ТЕХНОЛОГИИ РАЗРАБОТКИ ИНФОРМАЦИОННЫХ СИСТЕМ (ТРИС-2017): Материалы VIII Международной научно-технической конференции
The paper analyses a problem of application of the system approach and the lifecycle approach in systems engineering. Evaluation of the main concepts of these two approaches in systems engineering practice is considered in the connection to complex technical systems development. As a result presented a competence framework for the systems engineer position in the Russian Nuclear industry.
This volume contains papers presented at the 13th International Conference on Rough Sets, Fuzzy Sets and Granular Computing (RSFDGrC) held during June 25–27, 2011, at the National Research University Higher School of Economics (NRU HSE) in Moscow, Russia. RSFDGrC is a series of scientific events spanning the last 15 years. It investigates the meeting points among the four major disciplines outlined in its title, with respect to both foundations and applications. In 2011, RSFDGrC was co-organized with the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI), providing a great opportunity for multi-faceted interaction between scientists and practitioners. There were 83 paper submissions from over 20 countries. Each submission was reviewed by at least three Chairs or PC members.We accepted 34 regular papers (41%). In order to stimulate the exchange of research ideas, we also accepted 15 short papers. All 49 papers are distributed among 10 thematic sections of this volume. The conference program featured five invited talks given by Jiawei Han, Vladik Kreinovich, Guoyin Wang, Radim Belohlavek, and C.A. Murthy, as well as two tutorials given by Marcin Szczuka and Richard Jensen. Their corresponding papers and abstracts are gathered in the first two sections of this volume.
The technology of storage of poorly formalized documents that are created using lexicological synthesis is considered. The technology provides formation of the kept index sequences containing indexes of document forms and their substantial components. Additionally, thanks to simultaneous preparation of documents and creation of kept index sequences, the economy of time is provided. The experiments have shown the efficiency of the approach for the documents created for management of different kinds of activity.
The approach to formation ontologies on the basis of model of a subject domain which designing is carried out by a method of the situational analysis is considered. Ideas of situational management are put in a basis of a method by big systems, the conceptual analysis and designing of systems of organizational management, and also the theory of semiotics models. Substantive provisions of a method, its is formal-logic device of the analysis of conceptual structures of individual decisions and formations of conceptual structure of complete model of a subject domain are resulted. Questions of automatic removal ontologies various this model are considered.
This book constitutes the refereed proceedings of the 12th Industrial Conference on Data Mining, ICDM 2012, held in Berlin, Germany in July 2012. The 22 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on data mining in medicine and biology; data mining for energy industry; data mining in traffic and logistic; data mining in telecommunication; data mining in engineering; theory in data mining; theory in data mining: clustering; theory in data mining: association rule mining and decision rule mining.
We propose an iterative and human-centred knowledge discovery methodology based on formal concept analysis. The proposed approach recognizes the important role of the domain expert in mining real-world enterprise applications and makes use of specific domain knowledge, including human intelligence and domain-specific constraints. Our approach was empirically validated at the Amsterdam-Amstelland police to identify suspects and victims of human trafficking in 266,157 suspicious activity reports. Based on guidelines of the Attorney Generals of the Netherlands, we first defined multiple early warning indicators that were used to index the police reports. Using concept lattices, we revealed numerous unknown human trafficking and loverboy suspects. Indepth investigation by the police resulted in a confirmation of their involvement in illegal activities resulting in actual arrestments been made. Our human-centred approach was embedded into operational policing practice and is now successfully used on a daily basis to cope with the vastly growing amount of unstructured information.
A model for organizing cargo transportation between two node stations connected by a railway line which contains a certain number of intermediate stations is considered. The movement of cargo is in one direction. Such a situation may occur, for example, if one of the node stations is located in a region which produce raw material for manufacturing industry located in another region, and there is another node station. The organization of freight traﬃc is performed by means of a number of technologies. These technologies determine the rules for taking on cargo at the initial node station, the rules of interaction between neighboring stations, as well as the rule of distribution of cargo to the ﬁnal node stations. The process of cargo transportation is followed by the set rule of control. For such a model, one must determine possible modes of cargo transportation and describe their properties. This model is described by a ﬁnite-dimensional system of diﬀerential equations with nonlocal linear restrictions. The class of the solution satisfying nonlocal linear restrictions is extremely narrow. It results in the need for the “correct” extension of solutions of a system of diﬀerential equations to a class of quasi-solutions having the distinctive feature of gaps in a countable number of points. It was possible numerically using the Runge–Kutta method of the fourth order to build these quasi-solutions and determine their rate of growth. Let us note that in the technical plan the main complexity consisted in obtaining quasi-solutions satisfying the nonlocal linear restrictions. Furthermore, we investigated the dependence of quasi-solutions and, in particular, sizes of gaps (jumps) of solutions on a number of parameters of the model characterizing a rule of control, technologies for transportation of cargo and intensity of giving of cargo on a node station.
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a full-fledged implementation. This paper describes an ROLAP-based method of multidimensional event logs storage for process mining. The result of the analysis of the journal is visualized as directed graph representing the union of all possible event sequences, ranked by their occurrence probability. Our implementation allows the analyst to discover process models for sublogs defined by ad-hoc selection of criteria and value of occurrence probability
Existing approaches suggest that IT strategy should be a reflection of business strategy. However, actually organisations do not often follow business strategy even if it is formally declared. In these conditions, IT strategy can be viewed not as a plan, but as an organisational shared view on the role of information systems. This approach generally reflects only a top-down perspective of IT strategy. So, it can be supplemented by a strategic behaviour pattern (i.e., more or less standard response to a changes that is formed as result of previous experience) to implement bottom-up approach. Two components that can help to establish effective reaction regarding new initiatives in IT are proposed here: model of IT-related decision making, and efficiency measurement metric to estimate maturity of business processes and appropriate IT. Usage of proposed tools is demonstrated in practical cases.
I give the explicit formula for the (set-theoretical) system of Resultants of m+1 homogeneous polynomials in n+1 variables