Name
Dyachenko Roman Aleksandrovich
Scholastic degree
•
Academic rank
associated professor
Honorary rank
—
Organization, job position
Kuban State Technological University
Web site url
—
—
Articles count: 22
In this article, problems of multiparameter fuzzy systems’ state forecasting are reviewed. The algorithm of selection of the equipment on significant parameters of the engine is given
In the article, some problems of multiparameter systems’ state forecasting are reviewed. The algorithm of optimal model searching is given
The article discusses various ways to store chronological data. The mathematical models were constructed for each method. As one of the solutions is the method of data of organization partitioning of a particular DBMS
The article discusses the two ways to scaling storage chronological data systems. The formulas for calculating the optimal duration of the period (to split the data by period) and the maximum allowable rate for guaranteed preservation in the system are presented
The article deals with improving the reliability of data collection and storage of historical data. Investigated the reliability of collecting historical information, the technique, allowing on the basis of general logical and probabilistic methods to identify the most important elements to increase the reliability of which will sig-nificantly increase the reliability of the whole system
The article discusses the methodology of optimal configuration selection and structuring of distributed information systems for collecting and storing historical data from multiple data centers
On the basis of hydrodynamic analogy between turbulent transport of momentum, heat and mass transfer, and information in the conditions of modern electronic social networks, we consider a model of informational influence. The flow of information is represented as a stream of random events with simplest flow properties. In addition to the flow of information impact there were introduced the concepts of density, velocity and viscosity of the information flow. These parameters had been derived from the construction of dimensionless criteria characterizing the balance between inertia and viscosity of the information flow of information influence. This criterion serves as a numeric parameter determining the boundary
of the transition from low-intensity to high intensity of information influence the turbulent nature of the attack. We have also analyzed the ranges of changes and the meaning of the entered parameters from the point of the organized network information inserts. The existence of the information in time and procedural nature of the concept of information allow us to focus on the properties of information flow as inertia, dynamics and relaxation
The article is devoted to creation of intelligent management system of complex data-processing network. This is caused by the fact that modern telecommunication hardware generates growing amount of statistic information. Expert system is offered to be used in management of networks for the purpose of information security
The article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
Different stages of designing architecture of detection systems and opposition to network anomalies are analyzed in this article. It is pointed that common classification can be to determine state of network: “normal”, “critical”, “faulted”. Bases for building architecture of detection and removing anomalies are offered