Search results
-
V.1(21), 2015
89-94The article outlines the principles of quantitative evaluation of information security from the viewpoint of the theory of games. Definitions of the game matrix and its quantitative interpretation. Offered practically implemented method of analysis, planning and design of information security based on the proposed models. -
V.3(23), 2015
94-104The article describes the structural scheme, the algorithmic basis, functional composition and some technological characteristics of the hardware and software of information system of operating control parameters of the electric power in the traction power supply network, structural peculiarities of information-measuring complex, the hub characteristics of the data collection substation, type of equipment used in information and computational complex structure of servers for processing and storage, data volumes and characteristics of the necessary communication lines. -
V.4(36), 2018
120-132We consider the ways of increasing the effectiveness of the information-measuring complex of an automated system for monitoring and metering electricity. The possibility of reducing the volume of telemetry traffic in information transmission channels and increasing the energy efficiency of information-measuring equipment is investigated. -
V.4(32), 2017
130-141We consider the concept and architectural aspects of the development of the corporate information sys-tem for monitoring and resources accounting. The relevance of improving automated systems is due to the intensification of the use of modern information technologies in industry. The aim of the work is to select the architecture of the distributed information system for monitoring and resources accounting (hereinafter - the system), which ensures prompt decision-making in the management of technological objects. We consider the current trends in the development of information systems and concepts that provide the requirements established for systems of this class and purpose. The system is based on previously designed prototype that has been put into operation, and differs from it in new solutions that allow to increase mobility and fault tolerance. We describe the basic implemented architectures and the system functionality.