Preview
No 2 (2016)
View or download the full issue PDF (Russian)

Management of technical objects

4-10 898
Abstract

Expediency of use of a control system and monitoring of technological processes of production is proved in article that will allow to lower work expenses, and also to increase productivity due to the best production process.

The main objective of system, remote monitoring is that gives the chance far off and to quickly give an assessment to the current situation on production, to accept reasonable and timely administrative decisions.

Data processing and decision–making

12-16 753
Abstract

In article is offered the way of a search of the facts like unusual data (these raising doubts) by forming databases from several sources. As criterion for search of such data it is offered to use a method of pattern recognition – decision rule. By using two and more decision rules there are crossings at which objects which can’t be classified correctly by means of such decisive rules are formed. As an example of a search of the data like unusual data application of this method is shown in the analysis of the data of heterogeneous balance in NaCl–KCl–MgCl H2O system published in 12 various sources for the different periods of time. Accuracy of classification has made 92–98%.

17–24 954
Abstract

The problems which has added in the field of creation of systems PDM and their integration with ERP is considered. The analysis of the reasons of low efficiency existing PDM is carried out: insufficiency of the primary information brought in PDM unit, structures of a DB, entering of designations in one field, application of referential character of guiding of composition that leads to lowering of its functionality and creates problems with integration with ERP.

It is shown that the uniform integrated information system created on uniform databases is necessary for the enterprises with a full stroke, using as the primary document card part-bom-unit, instead of a file. For it other is necessary in difference from databases existing the general-purpose structure in which it is possible to bring any information.

Implementation of the new system CDRP, uniting on functional PDM-ERP and providing enterprise basic needs is offered.

25–30 1060
Abstract

The article deals with the description of the main points of the structural and logical coding and the features of SLC codes. There are shown the basic points of the generalized algorithm of decoding SLC, which is based on the method of perfect matrix arrangement (PMA) of the n-dimensional cube vertices for adequate representation and transformation of boolean functions, which is based on the method of generating sequences of variables for building the maximum coverage of the cube vertices. The structural and logical codes (SLC) use natural logic redundancy of the infimum disjunctive normal forms (IDNF) of boolean functions, which make the basis for building the SLC codes and correcting the errors, that occur during data transfer in real discrete channels, on the channels with independent errors. The main task is to define the basic relations between the implemented SLC codes of the logical redundancy and boundary values of multiplicity of independent errors which are corrected. The principal difference between the SLC codes and the well-known correcting codes is that the redundancy, that is needed to correct the errors in converting the discrete information, is not introduced into an additional code sequence but is defined in a natural way, during the construction of codewords of SLC.

31-36 2439
Abstract

Gear pumps are the most common type of hydraulic machines. They are used in various industries: oil and gas processing industry, in machine tools, mobile military, road-building and agricultural machinery. The need to ensure efficiency of hydraulic mobile applications in a wide climatic range requires increasing the accuracy of the calculation methods for the design of their elements. The results of temperature field modeling and caused them stress and strain. The results obtained allowed to justify the design and technological solutions, providing an increase of hydraulic performance at critical ambient temperatures.

37-42 1935
Abstract

In the paper a method of automatical counting the number of cell nuclei in histological images is studied. This operation is commonly used in the diagnostics of various diseases and morphological analysis of cells. In this connection, the procedure of automatical count the number of cell nuclei is a key step in the systems of medical imaging microscopic analysis of histological preparations. The main aim of our work was to develop an efficient scheme of automatic counting cell nuclei based on advanced image processing methods: directional filtering, adaptive image binarization and mathematical morphology. Unlike prior research, the presented approach does not provide segmentation of cell nuclei in the image, but only requires to detect them and count their number. This avoids complex algorithmic calculations and provides good accuracy of counting cell nuclei.

The paper describes a series of experiments conducted to assess the effectiveness of the proposed method using the available online database of medical test histological images. Critical parameters defined algorithms, configurable at each stage of image analysis. For each parameter we have defined value ranges, and then realized a selection of optimal values for every parameter and a mutual combination of them. It is based on generally accepted quantitative measures of precision and recall. The results were compared with the state-of-art investigations in this field and demonstrated an acceptable level of accuracy of the proposed method. The software prototype developed during the study can be regarded as an automatic tool for analysis of cell nuclei. The presented approach can be adapted to various problems of analysis of cell nuclei of various organs.

Information security

44-49 2373
Abstract

A new image encryption algorithm based on dynamic chaos is proposed. The encryption is performed using the modified element permutation procedure. The element value changing procedure is carried with regard to the performed permutation. The modified permutation procedure includes the following steps: (1) permutation table creation; (2) permutation of image blocks, (3) element permutation in the image regions. The procedure «block permutations – permutation in the image regions» is performed q times – for this study q = 3. The second element value changing procedure is realized with the use of the pseudorandom sequence G that is added to the image elements. The following algorithm is proposed for the formation of this pseudorandom sequence: (1) the formation of the sequence G element distribution by brightness; (2) sequence G element initialization; (3) permutation of the sequence G elements. It is shown that, owing to the modified permutation procedure, the amount of calculations for new positions of the elements using chaotic maps is reduced by a factor of a – in this study a is equal to 16 and 64. The implementation of the proposed element value changing procedure necessitates the formation of d pseudorandom values from the interval [0, 1) with a uniform distribution. Actually, for the majority of practical cases d = 256 is applicable. The proposed algorithm has been tested as follows. The correlation coefficients have been computed for the original and encrypted images, and also for the adjacent elements in the vertical, horizontal, diagonal directions. The algorithm key sensitivity has been evaluated. Besides, the values of the unified average change intensity (UACI) and the ratios of differing bits to the total number of bits have been determined. As demonstrated by the testing results, the proposed algorithm is highly operable and may be successfully used to solve the tasks of information security.

50-56 1745
Abstract

The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. Such a situation can occur in the formation of a common cryptographic key of a symmetric cryptosystem employing a quantum channel, listened by a cryptanalyst, or other methods that do not make use of one-way functions. A method with the conversion parameters to increase the entropy of a generated secret random key sequences suggested. The essence of the procedure developed is that the subscribers A and B (secretly to a cryptanalyst), but in agreement with each other, choose some of the bits in the generated key sequence (further referred to as «tagged») and produce a pre-announced conversion of this sequence, using the data about the tagged bits.

Since the amount and serial numbers of tagged bits are unknown to a cryptanalyst, the layout of the bits known to a cryptanalyst before randomly changes and becomes uncertain. The fundamental point of this method is to obtain tagged bits, the positions of which are known only to subscribers A and B without using the secure communication channel. One of the possible methods of obtaining tagged bits based on a random and independent inversion of a generated key sequence by the subscribers A and B and followed by the analysis of parities pairs of bits is analyzed. The efficiency of the method is evaluated.

Information technologies in education

58-65 968
Abstract

Using of information technologies and e-learning systems increases opportunities of teachers and learners in reaching their studying process goals. It takes into account the individual characteristics of each and provides opportunities for e-learning. But e-learning systems using is limited despite of many researchers and the obvious advantages of such systems. One of the main reasons of such limitation is the usage of precise quantitative techniques in a hard-structured and fuzzy area as a learning process. In designing of information learning systems developers are faced with the problem of modeling knowledge which can be divided into two categories conventionally: personal and subject. Subject knowledge is defined education program and represents expert knowledge (the teacher) about the composition and structure of the subject. Personal knowledge can determine the level of the material studied by learner. This kind of knowledge is dynamic, changing in the educational process and designed to adapt e-learning systems to the particular learner. There are a large number of knowledge representation models. Commonly used models are logical, productional, network, frame-based and mathematical models. The main advantage of the mathematical model is the accuracy, abstraction processing, communication logically uniform way. Mathematical model of knowledge representation based on the theory of fuzzy sets take into consideration the semantic ambiguity expert assessment (teacher) degree of preparation to learner.

66-71 4259
Abstract

Information technology is rapidly conquering the world, permeating all spheres of human activity. Education is not an exception. An important direction of information of education is the development of university management systems. Modern information systems improve and facilitate the management of all types of activities of the institution. The purpose of this paper is development of system, which allows automating process of formation of accounting documents. The article describes the problem of preparation of the educational process documents. Decided to project and create the information system in Microsoft Access environment. The result is four types of reports obtained by using the developed system. The use of this system now allows you to automate the process and reduce the effort required to prepare accounting documents. All reports was implement in Microsoft Excel software product and can be used for further analysis and processing.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2309-4923 (Print)
ISSN 2414-0481 (Online)