Vol 17, No 2 (2019)
View or download the full issue
PDF (Russian)
5-17 44
Abstract
Accuracy of the horizontal well placement in the target reservoir becomes essential for efficient oilfield development. Geosteering of a well with a complex trajectory is performed using real-time geophysical data obtained while drilling. The presented work is devoted to the development of a new software for horizontal oil and gas wells geosteering. Algorithms based on logging data correlation and electromagnetic logging data numerical inversion methods are used for well placement. The developed application is based on web-technologies and has a client-server architecture. To optimize the resource-intensive calculations execution time, high-performance cloud computing is used.
18-29 44
Abstract
During the process of forming a unified information space (UIS) is widely used modeling of information exchange facilities and UIS infrastructure. Despite the large variety of approaches to modeling a UIS, in particular using the design structure matrix method, the proposed solutions do not provide a direct link between elements of the described structure and hardware and software equipment. Also, existing approaches for modeling the UIS do not take into account possible external and internal constraints imposed on the placement of UIS components in the enterprise space. The paper proposes an approach to formalizing the UIS structure of the microelectronics design center, which is intended to eliminate these shortcomings. The structure of the UIS according to a parallel organization model includes following main components: a product data management system, participants of the microelectronic system design process, data-processing hardware and software. The structure of the UIS as a dynamic system can be reduced to a generalized model that includes the set of subscribers - participants of the design process, primary and secondary data-processing tools and objects of information exchange. The mathematical description is made using elements of theory of sets, matrices and queuing systems. The proposed model takes into account the constraints that affect a form of implementation of the UIS structure, as well as many characteristics of software and hardware. Simulation modeling of the UIS structural organization, presented as a set of multichannel queuing systems, helped to draw conclusions about bandwidth and reliability of considered variants for the UIS organization based on proposed hardware (the server solution) and software (the database management system) tools that are being used.
30-38 90
Abstract
This article discusses the problem of protection against unauthorized access to data by identifying users by biometric characteristics - keyboard handwriting. To do this, the authors conducted a series of experiments to obtain a set of samples of keyboard handwriting, which are used as a biometric characteristic to identify the owner. To analyze the data and determine the author of a particular handwriting sample, the authors consider the k -means method. This method is one of the simplest and most effective statistical classification methods when the number of clusters is known in advance. To evaluate the effectiveness of this method for solving this problem, the authors propose using the coefficients of false access and false access denial, which are the main characteristics of biometric authentication systems. The results suggest that there are some limitations when using this method. They are related to the fact that this problem is poorly formalized and depends on many factors that can not be mathematically described. For example, the instability of the keyboard handwriting, which is due to changes in the psycho-physiological state of the user, the ergonomics of the keyboard and others. Given these features,the authors propose to solve the problem using methods based on intelligent data processing, which allow to detect hidden patterns and dependencies in the data flow.
39-48 54
Abstract
The study describes an approach for heterogeneous web services cataloguing of geographically distributed computing nodes in the computational and analytical geological environment. The approach of creation of web services monitoring system is proposed. In this study the approach for web services catalogue organization based on SOAP (Simple Object Access Protocol) protocol, with use of UDDI (Universal Description Discovery and Integration) registries is reviewed. The scheme for heterogeneous web services description with an ability of further creation of catalogue is proposed. The catalogue includes functions for searching and receiving of metainformation about every web service in it. The study also describes an approach for computational and analytical geological environment creation. A number of web services for heterogeneous data processing used in geological research is described. The approaches for organization of cataloguing and web services monitoring provide a higher level of reliability of computational and analytical geological environment. They provide an information about web service reliability within environment.
49-60 87
Abstract
For a long time, functional Java programming was not possible. However, lambda expressions appeared in version 8 of the Java language. Due to the support of standard library classes (Stream, Optional, etc.) in Java, it became possible to describe transformations over data in a functional style. Java is a rather old language with a large imperative code base written in it. In order to take advantage of the new approach, it is necessary to perform a non-trivial refactoring, which can be very tedious and error prone when applied manually. Fortunately, for a sufficiently large number of situations, this refactoring can be safely performed automatically. Using IntelliJ Idea as a platform software tool was developed that allows you to find places where it is possible to automatically convert an imperative code to an equivalent code that uses Stream API, as well as an automatic fix that allows you to make a replacement. Refactoring uses IntelliJ Idea framework to analyze Java code, and integrates into the IDE itself. One of the main criteria for the correct operation of the algorithm is the security of this transformation. The user cannot trust the tool if the transformation can change the semantics of the code. This article discusses various constraints that are imposed on code patterns so that transformation without distortion of semantics is possible. Refactoring has been tested in various libraries to verify the semantics are preserved by checking the test results before and after applying refactoring. This article will not describe the impact of using the Stream API on the performance of the application.
61-73 73
Abstract
The paper is devoted to the issues related to the development and use of automated assessment systems for programming tasks. The work on automated testing of programming tasks had been held in Novosibirsk State University since 1998. It was created several generations of systems of this type. The first program of about 1,000 lines was written in Perl. Currently, the automated system, named NSUts, is used in the programming contests and in the educational process. As a result of work in it, as well as acquaintance with other similar systems, both Russian and foreign, it was possible to formulate requirements for software development of this kind, to analyze the difference between the systems for testing competitions and training support systems. The article also provides an overview of the existing systems for checking tasks on programming, an analysis of the advantages and disadvantages of each of these systems, and a detailed comparison of the NSUts system with the Yandex Contest system. The current state of the NSUts system architecture is described. Much attention is paid to the practice of using the system in the educational process, statistics and graphs of students' progress of students studying with the help of this system are given. The article describes the analysis of the experience of using the NSUts system and outlines the prospects for its development.
74-80 52
Abstract
The purpose of this study is to improve the mechanism of employment of graduates of universities in the field in the region with the use of modern computer technology. Namely, the article discusses the advantages and methodological aspects of using the tools of geographic information systems, which are a symbiosis of the management capabilities of large databases and spatial visualization characteristic of topographic maps by using QGIS A relational database table or a spreadsheet with a geolocation field, which allows data to be placed on a map, represents each information layer. The scientific significance of the article is due to the fact that this technology contributes to the creation of a single information space of the employers market in the context of popular specialties, as well as to the active establishment of cooperation between universities and employers in order to improve the mechanism of employment of graduates on the bases of competence-based approach. The result of the research is the methodological aspects of the use of open geographic information system QGIS for managing the employment of young professionals. In addition, tasks have been set for the mechanism for applying geo-information technologies in the employment of university graduates.
81-90 45
Abstract
The complexity of astrophysical processes lies in simultaneous consideration of components with different nature. So, for example, in the problem of collision of galaxies the three-dimensional dynamics of interstellar gas and stellar component is considered. The modeling of these components could be based on completely different classes of numerical methods. One possible solution to this problem is the use of the Eulerian-Lagrangian approach, in which the physical quantities are concentrated in material points, which is typical for the SPH method, and the calculation of forces is made on an adaptive grid bound to the system of material points. This approach uniformly takes into account both the dynamics of the continuous medium and discrete particles, and also eliminates a number of disadvantages typical for the original method. The calculation of the gravitational interaction is carried out by solving the Poisson equation for the gravitational potential. Herewith, all the particles are projected onto the computational grid and the potential values in each cell are calculated using this grid. The solution of the Poisson equation for the gravitational potential is performed using Fast Fourier Transform. The new “Virtual Planetarium” code for astrophysical objects modeling based on SPH method, supplemented by Godunov method for calculating pressure and momentum flows between particles, and Fast Fourier Transform method to solve the Poisson equation for the gravitational potential, is described in the paper. Rationale for the transition to such numerical model is given in the paper. Kinetic and hydrodynamic approaches are described in detail. The modeling of collapse of an isothermal gas cloud is performed, the ability of the method to reproduce the development of instabilities in the form of the formation of two density sleeves is shown.
91-100 32
Abstract
Mobile devices are frequently used for educational purposes considering their high availability and portability. However, educational abilities of mobile devices are quite limited due to the lack of proper IDE applications. Most Android integrated development environments for C++ are lacking code completion and real-time code analysis, while others provide these features at unacceptable speeds. Therefore, we decided to develop a next-generation mobile C++ IDE that will not only have these features, but will also provide them at real-time speeds. This will make mobile devices more suitable for learning C++ and will provide students with an opportunity to leave their laptops at home and to learn C++ in different situations, where usage of laptop is not convent. In this paper, we describe the software porting technology applied to Clang compiler and other required tools and propose the method to speed up compilation, code completion and code analysis in our IDE. We also propose UI optimization methods. We also describe a regular expression-based heuristic algorithm for precompiled header generation that has small processor time and RAM requirements. The efficiency of the algorithm is tested on different educational code examples. Our experiments show that our IDE is the only one at the moment, that can keep code completion real-time in all usage scenarios. The performance gain is 300 % average, when STL is used, reaching 3350 % when Boost library is involved. There is a small performance loss when C is used, but it is not significant, as the performance is still acceptable for real-time usage.
101-113 46
Abstract
In some cases, the drilling of oil and gas wells requires support for the drilling process, which consists in monitoring the parameters and making urgent decisions. Accompanying drilling takes place using the existing communication channels between the office and drilling. Satellite and mobile communications are most common. They are characterized by a low speed of receiving and transmitting data, frequent disconnects, the use of NAT. As part of this work, a software tool has been developed for transparent access to drilling parameters and measurements while drilling from a telemetry system in order to organize remote tracking via existing communication channels, taking their limitations into account. The software was based on the implementation of the SSH protocol, which provided compression and encryption of the transmitted data and transparent access to TCP services at the rig. This makes it possible to use existing software to access drilling measurements, which makes it possible to reduce the amount of data transferred in comparison with remote desktops. The software has been tested in conditions close to the field, and has shown its suitability for solving the tasks it was designed for.
114-121 48
Abstract
One of the ways of ensuring information security are intrusion detection systems (IDS). IDS are used to detect malicious activity on the network. The standard approach to the detection of attacks it is looking for specific patterns, such as byte sequences in network traffic, or known malicious instruction sequences used by malware. This approach is highly efficient, but it does not able to detect the attacks without patterns. Modern approaches to detection of attacks use deep learning. The purpose of this work was to explore the possibility of building a universal classifier of network traffic based on a deep neural network. For this, a recurrent autoencoder was trained on TCP packets from the CICIDS2017 dataset. During training the neural network was a model in which the expected vector was set the same as the original one. And learning was on normal traffic. The main idea was that a recurrent autoencoder trained in this way should recover anomalous traffic with a high loss. The TCP package is considered malicious if the recovery loss is above the threshold. However, the accuracy of recovering normal TCP packets was low due to the insufficient model capacity and the lack of the suitable representation learning method. After the results analyzing, we proposed an approach that can improve accuracy of detection for some attacks. Based on this approach, the VAEGAN network was trained on normal network flows from CICIDS2017. The VAEGAN was used to detect malicious network flows: to calculate the anomaly score for flow; if score is above the threshold - the flow is malicious. The VAEGAN network showed a high percentage of attacks detection and the F-score value - 0.933.
122-137 61
Abstract
The article describes the arrangement of internship for students that is required for higher educational institutions of the Russian Federation; provides links to regulatory documents, describes the approach established at NRU MPEI. Prior to the beginning of the internship, each student should be assigned to a particular internship place - an institution with corresponding specialization that matches the student’s major. That institution will conduct and supervise the internship. In case of external internship place, i.e. if it is not included into the organizational structure of an educational institution, then an agreement with this organization should be concluded. This article presents the experience of the development and implementation of the information system at NRU MPEI which automates the students’ internship assignment and prepares the related documentation. The program implementation includes a module for data import from other information systems, a module for the internship schedule editing, a module for reference information on partner institutions, a module for the formation and coordination of internship assignment applications, a module for the preparation of the printed forms of documents, a module for statistical reporting. The article describes the functioning of each module with the observation of its advantages over the manual data processing. Some technical solutions and characteristics of the program system have been disclosed; special attention is paid to the access rights management.
138-152 48
Abstract
In the paper we discuss how to support the process of creating tools which transform natural language (NL) queries into SPARQL queries (hereinafter referred to as a transformation tool). In the introduction, we describe the relevance of the task of understanding natural language queries by information systems, as well as the advantages of using ontologies as a means of representing knowledge for solving this problem. This ontology-based data access approach can be also used in systems which provide natural language interface to databases. Based on the analysis of problems related to the integration and testing of existing transformation tools, as well as to support the creation and testing own transformation modules, the concept of a software platform that simplifies these tasks is proposed. The platform architecture satisfies the requirements for ease of connecting third-party transformation tools, reusing individual modules, as well as integrating the resulting transformation tools into other systems, including testing systems. The building blocks of the created transformation systems are the individual transformation modules packaged in Docker containers. Program access to each module is carried out using gRPC. Modules loaded into the platform can be built into the transformation pipeline automatically or manually using the built-in third party SciVi data flow diagram editor. Compatibility of individual modules is controlled by automatic analysis of application programming interfaces. The resulting pipeline is combined according to specified data flow into a single multi-container application that can be integrated into other systems, as well as tested on extendable test suites. The expected and actual results of the query transformation are available for viewing in graphical form in the visualization tool developed earlier.
ISSN 1818-7900 (Print)
ISSN 2410-0420 (Online)
ISSN 2410-0420 (Online)