Preview

History and Archives

Advanced search
No 3 (2016)

THEORETICAL AND PRACTICAL ISSUES OF INFORMATICS

15-32 404
Abstract
The article considers the developing branch of knowledge at the interface of the pedagogics, informatics and information flows control technologies in modern learning process. There is a substantiation for the preference given to the concept of educational informatics over the concept of information pedagogics. The authors provide examples of the significance of the new branch of knowledge studied by using educational informatics.
33-45 614
Abstract
This article examines the use of information technologies in the work of the journalist. Challenges and opportunities of journalism in the context of media convergence are analyzed. It considers the problem of University education of the “universal” journalist in the process of integration of information and communication technologies into a single information resource.
46-53 377
Abstract
The article deals in issues of using the information communicational technologies and remote teaching technology in higher school professor’s practice. Tendencies in the development of remote technology use in nowadays context are considered. There is a generalization of the best practices in the creating and usage of remote training in technical subjects. Through the example of such subject as “Electrical engineering” several difficulties specific to the implementation of the distant learning are identified and analyzed. A solution to their problem by applying the case technologies is presented.
54-66 353
Abstract
This article discusses the approaches to the use of ISO/IEC 15504 evaluation processes methodology for designing control panels of information analytical system. The analysis resulted in the technology for creation of components of evaluation the process: the measurement scheme, base process model, scope of business process model with a view to obtaining a set of indicators for their visualization on panels of information analytical system. The technology for forming business process model is a systematic approach to developing scales and indicators of processes.
67-80 450
Abstract
The work considers an issue of volatility evaluation for prices of open-ended mutual investment funds through GARCH and EGARCH-processes. An evident advantage of EGARCH model use over results obtained with GARCH is the possibility to recognize volatility sign. Such effect is achieved by including the function g t t -1
) at the positive and negative interval ε t allows the conditional dispersion process to respond asymmetrically to asset price increase and fall. Besides the study contains approaches with evaluation of time series fractal structure. Numerical results of time series predictions with the local approximation of 1st and 2nd orders are obtained. The output matrix of parameters B for the local approximation of 2nd order.

INFORMATION SECURITY AND DATA PROTECTION

81-89 570
Abstract
The process of monitoring the state of information security of the payment system is the basis for the evaluation and analysis of information security risks. An important aspect of the task of monitoring of information security state of the payment system is the need to evaluate the relations between initiating events and their influence on the vulnerability of the payment system. These relations can be described with the help of logical and probabilistic models, the application of which is considered in this paper.
90-94 312
Abstract
The process of providing information security risks early warning in the payment system is essential for defining the necessary control actions to minimize those risks. An important aspect of the problem of preventing risks is to model the process of their occurrence.Such models can be described in various ways, including those using logical and probabilistic models, the application of which is considered in this paper.
95-102 320
Abstract
This paper proposes an algorithmic approach to building security model for cloud service was selected by the author OSE/RM open environment model as the basis of presentation for cloud system, which allows to organize and justify the choice of protection mechanisms. To demonstrate the application of the algorithm for constructing the security model an extension that allows to carry out the verification of the security model for cloud environment is built.
103-114 385
Abstract
The article presents challenges in preparation the participation exhibition business for the organization handling confidential information in its operations. An inadequacy of research into the matter of information security in exhibition business entails the weak normative framework necessary to regulate information security issues there.
115-124 509
Abstract
In this work the authors propose method of user’s biometric authentication by parameters of his voice. The principal parameters of the developed model are individual speed of the speech and pronouncing length of the speech elements. In the cource of voice samples comparison algorithm development it was discovered that the analysis of the speech and pronouncing length of the speech elements in text dependent user’s voice authentication procedure is reduced to finding the percentage of recording segments, overlapping in content and location, with due consideration for the variability of the uttered passphrase total length. For comparison the Mel-frequency cepstral coefficients method was used.
125-146 500
Abstract
The work is devoted to the study of the most important directions of the analysis of social networks - developing methods for deanonimization actors of those networks. The purpose of the paper is a comparative analysis of existing methods and models of users deanonimization and the development of a modified deanonimization algorithm based on proposed method of combining social graph vertices. It is shown that the use of graph vertices associations procedure enables the effective separation of tasks on equivalent subtasks, thus, achieving a drastic reduction in dimensionality of conducted calculations.
147-156 357
Abstract
The article presents an algorithm that constructs binary linear block codes according to the quantities of message and error correction bits. Theoretical complexity estimation and experimental time evaluation of the presented algorithm are proposed. It is shown that the algorithm provides codes with parameters equivalent to the results of algorithm exhaustive search. In most cases these parameters are the same as parameters of codes well-known from the literature (BCH, Golay), and in other cases they are inconsiderably worse.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2658-6541 (Print)