PROGRAM SYSTEMS: THEORY AND APPLICATIONS

12+

 

Online Scientific Journal published by the Ailamazyan Program Systems Institute of the Russian Academy of Sciences

2015 Issue 1
2015 Issue 2
2015 Issue 3
2015 Issue 4

Papers are accepted in the form of a PDF file

To view the PDF files, you will need Adobe Acrobat Reader

    


• Содержание выпуска •
• Mathematical Foundations of Programming •
• Methods for Optimal Control and Control Theory •
• Software and Hardware for Distributed Systems and Supercomputers •
• Artificial Intelligence, Intelligence Systems, Neural Networks •
• Supercomputing Software and Hardware •

Software and Hardware for Distributed Systems and Supercomputers

Responsible for the Section: Sergei Abramov, Dr. Phys.-Math.Sci., corresponding member of RAS

On the left: assigned number of the paper, submission date, the number of A5 pages contained in the paper, and the reference to the full-text PDF .

 

Article # 4_2015

11 p.

PDF

submitted on 24th Dec 2014 displayed on website on 24th Feb 2015

Mishchenko P., Gubarev V.
The distributed computer system for training specialists of high performance computing

The paper presents a software system aimed at finding best (in some sense) parameters of an algorithm. The system handles both discrete and continuous parameters and employs massive parallelism offered by public clouds. The paper presents an overview of the system, a method to measure algorithm’s performance in the cloud and numerical results of system’s use on several problem sets. (in Russian).

Key words: algorithmic parameter optimization, parameter tuning, cloud computing.

article citation

http://psta.psiras.ru/read/psta2015_1_39-49.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-39-49

Article # 5_2015

10 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Smirnov S.
Cloud system for program parameters fine tuning

The article is dedicated to questions of appliance high-performance tools for training specialists of parallel computing. Different methods of educational process organization is considered, strengths and weaknesses of this methods are discussed. After that the proposed approach of creating computing system based on personal computers connected into local or global network is described in detail. (In Russian).

Key words: high-performance computing systems, parallel algorithm, coarse-grain parallelism.

article citation

http://psta.psiras.ru/read/psta2015_1_51-60.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-51-60

Article # 6_2015

11 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Vorobiev V, Ryzhkov S.R,, Fatkieva R.R.
Cloud computing security perimeter

Abstract concept of cloud data sealing by means of determinable policies is proposed. Use of TPM crypto modules for creation of trusted server platforms within the cloud is described. Generalized geo tagging scheme is presented. (In Russian).

Key words: cloud, cloud computing, security perimeter, geo tagging.

article citation

http://psta.psiras.ru/read/psta2015_1_61-71.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-61-71

Article # 8_2015

15 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Tsvetkov A.
Multiagent approach to the controlling of the operational environment containing extremely large databases

A possible architecture of VLDB is considered based on co-operation of a system of the rational agents in the sense of [3], monitoring how VLDB works and providing adaptive control. (In Russian).

Key words: very large database, intelltcnual agent, rational agent, adaptive control, VLDB.

article citation

http://psta.psiras.ru/read/psta2015_1_83-97.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-83-97

Article # 9_2015

10 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Nepejvoda N., Khatkevich M., Tsvetkov A.
Rational agents as probabilistic automata

A notion of intellectual or rational agent is poorly defined. Its precise specialization is defined here to deal with very large data bases (VLDB). A rational agent is considered as a probabilistic automate inside of system of such automates. The notion of feeling is introduced to affect probabilities and to grant adaptive behavior. Centralized and collectivist control methods are considered. (In Russian).

Key words: VLDB, database, probabilistic automata, rational agents, multi-agent environment.

article citation

http://psta.psiras.ru/read/psta2015_1_99-108.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-99-108

Article # 10_2015

12 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Klimov Yu., Shvorin A., Khrenov A., Adamovich I, Orlov A., Abramov S., Shevchuk Yu., Ponomarev A.
Pautina: the High Performance Interconnect

This article presents new high performance interconnect based on active optic cables (AOC) and field-programmable gate arrays (FPGA). A prototype of the interconnect is currently under development in the Program systems institute of RAS. The interconnect is aimed to be used as the main communication network in supercomputers. Performance of the interconnect is about 56 Gbit/s of bandwidth per cable. (in Russian).

Key words: interconnect, network, active optic cable, HPC, supercomputer, FPGA.

article citation

http://psta.psiras.ru/read/psta2015_1_109-120.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-109-120

Article # 12_2015

11 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Kuznetsov A.
On the cryptographic security of the “BotikKey” authentication protocol against attacks on MD5 hash function

In this paper vulnerabilities of the BotikKey network protocol are described. It is being used in the “Botik” telecommunication system of Pereslavl-Zalesskiy for secure subscribers’ authentication. Protocol was developed as part of Botik-technologies initiative, according to which all software and hardware is based on open source, or on the inhouse developments. We outline the purpose and implementation details of the protocol and its pros and cons. It is pointed out that majority of the protocol’s vulnerabilities arise from the weaknesses of MD5 cryptographic hash function being used. With a number of assumptions, the BotikKey protocol can be compromised by committing an APOP-attack on a subscriber. It is noted that “Botik” network service provider should use contemporary cryptographic methods for subscribers’ authentication or avoid using the BotikKey system at all. (In Russian).

Key words: BotikKey protocol, secure authentication, cryptography, MD5 hash function, APOP attack.

article citation

http://psta.psiras.ru/read/psta2015_1_135-145.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-135-145

Article # 13_2015

10 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Kuznetsov A.
Research into the issue of BotikKey protocol resistance to the brute force attack

In this paper vulnerabilities of the BotikKey network protocol are described. The protocol is being used in the “Botik” telecommunication system of PereslavlZalessky for secure subscriber authentication. Protocol was developed as part of Botik-technologies initiative, according to which all software and hardware is based on open source, or on the inhouse developments. We outline the purpose and implementation details of the protocol. It is pointed out that majority of protocol vulnerabilities arise from weaknesses of MD5 cryptographic hash function being used. BotikKey protocol can be compromised in several ways: brute force attack for recovering plain network password using specific software on high-performance computing devices and cloud services, password attack using rainbow tables for MD5 hash function, and the password theft. It is noted that “Botik” network service provider should use more contemporary cryptographic methods for subscriber authentication, or even avoid using the BotikKey system. (In Russian).

Key words: BotikKey protocol, network access, subscribers secure authentication, rainbow tables, brute force, password search.

article citation

http://psta.psiras.ru/read/psta2015_1_147-156.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-147-156

Article # 14_2015

18 p.

PDF

submitted on 26th Dec 2014 displayed on website on 24th Feb 2015

Spitsina A., Orlov Yu., Podkolodnaya N., Svichkarev A., Dergilev A., Ming Chen, Kuchin N., Chernykh I., Glinskij B.
Supercomputer analysis of genomics and transcriptomics data revealed by high-throughput DNA sequencing

Development of high-throughput DNA sequencing technologies lead to new classes of bulk genomic data and consequent development of specialized algorithms and software. Supercomputing is necessary tool to deal with modern genetics data.
We present technical problems related to gene expression analysis, genomics and transcriptomics data, as well as sequencing technologies related to gene expression. Approaches for automatic genome data annotation are discussed. (In Russian).

Key words: Bioinformatics, DNA sequencing, Microarrays, Gene expression regulation, Transcription, Databases.

article citation

http://psta.psiras.ru/read/psta2015_1_157-174.pdf

DOI

https://doi.org/10.25209/2079-3316-2015-6-1-157-174

 

• Содержание выпуска •
• Mathematical Foundations of Programming •
• Methods for Optimal Control and Control Theory •
• Software and Hardware for Distributed Systems and Supercomputers •
• Artificial Intelligence, Intelligence Systems, Neural Networks •
• Supercomputing Software and Hardware •

 

Adress: Ailamazyan Program Systems Institute of the Russian Academy of Sciences, PSTA Online Journal, 4 a Peter the First Street,
Veskovo village, Pereslavl area, Yaroslavl region, 152021 Russia
Phone: +7-4852-695-228.       E-mail: info@psta.psiras.ru.      Website: http://psta.psiras.ru

© Electronic Scientific Journal "Program Systems: Theory and Applications" 2010-2017
© Ailamazyan Program System Institute of RAS 2010-2018