×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Formulation of the problem of route planning for goods delivery taking into account transportation safety

    The relevance of the scientific work, the purpose of which is to set the task of planning routes for the delivery of valuable goods, is based on the existence of a significant demand for the delivery goods with the participation of specialized transport companies. It is proposed for the graph model of the transport network to create matrices that affect the complex assessment of traffic between all nodes of the route depending on the time of day and day of the week, and the experience of the personnel accompanying the goods. Integrated assessment evaluation includes cost, duration and safety of delivery. The result of the solution of the problem is the traffic route of delivery that meets the criterias.

    Keywords: route planning problem, shortest path problem, transportation safety, graph model

  • The approach of clustering threats to information security of enterprises

    As a result of the implementation of threats to information security, enterprises suffer significant material and reputational losses. The paper suggests a methodologyAs a result of the implementation of threats to information security, enterprises suffer significant material and reputational losses. The paper suggests an approach to conducting a cluster analysis of information security threats, which allows to obtain groups of similar threats and to identify the possibility of reducing the damage from their implementation. The data on the realized threats are analyzed by using different clustering methods for a different number of clusters in order to share the threats in the best possible way. Realized threats are described by the damage that arose from the implementation of the threat and the duration of the elimination of the consequences of the threat. Clustering allows you to identify common characteristics of threats in each group. Analysis of the resulting breakdown of a variety of information security threats into clusters will allow separating threats into groups with the identification of those threats, the implementation of which leads to the most negative consequences and causes the greatest material damage. Thus, security specialists of the enterprise can take measures to protect information, direct efforts to provide protection from threats with the greatest negative consequences. The proposed approach to the clustering of threats to information security made it possible to analyze the enterprise protection system, identify approaches to reduce losses from vulnerability, and identify ways to improve the level of protection. for conducting a cluster analysis of information security threats, which allows to obtain groups of similar threats and to identify the possibility of reducing the damage from their implementation. The data on the realized threats are analyzed by using different clustering methods for a different number of clusters in order to share the threats in the best possible way. Realized threats are described by the damage that arose from the implementation of the threat and the duration of the elimination of the consequences of the threat. Clustering allows you to identify common characteristics of threats in each group. Analysis of the resulting breakdown of a variety of information security threats into clusters will allow separating threats into groups with the identification of those threats, the implementation of which leads to the most negative consequences and causes the greatest material damage. Thus, security specialists of the enterprise can take measures to protect information, direct efforts to provide protection from threats with the greatest negative consequences. The proposed approach to the clustering of threats to information security made it possible to analyze the enterprise protection system, identify approaches to reduce losses from vulnerability, and identify ways to increase the level of protection.

    Keywords: information security, the threat of information security, the damage from the implementation of the threat of information security, cluster analysis

  • The approach to evaluating DLP-systems using fuzzy logic

    Currently, the software market offers a multitude of diverse DLP-systems designed to protect confidential information from leaks. Since such systems have a relatively high cost, it is advisable to select the optimal option before acquisition and implementation, as incorrect selection will lead to unnecessary costs and ineffective control of information. The paper describes the base of the rules of the fuzzy inference system, designed to evaluate the DLP-system. Practical use of the proposed fuzzy system allows to perform a reasoned choice of such a DLP-system that most fully meets the requirements of a particular organization and provides the required level of protection of information from leaks. At the same time, the evaluation is performed according to several criteria, the values ​​of which, based on expert estimates, are input variables of the fuzzy inference system. At the output of the system of fuzzy inference, a comprehensive evaluation of the DLP-system is formed, which reflects the degree of its suitability for implementation at a particular enterprise.

    Keywords: Information security, data protection, protection of confidential information, DLP-system, artificial intelligence, fuzzy logic, fuzzy inference system

  • Systematic approach to the problem of spatial information usage for decision-making support of regional executive agencies

    The article examines the use of spatial information to support decision-making of the regional executive agencies. The results of system analysis of the problem of using spatial information in the activities of regional executive agencies are provided. On the basis of the provided system analysis with applying of systems engineering principles the functional and informational models of process of the decision-making support  were developed for the executive agency of large industrial region (on the example of Bashkortostan Republic).

    Keywords: spatial information systems analysis, decision support, regional executive authorities, functional and information models, systems engineering principles

  • Spatial organization grouping signals in associative processes of artificial neural networks

    The article discusses issues related to the development of the optimal structure of neural networks. One of the major problems in the synthesis neural conrollers is ensuring optimal number of neurons and connections between layers  in the network. Necessary to achieve a compromise between the representational network capabilities, and memory that will be required to store it. The article presents a number of heuristics, allowing to reach such a compromise by limiting the number of connections for each neuron.
    This is done through the introduction of two characteristics for the neuron: the radius of the coverage and density of connections. Coverage radius determines the number of neurons that could potentially have a connection to this neuron, and the density of the compound gives the actual number of such compounds. Altogether, these characteristics determine the amount of synaptic connections, which can have a neuron. The article presents the heuristics that allow to define these characteristics depending on the network structure.  

    Keywords: neural network, neural controller, associative memory, machine learning, optimization