Другие журналы

scientific edition of Bauman MSTU

SCIENCE & EDUCATION

Bauman Moscow State Technical University.   El № FS 77 - 48211.   ISSN 1994-0408

Informatics, Computer Science and Management

Optimization of solid-state wave gyro balancing with the use of the Hopfield neural network
# 07, July 2012
DOI: 10.7463/0712.0416090
M.A. Basarab, M.A. Ivoilov, V.A. Matveev
A neural network algorithm of balancing the non-ideal ring resonator of solid-state wave gyro is considered in the article. The algorithm is based on principles of combinatorial optimization and minimization of the Hopfield network energy; the algorithm allows harmonics compensation of angular mass distribution. The proposed approach can be generalized on various models of discrete balancing and combined with other tools of artificial intelligence: genetic algorithms, simulation annealing et al.
Modeling of geometric constraints in the process of decomposition of products into the assembly units
# 05, May 2012
DOI: 10.7463/0512.0415792
A.N. Bojko, S. Muammer, O.B. Rogova
The problem of modeling the geometric constraints in the assembly of mechanical products is considered. This problem was reduced to a mathematical two-person game on an ordered set. The result of the game is the correct col or of the partial order that it’s necessary to obtain for the minimum number of moves by decision-maker. This paper presents a static characterization of the correct co l ored ordered sets. It was shown that any coloring of this kind could be reduced to isotone mappings of ordered set onto two-element chain.
Review of filtration and segmentation methods for digital images
# 05, May 2012
DOI: 10.7463/0512.0411847
V.V. Strugailo
This article presents a review of approaches to filtration of digital images. Algorithms of linear, median and adaptive filters were simulated in order to filter pulse and white noises. Analyses of algorithms were carried out; the results of these algorithms application were also included in the article. Gradient operators and set of algorithms Canny for segmentation of digital images were simulated. Analyses of algorithms and results of implemented algorithms’ application for segmentation were carried out.
Synthesis of control in stochastic systems by generalized polynomial chaos
# 05, May 2012
DOI: 10.7463/0512.0410536
K.A. Pupkov, Xuan Phang Pham
One of the main difficulties of analysis and synthesis of control in stochastic systems is the need of operation in multi-dimensional abstract spaces which are typically infinite-dimensional and difficult to interpret physically. A method was proposed to solve the problem of synthesis of control in stochastic systems using generalized polynomial chaos. The method allows to transform the original problem with a stochastic model into a problem with a deterministic model of high-dimensional state space of a dynamical system. This problem can be solved by known numerical methods.
Modeling of frequency and power characteristics of titanium dioxide memristor
# 05, May 2012
DOI: 10.7463/0512.0409216
Yu.V. Hrapovickaya, N.E. Maslova, M.L. Zanaveskin, A.N. Marchenkov
The authors carried out numerical modeling of titanium dioxide memristor working frequency and power consumption. The model of memristor consists of two resistors connected in series; their resistance depends on the layers barrier between the oxygen layer and the TiO2 layer. For the first time the memristor power consumption at structural parameters dependences was analyzed. It was shown that  significant increase of working frequency under the conditions of decrease of active layer thickness and total memristor thickness leads to the increase of memristor power consumption. The optimal values of active layer thickness and total memristor thickness were defined in this article, basing on the obtained data.
Mobile personal device information security problems
# 05, May 2012
DOI: 10.7463/0512.0404286
I.I. Zaharchuk, Yu.G. Veselov, M.A. Eremeev
The paper describes the main types of threats to the mobile segment of the perspective military information infrastructure. The main principal approaches and technologies of mobile device security were analyzed.
77-30569/403744 Model of support element for boundary scanning technology for digital system testing tasks
# 04, April 2012
T.A. Demenkova, S.A. Nikolaev
The authors consider the task of creating a model of the element easily integrated into various devices ensuring access to performance capabilities of boundary scanning. The multifunctional support element for boundary scanning was developed as IP-kernel specified as RTL-model in the Verilog Hardware Description Language. The authors describe the test logic architecture and consider the results of simulation and configuration technique of the element according to the developer’s specific requirements. The proposed and implemented selection mechanism for optional CCS, the possibility of change of the binary code determining the commands through macro definitions allows to eliminate extra elements for any particular implementation at the corresponding stage.
Encoding of the binary sequence with the use of discrete chaotic maps
# 06, June 2012
DOI: 10.7463/0612.0402537
S.V. Mitin
This article presents a method of encoding of the binary sequences with the use of discrete chaotic maps. It was shown that in real systems the method of truncation to encode a message by blocks of bits should be used. The synthesis of a chaotic map with the specified probability density function was carried out. Maps and functions’ graphs, which are using for encoding of the binary sequence, are also included in the article.
77-30569/400433 Network packet tracking method
# 04, April 2012
A.O. Kryuchkov, V.A. Krishchenko
The paper describes a method of tracking individual IP packets throughout the network from their creation to delivery. The method keeps tracking various events including fragmentation, tunneling and NAT. An experiment with a software implementation of the method is described. Possible applications of the method include troubleshooting and studying of computer networks.
77-30569/400027 Description of the structure of technical objects with interchangeable components
# 04, April 2012
V.G. Mokrozub, A.A. Borisyak, D.A. Lagutin
The relational database provides a description of display methods for structure of technical objects with interchangeable components and rules of interchanging. Algorithm of composing the product’s tree was described in SQL format; every tree’s node consists of one element only.
The Laplace–Stieltjes transform of connection time of two tables in parallel database
# 06, June 2012
DOI: 10.7463/0612.0390320
V.L. Pluzhnikov, A.S. Domnikov
Connection of two tables in parallel database system (PDBS) was analyzed in this article. The Laplace–Stieltjes transform (LST) of connection time of two tables with NLJ and HJ methods in PDBS was introduced. Random character of the number of rows in the connecting tables is considered along with node fragmentation of tables, filtration of all table entries, probability of matching of connection attribute values, variants of hash-table location in the memory and parameters of interprocessor communication of PDBS nodes. Generating function of resultant value of entries, obtained after connection of tables in any node is presented in the article.
77-30569/387243 Analysis of query execution processes in parallel database systems with SE, SD, SN architectures.
# 04, April 2012
V.L. Pluzhnikov, V.M. Gasov
 The authors propose an approach to estimation of time characteristics of query execution to a parallel database system (PDBS). A model of query execution to PDBS with a p F(R) plan as a closed-loop queue system was developed. It was shown that the model could be reduced to a “repairman” model if there was a bottleneck. The possibility of reducing this model to an open-loop queue system is proved. Parameters of this model are determined. A policy of calculation of performance indexes of PDBS built on any architecture (SE, SD, SN) is formulated.
77-30569/382161 Automation system of communication process
# 04, April 2012
D.Yu. Gudzenko, G.I. Kazakov, M.V. Yuzov
The authors analyze several methods of creating a communication system for information interchange between workers on the shopfloor, managers in the office and clients. The most economical method was selected on the basis of using an additional database which interacts with the “1С:Enterprise 8.1. Trade control” program. Also the system comprises a website where clients can monitor the order state. The system was implemented at the particular enterprise.
77-30569/380497 Analysis of approaches to password system selection for protection of LAN servers when connecting Net users
# 03, March 2012
V.M. Gasov, V.M. Postnikov
This article deals with the analysis of approaches to the formation of password system for protection of LAN server when connecting user network. Based on the demands of information security, main functions of password system for protection of server were identified. Set of main components of password system was determined; it consisted of length of password, password’s alphabet, password’s expiration date, unicity of password and variants of password’s blocking modes. Analytical expression for evaluating the required length of password, which guaranteed the certain given level of probability of guessing password considering speed and time of guessing, and also the alphabet of password, was presented in the article. In order to provide the required level of information security, practical recommendations on the formation of password system for protection of LAN server when connecting user network were given.
77-30569/380603 Estimation of mean time of tables connection by NLJ and HJ methods in parallel database system
# 04, April 2012
Yu.A. Grigor'ev, V.M. Gasov
Known architectures of parallel database systems are analyzed in this article. The authors also consider expressions for evaluating the mean time of connection of two tables by NLJ and HJ methods; relevant mathematical expectations for SE, SD, SN architectures of parallel database systems are also considered. The authors provide examples of query processing in the following resources: disk array, RAM, connecting bus and processor. If there is a bottleneck in the resource, processing in that resource can be simulated by using the M/M/1 queue system. Parameters of that queue system are evaluated. The example of calculation which allowed to make several non-trivial conclusions is considered in the article.
77-30569/376455 Synthesis of optimal control systems for dynamic objects with random initial values
# 03, March 2012
K.A. Pupkov, Xuan Phang Pham, A.I. Diveev
 The authors formulate a problem of control systems synthesis for dynamic objects with random initial values. It was proposed for the synthesis to modify functionals of quality to form sum of values with weights for each initial value. Weights determine probabilities of initial values.  It was proposed to use the numerical network operator technique for solving the synthesis problem. An example of control system synthesis for an aircraft at the descend stage is presented in the article.
77-30569/373672 Issues of formal verification of engineering systems
# 04, April 2012
V.S. Burenkov, S.R. Ivanov, A.Ya. Savel'ev
Improving the verification of hardware and software systems is associated with the usage of formal methods among which the authors consider the model checking method which provides an automated consideration of all possible "paths of functioning" of the system. The problem of “explosion of the number of states” inherent in the method of verification of model checking is analyzed in the article; various methods of dealing with this problem are discussed. Particular attention is paid to verification of coherence memory protocols; possible approaches to solving this problem are outlined.
77-30569/372760 Methods of presentation and basis signal transformation in generalized Christenson functions
# 03, March 2012
V.V. Syuzev, A.Ya. Savel'ev, D.Yu. Gudzenko
 The authors consider methods of synthesis and basic properties of various discrete basis systems of generalized Christenson functions in polybasic number systems, as well as the original scalar method of constructing fast algorithms for analyzing the spectrum in these bases. Theoretical results are illustrated with concrete examples.
Algorithms of decomposition of complex discrete device formal model
# 05, May 2012
DOI: 10.7463/0512.0369895
I.V. Rudakov
 Modern CAD systems in mechanical engineering are increasingly used for design of microprocessor and robotic systems. The major component of modern CAD systems is creation of mathematical software for hierarchical cut-through design of complex devices. Simulation of complex technical systems is a high dimension problem, so one of the methods of investigating such systems is the decomposition method that allows to break the studied diagram into parts by checking the correctness of functioning both as a single functional unit and as the whole complex device at large.
Method of hierarchical study of complex discrete structures
# 06, June 2012
DOI: 10.7463/0612.0370230
I.V. Rudakov
 The proposed approach to the study of complex hierarchical structures allows to carry out discrete analysis of a complex structure functioning with the use of macro-modeling methods and subsequent automatic decomposition. Practical implementation of hierarchical investigation of complex discrete structures is based on technology of object-oriented programming. A language oriented to transacts was developed as a tool of analysis and verification of structure simulation. The method was tested in simulation of traffic flow in an overpass tunnel type.
 
SEARCH
 
elibrary crossref ulrichsweb neicon rusycon
Photos
 
Events
 
News



Authors
Press-releases
Library
Conferences
About Project
Rambler's Top100
Phone: +7 (915) 336-07-65 (строго: среда; пятница c 11-00 до 17-00)
© 2003-2024 «Наука и образование»
Перепечатка материалов журнала без согласования с редакцией запрещена
 Phone: +7 (915) 336-07-65 (строго: среда; пятница c 11-00 до 17-00)