task of the resource rectangle distribution is equivalent to the one of multiprocessor task service scheduling provided that processors with consecutive numbers are allotted for task handling. In our previous papers the resource rectangle environment were presented as an instrument of the polynomial scheduling theory for control of computational and time resource distribution. In this paper we define operations of resource rectangle dynamic integration with exceeding and minimal deviation, for the resource rectangle environment. On the base of introduced operations we develop an initial ring algorithm with exceeding and initial ring algorithm with minimal deviation which have polynomial completeness. The algorithms suggested here are adapted for use with the circular quadratic type of a multiprocessor task set. The quality estimation of the algorithms of scheduling is carried out with the use of the Non-Euclidean heuristic measure, which takes into consideration both the area and the shape of occupied resource enclosure. The values of the heuristic measure of the resource enclosures derived in the process of implementation of the initial ring algorithm with exceeding and initial ring algorithm with minimal deviation for scheduling the simulation examples of the set of resource squares with the sides equal to successive natural numbers which begin with one. The investigation shows that the initial ring algorithm with exceeding has the biggest value of the heuristic measure in comparison with the other ones. The result of the comparison of the heuristic measure values of the resource enclosures produced by the initial ring algorithm with minimal deviation and the initial ring algorithm, which was presented in the previous papers, doesn't make it possible to give preference for one of them in particular. On the base of the analysis' results we can recommend the initial ring algorithm with minimal deviation, presented here, for use in Grid systems with centralized architecture of scheduling system and the multisite mode of service. P. 163—169 D. V. Oshkalo, Postgraduate Student, dmitry.oshkalo@gmail.com, Bauman Moscow State Technical University, Moscow Bigraph-Based Development of Model Transformation Processes Model transformation is one of the key activities of model-driven software development, which enables model and code generation, model refactoring, model synchronization, change propagation, etc. It is performed by applying a set of transformation rules to the model elements. The most practically used rule-based approaches (like relational QVT or graphical TGG) provide a formal background for specifying model transformations, but the lack of technique of developing a transformation rules' set for every concrete scenario makes the development of model transformation processes ineffective and error-prone, since there is no possibilities which allows to formulate and verify the properties of the rule set. P. 170—178 A. S. Filippova, Professor. e-mail: annamuh@mail.ru, Bashkir State Pedagogical University named after M. Akmulla, E. I. Dyaminiva, Assistant Professor, e-mail: xasel@mail.ru, Yu. I. Valiahmetova, Assistant Professor, e-mail: julikcas@inbox.ru, Ufa State Aviation Technical University The Limited Decomposition Method for Solving a Complex Problem of Geometric Coverage and Cutting There is considered some NP-hard complex problem of geometric coverage and cutting. The solutions for it are as follows: a plan of covering the given polygonal domain with rectangular items of maximal size; a plan of cutting maximal number of sheets into covering items. Cutting and covering coefficients are the two criteria to evaluate its efficiency. The method of limited decomposition of the coverage area is offered, it uses matrix representation of the initial data and is based on the two-stage process, namely: solving a sub-problem of decomposing of the polygonal domain into rectangular ones, the sizes of which do not exceed the sheet size; solving a corresponding subproblem of rectangular sheet cutting. The computing experiment aimed at researching and comparing of the given method efficiency and that of the hybrid evolutional algorithm, developed earlier, has been carried out. Test problem solving has shown that both methods give high cutting coefficient but the suggested method of limited decomposing brings better cutting coefficient in 90 % of cases. P. 179—187 V. I. Struchenkov, Professor, e-mail: str1942@mail.ru, Moscow State University of Information Technology, Radio Engineering and Electronics, Moscow, Russia Dynamic Programming with Pareto Sets for Planning of the Renewable Resources Implementation Under study is the problem of optimal planning of the renewable resources implementation, such as the commercial breeding offish, animals and so on. P. 187—191 R. R. Zagidullin, Professor, porysoft@list.ru, Ufa State Aviation Technical University Automated Development of Alternative Technology The paper deals with automating the creation of alternative technological processes (ATP) in systems classes CAM using the built-in libraries of programming scripts. The proposed method of formalization of ATP as a symbiosis of the traditional linear technological structure of the operating technology with operators control when used in systems of classes CAM built-in programming scripts allows you to create one record base technological process (TP) several different ATP, which further automates the process of activation of or another ATP as a current depending on the particular circumstances and be used in any system scheduling classes MES (Manufacturing Execution System), APS (Advanced Planning System). P. 192—197 P. S. Poperechny, Postgraduate, Institute for Design Problems in Microelectronics (IPPM RAS) Digital Filtering Application for Reed-Solomon Coder Implementation This article proposes a method for coding circuit development by means of digital filtering. This approach allows to use digital filtering methods (cutting to small-order filters, pipe-lining) to change correcting level capability. The well-known coder scheme for RS includes linear feedback shift register (LFSR), which is very similar to TIR-filter (infinite impulse response). So, it is possible to use digital filtering for coder. Here are algebraic and scheme presentations of this approach. It is shown that we can not just change LFSR by IIR — filter, because both of them have different outputs. As well the coder works at different modes for input data and for output. But if we will use FIR-filter (finite-impulse response) serial-connected to IIR we can overcome these issues. This approach allows using all digital filtering advantages, such as to split one big order filter to many first-order filters. P. 198—202 A. V. Eremenko, Ph. D., Associate Professor of the Department "Info-communication systems and information security", nexus-@mail.ru, Omsk State Transport University (OSTU), A. E. Sulavko, Ph. D., Senior Lecturer of the Department "Comprehensive Information Protection", sulavich@mail.ru, D. A. Volkov, Postgraduate Student, vlkv.d.a@gmail.ru, Omsk State Technical University (OmSTU) Current State and Ways to Modernize Converters Biometrics to Code The article is devoted to the problem of the protection of cryptographic keys during their operation. The object of study in the article are the converters biometrics to code. An overview of the methods for use biometric characteristics of a human as a starting material for producing the cryptographic key encryption, as well as for identification and authentication is performed. The main factors affecting the reliability of the methods are considered. The conclusion about possible ways to modernize the existing methods to generate cryptographic keys based on dynamic biometric features is made. P. 203—210 N. I. Chervyakov, Professor, Chief of Department of Applied Mathematics and Mathematical Modeling, k-fmf-primath@stavsu.ru, Ì. A. Deryabin, Postgraduate Student, Junior Researcher of Department of Organization of Scientific Research, maxim.deryabin@gmail.com, North Caucasus Federal University, Stavropol New Method of Threshold Secret Sharing Based on Residue Number System This paper researches basic principle of constructing secret sharing schemes based on residue number system (RNS). Perfect and computational secrecy analysis of existing secret sharing schemes based on RNS is followed by a new approach to constructing a secret sharing scheme based on conversion of the secret to RNS. The main feature of the proposed method is the fact that the size of each share is small relatively to the size of the secret. Mentioned above feature results in effective data storage and transfer. Performed analysis has shown that using compact sequences of co-prime numbers as moduli set leads to computational secrecy of proposed scheme being close to the computational secrecy of Asmuth—Bloom scheme. P. 211—219 V. N. Zhurakovskiy, Associate Professor, S. I. Silin, Assistant, e-mail: sm2-2@inbox.ru, Bauman MSTU System Analysis Applied to the Data Processing Algorithms Selection for Modern Computing Systems Main purpose of this work is development of criteria system that could be applied to develop sophisticated devices based on field programmable gate array (FPGA), systems on the chip (SOC) and complex programmable logic devices (CPLD). In the first chapter of this article authors reviewed typical modern approaches to fulfilling this task. Authors provided explanation of the basis which the further apply to developed theory. In the second chapter authors developed criteria and objective function that could be used during system development to select the most suitable algorithm and realization. In the third chapter authors developed limitations to be used during selection process. Limitations are based on the typical structure of programmable integrated circuits and properties of typical problems arise during development process. In the fourth chapter authors placed example of different signal processing algorithms that could be analyzed with developed criteria and limitation systems. In the fifth chapter conclusion to work is placed. This theory suits to give mathematical and theoretical explanation of the selection process during DSP algorithms development. P. 220—228 A. S. Zuev, Ph. D., Head of the "Applied and Business Informatics" Department, Zuev_Andrey@mail.ru, I. S. Fadeev, fadeev@protonmail.ch, Moscow State University of Information Technologies, Radioengineering and Electronics Virtual Command Centers — New Management Tool for Socio-Economic Systems The article describes the possibilities of application of modern technologies and virtual reality devices to implement virtual command centers as an instrument of socio-economic systems at the level of the state and the individual economic actors. Expediency of addition of management system, based on the command centers, with their virtual models, which are processed with modern computer hardware is proved. P. 229—232 V. I. Golubev, Ph. D., RNTO im. A. S. Popov Information is Display of Subjects of World Around in a Cerebral Cortex The mechanism of consciousness is formed in this way. The signals from the object through a visual or acoustic analyzer fall within the field of projection of the cerebral cortex and are recorded in the columns in the area. Then they are transferred to the field of associative cortex. There momentum flux forming rings connected neurons, wherein a burst circulate with damping. It has rings connected neurons, rings reverb, which are formed by horizontal connections in neural networks. This circulation occurs with attenuation of the signal amplitude, but it is enough to record the process in biochemical memory peptides and create lasting memories of an event process. Separate impulses from neurons in the rings back to the thalamus, hippocampus, others go on and on to the thalamus through the caudate nucleus of the brain. The delay in the long pulse brain nuclei required for direct synchronization pulses from the projective areas and detained in long nuclei of the brain, the hippocampus. This delay creates a long-term memory. P. 233—239
|