For applicants For learners For teachers For Heads of Departments For Deans Electronic administration Documentolog Қаз Рус Eng
Подать заявку на заселение в общежитие
Non-profit limited company
"Manash Kozybayev
North Kazakhstan university"
larger

11. Mathematical Simulation in Information Systems

Module Name:

Module 11: Mathematical Simulation in Information Systems

Code

M11IS(Ma) 

Module Elements

Elective Subjects

Mathematical Simulation in Information Systems/Simulation of Information Processes and Systems

Information Systems Infrastructure/ Information Systems Administration

Theory of Discrete Control Systems/ Calculus of variations and optimization methods

Information Protection Methods/ Information Security

Neurocomputing Systems/ Applied Fuzzy Systems

Semester Number:

2

Person responsible for the module:

N.V. Astapenko

Lecturer:

Mathematical Simulation in Information Systems– V.P. Kulikova

Simulation of Information Processes and Systems  – Y.V. Kukharenko

Information Systems Infrastructure – N.V. Astapenko

Information Systems Administration – V.P. Kulikov

Theory of Discrete Control Systems – V.P. Kulikova

Calculus of variations and optimization methods – V.P. Kulikova

Information Protection Methods – N.V. Astapenko

Information Security – Y.V. Kukharenko

Neurocomputing Systems – V.P. Kulikov

Applied Fuzzy Systems – V.P. Kulikova

Language:

Russian

Curriculum relation:

Information Systems (Ma)

Type of teaching / number of hours per week and per semester :

Full-time: 

2 semester: hours per week – 38 (lectures -6; workshops -6; independent work of students -26);

hours per semester –570

Workload:

Full-time education:

Teaching Load: 190 hours

Extracurricular Classes: 380 hours

Total: 570hours

Credit Points:

19 ECTS

Conditions for Examinations:

For admission to the exam, the student must score at least 50 points out of 100 available for each subject of the module

Recommended Conditions:

This module is based on the knowledge gained in the course of the following undergraduate subjects: Information Protection, Fuzzy Logics and Neural Networks

Expected Learning Outcomes:

Knowledge: theories, methods and technologies of simulation in the study and design of information systems; simulation technologies using mathematical apparatus; basic methods of systems simulation, modern technology and their software for solving simulation problems, methods of analysis and evaluation of the effectiveness of the development, implementation and functioning of information systems; modern information systems, models, methods and technologies of design, as well as business administration; system concepts for understanding and determining the problems, basic principles of complex information systems that are compatible with the most modern technologies, and possess personal experience of adequate handling of such systems; general methodology for the development of object-oriented programs using modern algorithmic languages and programming systems. Mathematical apparatus Z - transformations; methods of structural and parametric synthesis of digital controllers. Knowledge: means of protection, standards of evaluation of security level and major software vulnerabilities, basic concepts of information security and information protection; sources, risks, forms of attacks on information; security policy and standards; methods of software reliability; legal and organizational support of software development and application, basics of the theory of fuzzy sets and practical results of the use of fuzzy technologies for processing semi-structured information to determine effective solutions; terminology related to neural networks; architecture of neural networks.

Skills: to analyze the initial problem, to assess the need to solve the problem by simulation, to bring the original model to a form convenient for simulation, to develop programs for solving specific problems of simulation, to apply known methods for the identification of mathematical models; implementation of information models, systems and processes; to apply IT and mathematical models used in the analysis of systems of different nature in planning and forecasting of human economic activity in fields of professional activity; to implement information models, systems and processes, to use modern methods, styles and tools in the development of software products in various fields of professional activity; to use modern languages and technologies of program development; features of their application in the education system; recurrence relations from transfer functions in order to implement digital controllers on a computer for industrial control objects. Skills: to implement measures to fight network security violations using a variety of software, install, test, try and use hardware and software protection; to implement measures to fight network security violations using a variety of software protection; install and configure software to protect against malicious software, to apply the obtained theoretical knowledge to solving practical problems of neural network simulation in economic applications; to apply the obtained theoretical knowledge to solving practical problems of neural network simulation in financial applications; to use the basic principles of solving problems of economic analysis, classification, forecasting and management using neural networks.

Abilities: to select methods, tools and instruments for simulation; to construct models and obtain new knowledge based on the analysis, be competent in matters of design, deployment and business administration of information systems; be competent to solve problems of information processing with the use of modern programming languages, methods of discrete-analog obtaining of recurrence relations from transfer functions; methods for synthesizing digital controllers; methods for modeling digital control systems on a computer, analyzing the quality and stability of the system. Abilities:security administration, identifying and eliminating software vulnerabilities, analysis of information security; administration of security software; skills to identify and resolve software vulnerabilities. to professional operation of modern equipment and devices, knowledge of optimization methods and the ability to apply them in solving problems of professional activity, apply the basic principles of solving problems of economic analysis, classification, forecasting and management using neural networks, willingness to use knowledge and understanding for the design and implementation of information models, systems and processes.

Intendend use/applicability

Modules: Project and Information Management

Content:

1. Mathematical Simulation in Information Systems. 

 Classification of types of simulation. System approach in simulation. Technology of development and research of the model. The problem of conditionality of the model and numerical stability of the simulation algorithm. Conceptual models of systems, application of graph theory in conceptual simulation. Simulationin the research and design of systems.

2. Simulation of Information Processes and Systems.

Basic methods of systems simulation, modern technical means and their software for solving simulation problems. Study of general principles and methods of simulation discrete-continuous processes, in particular, information processes occurring in computer systems and data networks; studying the theory of queuing systems, the principles of the system approach in the development of simulation models, the structure and methods of writing simulation programs in universal programming languages, methods and algorithms for simulation of random events with different distribution laws.

3. Theory of Discrete Control Systems

Digital laws of control. Quantization of continuous signals. Study of an open linear system. Recovery of continuous signals. Sequence analysis. Linear discrete systems. Designing a regulator for a linear system. Stability. Single loop discrete system. Stabilizability. Discretization of continuous processes. Transfer functions of digital systems. Sustainability of digital systems. Quality indicators. Re-equipment of continuous regulators. Synthesis of the controller according to the reference model. Synthesis using bilinear transformation.

4. Calculus of variations and optimization methods

5. Information Systems Administration. Study of methods and models of information system management, functions, procedures and services of various hardware and software platforms of administration; capabilities of platforms, tools and systems of administration; methods of administration and control; objects and methods of administration of information systems; service administration and configuration management of information systems; hardware and software platform administration.

6. Information Systems Infrastructure.

The concept of modern enterprise infrastructure. Basic principles of design and construction of information system infrastructure, a set of technologies for the construction of enterprise management IT-infrastructure. 

7. Information Protection Methods

 Information market: features of formation and development. Formation of the information industry. Information as commodity. Features of pricing for information products. Main methods of determining the cost of information security. Determination of the amount of reasonable costs to ensure the security of information. Economic evaluation of intellectual property. Models of information security systems. General model of information security process. Generalized system model of information security. Generalized methods of information protection.

8. Information Security

International standards of information exchange. The concept of threat. Types of possible violations of the information system. Protection. Purpose and tasks in the field of information security at the state level. Provisions of the theory of information security of information systems.

9. Neurocomputing Systems.

Basics of building neurocomputers. A detailed review and description of the most important methods of teaching neural networks of different structures, as well as the problems solved by these networks. Consideration of the issues of neural networks implementation. Overview of fuzzy systems.

10. Applied Fuzzy Systems.

Study of the theoretical basics of the theory of fuzzy sets and practical results of the use of fuzzy technologies for the processing of semi-structured information in professional activities. Overview of neurocomputer systems.

Examination Form, module mark:

Examination of the module including:

Mathematical Simulation in Information Systems / Simulation of Information Processes and Systems written control examination. 

Information Systems Administration / Information Systems Infrastructurem written control examination.

Theory of Discrete Control Systems written control examination

Calculus of variations and optimization methods – written control examination- written control examination

Information Protection Methods/ Information Security  written control examination

Neurocomputing Systems/ Applied Fuzzy Systems  written control examination

Technical/Multimedia Facilities:

Interactive whiteboard, multimedia system, IT room.

Study Materials:

  1. V. N. Ashikhmin, M. B. Gitman et al. Introduction to Mathematical Simulation. -M., Logos, 2008.
  2.  G. G. Arunants. Simulation of Economic Processes: Practical course – Kaliningrad, 2009.
  3. S. I. Shelobayev. Mathematical Methods and Models (Economics, Finance, Business) ° M., 2007.
  4. , A.V. Kaplan et al. Solution of Economic Problems on the Computer - M., 2007.
  5. S. A. Orlov. Software Development Technology - St. Petersburg.: Piter, 2002.
  6. V. N. Petrov. Information Technologies - St. Petersburg.: Piter, 2006.
  7. A. M. Vendrov. Practical Course on Design of Software for Economic Information Systems - M.: Finances and statistics, 2006.
  8. Polyakov K.Yu. Fundamentals of digital systems theory management, - St. Petersburg: SPbGMTU Publishing House, 2012 
  9. Polyakov K.Yu. Research of continuous and digital control systems in the Scilab environment, - St. Petersburg: SPbGMTU Publishing House, 2020 
  10. Polyakov K.Yu. Fundamentals of the theory of automatic control, - St. Petersburg: SPbGMTU Publishing House, 2016 
  11. V. F. Shangin Protection of Computer Information. Effective Methods and Means. – M: DMK Press, 2012. 
  12. A.V. Vasilkov, I. A. Vasilkov. Security and Access Control in Information Systems.- M: FORUM, 2012 
  13. Ensuring Information Security. Edited by A. P. Kurilo. M. Alpin, 2011 
  14. B. Schneier. Secrets and Lies. Data Security in the Digital World. Publishing House: Piter, 2003 ISBN: 5-318-00193-9, 0-471-25311- 1 
  15.  Practical Cryptography.Niels Ferguson, Bruce Schneier,Publishing House: Williams, 2005, ISBN: 5-8459-0733-0, 0-4712-2357-3 
  16. Basics of Information Security. Textbook for high schools / by Y. B. Belov, V. P. Los, R. V. Mescheryakov, A. A. Shelupanov. – M: Goryachaya liniya – Telekom, 2006. – 544 p.: with pictures. 
  17. Gulnara Yakhyaeva. Fuzzy Sets and Neural Networks. Internet University of Information Technologies, 2011 
  18. Alexander Galushkin. Neural Networks. Basics of the Theory. Goryachaya liniya - Telekom ISBN 978-5-9912-0082-0; 2012 
  19. Ryszard Tadeusiewicz, Barbara Borovik, Tomas Gonzak, Bartos Lepper. Elementary Introduction to Neural Networks with Examples of Programs(translated by Igor Rudinskiy). Goryachaya liniya - Telekom ISBN 978-5-9912-0163-6; 2011 
  20. Toby Segaran. Programming Collective Intelligence. (translated by A. Slinkin). Simvol-Plus ISBN 978-5-93286-119-6, 5-93286-119-3, 0-596-52932-5; 2008

Date of last amendment

20.01.2023