scholarly journals MODELLING OF AUTOMATED WORKING TIME CONTROL SYSTEMS IN EDUCATIONAL INSTITUTIONS

Author(s):  
V. V. Kolenko ◽  
M. S. Safonov ◽  
O. Ye. Iakovenko Iakovenko

The article includes modeling of the automated system of personnel time recording with further development and implementation of it in the educational institution. Practice shows that when using automated time recording, more effective personnel management occurs, employee discipline is increased, and the wage fund is saved on 5–15%. Personalized personnel identification methods have been identified; the selection of technical equipment and software for data collection is justified; A work time model has been developed; Software for employee identification, recording and recording of working hours has been developed and introduced. To do this, special access control equipment was installed on the passageway. Employees have special cards that allow them to easily overcome these devices. If there are several checkpoints in the territory, it is advisable to use a computer network to transfer data to the server, where all data about employees are stored. Based on such data, accurate reports of misconduct can be generated, as well as a time sheet. User identification is an integral and important element for any information system. The identification system is one of the key elements of the infrastructure for protection against unauthorized access. The task of identification and authorization systems is to determine and verify the set of authority of the subject when accessing the information system. A barcode can also act as a unique person identifier. Each employee is ssued a card with a unique bar code, this code is fixed to the person in the database. A barcode scanner is installed on each pass point. This model with a developed algorithm for identifying a person and fixing the passage of control was ntroduced at the Kherson Polytechnic Vocational College of Odessa Polytechnic State University.

Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 955
Author(s):  
Vasyl Teslyuk ◽  
Andriy Sydor ◽  
Vincent Karovič ◽  
Olena Pavliuk ◽  
Iryna Kazymyra

Technical systems in the modern global world are rapidly evolving and improving. In most cases, these are large-scale multi-level systems and one of the problems that arises in the design process of such systems is to determine their reliability. Accordingly, in the paper, a mathematical model based on the Weibull distribution has been developed for determining a computer network reliability. In order to simplify calculating the reliability characteristics, the system is considered to be a hierarchical one, ramified to level 2, with bypass through the level. The developed model allows us to define the following parameters: the probability distribution of the count of working output elements, the availability function of the system, the duration of the system’s stay in each of its working states, and the duration of the system’s stay in the prescribed availability condition. The accuracy of the developed model is high. It can be used to determine the reliability parameters of the large, hierarchical, ramified systems. The research results of modelling a local area computer network are presented. In particular, we obtained the following best option for connecting workstations: 4 of them are connected to the main hub, and the rest (16) are connected to the second level hub, with a time to failure of 4818 h.


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


2020 ◽  
Vol 36 (4) ◽  
pp. 389-407
Author(s):  
Hugo Gonzaga Miguel ◽  
Pedro Ramos ◽  
Susana da Cruz Martins ◽  
Joana Martinho Costa

One of the most widely researched issue on higher education relates to exposed paths that lead to academic success. Nowadays information systems represent an essential part of the education sector in many universities. In particular, the increasing of the number of students in higher education in Portugal leads to the progressive increase of student’s data contained in institutional information systems. This article aims to include the use of student data contained in the Fénix information system of a Portuguese higher educational institution, turning their information in an internal tool, to assist analysis and studies of internal academic success. Providing relevant data for queries can offer a clearer explanation of the paths to success in higher education. It can also help the identification of problems and failures aiming to support a more effective intervention of institutions and researchers to improve the academic success.


2020 ◽  
Vol 3 (2) ◽  
pp. 119-123
Author(s):  
Nur Aeni Hidayah ◽  
Elvi Fetrina ◽  
Alvali Zaqi Taufan

As concrete steps in order to realize the vision and mission of an organization or educational institution is to implement the system of academic information. The one factor that influences the success of the academic information system is the satisfaction of users.  The problems in the user satisfaction are also issues that cannot be denied and continue to be studied. In consequently, having measurements related to user satisfaction is required. This research is done to see how the user satisfaction of the existing system has been implemented and to know what factorshas influenced the system. The method used in this study is a quantitative method using the End User Computing Satisfaction (EUCS) model whereas 255 respondents are chosen as the sample for the study. The purposive sampling technique is usedand the PLS-SEM approach with tools Smart PLS 3.0 is used for analyzing the data.  This research consists of 7 hypotheses and 8 variables, namely Content, Accuracy, Format, Timeliness, Ease of Use, System Reliability, System Speed and End-User Satisfaction. The research finds out that the current level of end-user satisfaction is in satisfied level. Inferentially, of the 7 hypotheses tested, 2 of them were rejected and the other 5; Accuracy, System Reliability, Timeliness, Content and System Spee;are accepted.Through this research, it is hoped that later it could be used as a practical consideration and theoretical study in thefuture.


2018 ◽  
Vol 2 ◽  
pp. 12-20 ◽  
Author(s):  
Svitlana Popereshnyak ◽  
Anastasia Vecherkovskaya

In the course of the study, the activity of Ukrainian enterprises was analyzed. It was revealed that the main aspects that require increased attention, regardless of the industry, are staff management and order management. The activity of any enterprise consists of fulfilling orders and, as a consequence, satisfying customers. It is proposed to develop an automated system that will enable to keep records of orders, namely: the time of order receipt, the number of products, the urgency, the necessary material and time resources, the priority of the order, the executor, the predicted and actual time of the order. This system will help to organize the work of staff, namely: to optimize the working hours of employees due to the dynamic scheduling of the task list; to introduce responsibility for an order that is tied to a specific employee, to keep records of shifts and working hours, automatically form a payroll with due account of worked shifts/hours. The work designed an automated system for managing orders and staff at middle-class enterprises. The requirements for this system are defined and two types of architecture are proposed. For a better understanding of the design phase of the automated system, a class diagram, activity diagram and interaction diagrams are presented. In the process of research, the end product was created with a user-friendly and intuitive user interface that maximally satisfies all the requirements that have been defined for this system. For today the system works in a test mode at the enterprise of Ukraine. The introduction of the system to the filter element manufacturing company allowed to improve the interaction with customers by 40 % due to faster fulfillment of orders; 80 % facilitate the work of managers to track and control the execution of orders; and also, by 20% increase the efficiency of the staff department. What on the whole positively affected the work of the enterprise as a whole.


2019 ◽  
Vol 65 ◽  
pp. 04013 ◽  
Author(s):  
Serhiy Leonov ◽  
Hanna Yarovenko ◽  
Anton Boiko ◽  
Tetiana Dotsenko

The article deals with the prototyping of an information system for intrabank monitoring of transactions related to money laundering. It has been proven that the automation of financial monitoring system would increase the bank’s efficiency due to examining all bank transactions without exception, leveling the human factor, maximizing the speed of identifying suspicious transactions, which will provide the bank management with the possibility to reduce reputational risk and minimize losses related to paying penalties imposed by regulatory agencies. It has been established that the prototype of the information system for monitoring transactions related to money laundering through banks should consist of a model of the business process monitoring in an automated system environment, a DFD model of automated monitoring of banking transactions, a structural database model, user interface forms and the logic of validation business rules. The resulting methodological and practical developments are a universal component of the financial monitoring system of any bank since they have the opportunity to transform and adapt to new standards for reporting entities or differentiation of the business processes of a bank.


2014 ◽  
Vol 568-570 ◽  
pp. 1593-1596
Author(s):  
Hao Fei Xie ◽  
Chong Yang Li ◽  
Guo Qi Zhang ◽  
De Long Su

In order to remedy the deficiency of application of bar code that needs artificial intervention in automotive manufacture, we propose a solution to integrate Radio Frequency Identification (RFID) system in the original enterprise information system based on Web service. Distributed real-time data of welding, lacquer covering and assembly workshops in the automotive manufacture are collected, that are used in the enterprise information system to provide more productions information for management. Firstly, the architecture of integrating the RFID system and the Manufacturing Execution System (MES) in automotive manufacture is given, that is focused on the RFID system network, the Middleware and the Application Gateway. Finally, web service implementation is designed to integrate RFID system in enterprise information system.


2014 ◽  
Vol 1079-1080 ◽  
pp. 791-795
Author(s):  
Lian Zhong ◽  
Hui Chen

thedevelopment of modern logistics industry, has been unable to leave the support of computer network. This paperbriefly introduces the modern logistics and computer network technology relatedconcepts, analyzes the characteristics and results of information system ofmodern logistics, and discusses the construction of the security defensesystem, with a view to promoting to a certain function of the construction oflogistics information system based on computer network technology under.


2015 ◽  
Vol 752-753 ◽  
pp. 1164-1169 ◽  
Author(s):  
M. Manap ◽  
Nur Sumayyah Ahmad ◽  
Abdul Rahim Abdullah ◽  
Norhazilina Bahari

Voltage source inverter (VSI) plays an important roles in electrical drive systems. Consistently, expose to hash environmental condition, the lifespan of the electronic component such as insulated-gate bipolar transistor (IGBT) may shorten and many faults related to the inverter especially switches can be occur. The present of VSI switches faults causing equipment failure and increased the cost of manufacturing process. Therefore, faults detection analysis is mandatory to identify the VSI switches faults. This paper presents the analysis of VSI switches faults using time-frequency distributions (TFDs) which are short times Fourier transform (STFT) and spectrogram. From time-frequency representation (TFR) obtained by using the TFDs, parameters of the faults signal are estimated such as instantaneous of average, root mean square (RMS), fundamental, Total Waveform Distortion (TWD), Total Harmonics Distortion (THD) and Total non-Harmonic Distortion (TnHD) of current signals. Then, based on the characteristics of the faults calculated from the signal parameters, VSI switches faults can be detected and identified. The performance of TFD for the faults analysis is also demonstrated to obtain the best TFD for switches faults detection and identification system. The results show that, STFT is the best technique to classify and identify VSI switches faults and can be implemented for automated system.


Sign in / Sign up

Export Citation Format

Share Document