Scientific Journal of KubSAU

Polythematic online scientific journal
of Kuban State Agrarian University
ISSN 1990-4665
AGRIS logo UlrichsWeb logo DOAJ logo
Search by author's name Search by title
Sort by: Date Title Views
152 kb

ABOUT THE PROBLEM OF PROJECTIVE CULTURE FORMATION AMONG JUNIOR SCHOOL KIDS

abstract 1101506111 issue 110 pp. 1708 – 1720 30.06.2015 ru 1049
The article comprises the results of the research aimed at the definition of pedagogical conditions facilitating the projective culture formation among junior pupils in the educational sphere at school. The ideas about the educational sphere of school as conditions for the projective culture are cleared; substantial characteristics and basic specific principles are defined. Effectiveness of pedagogical conditions and the system of technologies and methods of “teacher to student” work are proved which are directed to the formation of projective culture among junior pupils. The obtained results facilitate perfection of the process of projective culture formation among junior pupils
246 kb

DOCUMENTING OF THE PROCESS OF ACCUMULATION OF KNOWLEDGE AND DEVELOPMENT OF THE INTELLECTUAL HUMAN CAPITAL

abstract 1101506112 issue 110 pp. 1721 – 1745 30.06.2015 ru 1058
The problem of documenting of process of accumulation of knowledge and development of the intellectual human capital is considered in this article. The purpose of the article is the research of theoretical approaches of documenting of process of accumulation of knowledge, development of the intellectual human capital and the analysis of domestic public corporations on documenting of process of accumulation of knowledge. The solution of research tasks in article is proposed: the analysis of the contents of theories of development of the human capital in the conditions of economy of knowledge is carried out; domestic practice of public corporations on documenting of process of accumulation of knowledge is studied; features of documenting of knowledge as maintenance of development of the human capital are marked out. The particular emphasis in the article is placed on disclosure of such problems, as: methodological and theoretical aspects of development of the intellectual human capital; formation of mechanisms and ways of documenting of knowledge in the conditions of knowledge economy; formation of corporate institutes of formation and the development of the intellectual human capital, realizing reproduction of the intellectual capital and engineering of knowledge; formation of organizational innovations and dumping of old organizational routines. Documenting of knowledge is presented as maintenance of development of the human capital, the project of introduction of knowledge management and its documentary maintenance in corporations, and also ways of network documenting of knowledge of the human capital in the process of joint design activity is offered. Development of a special control system and its organizational and methodical providing which will allow to increase efficiency of work with documents during projects of development of the intellectual human capital is necessary for management of the documentary massif of knowledge of the organization, documentary ensuring management
232 kb

KNOWLEDGE STRUCTURE OF THE CORPORATION: THE KNOWLEDGE MANAGEMENT SYSTEM AND SERVICE COMMUNICATIONS AND DOCUMENTATION MANAGEMENT

abstract 1101506113 issue 110 pp. 1746 – 1769 30.06.2015 ru 1064
The following research problems are solved in the article: practice of domestic corporations of documenting of process of accumulation of knowledge is generalized, the knowledge structure of development of the intellectual human capital of corporation is investigated, the model of the project of a management system of knowledge in corporation and its communication and documentary maintenance is offered, the essence of new ways of documenting of knowledge and feature of network documenting of knowledge of the human capital during joint design activity is considered. Organizational design of knowledge structure of development of the intellectual human capital of the corporation which is the center of the modern integrated management system of corporation is connected with formation of a management system of knowledge and a service subsystem of communication and documentary management, which basic appointment is the collecting, accumulation, documenting and ensuring the movement of knowledge in internal space of corporation. The model of the project of introduction of a management system of knowledge and communication and documentary management is developed. Documentary management in the sphere of management of knowledge is the new area of the theory and practice of engineering of knowledge. Unique peculiar features of knowledge documents are revealed. Integration of a communication network and the document services having various forms of representation (documenting) of knowledge is the new phenomenon in traditional document science generated by informatization, intellectualization and a networking. And association of document science, electronic document flow, information technologies of work with knowledge, languages and models of representation of knowledge presents the new area of engineering of knowledge on new essence knowledge of document science
358 kb

ADAPTIVE SUBSYSTEM FOR DETECTING AND PREVENTING ANOMALIES AS A PROTECTION MEANS AGAINST NETWORK ATTACKS

abstract 1101506114 issue 110 pp. 1770 – 1779 30.06.2015 ru 1085
This article describes the results of networks anomalies detection system based on modular adaptive approach practical implementation. The list of specific modules used in the practical implementation of IPS, their architecture, algorithms, software, organizational and technical support determined at technical working design based on the results of the audit, evaluation and risk analysis. In the general list of modules (subsystems) we may include: intrusion detection and prevention (IPS / IDS) subsystems; monitoring, data collection, and event correlation, administration and management subsystem and others. We have demonstrated the specificity of formation requirements for the basic mechanisms of the subsystems in terms of development and implementation of specific architecture with some examples, plus practically implemented structure of system modules, as well as organizational and technical support system functioning
150 kb

TO THE QUESTION OF THE ORGANIZATION OF DISTRIBUTED INFORMATION-ANALITICAL SYSTEMS WITH ELEMENTS OF INTELLECTUAL PROCESSES

abstract 1101506115 issue 110 pp. 1780 – 1788 30.06.2015 ru 911
In the article we have allocated a number of poorly formalized functional tasks that significantly affect the efficiency of the operation of distributed information-analytical systems. The scheme has been developed for the iterative process, which in addition to the automation of the delivery process and the exchange of information between information systems based on grid integration, also includes funds for applied modeling situations on the basis of available information, developing alternatives, multi-criteria decision problems using techniques scenarios and peer review. Obtained during the evaluation of the effectiveness results allow us to control and manage the operation of distributed information-analytical systems with specific problems, as well as to conduct simulations and analytical processing of the results
209 kb

MODEL OF INFORMATION EXPOSURE IN SOCIAL NETWORKS

abstract 1101506116 issue 110 pp. 1789 – 1802 30.06.2015 ru 937
On the basis of hydrodynamic analogy between turbulent transport of momentum, heat and mass transfer, and information in the conditions of modern electronic social networks, we consider a model of informational influence. The flow of information is represented as a stream of random events with simplest flow properties. In addition to the flow of information impact there were introduced the concepts of density, velocity and viscosity of the information flow. These parameters had been derived from the construction of dimensionless criteria characterizing the balance between inertia and viscosity of the information flow of information influence. This criterion serves as a numeric parameter determining the boundary of the transition from low-intensity to high intensity of information influence the turbulent nature of the attack. We have also analyzed the ranges of changes and the meaning of the entered parameters from the point of the organized network information inserts. The existence of the information in time and procedural nature of the concept of information allow us to focus on the properties of information flow as inertia, dynamics and relaxation
193 kb

MODEL OF INFORMATION SECURITY FOR CONTROL PROCESSES OF COMPUTER NETWORKS

abstract 1101506117 issue 110 pp. 1803 – 1811 30.06.2015 ru 819
In order to improve the security of information transfer we have offered one of the possible approaches to modeling process control computer networks with elements of intelligent decision support. We proceed from the graph model of network nodes which are network devices with software control agents, and arcs are logical channels of information exchange between the equipment computer systems. We built an addressless sensing technology which ensures the completeness of monitoring of all network equipment. To classify the computer networks state we provided a method for calculating the values of reliability. Development of signal mismatch triggers the control cycle as a result of which the adjustment of the state of network equipment. For existing tools we proposed adding network control expert system consists of a knowledge base, inference mechanism and means of description and fill in the knowledge base
124 kb

PROVIDING INFORMATION SECURITY OF DATA-PROCESSING NETWORK WITH USE OF INTELLIGENT SYSTEM

abstract 1101506118 issue 110 pp. 1812 – 1817 30.06.2015 ru 875
The article is devoted to creation of intelligent management system of complex data-processing network. This is caused by the fact that modern telecommunication hardware generates growing amount of statistic information. Expert system is offered to be used in management of networks for the purpose of information security
128 kb

USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS

abstract 1101506119 issue 110 pp. 1818 – 1825 30.06.2015 ru 905
The article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
471 kb

DIAGNOSTIC OF ANOMALIES IN DATA-PROCESSING NETWORKS WITH USE OF VARIETY OF INFORMATION EXCHANGE

abstract 1101506120 issue 110 pp. 1826 – 1836 30.06.2015 ru 777
The work is devoted to searching efficient detection methods of anomalous state in data networks. There is a structure of modern informational attacks detecting system. There are short review and analysis of information system network security facilities. Two main technologies of attack detection are described: anomaly detection and misuse detection. It is shown that every detection of anomalies is based on assumption that anomalous behavior is deflection from normal profile of behavior. It is hard to implement this technology, although there is some progress when expert system, fuzzy logic and so on are used for this purpose. Action patterns or symbols assets which describe anomaly activity are used as attack signature in misuse detection method. Author offers to use benefits of both methods for solving the problem
.