automated information system
Recently Published Documents


TOTAL DOCUMENTS

178
(FIVE YEARS 84)

H-INDEX

4
(FIVE YEARS 1)

Author(s):  
Laba Oksana ◽  
Zakhara Ihor

The documentary aspect of information interaction of the laboratory for testing of wheeled vehicles is analyzed. The main components of information interaction are identified, which are information infrastructure, information resources and information security. The automated information system used in the activities of the laboratory for testing wheeled vehicles, as well as the main types of documents created and used by the laboratory are described. The subjects of information interaction of the laboratory with which information is exchanged, including documents, have been identified. The documentation of the management system of the training-research-production motor transport laboratory has been systematized. The main traditional and electronic information resources used in the activities of the training-research-production motor transport laboratory are determined. Measures to ensure the protection of information are described, which consist in the use of a qualified electronic signature for identification in an automated information system, as well as for the signing of electronic documents.


Author(s):  
Viktor P. Kochyn ◽  
Anatolii V. Zherelo

The article discusses the main approaches to the design and development of an automated information system for a secure cloud repository of paperworks of students and employees of educational and research organisations (abstracts, essays, term papers and theses, master’s theses, deposited articles), providing secure storage and secure mobile access to stored data. The research and development of architectural solutions to ensure reliable and secure data storage using cloud technologies are described. The main problems of designing a secure repository and ways to solve them are considered. The cloud repository of written works is built on the basis of the Ceph distributed file system, which uses the NextCloud system and the virtual computing resources of the virtual network infrastructure of the Belarusian State University as a platform for building a cloud interface.


Author(s):  
V.S. Boldyrev

The features of scientific activity of scientific and industrial enterprises are considered. The analysis of the functioning of a research and production enterprise in carrying out complex scientific research has been carried out. The contour of scientific research management is presented in the form of the main stages of the technological process of their implementation. The possibility of using the program-target approach as an effective strategy for managing research in solving complex and complex problems of a research and production enterprise is shown. An example of a matrix organizational structure of management is given as the most effective for the approach under consideration, with a description of the main stages. The use of automated information systems to improve the efficiency of research management is proposed. The diagram of the inclusion of an automated information system in the general structure of management of scientific research of the enterprise is shown. The described methods have been introduced in the NPO "Lakokraspokrytie" and are successfully used in the implementation of innovative projects for the development, design and commissioning of energy-saving painting lines, within the framework of one of which a painting line for freight cars was designed and put into operation JSC "SPC "Uralvagonzavod" in Nizhny Tagil city, which allows painting up to 16 thousand different modifications of freight cars per year


2021 ◽  
Vol 2021 (2) ◽  
pp. 35-42
Author(s):  
Aleksey Valerievich Kogtev

The article analyzes the main components of cyber threats in the developed automated information system for assessing and predicting cyber threats on sea vessels under the flag of the Russian Federation. The following components of cyber threats were listed: subjects of cyber threats, motives of cybercriminals, tasks and goals of cybercriminals, vulnerable ship systems, prerequisites for executing cyber threats, types of cyber threats, stages of a cyber-attack. The examples of the cyber-threat components are given. The possibility of making operational changes to the main components of cyber threats conditioned by the development of the shipping industries and progress of information technologies and cyber threats has been substantiated


2021 ◽  
Vol 2021 (2) ◽  
pp. 7-14
Author(s):  
Julia Sergeevna Shevnina ◽  
Vadim Valerievich Konstantinov

The article discusses designing and developing an automated information system for assessing the professional qualities and competencies of the enterprise employees. There has been noted the system’s ability to test the employees, taking into account the specifics of the enterprise and the individual achievements of employees. There has been analyzed an integrated method that allows composing individual test tasks consisting of tests and routine problems, whose sequence is determined by the answers of the employees tested. The automated information system is implemented as a one-page SPA application. Vue.js and Express.js frameworks are used. In the process of designing an automated information system the main functional requirements were determined, the structure of the database was developed. The system implements the principles of access control based on the differentiation of user rights. The roles of users and administrator are defined. The architecture of the developed automated information system based on the client-server approach has been designed. The function of creating tests in the developed system allows creating tests with different types of questions and forming different individual trajectories of testing the knowledge of the company’s employees, taking into account its specifics


Expert system is a methodology to adapt algorithm of successful decisions in one sphere of scientific and practical activity into another. Widespread information technology is an identical intelligent computer program that contains the knowledge and analytical skills of one or more experts in the field of application and is able to draw logical conclusions based on this knowledge, thereby solving specific problems in designing the process equipment without the presence of an expert (a specialist in a specific problem area). The expert system allows to solve problems in a narrow subject area. The modern realities of introduced automated production do not provide a quality result, because all design decisions are made on the basis of subjective knowledge and intuitive feelings. One way to solve this problem is to develop formalized human-machine design methods in the early stages of creating a project of process equipment. This study describes the process of developing an expert system, which is aimed at solving problems of product modeling, optimization synthesis of the process operation structure and layout of the process machine. In the study, the author identifies the stages of process equipment designing, identifies the components of the expert system, and describes the procedural model of the design process. The result of the paper is the developed structure of software and information support of the automated information system for the design of process equipment. The developed system will speed up the decision-making process in the design of process equipment and receive competent advice. The expert system will serve as a basis for the introduction of intelligent production and smart consumption, which confidently goes hand in hand with the Fourth Industrial Revolution


2021 ◽  
Vol 2083 (4) ◽  
pp. 042010
Author(s):  
Taiyou Wang ◽  
Litiao Chen

Abstract In order to meet the needs of today’s large-scale enterprise human resource management attendance business, this paper designs an embedded face recognition attendance system, and designs and analyses the implementation method of the system in detail. The system consists of two parts: face-swiping attendance and attendance management. Among them, face-swiping time attendance uses the Face Boxes model to detect faces, and the Face Net model to identify the person who punches in. Tests have found that the system is simple to operate, has high recognition accuracy, and has a certain practical value.


Author(s):  
Василий Васильевич БЫЧКОВ

В статье формулируется возможность применения компьютерного моделирования при расследовании преступлений экстремистского характера как способ повышения эффективности предварительного следствия. Статья проиллюстрирована скриншотами окон автоматизированной информационной системы с криминалистически значимой информацией о преступлениях данного вида. The article formulates the need to use computer modeling in the investigation of extremist crimes. The article is illustrated with screenshots of windows of the automated information system with forensically significant information about crimes of this kind.


Author(s):  
S.M. Gazalieva ◽  
◽  
M.N. Yugay ◽  
N.Y. Ilyushina

Abstract: The paper presents the results of statistical studies of disability due to occupational diseases in the Karaganda region between 2016 and 2020. The analysis of disability due to occupational diseases was conducted using the automated information system called "Centralized Database of Persons with Disabilities" (CDPD). The structure of primary disability by the severity of groups, age and sex, the place of work of the affected workers has been studied.


2021 ◽  
Vol 11 (4) ◽  
pp. 361-367
Author(s):  
Oleksandr Gordieiev ◽  
Vyacheslav Kharchenko ◽  
Oleg Illiashenko ◽  
Olga Morozova ◽  
Magomediemin Gasanov

Eye tracking technology is based on tracking the trajectory of human eye movement. As a rule, it is implemented in the form of an additional device attached under the monitor or in the form of glasses. On the basis of a mathematical model, the focus of a person's attention is calculated and, accordingly, the user's visual route is built. Eye tracking technology is used to solve various problems, e.g. for marketing research, assessing the quality of user interfaces, developing simulators for operators, etc. The article discusses the concept of using eye tracking technology to assess and ensure cyber security, functional safety and usability. The possibility of using eye tracking technology (ETT) to solve the problem of identifying a person's personality is considered separately. The solution is achieved by reproducing a certain trajectory by a person's vision. This technique can be used as a basic or additional technique for identifying a person's personality. It also analyzes the results of using eye tracking to study the interface of an automated information system for operator support based on algorithms for symptom-oriented emergency instructions (ASOEI), which is used at nuclear power plants (NPP).


Sign in / Sign up

Export Citation Format

Share Document