Wyniki wyszukiwania

Filtruj wyniki

  • Czasopisma
  • Data

Wyniki wyszukiwania

Wyników: 2
Wyników na stronie: 25 50 75
Sortuj wg:

Abstrakt

A mathematical model is proposed that makes it possible to describe in a conceptual and functional aspect the formation and application of a knowledge base (KB) for an intelligent information system (IIS). This IIS is developed to assess the financial condition (FC) of the company. Moreover, for circumstances related to the identification of individual weakly structured factors (signs). The proposed model makes it possible to increase the understanding of the analyzed economic processes related to the company's financial system. An iterative algorithm for IIS has been developed that implements a model of cognitive modeling. The scientific novelty of the proposed approach lies in the fact that, unlike existing solutions, it is possible to adjust the structure of the algorithm depending on the characteristics of a particular company, as well as form the information basis for the process of assessing the company's FC and the parameters of the cognitive model.
Przejdź do artykułu

Autorzy i Afiliacje

Olena Kryvoruchko
1
Alona Desiatko
1
Igor Karpunin
1
Dmytro Hnatchenko
1
Myroslav Lakhno
2
Feruza Malikova
3
Ayezhan Turdaliev
4

  1. State University of Trade and Economics, Kyiv, Ukraine
  2. National University of Life and EnvironmentalSciences of Ukraine, Kyiv
  3. Almaty Technological University, Almaty,Kazakhstan
  4. Kazakh University of Railways andTransportation, Almaty, Kazakhstan

Abstrakt

In the article there are presented results of the study of the state of user competencies for different specialties of the university digital educational environment (UDEE) on issues related to information security (IS). The methods of cluster analysis and analysis of digital (electronic) traces (DT) of users are used. On the basis of analyzing the DTs of different groups of registered users in the UDEE, 6 types of users are identified. These types of users were a result of applying hierarchical classification and k-means method. Users were divided into appropriate clusters according to the criteria affecting IS risks. For each cluster, the UDEE IS expert can determine the probability of occurrence of high IS risk incidents and, accordingly, measures can be taken to address the causes of such incidents. The algorithms proposed in this study enable research during log file analysis aimed at identifying breaches of information security within the university's DEE.
Przejdź do artykułu

Autorzy i Afiliacje

Valerii Lakhno
1
Myroslav Lakhno
1
Kaiyrbek Makulov
2
Olena Kryvoruchko
3
Alona Desiatko
3
Vitalii Chubaievskyi
3
Dmytro Ishchuk
4
Viktoriya Kabylbekova
2

  1. National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
  2. Caspian University of Technology and Engineering named after Sh.Yesenova, Almaty, Kazakhstan
  3. State University of Trade and Economics, Kyiv, Ukraine
  4. Zhytomyr Politechnic State University, Zhytomyr, Ukraine

Ta strona wykorzystuje pliki 'cookies'. Więcej informacji