<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid/>
  <issn>2687-0517</issn>
  <journalInfo lang="ENG">
    <title>Computing, Telecommunication and Control</title>
  </journalInfo>
  <issue>
    <number>2</number>
    <altNumber>193</altNumber>
    <dateUni>2014</dateUni>
    <pages/>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-22</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Ageev</surname>
              <initials>Evgeniy</initials>
              <email>agevg@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Benderskaya</surname>
              <initials>Elena</initials>
              <email>helen.bend@gmail.com</email>
              <address>St. Petersburg, Russian Federation</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Review of natural computing: important trends</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The classification of natural computing and the basic elements of natural computing and natural computing applications are considered. Additional classification features of natural computing and natural computing interconnection scheme are proposed. Variants of hybrid natural computations are discussed. Tendencies of the development of natural computing are revealed.</abstract>
        </abstracts>
        <codes>
          <udk>004.023, 004.383.8</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>natural computing</keyword>
            <keyword>bio-inspired computing</keyword>
            <keyword>chaotic computing</keyword>
            <keyword>new computing paradigm</keyword>
            <keyword>structure formation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.1/</furl>
          <file>1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>23-30</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Belyaev</surname>
              <initials>Sergey</initials>
              <email>sergey.belyaev@d-inter.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Shubnikov</surname>
              <initials>Vladislav</initials>
              <email>vlad.shubnikov@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Estimating a human foot size from images</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Most of the internet shoe shops are interested in selling rate increasing. Main problem is inside too high percentage of delivery returns due to wrong shoe fit. Minimization of wrong shoe size selection can be achieved using virtual shoe fitting. In this scheme customer (private person without specific measuring equipment) should perform a measurement of some important (non-trivial) dimensions of his(her) feet and pass them through on-line service to the online store. The disadvantage of this approach is the lack of accuracy of measurements with the measuring instruments available to the client. Using digital foot images it is possible to detect characteristic foot sizes automatically, with enough high level of accuracy. This paper proposes a method for horizontal and vertical foot contours restoration from digital images, and detection physical foot size with sufficient accuracy for shoe fitting applications.</abstract>
        </abstracts>
        <codes>
          <udk>004.932</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>human foot measurement</keyword>
            <keyword>image processing</keyword>
            <keyword>image recognition</keyword>
            <keyword>shoe fit</keyword>
            <keyword>shoe comfort estimation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.2/</furl>
          <file>2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>31-38</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Mukhin</surname>
              <initials>Vadim</initials>
              <email>v_mukhin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kornaga</surname>
              <initials>Yaroslav</initials>
              <email>slovyan_k@ukr.net</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Steshyn</surname>
              <initials>Viktor</initials>
              <email>mail@webmarker.com.ua</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Adaptive safety mechanisms for computer systems based on the modified Kohonen neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In the paper we propose a new approach to the safety ensurance for the distributed computer systems based on the neural network mechanism. There is described a complex adaptive safety support system with the intelligent agent based on the modified neural networks. This system allows to implement the adaptive control for the security mechanisms and to provide the in-time reaction to the security threats, and also to support the fast decisions making on the security mechanisms parameters modification. Also, we perform the experimental researches to evaluate the correctness level of the threats detection and recognition.</abstract>
        </abstracts>
        <codes>
          <udk>04.004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>distributed computer system</keyword>
            <keyword>neural network</keyword>
            <keyword>intellectual agent</keyword>
            <keyword>complex adaptive system</keyword>
            <keyword>safety insurance</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.3/</furl>
          <file>3.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>39-44</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Vargauzin</surname>
              <initials>Viktor</initials>
              <email>var@mail.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Estimation of error probability in a channel based on the recurrent properties of convolutional codes</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The method of the estimation of the probability of errors in the channel, based on recurrence property of convolution codes. The method can be used in computation of the likelihood ratio (LLR) of the code symbols at the demodulator output in communication systems that use both directly convolution code and turbo codes and trellis codes modulations.</abstract>
        </abstracts>
        <codes>
          <udk>621.39(075.8)</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>convolution codes</keyword>
            <keyword>probability of errors in the channel</keyword>
            <keyword>parity check matrix</keyword>
            <keyword>signal to noise ratio</keyword>
            <keyword>turbo code</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.4/</furl>
          <file>4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>45-54</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <researcherid>S-4849-2017</researcherid>
              <scopusid>57191270776</scopusid>
              <orcid>0000-0001-7006-9634</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St.Petersburg Polytechnic University</orgName>
              <surname>Sergey</surname>
              <initials>B.</initials>
              <email>makarov@cee.spbstu.ru</email>
              <address>Polytechnicheskaya, 29, St.Petersburg, 195251, Russia</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Zavialov</surname>
              <initials>Sergey</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Improving BER performance for coherent detection of nonorthogonal multifrequency signals</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Research of the BER performance of multifrequency PSK-4 signals with nonorthogonal location of subcarriers has been conducted. Elementwise coherent detection algorithm with compensation for interchannel interference (and multistep modification) and algorithm according to the state diagram are proposed.</abstract>
        </abstracts>
        <codes>
          <udk>621.391.8</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>nonorthogonal multifrequency systems</keyword>
            <keyword>coherent detection algorithm</keyword>
            <keyword>compensation for inter-channel interference</keyword>
            <keyword>state diagram</keyword>
            <keyword>BER performance</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.5/</furl>
          <file>5.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>55-60</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Malyshev</surname>
              <initials>Victor</initials>
              <email>uhmal@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Matveev</surname>
              <initials>Yuriy</initials>
              <email>matveev.rf@gmail.com</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St.Petersburg Polytechnic University</orgName>
              <surname>Nikitin</surname>
              <initials>Aleksandr</initials>
              <email>nikitin@mail.spbstu.ru</email>
              <address>Polytechnicheskaya, 29, St.Petersburg, 195251, Russia</address>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>Khudyakov</surname>
              <initials>Аrtem</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Varactor diode model used to design wideband microwave voltage-controlled oscillators</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article describes the nonlinear model of the varactor diode for use in broadband microwave voltagecontrolled oscillator. The proposed model has been verified based on measurement data and adequately reflects the characteristics of the varactor diode. This varactor model can be used in various types of CAD for accurately design broadband microwave VCO and frequency-tuning circuits.</abstract>
        </abstracts>
        <codes>
          <udk>621.37</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>varactor diode</keyword>
            <keyword>microwave oscillator</keyword>
            <keyword>frequency tuning</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.6/</furl>
          <file>6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>61-73</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Minullin</surname>
              <initials>Renat</initials>
              <email>Minullin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kasimov</surname>
              <initials>Vasil</initials>
              <email>VasilKasimov@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Filimonova</surname>
              <initials>Tamara</initials>
              <email>Filimonova.Tamara@bk.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>Yarullin</surname>
              <initials>Marsel</initials>
              <email>Marsel.Jarullin@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Location detection of glaze ice on overhead electric power lines. Part 1. Methods of glaze ice detection</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper presents practically implemented methods of detection of glaze ice on wires, such as overhead electric power lines. The paper describes in detail the method of location detection of glaze ice. Authors give several examples of glaze ice detection resulting from multiannual investigations of the active electric power lines. Authors discuss the advantages of the location detection over other methods of glaze ice detection.</abstract>
        </abstracts>
        <codes>
          <udk>621. 315.1, 621.372.2</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>electric power lines</keyword>
            <keyword>glaze ice on wires</keyword>
            <keyword>detection methods</keyword>
            <keyword>location probing</keyword>
            <keyword>glaze ice detection technology</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.7/</furl>
          <file>7.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>74-84</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Minullin</surname>
              <initials>Renat</initials>
              <email>Minullin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kasimov</surname>
              <initials>Vasil</initials>
              <email>VasilKasimov@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Filimonova</surname>
              <initials>Tamara</initials>
              <email>Filimonova.Tamara@bk.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>Yarullin</surname>
              <initials>Marsel</initials>
              <email>Marsel.Jarullin@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Location detection of glaze ice on overhead electric power lines. Part 2. Noise-limited sensitivity and operation threshold setting in detecting ice accretion by location probing</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The authors study the threshold sensitivity of detecting ice accretion by location probing and stability of amplitude and transmission delay of reflected signals in the normal operation mode in the absence of ice. Due to long-term investigations of the active power lines annual and daily variations were discovered in amplitude and transmission delay of reflected signals. It was shown that these variations as well as sporadic fluctuations in the normal operation mode are far less than the changes in signal amplitude and transmission delay at the early stage of ice accumulation. Guidelines to set operation threshold for detecting early ice accretion on electric power lines and wire breakage by amplitude and transmission delay are given.</abstract>
        </abstracts>
        <codes>
          <udk>621.315.1, 621.372.2</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>electric power lines</keyword>
            <keyword>location monitoring</keyword>
            <keyword>amplitude and transmission delay of reflected signals</keyword>
            <keyword>detecting ice accretion and wire breakage</keyword>
            <keyword>location method sensitivity</keyword>
            <keyword>setting operation threshold for amplitude and transmission delay</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.8/</furl>
          <file>8.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>85-90</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Rybin</surname>
              <initials>Yurii</initials>
              <email>rybin@tpu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Synthesis of signals with a given harmonic coefficient</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A problem of the measured signals with a predetermined ratio of harmonics formation is described. It is shown that a promising way of forming such shaped signals is a synthesis using sinusoidal signal generator to control the duration of half-periods. Synthesized signals have constant amplitude and RMS voltage at a different set THD.</abstract>
        </abstracts>
        <codes>
          <udk>621.374</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>measuring signal</keyword>
            <keyword>nonlinear distortion factor</keyword>
            <keyword>total harmonic distortion</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.9/</furl>
          <file>9.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>91-98</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Rostov</surname>
              <initials>Nikolay</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Multiobjective parameter optimization of digital controllers with regard to the influence of nonlinearities and external disturbances</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Some formulations and  сomputer-aided technologies for multiobjective parameter optimization of digital stabilization and tracking control systems with electromechanical plants are proposed, taking into account nonlinearities and disturbances in different dynamical modes. The practical examples are given to multiobjective parameter tuning of typical digital controllers.</abstract>
        </abstracts>
        <codes>
          <udk>681.3 (075.8)</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>automatic control systems</keyword>
            <keyword>digital controlers</keyword>
            <keyword>multiobjective parameter optimization</keyword>
            <keyword>direct sounding</keyword>
            <keyword>Pareto-solutions</keyword>
            <keyword>nonlinearities</keyword>
            <keyword>disturbances</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.10/</furl>
          <file>10.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>99-109</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Igumnov</surname>
              <initials>Alexei</initials>
              <email>Alexei.Igumnov@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Saradgishvili</surname>
              <initials>Sergey</initials>
              <email>SSaradg@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Fault recovery in redundant multiagent systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The model of redundant multiagent system (MAS) as distributed hardware-software complex, which is based on replication of tasks instead of replication of agents, is developed. The developed fault recovery methodology presented in the article includes communication protocol for components of MAS, which enables task execution independently of its deployment or belonging to a particular component of MAS, technique for keeping inactive task replicas in actual state and techniques for fault detection and fault recovery. Developed models and methodology are validated by stated and proved theorem on fault tolerance property of MAS.</abstract>
        </abstracts>
        <codes>
          <udk>004.052.3</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>multiagent system</keyword>
            <keyword>redundancy</keyword>
            <keyword>replication</keyword>
            <keyword>fault</keyword>
            <keyword>fault recovery</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.11/</furl>
          <file>11.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>110-125</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kuznetsov</surname>
              <initials>Andrey</initials>
              <email>andrei.n.kuznetsov@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>36574097400</scopusid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>University of Aizu</orgName>
              <surname>Evgeny</surname>
              <initials>V.</initials>
              <email>pyshe@u-aizu.ac.jp</email>
              <address>Japan</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Ontology of software building, execution and environment configuration and its application in software deployment in computing clouds</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper is focused on software applications build, configuration and execution in cloud frameworks. We pay special attention to the case when developers being experts in their subject domain aren’t experienced enough in programming. By examples of problems existing in the area of testing information retrieval algorithms we examine major approaches to support CLI client software execution in clouds. We introduce a subject domain ontology describing processes of software code building, its execution, build and execution errors as well as actions which are necessary to fix recognized errors. We cite examples of concrete tasks ontology definition to describe code building activities using maven and software execution activities using java. The recommendations on how to use the proposed ontology to define expert system knowledge base rules are given.</abstract>
        </abstracts>
        <codes>
          <udk>004.41:004.822</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>service-oriented architecture</keyword>
            <keyword>cloud computing</keyword>
            <keyword>software ontology</keyword>
            <keyword>information retrieval</keyword>
            <keyword>semantic networks</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.12/</furl>
          <file>12.pdf</file>
        </files>
      </article>
      <article>
        <artType>SCO</artType>
        <langPubl>RUS</langPubl>
        <pages>129-129</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <researcherid>N-8983-2014</researcherid>
              <scopusid>36237396900</scopusid>
              <orcid>0000-0003-0276-4517</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St.Petersburg Polytechnic University</orgName>
              <surname>Vladimir</surname>
              <initials>M.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG"/>
        </artTitles>
        <abstracts>
          <abstract lang="ENG"/>
        </abstracts>
        <codes/>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>conference</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.13/</furl>
          <file>13.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>130-142</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Ivannikov</surname>
              <initials>Viktor</initials>
              <email>ivan@ispras.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kamkin</surname>
              <initials>Alexander</initials>
              <email>kamkin@ispras.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Chupilko</surname>
              <initials>Mikhail</initials>
              <email>chupilko@ispras.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Verifying correctness of hdl-model behavior on the basis of dynamical trace matching</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Correctness checking of HDL-model behavior is an integral part of dynamical verification of hardware. As a rule, it is based on comparing of HDL-model behavior and reference model behavior, developed in high-level programming languages. Being verified, both models are applied with the same stimulus sequences; their reactions are caught and checked against each other. Due to the abstractness of the reference model, the checking is not a trivial task as event sequences can be different and some events of one trace may miss in the other one. A methodology of dynamical trace matching for hardware models of different abstraction levels is considered in the paper. The methodology has been successfully used in a number of industrial projects of unit-level microprocessor verification.</abstract>
        </abstracts>
        <codes>
          <udk>004.415.53</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>dynamical verification</keyword>
            <keyword>unit-level verification</keyword>
            <keyword>HDL</keyword>
            <keyword>trace matching</keyword>
            <keyword>partially ordered multisets</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.14/</furl>
          <file>14.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>143-152</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Averina</surname>
              <initials>Anastasiya</initials>
              <email>Anastasia.Matveeva@exactprosystems.com</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Antonov</surname>
              <initials>Nikolay</initials>
              <email>nikolay.antonov@exactprosystems.com</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Itkin</surname>
              <initials>Iosif</initials>
              <email>sasha.khodchenko@exactprosystems.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Particular qualities of testing tools used in industrial operation of trading systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article discusses the basic requirements for tools developed to verify the correct operation of electronic trading systems using a large amount of automated testing (NiVAT); analyzes the applicability of such tools for industrial operation trading systems.</abstract>
        </abstracts>
        <codes>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>test automation</keyword>
            <keyword>trading systems</keyword>
            <keyword>НIVAT</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.15/</furl>
          <file>15.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>153-168</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Bulda</surname>
              <initials>Alyona</initials>
              <email>alyona.bulda@exactprosystems.com</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Buyanova</surname>
              <initials>Olga</initials>
              <email>olga.buyanova@exactprosystems.com</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Zverev</surname>
              <initials>Alexey</initials>
              <email>natalia.goroshnikova@exactprosystems.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using of exchange simulators and test exchanges as tools to test Ticker Plant systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Ticker Plant systems are widely used in modern day trading. They allow collecting in real-time quotes from several markets, present the data in a unified format, and disseminate it electronically depending on requests and goals of external clients, traders. This paper presents a view on the possibility of using market simulators for testing such systems. A set of main functional and non-functional test scenarios required to control the quality of quote dissemination has been identified. A comparison of market simulators and real test markets has been presented.</abstract>
        </abstracts>
        <codes>
          <udk>004.052.2</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Ticker Plant</keyword>
            <keyword>Market Data</keyword>
            <keyword>exchange</keyword>
            <keyword>test market</keyword>
            <keyword>market simulator</keyword>
            <keyword>functional testing</keyword>
            <keyword>non-functional testing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.16/</furl>
          <file>16.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>169-179</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Podymov</surname>
              <initials>Vladislav</initials>
              <email>valdus@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Popesko</surname>
              <initials>Uliana</initials>
              <email>ulya_kiber@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">UPPAAL-based verification of software-defined networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">special kind of computer networks in which the switching device control is fully centralized. This paper investigates the problems of formal description and verification of SDN as a real-time system. We provide a UML-based description of SDN, using the UML diagram editor Dia. To verify real-time properties of SDN, we use a well-known model-checking tool UPPAAL. The main result of the research is an approach for SDN verification, based on translation of SDN description into network of timed automata. Translation correctness is formalized and proved. A number of experiments were done to show that the approach can be used to verify real-time properties of SDN specified as TCTL formulae.</abstract>
        </abstracts>
        <codes>
          <udk>519.7</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>software-defined networks</keyword>
            <keyword>verification</keyword>
            <keyword>timed automata</keyword>
            <keyword>temporal logic</keyword>
            <keyword>UPPAAL</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.17/</furl>
          <file>17.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>180-188</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Nikeshin</surname>
              <initials>A.V.</initials>
              <email>alexn@ispras.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Pakulin</surname>
              <initials>Nikolay</initials>
              <email>npak@ispras.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Shnitman</surname>
              <initials>Victor</initials>
              <email>vzs@ispras.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Conformance testing automation for transport layer security protocol TLS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">TLS protocol is widely used to protect data exchange between clients and servers in various scenarios: while browsing Internet, sending and receiving e-mails, establishing VPN, etc. There are dozens implementations in the market at the moment; such as, ensuring interoperability is highly important. Incompatibility between two implementations might result in disconnection or even disclosure of sensitive data. Conformance testing is the primary tool to ensure interoperability between implementations of a protocol. The paper presents a model-based approach to conformance testing of TLS implementations. It discusses the formal model of TLS protocol, the structure of the test suite. We applied the test suite to a several popular implementations of TLS, and present brief results. The paper concludes with discussion of the directions for future research.</abstract>
        </abstracts>
        <codes>
          <udk>536.421</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>testing</keyword>
            <keyword>verification</keyword>
            <keyword>formal methods</keyword>
            <keyword>formal specification</keyword>
            <keyword>model based testing</keyword>
            <keyword>software models</keyword>
            <keyword>TLS</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.18/</furl>
          <file>18.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>189-203</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Pakulin</surname>
              <initials>Nikolay</initials>
              <email>npak@ispras.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Dynamic verification of hybrid systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In the recent decade we face aggressive replacement of analogue control loops with digital ones. There are ongoing projects for digital control even for critical systems: «Smart Grids» in power industry, «Integrated Modular Avionics» in aerospace, «Smart Fabrics» in manufacturing, etc. Introduction of large scale digital control channels raises the risks of faults that might result in heavy losses. Those risks call for new methods of analysis and verification, including modeling hybrid systems and model-based verification. The paper overviews a number of existing approaches to verification of hybrid systems and introduces an architecture of a test bed for dynamic verification of models of hybrid systems.</abstract>
        </abstracts>
        <codes>
          <udk>004.05</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>hybryd systems</keyword>
            <keyword>cyber-physical systems</keyword>
            <keyword>model-based verification</keyword>
            <keyword>dynamic verification</keyword>
            <keyword>testing</keyword>
            <keyword>UniTESK</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2014.38.19/</furl>
          <file>19.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
