scholarly journals MEASUREMENT ERRORS AFFECTING THE CHARACTERISTICS OF MULTI-POSITION SYSTEMS, AND WAYS TO REDUCE THEM

InterConf ◽  
2021 ◽  
pp. 333-346
Author(s):  
Andriy Аrtikula ◽  
Dmytro Britov ◽  
Volodymyr Dzhus ◽  
Borys Haibadulov ◽  
Anastasiia Haibadulova ◽  
...  

Modern wide development of science and technology causes the growth of information needs in all branches of human development. At present, there are all opportunities to increase information security by combining sources of information into a single system. At the same time, when merging, specific difficulties and features emerge, which together make it difficult to implement the proposed solutions. The paper considers the peculiarity of combining different types of radar stations into a single information system. Errors of measurements of separate parameters and their influence on system characteristics are considered. Options for solving the problems that have arisen are proposed.

2019 ◽  
Vol 8 (4) ◽  
pp. 9030-9034

The article provides a comprehensive analysis of the concepts related to the information security of critically important information systems in Russia. Today, problems exist, which are associated with numerous threats to Russian information security due to the rapidly increasing role of the information sphere. To solve these problems, an effective mechanism is needed to prevent and eliminate these threats. To develop the organizational and legal basis of the mechanism, it is necessary to define a number of concepts, such as information security, critically important information system, information infrastructure, etc. The authors explore Russian legal regulation, as well as international experience and research on this topic. The article shows the main sources of information security threats and defines general principles and approaches to ensuring information security of critically important information systems. The concept and types of critically important information systems are identified and the necessity of developing and improving their legal regulation is substantiated. A number of legal and organizational measures aimed at ensuring the information system security of Russian infrastructure are proposed.


Author(s):  
Nataliia Kasyanova ◽  
Mykola Salatko

The introduction of electronic means of communication in the management processes of the enterprise has led to a sharp increase in the number of information messages. There was a redistribution of working time in favor of solving information problems. As a result, information technology leads to negative effects and losses. The purpose of the study is to develop guidelines for improving the information support of the industrial enterprise on the basis of evaluation and management of information resources. It is proposed to evaluate the information resources of the enterprise in a pragmatic approach (qualitative assessment) for three groups of indicators – effectiveness, security and adequacy of information. Effectiveness is determined by the level of satisfaction of information needs and the ability to give the target effect. Security shows the level of automation, the state of use of information infrastructure, information literacy of staff, and financial security of information resources. Sufficiency is due to indicators of information quality, timeliness of receipt and use of information resources, the use of information models and a variety of sources of information resources. The method of calculation of the integrated indicator which allows to receive complex representation at once about all system of information maintenance of the enterprise is offered. Reflecting the efficiency of attracting and using information resources, the integrated indicator can serve as a signal indicator of the feasibility of updating information and modernizing the information system. When forming the list of signs it is necessary to consider that the qualitative sign can be presented by a set of equivalent nominations which are the list of possible names of quality. In this case, each nomination of a qualitative feature is placed in accordance with the quantitative value of the transformation function depending on the desirability scale. The transformation of partial indicators is proposed to be carried out by the geometric mean method. In addition to the method of forming an integrated indicator of evaluation of information resources, the expediency of using the method of analysis of hierarchies for making management decisions on the formation of the information system of the enterprise is substantiated. Thus, the method of integrated evaluation allows you to synthesize indicators of effectiveness, security and adequacy of information resources of the enterprise and on this basis to form the optimal structure and amount of information that takes into account economic needs and increases productivity.


2021 ◽  
Vol 26 (jai2021.26(1)) ◽  
pp. 22-30
Author(s):  
Belej O ◽  
◽  
Spas N ◽  
Artyshchuk I ◽  
Fedastsou M ◽  
...  

Statistics of recent years on attacking actions on information systems show both the growth of known attackers and the growth of new models and directions of attacks. In this regard, the task of collecting information about events occurring in the information system and related to the main objects of the information system, and conducting their effective analysis is relevant. The main requirements for the tools of analysis are: speed and ability to adapt to new circumstances - adaptability. Means that meet these requirements are artificial intelligence systems. In particular, there are a number of research that use neural networks as a means of analysis. There are different types of neural networks, which differ depending on the tasks to be solved and are more suitable for different input data. The proposed multi-agent attack detection system collects and analyzes the collected information about the events of the information system using two types of neural networks. A multilayer perceptron is used to analyze various logs of information system objects. The Jordan network is used to analyze directly collected information about the events of information system objects. The use of a multi-agent attack detection system can increase the security of the information system. Features of modern attacks are considered. The urgency of the task of detecting attacks is substantiated. The peculiarities of the attack process were considered. The actions of attackers of different types at different stages of the attack are analyzed. It was shown which methods of detecting attacks should be used at different stages of the attack by an attacker. A model of a multi-agent attack detection system is proposed. An interpretation of the results of the analysis of information system events by the method of detecting attacks was proposed, as well as an algorithm for joint decision-making by agents based on several sources of information about their status. A model of an attack detection system that takes into account these features is proposed. This attack detection system collects information at several levels of the information system and uses it to analyze the artificial intelligence system


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


HortScience ◽  
1998 ◽  
Vol 33 (3) ◽  
pp. 552e-552
Author(s):  
James L. Green

In 1997, the ASHS Board of Directors established ASHS HortBase as a Standing Committee of the Society. The ASHS HortBase Committee, a six-member Standing Committee and Chair, is charged to implement and maintain ASHS HortBase. The members of the ASHS HortBase Committee will be chair and chair-elect of the three HortBase Task Forces: 1) Finance and Marketing; 2) Standards—authoring, reviewing, and publishing; and 3) Technology. ASHS HortBase is a dispersed, dynamic horticultural information system (network) on the WWW comprised of peer—reviewed, concise, interlinked information modules to meet the information needs of instructors and students, gardeners and growers. A strong advantage and distinguishing characteristic of ASHS HortBase is our dynamic pool of potential authors, reviewers, and users (ASHS Extension, Industry, and Teaching membership) to continually evolve and update the peer-reviewed information in HortBase. We have the scholastic international standing to provide peer review and validation of the information and to recognition to the authors, coupled with the marketing to stimulate wide use of their information modules. ASHS HortBase is a dispersed system (dispersed development and server costs). The “dispersed cost” for information file development and updating and delivery on the respective authors' dispersed servers disperses the major costs of the HortBase information system. Additional information on ASHS HortBase and the papers presented at the 4-h Colloquium on HortBase at ASHS-97 can be found at http://[email protected] or contact me ([email protected], phone 541.737.5452, fax 541.737.3479).


1986 ◽  
Vol 18 (4-5) ◽  
pp. 15-26 ◽  
Author(s):  
D. A. Segar ◽  
E. Stamman

Most historical marine pollution monitoring has proven useless in a management context. A strategy for development of effective marine pollution monitoring programs is outlined. This strategy is based on the following steps: 1) systematic evaluation of the management information needs, 2) identification of the hypothetical impacts associated with those management concerns, and 3) investigation of the feasibility of monitoring those effects such that the existence, or absence, of a specified level of effects can be established in a statistically-valid manner. There are two fundamentally different types of monitoring program: site-specific and regional. These two types of program differ markedly in scope and approach when designed through application of this strategy. The strategy requires development of null hypotheses which address management concerns and which are amenable to scientific testing. In order for the program to be successful, the null hypotheses selected for inclusion in a marine pollution monitoring program must address levels of effect which are predefined to be environmentally significant. The definition of environmentally significant effect levels is a difficult process which must be primarily the responsibility of the managerial community.


2020 ◽  
Vol 36 (2) ◽  
pp. 97-111
Author(s):  
Stanislava Gardasevic

Purpose This paper presents the results of a qualitative study that involved students of an interdisciplinary PhD program. The study objective was to gather requirements to create a knowledge graph information system. The purpose of this study was to determine information-seeking practices and information needs of this community, to inform the functionalities of a proposed system, intended to help students with relevant resource discovery and decision-making. Design/methodology/approach The study design included semi-structured interviews with eight members of the community, followed by a website usability study with the same student participants. Findings Two main information-seeking styles are recognized and reported through user personas of international and domestic (USA) students. The findings show that the useful information resides within the community and not so much on the program website. Students rely on peer communication, although they report lack of opportunities to connect. Students’ information needs and information seeking are dependent on their progress through the program, as well as their motivation and the projected timeline. Practical implications Considering the current information needs and practices, a knowledge graph hosting both information on social networks and the knowledge produced by the activities of the community members would be useful. By recording data on their activities (for example, collaboration with professors and coursework), students would reveal further useful system functionalities and facilitate transfer of tacit knowledge. Originality/value Aside from the practical value of this research that is directly influencing the design of a system, it contributes to the body of knowledge on interdisciplinary PhD programs.


2020 ◽  
Vol 10 (1) ◽  
pp. 7
Author(s):  
Miguel R. Luaces ◽  
Jesús A. Fisteus ◽  
Luis Sánchez-Fernández ◽  
Mario Munoz-Organero ◽  
Jesús Balado ◽  
...  

Providing citizens with the ability to move around in an accessible way is a requirement for all cities today. However, modeling city infrastructures so that accessible routes can be computed is a challenge because it involves collecting information from multiple, large-scale and heterogeneous data sources. In this paper, we propose and validate the architecture of an information system that creates an accessibility data model for cities by ingesting data from different types of sources and provides an application that can be used by people with different abilities to compute accessible routes. The article describes the processes that allow building a network of pedestrian infrastructures from the OpenStreetMap information (i.e., sidewalks and pedestrian crossings), improving the network with information extracted obtained from mobile-sensed LiDAR data (i.e., ramps, steps, and pedestrian crossings), detecting obstacles using volunteered information collected from the hardware sensors of the mobile devices of the citizens (i.e., ramps and steps), and detecting accessibility problems with software sensors in social networks (i.e., Twitter). The information system is validated through its application in a case study in the city of Vigo (Spain).


Sign in / Sign up

Export Citation Format

Share Document