Vol 18, No 1 (2020)
View or download the full issue
PDF (Russian)
5-15 54
Abstract
This paper analyzes the problems of designing enterprise systems for solving problems with several sections and types of accounting. The particular problem of the interaction of the operational and accounting circuits is solved by the example of work with tolling raw materials. The necessity of creating a model for the interaction of different subsystems that ensure the correctness of work with transactions at the level of business logic is indicated. An appropriate model is proposed that allows design integration solutions based on several subsystems with a description of the exchange of transactional data.
16-26 57
Abstract
An algorithm for solving the inverse problem for determining the parameters of a buried archaeological object in the form of an elliptical cylinder (as a model of a typical burial or pit) is proposed. The estimation of accuracy of determination of parameters of the buried archaeological objects on the basis of the numerical solution of the inverse problem of magnetic prospecting for synthetic model is carried out. Its implementation included, firstly, the stage of modeling the magnetic field from a synthetic model of the archaeological site at three different heights for different parameters of the grid density and the size of the magnetic survey site and, secondly, the stage of solving the inverse problem from synthetic data at different heights, for different parameters of the magnetic survey and assessing the accuracy of the solution of the inverse problem. It is found that the accuracy of determining the parameters of the anomalous body is more affected by the size of the survey area than the density of the measurement network. There is also a tendency to increase the accuracy of determining parameters when using data of different heights. Approbation of the algorithm for solving the inverse problem on real data of different-altitude magnetic survey over the burial at the archaeological site Tartas-1 showed quite good results. The average error in determining the geometric parameters of the body and its occurrence is ~ 15 %.
27-35 55
Abstract
In machine learning, k -means unsupervised model is used for classification analysis. In this paper k-means model is applied for productivity prediction of giant Western Siberian oilfield. An essential condition for method’s application is availability of digital databases with representative results. Complex method allows combine different reservoir and production parameters: rates, porosity, saturation, frac parameters etc. The method can be particularly useful in complicated reservoirs, e.g. in dual porosity ones, where the relationship between formation parameters (permeability, porosity, saturation) and production rates is unclear and cannot be set by traditional development analysis, particularly in frac environment.
36-49 56
Abstract
A model of fracture initiation and propagation along the boundary of a cement plug and a steel casing in a plugged wellbore is proposed. The model allows predicting the conditions of hydraulic isolation failure of a cement plug induced by reservoir pressure. The model describes the stress state of the cement and it’s breakaway from the steel casing caused by the pressure of the pore fluid flowing into the fracture. Numerical experiments show that the fracture propagation velocity and the stability of the hydraulic isolation are sensitive to the reservoir pressure and to the prestressed state of the cement. It is shown also that the quality of cement adhesion to steel and the size of the initial cementing defects have little effect on the initiation conditions and fracture propagation velocity.
50-64 79
Abstract
The article describes the technology of discretization of the computational domain for solving unsteady gas-dynamic problems in the field of industrial safety of coal mines. The most important of this problem is the calculation of the parameters of air shock waves and the affected areas during methane explosions in mine workings. The technology allows you to automate the construction of a differential grid for a spatial network of mine workings, taking into account the features of the mines topology and simulated processes. At the same time, the grid can consist of cells of various dimensions - one-dimensional, two-dimensional and three-dimensional. The aim of the work is to create the basics for the development of scientific research of gas-dynamic processes in gas explosions in mining workings by taking into account new factors - means of explosion protection, the participation of coal dust, etc. The tasks of the work include: developing an addressing system for identification and quick access to arbitrary cells of the difference grid; the construction of unambiguous spatial relationships between the corresponding faces of the cells during their splitting and combining; testing of the technology on the mine network of a real mine. A new approach in the work is the possibility of automating the partition of the computational domain with the simultaneous use of cells of all three dimensions. The article contains details of the implementation of technology. The article shows the results of splitting the network of mine workings in a real coal mine, the results of calculations using the obtained grid and the convergence of the results to a solution when reducing the step as a result of subsampling the computational domain with different depth of splitting.
65-73 89
Abstract
According to statistical research, a violation of license agreements annually causes huge losses to software companies. On the one hand, illegal copies of the software product are created, on the other hand, some fragments of the programs are used by third parties unauthorized. Another important problem is the violation of the program integrity, for example, in terms of blocking functions of the license key checking. In this regard, the task of construction methods for protecting intellectual property in software applications is highly relevant. Previously known methods solve this problem by means of fragile digital watermarks. Below is presented a method for constructing a fragile digital watermark used in executable files. A model of a developers team creating software product protected by DWM is considered. The application of this method will allow to reveal the fact of the container integrity violation, on the one hand, and, on the other hand, will allow the author, if it is necessary, to confirm his participation in the development and embedding of the DWM. In this method we use mathematical properties of systems of linear algebraic equations, digital signature and cryptographic hash functions. The scheme is based on the Kronecker - Capelli theorem. To find the group password the co-author who is in the group finds one root of the consistent system of linear algebraic equations. The indicated system consists of n equations and contains n + 1 variables. For an outsider who is not in the group, the system of equations does not have a unique solution. The co-author of the group is able to calculate one variable in system based on their passport data. Therefore, the system of equations for such co-author has a unique solution. Various attacks on a protected by the new method are analyzed, and it is shown its efficiency. The constructed method can be applied in companies with a large team of developers.
74-82 78
Abstract
In our work we present a description of integration of natural language processing tools (pseudostem extraction, noun phrase extraction, verb government analysis) in order to extend analytic facilities of the TXM corpora analysis platform. The tools introduced in the paper are combined into a single software package providing TXM platform with an effective specialized corpora preparation tool for further analysis.
83-93 55
Abstract
The work is devoted to the description of the structure of the developed SkiaAtlas software, which is focused on working with individual anatomical models of the human body and physiological parameters of the patient. The problem of using mock-up and post-sectional material in teaching medical students, and why the developed information system has advantages over these models, is shown. Virtual anatomical models were obtained from anonymous DICOM images of magnetic resonance imaging (MRI) and computed tomography (CT). The subsystems of the information system are described: a PACS server where all data is stored (server part) and a web application where the user works with data (client part). The information system modules implemented in the form of various software products are described in detail: data import module, anonymization module, DBMS module, visualization module, etc. The operation of these modules is illustrated schematically. It is shown in what programming languages and frameworks this software is implemented, and advantages of choosing these implementation tools relative to software are shown. The process of deleting personal data from DICOM files is described in detail; the process of obtaining the “mask” of the object in the picture, which is then used to obtain three-dimensional models of the patient’s internal organs. The process of user work with the database and the search for pathologies using the system interface tools are clearly described. The possibilities of using this information system in the educational field are shown - an illustration of specific clinical cases in order to search for cause-effect relationships in the pathogenesis of various diseases and the development of clinical thinking in a student. In a specific clinical case, an example is given of how the SkiaAtlas program was used to search for a pathology - a volumetric formation of the left hemisphere of the brain.
ISSN 1818-7900 (Print)
ISSN 2410-0420 (Online)
ISSN 2410-0420 (Online)