ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)
Menu
Summaries of the issue

INFORMATION TECHNOLOGIES

7
Peculiarities of discrete Hadamard transform application to digital image watermarking are considered. The tolerance of the digital marking algorithm Elham to image size and compression is studied for JPEG and JPEG2000 formats.
A CONSISTENT MODEL OF MANDATORY ACCESS CONTROL Shcheglov Konstantin A, Shcheglov Andrey Yu
12
A much used confidential leveling mandatory access control model is studied. Inconsistency and principle disadvantages of the model are revealed which do not allow for creation of a safe system based on it. New integrity and accessibility model, as well as consistent mandatory access control model are developed and justified; application of the latter model is shown to prevent confidential information leakage and to solve the problems of information integrity and accessibility.
A METHOD OF PROTECTION AGAINST DRIVE-BY DOWNLOAD ATTACKS Markina Tatiana A, Shcheglov Andrey Yu
15
Most actual types of drive-by download attacks using harmful script programs are considered. Existing methods of protection against similar attacks and corresponding security features are analyzed. A new method of protection against malicious software is proposed. Implementation of this method is demonstarated.
20
Ways and means for increasing robustness of person recognition by multimodal biometric systems are considered.
TRANSFORMATION OF A NATURAL LANGUAGE TO RDF FORMAT USING SEMANTIC ANALYZERS OF TEXTUAL INFORMATION Kalinin Igor V, Klimenkov Sergey V. , Kharitonova Anastassia E., Tsopa Evgeny A
23
The problem of automated transformation of a text in a natural language (in Russian) into RDF format using semantic analysis methods is solved. Major stages of this transformation and software modules required for their implementation are considered in detail.
SERVICE QUALITY PARAMETERS OF ELECTRONIC INDUSTRY WEB SERVICES Andrey M. Dergachev, Dergachev Alexander A
27
Development of service-oriented approach in automated design system is considered. Principles of selection and determination of service quality parameters of web services to support electronic devices life cycle are formulated.

COMPUTER SYSTEMS AND NETWORKS

DESIGN OF SYSTEMS WITH PRIORITIES Aliev Taufic Ismailovich
30
The problems of design of queuing system with priorities under restrictions on the average residence time of the query are considered. During the design process, queuing discipline with mixed priorities and the facility performance are determined as to minimize the overall system cost.
35
A method for evaluation of characteristics of closed-type network models of multi-service computer networks with determined service time is proposed. The assumption of determined service time makes it possible to account for actual packet size distribution in multi-service computer networks.
39
Peculiarities of the FIFO (FCFS) rule are discussed as applied to multi-class queuing systems. Surprising results of simulations are obtained for GI2/GI2/1 for two classes of transactions: mean waiting time is different for the two classes. A quantitative estimation of the lower bound of mean waiting time for the transactions of a flow that has lesser utilization factor is proposed.
OPTIMIZATION OF QUERIES REDISTRIBUTION IN CLUSTERS AT CHANGING ACTIVITY OF THE QUERIES SOURCES Bogatyrev Vladimir A, Bogatyrev Anatoly Vladimirovich, Bogatyrev Stanislav Vladimirovich
41
The problem of dynamic optimization of redistribution of queries through a network in a public cluster is formulated and solved. Optimization is performed to minimize the average time of queries stay, and to account for delays in display of number of the active knots which generate the queries.
ESTIMATION OF RELIABILITY OF EXECUTION OF REAL-TIME QUERIES Bogatyrev Vladimir A, Bogatyrev Anatoly Vladimirovich, Bogatyrev Stanislav Vladimirovich
46
An approach to the problem of reliability estimation for computer system of cluster architecture is proposed. The approach enables an account for requirement of timely execution of critical queries.

SOFT HARDWARE OF INFORMATION-CONTROL SYSTEMS

49
The possibilities of improvement of technologies of embedded systems and system-on-chip design are considered. Peculiarities of reconfigurable architecture of specialized computer systems are analyzed. A promising approach to reconfigurable system design is proposed.
TRANSACTION-LEVEL REAL-TIME CONSTRAINTS MONITOR FOR SYSTEM ON CHIP Antonov Alexander A, Sergei V. Bykovskii, Kustarev Pavel V
53
A method of the formal description of internal timing restrictions for computing systems at transaction level is proposed. The method is focused on reduction of hardware complexity of embedded monitoring and diagnostics tools. Based on the proposed approach, the timing restrictions hardware monitor for systems on chip (SoC) with bus-topology is designed, and results of its experimental implementation are presented.
APPLICATION OF MULTIVALUED LOGIC IN FUNCTIONAL CIRCUITS DEVELOPMENT Vladimir I. Polyakov, Skorubskiy Vladimir I
57
Applications of multivalued logic to the problems related to functional analysis of digital circuits including functional and temporal simulation and testing are reviewed. Peculiarities of the use of Boolean algebra in evaluation of proper subspace are considered.
METHODS AND MEANS FOR MONITORING OF RESPIRATION Kormilitsin Alexander Yu, Vladimir I. Polyakov
61
Peculiarities of computer information processing application in medicine are considered. Structure of respiration monitoring system and the principles of lungs diagnostics are described. The focus is made on thermal methods supposed to be the most promising.
SEARCH FOR PROCEDURE WITH THE USE OF FUNCTIONAL PROGRAM TRANSITION GRAPH TO VERIFY COMPUTATIONAL PROCESSES Гедич А. А., Anatoly Zykov, Arthur Lazdin, Vladimir I. Polyakov
64
The problem of search of a procedure in software product to verify computational processes is analyzed and solved. An algorithm of search for a procedure initial address and its propagation in the address space of the application is proposed.
69
A structure of quasi-absolute reversible digitizer of corner based on a dual-track recursive nonlinear code scale is proposed.
CODE SCALES ON THE BASE OF INVERSELY CONJUGATED BINARY SEQUENCES Kirill M. Rostovsky, Ozhiganov Aleхander A.
74
A new type of code scale on the base of inversely conjugated binary sequences is proposed.