?
Сервисно-ориентированная модель ИТ-службы крупной организации
Вестник Южно-Уральского государственного университета. Серия: Компьютерные технологии, управление, радиоэлектроника. 2013. Т. 13. № 3. С. 83-91.
This paper describes model of IT division that provides permanent development and support of enterprise information system (IS). Model of IS which is described it as a network of interacting infrastructure services, services of business application support, and services of business processes support is given. Common process of coordinated development of all services is discussed, as well as processes of incremental development and radical transformation of IS.
Zelenkov Y., International Journal of Information Systems and Change Management 2014 Vol. 7 No. 2 P. 150-166
Existing approaches suggest that IT strategy should be a reflection of business strategy. However, actually organisations do not often follow business strategy even if it is formally declared. In these conditions, IT strategy can be viewed not as a plan, but as an organisational shared view on the role of information systems. This approach generally ...
Added: October 29, 2017
Zelenkov Y., Вестник Южно-Уральского государственного университета. Серия: Компьютерные технологии, управление, радиоэлектроника 2013 Т. 13 № 3 С. 109-116
Issue of providing of agility of enterprise information system (IS) which is defined as an ability to detect changes in external environment (for example changes of functional requirements) and effectively react to these changes is discussed. System’s splitting to relative weakly bound modules which can develop independently is considered as a main manner to provide ...
Added: October 29, 2017
Zelenkov Y., Открытые системы. СУБД 2014 № 3 С. 17-20
Доминирующие сегодня представления о стратегическом управлении корпоративными ИТ морально устарели — вместо традиционного построения долгосрочных планов целесообразно ориентироваться на создание систем с высокой адаптивностью. ...
Added: October 29, 2017
Zelenkov Y., Управление большими системами: сборник трудов 2013 № 41 С. 146-161
Information systems implementation efficiency measurement method is proposed. It is based on entropy of characteristic parameter of business process which is supported by system. Equations are introduced, which help to estimate the rate of processes with predefined output. Example is given of the proposed method application to information system effect estimation and finding the direction of business processes improvement. ...
Added: October 29, 2017
Springer, 2017
This book constitutes the proceedings of the 7th Enterprise Engineering Working Conference, EEWC 2017, held in Antwerp, Belgium, in May 2017. EEWC aims at addressing the challenges that modern and complex enterprises are facing in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous ...
Added: May 12, 2017
Zelenkov Y., Открытые системы. СУБД 2016 № 2 С. 44-46
Количественный анализ научных публикаций позволяет определить актуальные направления исследований в конкретных областях. Не стал исключением и наукометрический анализ в области корпоративных информационных систем. ...
Added: October 29, 2017
Пермь : Пермский государственный национальный исследовательский университет, 2018
В сборник включены статьи, относящиеся к следующим направлениям научной работы: моделирование и анализ процессов и систем; разработка, анализ и тестирование программных систем, методы и инструментальные средства разработки программных систем.
Представлены результаты выполнения проектов, поддержанных грантами РФФИ (проекты № 18-01-00359, № 18-37-00070) и научного фонда НИУ ВШЭ (проект № 17-05-0020).
Материалы сборника могут представлять интерес для научных работников, специалистов ...
Added: December 16, 2018
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
Васильева Т. П., Мызникова Б. И., Rusakov S. V., Научно-технические ведомости Санкт-Петербургского государственного политехнического университета. Информатика. Телекоммуникации. Управление 2012 № 1(140) С. 73-79
Предложена модель, включающая описание двух взаимодействующих подсистем: «население» и «градообразующая база». Представлено построение матрицы вероятностей распределения потоков характеристик между отраслевыми блоками, а также матрицы вероятностей миграции населения между федеральными округами. Дана интерпретация результатов моделирования, полученных с помощью реальных статистических данных. ...
Added: March 10, 2015
Aier S., Gordijn J., Proper H. . et al., IEEE Computer Society, 2020
The 22nd IEEE International Conference on Business Informatics (IEEE CBI 2020) was held June 22–24, 2020. This time, the conference was hosted by the University of Antwerp, Belgium but due to the COVID-19 pandemic, the conference was organized online. While this is not the preferred format of an academic conference, it provided the opportunity to ...
Added: July 13, 2020
Fuad Aleskerov, Demin S., Shvydun S., SN Computer Science 2020 Vol. 1 No. 2 Article 68
The paper examines the choice problem when the total number of observations and criteria is too large. There are many different procedures, which are used for decision-making process under multiple criteria; however, most of them cannot be applied to large datasets due to their computational complexity while others provide sufficient accuracy. To solve the problem, ...
Added: February 20, 2020
Silakov D., Системный администратор 2018 № 6 С. 24-28
CentOS 7 was released in 2014, but many system administrators still use the old CentOS 6.x. The more so since updates for CentOS 6 are going to be released till the year 2020. There are a lot of reasons to use the old version, but one of the major ones is significants of functional changes ...
Added: October 19, 2018
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
L. : IEEE, 2016
IntelliSys 2016 conference will focus on areas of intelligent systems and artificial intelligence and how it applies to the real world. It is an opportunity for researchers in this field to meet and discuss solutions, scientific results, and methods in solving important problems in this field. Conference Topics include, but are not limited to: Artificial ...
Added: February 25, 2017
Babash A. V., М. : ИНФРА-М, РИОР, 2013
Пособие предназначено для студентов высших учебных заведений, обучающихся по специальности «Прикладная информатика (в экономике)». Оно также содержит методический материал для ряда инновационных курсов лекций по профилю «Информационная безопасность» и может быть использовано и для блока дисциплин этого профиля. Ряд представленных результатов полезен специалистам и аспирантам, специализирующихся в указанной области. ...
Added: January 14, 2014
Akopov A. S., Beklaryan L. A., Saghatelyan A. K., Environmental Modelling and Software 2019 Vol. 116 P. 7-25
Urban greenery such as trees can effectively reduce air pollution in a natural and eco-friendly way. However, how to spatially locate and arrange greenery in an optimal way remains as a challenging task. We developed an agent-based model of air pollution dynamics to support the optimal allocation and configuration of tree clusters in a city. The Pareto ...
Added: February 24, 2019
Samodurov V., Kornilov V., Isaev E., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 176-186
The main threats to the reliability and information security data centers are designated and systematized. In first there are the technical threat of failure of the life support systems of various DC: server nodes, power system, air-conditioning, fire-fighting, provider's lines, cable systems, etc. In second there are external threats: in particular, the threat of DDoS-attacks ...
Added: February 19, 2015
Vikentyeva O., Deryabin A. I., Shestakova L. V., International Journal "Information Theories and Applications" 2015 Т. 22 № 2 С. 169-182
In this paper we continue the investigation related to the develpoment of tools for the design and implementation of computer business games, aimed at creating a certain level of competence in the process of realization of the scenarios defined by models of applied domain. ...
Added: July 15, 2015
Serova E., Guryeva I., Khvatova T., International Journal of Technology and Human Interaction 2018
In such a socially significant sphere as healthcare industry, innovation activity has become vital especially in such areas as automation of physician working place, creation of unified electronic medical record, distribution of intelligent decision support systems for medical solutions, application and wide dissemination of new medical technologies, telemedicine development. The intersection of medicine and ICT ...
Added: March 15, 2018
Хивинцев М. А., Akopov A. S., Бизнес-информатика 2013 № 3(25) С. 35-41
In the article is presented a novel approach to the solution of multi-objective optimizing problems of large-scale dimension systems realized, in particular, in the simulation systems of the class AnyLogic through distributed calculations. A new concept of creation of the distributed evolutionary network is suggested, based on splitting of space of required variables into clusters ...
Added: October 3, 2013
Baranov P., Системы высокой доступности 2014 № 4 С. 94-98
During creation of a centralized identity management IT-service the IT-project's management division faces necessity of making a number of decisions that influence the project as a whole and could be crucial for its overall success. These decisions include: automation processes' selection (creation, modification, removal of user identities, user rights' reconciliation), managed IT-systems' user rights role ...
Added: February 11, 2015
Guimarães R. R., Passos L., Filho R. H. et al., IEEE Network 2019 Vol. 33 No. 2 P. 126-131
Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors or malicious attacks, just to name a few. In this article, we introduce an anomaly detection-based OPF classifier in the ...
Added: December 19, 2018