scholarly journals THE OBJECTIVE OF CONSTRUCTING THE OPTIMAL INFORMATION STRUCTURE HIERARCHIC STRUCTURE SYSTEMS

2020 ◽  
Vol 69 (1) ◽  
pp. 355-360
Author(s):  
K.S. Imanbaev ◽  
◽  
S.D. Zhanuzakov ◽  
Zh.Zh. Kozhamkulova ◽  
A.S. Zhanuzakov ◽  
...  

This paper presents the results of an analysis of the structures of an information system of a hierarchical structure using algebraic methods, emphasizing its functioning as a result of the interaction of external factors. An assessment of the structure bonds is obtained using a matrix apparatus. The main attention in this paper is paid to methods of structure analysis with unknown principles and algorithms for the functioning of systems. The proposed approach to the analysis of the structure of systems is based on the principle of a sequential analysis of acceptable options for constructing individual elements, parts and systems as a whole with the subsequent selection of the best option for its implementation and development on an acceptable set of system structure. This paper presents the results of an analysis of the structures of an information system by the methods of algebra, emphasizing its functioning as a result of the interaction of external factors.

2020 ◽  
Vol 1 (3) ◽  
pp. 227-237
Author(s):  
Fathorazi Nur Fajri ◽  
Wali Ja’far Shudiq ◽  
Nurul Hidayattun Nasyihin

New Santri Admission (Penerimaan Santri Baru) is an administrative process for the selection of new student candidates. The PSB process is always carried out manually at each school institution, especially the Islamic Boarding Schools, which will cause various difficulties from several related parties. Therefore the New Santri Admission System was created online or the term can be called the online PSB. . An idea emerged to create a new student admission information system based on the SQL database. With this system, pesantren or administrators can manage the implementation of student registration for web technology using the PHP programming language and new languages. such as rapid registration and announcements.


2004 ◽  
Vol 5 (2) ◽  
pp. 177-203 ◽  
Author(s):  
Thomas Pfeiffer

Abstract In the literature, the information structure of the hold-up problem is typically assumed to be exogenous. In this paper, we introduce an additional stage at which the head office may grant individual divisions access to an information system before they undertake their specific investments. Although more information ceteris paribus enhances each divisions’ profits, more information can reduce divisions’ investments and destroy synergies for the other division that would have been generated by the investments. If this negative effect dominates, then information can be harmful for the entire company. Hence, information control can be a subtle force to deal with the hold-up problem to a certain extent. In this paper we analyze those conditions under which information is either harmful or beneficial for central management.


2004 ◽  
Vol 13 (03) ◽  
pp. 289-332 ◽  
Author(s):  
JULIANE DEHNERT ◽  
WIL M. P. VAN DER AALST

This paper presents a methodology to bridge the gap between business process modeling and workflow specification. While the first is concerned with intuitive descriptions that are mainly used for communication, the second is concerned with configuring a process-aware information system, thus requiring a more rigorous language less suitable for communication. Unlike existing approaches the gap is not bridged by providing formal semantics for an informal language. Instead it is assumed that the desired behavior is just a subset of the full behavior obtained using a liberal interpretation of the informal business process modeling language. Using a new correctness criterion (relaxed soundness), it is verified whether a selection of suitable behavior is possible. The methodology consists of five steps and is illustrated using event-driven process chains as a business process modeling language and Petri nets as the workflow specification language.


2019 ◽  
Vol 8 (1) ◽  
pp. 39-47
Author(s):  
Zulfachmi ◽  
Angger Andrea Amanda ◽  
Dedy Jauhari

The increasing need for property in Tanjungpinang City is very growing, especially in the housing sector. Selection of property based on location and facilities and infrastructure is always a consideration for the community in making decisions to buy a property. Difficulty finding property location information in a certain area often occurs, resulting in people not getting references about the properties offered in Tanjungpinang City. The purpose of this research is to create a web-based geographic information system (GIS) regarding the distribution of the number of properties on offer, especially in Tanjungpinang City using a web-based mapping approach. In the development of Property GIS the author uses the Waterfall method and in the analysis of system requirements it is modeled with UML (Unified Modeling Language) and implemented with the PHP programming language and MySQLI database. It is hoped that the results of making this property's geographic information system can help the public to find out information about the distribution of properties offered, such as the location of property coordinates, addresses, prices, property photos, property specification data and property developer data.


2016 ◽  
Vol 11 (5) ◽  
pp. 129 ◽  
Author(s):  
Oluyemisi Rachael Arowolo ◽  
Ayoib Che-Ahmad

Monitoring mechanisms are tools for companies to protect the interests of the shareholders, most especially, the minority shareholders from the deviant behaviour of the management and board members. This study examines the relationship between monitoring mechanisms (directorship, internal and external auditing), gender and information system structure in Nigerian non-financial listed companies. The empirical tests for the study are by quantitative analysis approach with data from annual reports and questionnaires (for information system structure and internal auditing not obtainable from annual reports). The findings reveal that both gender and information system structure significantly relates to monitoring mechanisms (directorship, internal auditing and external auditing). This empirical study adds to the literature on the antecedents of organizational attributes in respect of gender and information system structure as related to monitoring mechanisms, particularly in Sub-Saharan African. Likewise, the findings suggest policy implication for the board of directors regarding appropriate board composition and structuring of the information system of a company to mitigate agency problems.


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Evasaria M Sipayung ◽  
Yosi Yonata ◽  
Chrevita J Rende

Anak Pelangi Indonesia (API) Foundation is a non-profit foundation that offers scholarship programs for elementary, middle and high school students. This institute is supported by donaturs who give contribution to the Foundation. The donation is processed to be a cost that is used to pay Sumbangan Pembinaan Pendidikan (SPP) or Education Development Donation of each student. Currently, the provision of monthly donor fund is at uncertain amount so that the Foundation needs to determine the students of whom SPP will be firstly paid. However, the funding needs of each student are different due to the different amount of SPP and a giving fine from the school for the tardiness in paying the tuition. From these matters, the Foundation finds it difficult in deciding which students whose the tuition will be paid first. The solution to this problem is to use the four criteria referring to the tuition payment, namely the difference of pay date, fine, rank, and the amount of payment. The four criteria is then given the same integrity which is 25% for each criteria and counted by using Weighted Product (WP) method. The result of this research is an information system to the selection of scholarship payment using Weight Product method that takes the biggest value from the calculation result as a reference in deciding which students of whom SPP will be initially paid in accordance with the current fund condition.


Accounting ◽  
2021 ◽  
pp. 645-654 ◽  
Author(s):  
Malek Hamed Alshirah ◽  
Abdalwali Lutfi ◽  
Ahmad Farhan Alshira’h ◽  
Mohamed Saad ◽  
Nahla Mohamad El Sayed Ibrahim ◽  
...  

The objective of this study is to examine the role of external factors including MP, CP, and NP on the intention to adopt Cloud Based Accounting Information System (CB-AIS). The study proposes a theoretical framework based on institutional theory (INT). The data were collected from small and medium sized enterprise (SMEs) operating in Jordan. A total of 600 questionnaires were distributed to selected SMEs and only 142 were returned and used for the analysis. The empirical data were analyzed using the PLS-SEM modelling. The findings showed that MP, CP, and NP had significant direct associations with the CB-AIS intention to adopt. The results provide important insights to managers, researchers and policymakers to help them understand the importance of CB-AIS adopting to enhance firm performance.


2021 ◽  
Author(s):  
Nivedita Nivedita ◽  
John D. Aitchison ◽  
Nitin S. Baliga

ABSTRACTDrug resistance is a major problem in treatment of microbial infections and cancers. There is growing evidence that a transient drug tolerant state may precede and potentiate the emergence of drug resistance. Therefore, understanding the mechanisms leading to tolerance is critical for combating drug resistance and for the development of effective therapeutic strategy. Through laboratory evolution of yeast, we recently demonstrated that adaptive prediction (AP), a strategy employed by organisms to anticipate and prepare for a future stressful environment, can emerge within 100 generations by linking the response triggered by a neutral cue (caffeine) to a mechanism of protection against a lethal agent (5-FOA). Here, we demonstrate that mutations selected across multiple laboratory evolved lines had linked the neutral cue response to core genes of autophagy. Across these evolved lines, conditional activation of autophagy through AP conferred tolerance, and potentiated subsequent selection of mutations in genes specific to overcoming the toxicity of 5-FOA. We propose a model to explain how extensive genome-wide genetic interactions of autophagy facilitates emergence of AP over short evolutionary timescales to potentiate selection of resistance-conferring mutations.


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


2018 ◽  
Vol 18 (3) ◽  
pp. 333-338
Author(s):  
E. A. Vitenburg ◽  
A. A. Levtsova

Introduction. Production processes quality depends largely on the management infrastructure, in particular, on the information system (IS) effectiveness. Company management pays increasingly greater attention to the safety protection of this sphere. Financial, material and other resources are regularly channeled to its support. In the presented paper, some issues on the development of a safety enterprise information system are considered.Materials and Methods. Protection of the enterprise IS considers some specific aspects of the object, and immediate threats to IT security. Within the framework of this study, it is accepted that IS are a complex of data resources. A special analysis is resulted in determining categories of threats to the enterprise information security: hacking; leakage; distortion; loss; blocking; abuse. The connection of these threats, IS components and elements of the protection system is identified.  The requirements of normative legal acts of the Russian Federation and international standards regulating this sphere are considered. It is shown how the analysis results enable to validate the selection of the elements of the IS protection system.Research Results. A comparative analysis of the regulatory literature pertinent to this issue highlights the following. Different documents offer a different set of elements (subsystems) of the enterprise IS protection system. To develop an IS protection program, you should be guided by the FSTEC Order No. 239 and 800-82 Revision 2 Guide to ICS Security.Discussion and Conclusions. The presented research results are the basis for the formation of the software package of intellectual support for decision-making under designing an enterprise information security system. In particular, it is possible to develop flexible systems that allow expanding the composition  of the components (subsystems).


Sign in / Sign up

Export Citation Format

Share Document