scholarly journals Organizational and Functional Structure of the System of Information and Analytical Management of Construction Waste Streams

Author(s):  
A. A Shuvaiev

Purpose. The main purpose of the work is to define and substantiate the principles, functional requirements and objectives of the implementation of information and analytical support for the management of waste streams of construction and wracking as secondary resources; development of the organizational and functional structure of the information-analytical management system, which would satisfy the conditions for the introduction of a logistical approach within the framework of integrated management of construction waste streams and became the basis for creating a single information platform. Methodology. As a methodological basis for the research of the process of managing the secondary resources streams and reversible streams in the construction industry, a logistic approach is used. It involves the analysis of factors influencing the system and study of its dynamic behavior as a complex adaptive system. The system approach in the development of information-analytical management systems involves solving the following tasks: development of a functional model of the management system of construction and wracking waste streams; construction of interaction matrices of automated processes and data routing processes; modeling the logical architecture of the data warehouses; development of a software and hardware set. Findings. The main tasks of developing information support for the logistics management system of construction and wracking waste streams are substantiated. The integration into the system of the following functional blocks is proposed: database formation; block for estimating the total economic costs of the process; environmental damage assessment blocks; information risk assessment; evaluation of alternative methods of waste stream management; optimal route formation block; visualization block. Based on the generalization of requirements and possibilities of the functionality analyzed information-analytical systems and requirements which would provide efficiency of construction waste streams management, the organizational-functional structure of the system of information-analytical management is proposed. Originality. The work gives reasons for the inclusion in the list of functional blocks of the organizational and functional structure of the information-analytical management system, which should be the basis for creating an information platform for the management of construction and wracking waste streams, environmental and information risk assessment. Practical value. Implementation within the information-analytical management of environmental damage assessment (as part of the efficiency assessment of the construction waste streams) and information risk assessment (as a tool of logistical approach) will provide the ability to predict key system indicators, make optimal decisions aimed at maximum inclusion of construction waste streams in the system as a potential secondary raw material, a sufficient level of economic and environmental efficiency with the optimal level of logistics costs.

Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2011 ◽  
Vol 71-78 ◽  
pp. 4341-4344
Author(s):  
Jin Wei Tu

The paper analyzes the development status of colleges, the actual problems the graduates meet in the course employment, and the design goals and principles of employee management system. SOA employee management system was designed which based on the above conditions. The system maximizes the information shared with other systems through the implementation of the SOA system. And the system manages the information of graduates efficiently through the internet information platform of local management information system.


Author(s):  
V.I. Kravchuk ◽  
◽  
A I. Korobko

Goal of the study is to improve the laboratory management system. The substantiation of principles classification and assessment of risks are carried out. The mind-activity methodology is used. To achieve the goal it is necessary to determine the source of risk, assess a scale of selected risk impact, establish reference (control) points, assess the risk, develop and implement corrective actions. Research methods. The mind-activity methodology is the basic method for research. Application to the risk management process of testing laboratory activities. The results of the study. The levels of the hierarchy are determined by the level of consequences (low, high, medium) from the onset of a negative situation. The phases are determined by the type (category) of risk by the stage of its determination. Forecasted risks are determined by the method of forecasting for a certain future period of time (for example, the next calendar year). In fact, identified are risks that have been identified and are aimed at the short-term perspective of their emergence. Not detected - risks remain identified and arise from the implementation of inappropriate preventive measures. These risks are stipulated by the uncertainty of the input information in the analysis of risks and the inadequacy of measures to eliminate possible negative consequences. The proposed risk classification system makes it possible to compile a “risk profile” of the laboratory. The "Risk-Profile" of a laboratory is a conditional indicator that characterizes the laboratory's ability to possibly provide unreliable test results. Conclusions. The mind-activity methodology was used. Principles, classification and risk assessment method have been developed for the testing laboratory. This made it possible to establish the relationship between the level of risk, its source and the period of exposure, as well as to identify the most vulnerable elements of the management system at a given time and to find ways to improve and search for opportunities. The scientific value of the study lies in the substantiation of the principles classification and method of risk assessment of the testing laboratory. The practical value of the study lies in the possibility of forming a "risk profile" of the laboratory, provides objective information about the current state of the laboratory management system and indicates possible ways of improvement.


Author(s):  
Juan B. Bengoetxea ◽  
José L. Luján ◽  
Oliver Todt

RESUMENDesde la década pasada, en la evaluación de riesgos se ha propuesto utilizar la información mecanística con un doble propósito: seleccionar guías de inferencia y realizar extrapolaciones inter-químicas para establecer categorías de tóxicos. En este trabajo se utilizan aportaciones procedentes del análisis filosófico de las explicaciones mecanísticas para analizar el concepto de información mecanística utilizado en la evaluación de riesgos. Categorizamos la información mecanística de los modos de acción en términos de explicaciones etiológicas que emplean bosquejos de mecanismos. El grado de detalle que ha de incorporar la información mecanística en la evaluación de riesgos dependerá, entre otros factores, de consideraciones pragmáticas respecto del uso posterior de dicha información.PALABRAS CLAVEINFORMACIÓN MECANÍSTICA, EVAVALUACIÓN DE RIESGOS, MODELO, BOSQUEJO, EXPLICACIÓN.ABSTRACTSince the 2000s, in risk assessment studies it is usual to use mechanistic information with a double aim: to select inference guidelines and to make inter-chemical extrapolations to categorize toxics. Here, we use the contributions made in philosophical analysis of mechanistic explanations to analyze the concept of mechanistic information used in the risk assessment. We classify mechanistic information, specifically that concerning modes of action, in terms of etiological explanations employing sketches of mechanisms. The grade of the details that mechanistic information must incorporate to risk assessment depends on, among other factors, pragmatic considerations on the further use of such information.KEYWORDSMECHANISTIC INFORMATION, RISK ASSESSMENT, MODEL, SKETCH, EXPLANATION.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Wenru Guo

With the development of science and technology, system management is gradually applied to tourism management. How to correctly assess the security risks of the tourism management system has become an important means to maintain passenger information. The security risk index of the travel management system is input into the PSO-BP network as a sample, and the corresponding risk value of the index is used as the network output. The results show that the error results, accuracy (96.53%), training time (216 s), number of iterations (275 times), and convergence speed are all better than traditional BP network. The relative error of PSO-BP network (0.32%) is better than that of BP network, with 300 iterations, and the error is close to 10–5. The average evaluation accuracy of S based on PSO-BP network is 99.72%, and the average time consumed is 2.512 s. It is superior to the evaluation model based on fuzzy set and entropy weight theory and the evaluation model based on gray correlation analysis and radial basis function neural network. In conclusion, the security risk assessment of the tourism management system based on PSO-BP network can effectively assess the security risk of the tourism management system.


2012 ◽  
Vol 16 (3) ◽  
pp. 407-419 ◽  
Author(s):  
Bhawna Singh ◽  
Anders H. Strømman ◽  
Edgar G. Hertwich

2008 ◽  
Vol 94 (14) ◽  
pp. 23-28
Author(s):  
Xin Ruan ◽  
Dezhi Xu ◽  
Liaojin Li ◽  
Zhiyong Zhang

Sign in / Sign up

Export Citation Format

Share Document