Modeling of environmental monitoring data processing in a cloud infrastructure

Author(s):  
A.V. Skatkov ◽  
◽  
V.I. Shevchenko ◽  
E.N. Mashchenko ◽  
O.V. Chengar ◽  
...  

A model of a cloud-based system for processing environmental monitoring data is proposed. The model takes into account the multi-tier web applications and the heterogeneity of the input flow of applications. As a characteristic of the efficiency of the data processing system, an additive criterion is chosen that takes into account the volume of processed requests and the load on the resources of the cloud infrastructure. The approach under consideration will allow creating a basis for modeling the processes occurring in natural-technical systems (NTS), analyze data processing processes during monitoring of key performance indicators of NТS and ensure that these indicators meet the requirements specified in SLA agreements through the use of alternative data processing strategies.

2012 ◽  
Vol 503-504 ◽  
pp. 1330-1333
Author(s):  
Yan Kun Wang ◽  
Yun Xu Shi ◽  
Hong Mei Fan

The mine safety monitoring system is a set of sensor technology, electronics technology, power electronics technology, computer technology, wireless communication and network technology in one of China's leading multi-functional computer network systems, including underground, Inoue environment and equipment the detection of network systems and the Inoue monitoring data processing system. Environment and equipment for testing network system to achieve underground, of Inoue environment physical monitoring and control; monitoring data processing system is a comprehensive treatment of the collected data in order to achieve the sub-station set up and control equipment or detection sensors, through LAN detection information sharing, may constitute the enterprise information system.


Author(s):  
V. A. Sizov ◽  
A. D. Kirov

The article is devoted to the problem of developing an analytical data processing system for monitoring information security within the information security management system of modern companies conducting their main activities in cyberspace and using cloud infrastructure. Based on the analysis of modern information technologies related to ensuring information security of cloud infrastructure and the most popular products for ensuring information security of cloud infrastructures, as well as existing scientific approaches, a formalized approach to the synthesis of an analytical data processing system for monitoring the information security of an informatization object using cloud infrastructure is proposed. This approach takes into account the usefulness of the used information technologies from the viewpoint of information security. A general model of the structure of information support of an analytical data processing system for monitoring information security, as well as a model of the dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist and an attacker are presented. The quality of the information security monitoring system is used as a criterion in the first optimization model. The following limitations are suggested: limitation on the time of making a decision on an incident; limitation on the degree of quality of analysis of information security events by the analytical data processing system and limitation on the compatibility of data analysis functions with data types about information security events. The cited results of the study of the second model show a logically consistent dependence of the usefulness of information technology on time and the ratio of the skill level of an information security specialist to the skill level of an attacker. The particular models of the structure of the information support of ASOD are presented. They make it possible to determine the rational structure information support of ASOD according to particular criteria. The following particular criteria are used: the maximin criterion of the usefulness of the information support of ASOD for monitoring the information security of an informatization object in the cloud infrastructure; the criterion for the maximum relevance of information support distributed over the nodes of the cloud infrastructure for systems with a low degree of centralization of management.


Food Control ◽  
2021 ◽  
pp. 108746
Author(s):  
Brittany F. Magdovitz ◽  
Sanjay Gummalla ◽  
Donna Garren ◽  
Harshavardhan Thippareddi ◽  
Mark E. Berrang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document