Stable operation of computer equipment is important for its effective use. A significant role in ensuring stability depends on the reliability of the software. The article analyzes the state of the problem to improve the reliability of the software based on the models of reliability assessment. The methods of increasing the software reliability using time and software redundancy are analyzed. It is concluded that there is no universal solution to the problem of software reliability in the presence of many private solutions.
Keywords: software reliability, software reliability evaluation models, classification of software reliability models, methods of software reliability improvement
The relevance of the scientific work, the purpose of which is to set the task of planning routes for the delivery of valuable goods, is based on the existence of a significant demand for the delivery goods with the participation of specialized transport companies. It is proposed for the graph model of the transport network to create matrices that affect the complex assessment of traffic between all nodes of the route depending on the time of day and day of the week, and the experience of the personnel accompanying the goods. Integrated assessment evaluation includes cost, duration and safety of delivery. The result of the solution of the problem is the traffic route of delivery that meets the criterias.
Keywords: route planning problem, shortest path problem, transportation safety, graph model
As a result of the implementation of threats to information security, enterprises suffer significant material and reputational losses. The paper suggests a methodologyAs a result of the implementation of threats to information security, enterprises suffer significant material and reputational losses. The paper suggests an approach to conducting a cluster analysis of information security threats, which allows to obtain groups of similar threats and to identify the possibility of reducing the damage from their implementation. The data on the realized threats are analyzed by using different clustering methods for a different number of clusters in order to share the threats in the best possible way. Realized threats are described by the damage that arose from the implementation of the threat and the duration of the elimination of the consequences of the threat. Clustering allows you to identify common characteristics of threats in each group. Analysis of the resulting breakdown of a variety of information security threats into clusters will allow separating threats into groups with the identification of those threats, the implementation of which leads to the most negative consequences and causes the greatest material damage. Thus, security specialists of the enterprise can take measures to protect information, direct efforts to provide protection from threats with the greatest negative consequences. The proposed approach to the clustering of threats to information security made it possible to analyze the enterprise protection system, identify approaches to reduce losses from vulnerability, and identify ways to improve the level of protection. for conducting a cluster analysis of information security threats, which allows to obtain groups of similar threats and to identify the possibility of reducing the damage from their implementation. The data on the realized threats are analyzed by using different clustering methods for a different number of clusters in order to share the threats in the best possible way. Realized threats are described by the damage that arose from the implementation of the threat and the duration of the elimination of the consequences of the threat. Clustering allows you to identify common characteristics of threats in each group. Analysis of the resulting breakdown of a variety of information security threats into clusters will allow separating threats into groups with the identification of those threats, the implementation of which leads to the most negative consequences and causes the greatest material damage. Thus, security specialists of the enterprise can take measures to protect information, direct efforts to provide protection from threats with the greatest negative consequences. The proposed approach to the clustering of threats to information security made it possible to analyze the enterprise protection system, identify approaches to reduce losses from vulnerability, and identify ways to increase the level of protection.
Keywords: information security, the threat of information security, the damage from the implementation of the threat of information security, cluster analysis
Currently, the software market offers a multitude of diverse DLP-systems designed to protect confidential information from leaks. Since such systems have a relatively high cost, it is advisable to select the optimal option before acquisition and implementation, as incorrect selection will lead to unnecessary costs and ineffective control of information. The paper describes the base of the rules of the fuzzy inference system, designed to evaluate the DLP-system. Practical use of the proposed fuzzy system allows to perform a reasoned choice of such a DLP-system that most fully meets the requirements of a particular organization and provides the required level of protection of information from leaks. At the same time, the evaluation is performed according to several criteria, the values of which, based on expert estimates, are input variables of the fuzzy inference system. At the output of the system of fuzzy inference, a comprehensive evaluation of the DLP-system is formed, which reflects the degree of its suitability for implementation at a particular enterprise.
Keywords: Information security, data protection, protection of confidential information, DLP-system, artificial intelligence, fuzzy logic, fuzzy inference system
The article discusses issues related to the development of the optimal structure of neural networks. One of the major problems in the synthesis neural conrollers is ensuring optimal number of neurons and connections between layers in the network. Necessary to achieve a compromise between the representational network capabilities, and memory that will be required to store it. The article presents a number of heuristics, allowing to reach such a compromise by limiting the number of connections for each neuron.
This is done through the introduction of two characteristics for the neuron: the radius of the coverage and density of connections. Coverage radius determines the number of neurons that could potentially have a connection to this neuron, and the density of the compound gives the actual number of such compounds. Altogether, these characteristics determine the amount of synaptic connections, which can have a neuron. The article presents the heuristics that allow to define these characteristics depending on the network structure.
Keywords: neural network, neural controller, associative memory, machine learning, optimization
Information about authors of issue №4 (2011)
Keywords: authors