Summaries of the Issue

INFORMATION TECHNOLOGIES

3
For "Common Criteria" functional model building the SADT method and its DFD notation are used. SADT method initially is not able to reflect "Common Criteria" model properly due to modeling object certain specificity, that’s why for CC functional modeling method the SADT method should be somehow corrected.
9
This article represents the result of comprehensive investigations of the distributed data storehouses and the quantitative and qualitative analysis of their functioning characteristics. As the result of research the author describes the functional model of distributed data storehouse system for Internet services.
THE SOURCE CODE PARSING METHOD ON BASIS OF LANGUAGE SIMPLIFIED GRAMMAR Alexander Moldovyan, Alexey Galanov, Vladimir Vereshchagin, Dmitry Arefev
17
The article involves the source code parsing method on basis of simplified ensemble of grammar production rules. The authors present methodological conception and information about effective practical application
25
The article describes new concepts of collection and processing of borehole measurements data using an acoustic flowmeter. Computerized system allows to increase the development profitability of the earlier unpromising oil fields.
34
We consider features of Deferred Shading, a number of advantages and disadvantages of Cook-Torrance lighting model, and implementation of this lighting model using deferred shading. We suggest a layout for g-buffer and number of optimization techniques.
HARDWARE-SOFTWARE COMPLEX FOR AIRCRAFT LANDING CONTROL Polyakov Vladimir Ivanvich, Alexander Sauta
44
The article gives a brief description of satellite landing system and satellite navigation system differential operating mode. The problem of aircraft landing accuracy control for existing systems is considered, and its solution with tools commercially available on avionics market is suggested.
IMAGE SEGMENTATION FOR RECOGNITION OF PRINTED DOCUMENTS Korobeynikov Anatoliy Grigorievich, Hoang Giang
52
This paper describes the newly developed multiscale algorithm for document segmentation, based on the Dynamic Local Connectivity Map (DLCM). Using this algorithm we can extract the hierarchical tree of document blocks with a complicated structure (presence of pictures, sports, text in different fonts and so on).
EXTERNAL ATTACKS EFFECT ON DC COEFFICIENTS OF DCT MATRIX OF STILL SEMITONE IMAGES Korobeynikov Anatoliy Grigorievich, Mikhailichenko Olga V, Prokhozhev Nikolai N
57
The subject of this article is an external attacks effect on DC coefficient of semitone image DCT matrix. The goal of this analysis is a convenience determination of using DC coefficients as a data hide area for steganography algorithms. Resizing, Gaussian noise, filtering and JPEG compression are used as an external attacks.
62
The article deals with a quantitive recurrent calculation of recurrent diagram in the window moving along the main diagonal. Examples of the method application to model and natural data are given. The results and application facilities are estimated.

TELECOMMUNICATION SYSTEMS

73
A study of the limited packets length impact on the functioning characteristics of communication networks was carried out using simulation system GPSS. We show that the error of calculation characteristics results in the assumption of unlimited length of packets can reach up to tens of percent.
81
The impracticability of analytical methods for buffer memory size estimation in telecommunication network intermediate nodes is shown. The results of multiple simulation experiments are allowed suggesting an empiric inequality that can be used to calculate accurately the upper bound for the buffer memory size. The inequality gives decent results only if utilization factor is above 40%.
OPTIMIZATION ALGORITHMS FOR THE WIRELESS SENSOR NETWORK BASED ON ZIGBEE PROTOCOL Alexei Chechendaev, Timofei Istomin, Maxim Minenko, Sergey Trifonov, Sergey Trifonov
86
The wireless networks based on ZigBee protocol and problems of reducing both message delivery time and energy consumption at the same time are considered. The roles of distribution and schedule planning algorithms for routers are described with their theoretical analysis. The results of carried out experiments are given and analyzed.

Information and Educational Technologies

96
This article covers the description of an electronic course in the AcademicNT distant learning system based on competence set-rating approach. The graphic notation for the description of electronic course models is developed on the basis of the automatic approach. Condition components are defined. Typical transition diagrams are constructed, and the dependence analysis of condition number from electronic course modules quantity and access technique is carried out. Modeling technique of the course logic in the Stateflow environment of Matlab system is offered.
103
The article is devoted to big distributed hardware-software complexes design and arrangement, an optimal choice of the equipment configuration. The developed technique and algorithms allow defining a number of the complex hardware characteristics for carrying out UGE in the computer form based on the users quantity in system.
CONTROL ACTIONS COORDINATION WHILE PROFESSIONAL QUALIFICATIONS FORMATION IN PROGRAMMING Gusarova Natalya Fedorovna, Galina Kotelkova, Vladislav Sinitsyn, Filipp Smirnov
111
The article deals with overcoming of environment system uncertainty as a part of programmer professional qualifications (PPQ). Mathematical model and demonstration system of PPQ formation are represented with visualization of programming results. This system implies immersion into the real-life environment with the two-level control facility while receiving professional skills by learners.
Copyright 2001-2019 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика