Kuban State Technological University
Author list of organization
List of articles written by the authors of the organization
-
Description
The article describes a development of the mathematical model for managing access rights affecting the assessment of the effectiveness of the integrated systems of protection with selection factors, as well as groups of factors affecting the system security policy. The model works due to forming a binary expression which would lead to either a zero value or the unit, or not significant value. Next, we have control comparisons and analysis of the values that provides an expert decision about blocking the access rights or not. This system is adaptive and able to evolve by adding various factors and expansion of expert decisions
-
SYSTEMS OF REMOVING NETWORK ANOMALIES AND METHODS OF CREATION THEIR ARCHITECTURE
DescriptionDifferent stages of designing architecture of detection systems and opposition to network anomalies are analyzed in this article. It is pointed that common classification can be to determine state of network: “normal”, “critical”, “faulted”. Bases for building architecture of detection and removing anomalies are offered
-
MODELLING THE KINETICS OF DRYING, DEFORMATION AND MINIMIZATION OF RICE CRACK FORMATION
DescriptionThe article studies the issues of drying, deformation and minimization of rice crack formation according to different parameters of drying modes
-
USING TECHNOLOGIES OF EXPERT SYSTEMS FOR SECURITY IN INFORMATION SYSTEMS
DescriptionThe article is devoted to the expert systems technology using to monitor the correct operation of the software and databases. It is noted that the main issues of security management in critical information systems is a process of observation and collection of information in a computing environment. Observation results should be evaluated and processed by an expert on security and then recorded in the database of expert systems. One of the possible options for security management of distributed computing network - creating a security machine. It will ensure: minimum response time to external perturbations; the accuracy of the audit protected by S-interface and independent decision-making process of the state of the controlled elements of information systems. After that, the agent is completely worn out; it is destroyed and replaced by a new one. This aging mechanism protects agent from analyzing and from external attacks
-
AN ELECTRIC MODEL OF A CITY TRANSPORT NETWORK
DescriptionThe main characteristics of a transport network are the intensity of the traffic flow, speed and density of its traffic. Comfortable driver's traffic density is determined by the rule of the traffic police, which is "clearance between cars on the road should be a tenth of the speed of movement." We have built a reference curve of the density function of the flow of vehicles on its speed, which is basic when simulating a traffic flow. The article describes a model of electrical city transport networks, allowing calculating traffic flows, their speed, the density and the number of traffic lanes by means of laws of electrical engineering. We have also compared electrical concepts (current, resistance, electro-motive force, etc.) and transportation (of intensity-flow lane road, transport driving force, etc.). For the transport network there are methods of calculation of electrical circuits - a method of Kirchhoff's laws, loop currents, etc. We have confirmed the correctness of electric models and the possibility of its use for the calculation of transport networks; as well as we have presented an example of the calculation
-
LINGUOPRAGMATIC ASPECTS OF KINEME VERBAL REPRESENTATION IN FICTION LANGUAGE
10.00.00 Philological sciences
DescriptionIn this article the linguistic-pragmatic problems of kineme verbal representation in literary text space are examined. The authors interpret the concepts of "speech act illocutionary force" and "performative utterance", which are becoming more widespread within the frame of pragmatic theory, speech act theory being the very core of it. The authors emphasize the kinemes which are used attended by verbal utterance. First, they complement verbal part, serving as speech act illocutionary force marker. Secondly, kinemes duplicate verbal utterance information and together with verbal part of the utterance create speech act illocutionary force. The authors draw special attention to non-verbal kinemes as they carry the entire "message", serving as speech act illocutionary goal markers. In addition, kinemes as any other signs undergo alterations under social and economic, cultural conditions and convey culture-specific and universal concepts of Russian and French kinesics systems. These characteristics are foregrounded in cross-cultural communication, in connection with complexity of denotation object construal and sign-oriented similarity establishment
-
THE MODERN REQUIREMENTS TO AUDIT DOCUMENTATION IN ACCORDANCE TO ISAS
DescriptionThe article is about modern requirements to audit documentation in accordance with International Standards of Audit (ISAs). As the usage of ISAs in Russia obliges auditors to use the new approaches to agreeing terms of audit engagement, audit planning, obtaining audit evidence and forming audit opinion, an auditor has to prepare new forms of audit documentation as the result of an audit conduct. The main standard that contains information about audit documentation is ISA 230 «Audit documentation». It gives definition of «audit documentation», «audit file», «requirements to audit documentation» etc. The author also analyses the theses of some other ISAs that might also contain rules of making audit documentation. For example, ISA 210 «Agreeing the term of audit engagements» obliges auditor to make an audit engagement letter, ISA 501 «Audit evidence – specific consideration for selected items» says that an auditor should conduct inventory of materials and as the result of it make a request for being included into in the inventory committee etc.
-
Description
In the article we have allocated a number of poorly formalized functional tasks that significantly affect the efficiency of the operation of distributed information-analytical systems. The scheme has been developed for the iterative process, which in addition to the automation of the delivery process and the exchange of information between information systems based on grid integration, also includes funds for applied modeling situations on the basis of available information, developing alternatives, multi-criteria decision problems using techniques scenarios and peer review. Obtained during the evaluation of the effectiveness results allow us to control and manage the operation of distributed information-analytical systems with specific problems, as well as to conduct simulations and analytical processing of the results
-
Description
The article describes the types and forms of search movement activity of the Krasnodar Region in the formation, preservation and reconstruction of historical and cultural heritage of the Great Patriotic War. The search movement in Russia is the unique socio-cultural phenomenon. In Krasnodar region this movement began in the 80s. Today it is 16 specialized public search organizations. Kuban searchers found the remains of more than 10,000 Soviet soldiers and recognized the names of 220 of them; they have carried out more than 700 expeditions. The main activities of the search organizations of Kuban in the area of historical and cultural heritage of the Great Patriotic War are conducting field exploration works; the establishment of names of the dead, found in the course of search operations and search for their relatives; reburial of the soldiers; assist in the elimination of explosive devices of the Great Patriotic War; patriotic education; military and historical reconstruction; the popularization of the military history of the region. The main purpose of search organizations is to recreate and perpetuate the memory of killed people in the defense of the Fatherland. Through the forms of activity, practiced by search organizations of the Krasnodar region, formed valuable attitude to the historical past, carried out patriotic education, readiness for armed defense of the motherland
-
Description
Fracture geometry depends on stresses and rock properties in hydraulic fracturing operation. Poisson’s ratio imports directly in the calculations related to formation stresses. The most important reason for limiting fracture height is the natural stresses contrast resulting from the differences with Poisson ratios. Without this difference, fracture would have largely uncontrolled height. The goal of this study is mathematical investigation of the effect of Poisson’s ratio on the formation stresses that is necessary to select value of breakdown pressure in hydraulic fracturing operation. In this article, a mathematical model has been coded using “MATLAB” software for prediction of stresses in the various layers. This designed program is able to present both digital and graphical output results for different values of Poisson’s ratio. At the end, stresses exerted on the different layers of the several real oil reservoirs have simulated and breakdown pressures have determined