Analytical Models of Parrying Negative External Influences on a Network Information System

2020 ◽  
Vol 54 (5) ◽  
pp. 250-254
Author(s):  
V. M. Tyutyunnik ◽  
Yu. Yu. Gromov ◽  
E. Yu. Aleksandrov
2021 ◽  
Vol 45 (1) ◽  
pp. 77-94
Author(s):  
Alexander V. Robutsov ◽  
Violetta V. Levshina ◽  
Svetlana V. Mamaeva ◽  
Ludmila N. Khramova ◽  
Igor V. Khramov

The subject of this study represents of the processes of functioning of information flows in a network information system through the use of fuzzy sets. The purpose of this article is consider to the possibilities of fuzzy sets in information flows distribution problems of the Network Information System by the development of mathematical tools. In the theoretical part of the study the main issue was the description of fuzzy approach. In the empirical part of the study the main concern was finding out the reasons of the advantages of fuzzy approach. Methods of this research include: analysis of information sources, formalization, synthesis, and modeling. The main results of the present study: proof of the identity between the functioning of the analytical data; held the solution of the optimization problem based on the formulated analytical models; comparison of the usage of fuzzy logic with a different statistical method; demonstrated the advantage of fuzzy approach in modeling processes network information system. The results can be applied to be used by further authors in the field of information systems and technologies. The article is aimed at improving the functioning of the network information system by improving the mathematical tools.


2020 ◽  
Author(s):  
Tingting Zhang ◽  
Yushi Lan ◽  
Aiguo Song ◽  
Kun Liu ◽  
Nan Wang

<p>The network information system is a military information network system with evolution characteristics. Evolution is a process of replacement between disorder and order, chaos and equilibrium. Given that the concept of evolution originates from biological systems, in this article, the evolution of network information architecture is analyzed by genetic algorithms, and the network information architecture is represented by chromosomes. Besides, the genetic algorithm is also applied to find the optimal chromosome in the architecture space. The evolutionary simulation is used to predict the optimal scheme of the network information architecture and provide a reference for system construction.</p><br>


BioScience ◽  
2000 ◽  
Vol 50 (11) ◽  
pp. 963 ◽  
Author(s):  
KAREN S. BAKER ◽  
BARBARA J. BENSON ◽  
DON L. HENSHAW ◽  
DARRELL BLODGETT ◽  
JOHN H. PORTER ◽  
...  

2018 ◽  
Vol 2 ◽  
pp. e26479
Author(s):  
Sharon Grant ◽  
Janeen Jones ◽  
Kate Webbink ◽  
Rob Zschernitz

On the 9th of April 2010 the Field Museum received a momentous email from the ORNIS (ORnithology Network Information System) team informing them that they could now access the products of a nationwide georeferencing project; its bird collection could be, quite literally, put on the map. On the 7th of August 2017 those data (along with the sister datasets from FISHNet (FISH NETwork) and MaNIS (Mammal Network Information System) finally made their way into the Museum’s collection management system. It's easy to get data out, why is it so hard to get it back? To make it easier, what do we need to do in terms of coordination, staffing, and/or technological resources? How can tools like data quality flags better accommodate the needs of data-providers as well as data-users elsewhere along the collections data pipeline? We present a real life case studyof repatriating an enhanced dataset to its institute of origin, including details on timelines, estimates of effort, and lessons learned. The best laid repatriation protocols might not prepare us for everything, but following them more closely might save us some sanity.


2018 ◽  
Vol 246 ◽  
pp. 03017
Author(s):  
Kai Fan ◽  
Hang Yang ◽  
Aidong Xu

Nowadays, with the rapid development of science and technology, network information technology is widely applied to various enterprise departments. In order to meet the increasing social needs, power companies have also built power network information systems. The establishment of the network information system has been put into use, which has greatly improved the efficiency of the power enterprise. However, the security risks of network information systems have followed. Once the network is damaged by the attack, it will cause the power system to fail to operate normally, which will inevitably cause significant losses. Power system information security issues threaten the security of the power system and the entire power industry. Studying the information security of power systems, how to protect the power information network from threats, how to ensure the safe and stable supply of electricity to the whole society, and striving to develop a safe and effective power network information system is an important issue facing the development of information technology.


Sign in / Sign up

Export Citation Format

Share Document