In the digital age, the role of information technology and computer processes is growing. This requires refining the development of software by optimizing the communications between program components and seeking effective interaction in the implementation of processes. Complex module structures are usually developed, which require high compatibility between components and their proper functioning. The purpose of this article is to propose an approach for investigation of a set of connected computer processes executed on a macro level by using deterministic modelling. A formal technological procedure for conducting a deterministic investigation of the interaction between processes was developed. It allows for the transition from the object-original to an adequate mathematical model with its program realization. The core of the constructed procedure is the phases “mathematical formalization”, “mathematical description”, and “program realization”. The goal was to present an application of the procedure to investigate all possible realizations of connected processes, presented as nodes in a directed graph scheme of algorithms by determining the reachability. The program language APL2 was used as a tool for program description of the defined mathematical models, which were realized in the software system TryAPL2 for research automation. A preliminary mathematical formalization of interacting processes was made by presenting an example graph scheme and its transformation into an ordered structure. On the basis of the mathematical description, we developed two program models for automation of the transition to an ordered graph scheme and determination of all possible paths in it for activation of sequences of processes. The proposed models are part of a generalized environment for program investigation of the computer processing organization.
The investigation of characteristics of access and use of resources in different distributed environments in the network space is aimed at determining optimal levels for the basic parameters of the supported processes. On the other hand, with the development of the possibilities of the digital space and the significant change in the level of informatization of the society, it is necessary to take the necessary measures to ensure secure access to information resources and in particular to the profiles of personal data. In this respect, the purpose of the article is to propose an organization of heterogeneous environment with resources stored in different places (own memories and cloud data centres). A general architecture and functionality of the main sub-systems are presented. Deterministic model investigation by using Petri Net apparatus based on preliminary formalization is provided to analyse the effectiveness of the processes for regulated and secure access to resources.
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.
The purpose of the virtual laboratory is to propose an intellectual space for organization of the on-line work in specialized field of knowledge. The research presented in this paper is linked with the research carried out within the frame work of a two year scientific project. The main goal of the project team is to develop a Virtual Research Laboratory (VRL) as a collection of relatively independent distributed virtual mediums, search machine, software instruments and tools for specific research organization in the field of the modern electronic and computer technologies. The life cycle models for software development propose a system investigation and evaluation by using suitable apparatus to determine the adequate structural organization during the phase of the architectural design. In this reason, the goal of this paper is to present an investigation of the defined architecture by using the asynchronous apparatus of Petri Nets (PN) as a second phase of the project work concerning the VRL development. The PN model defining and the carried out research are based on the results obtained during the first phase of the project work-conceptual model defining, formalization, preliminary evaluation and general architecture building. The formal description is based on the fact that each process of the information servicing in the virtual environment could be treated as a sequence of events (states) that generates requests for access to different information resources (relations) via Internet. This formal description permits to make a deterministic model of the information service as a sequence of active events and transactions between them that could be realized by the asynchronous PN apparatus. The defined PN-model describes the evaluated object as a sequence of events (presented by transactions) that could be realized if all related conditions (presented by input places) are fulfilled. In this reason the PN model describes the information servicing in the evaluated VRL as a collection of transactions and position with defined relations between them. Some important experimental results and assessments are discussed.
Contemporary digital age proposes different opportunities in the public, social, private, and business areas based on remote access to distributed resources placed in virtual, cloud, educational, governmental, business, smart, and so forth environments. In this reason, the e‐governance is realized on the basis of digital communications between different parties that requires strong protection of the information resources and personal data. The digital sustainability is an important task for e‐governance in the digital world. Article deals with principles of correct protection of the information resources (including in the cloud) by using strong procedures for access regulation of the external clients. Organization of Information Security Management System for identification, registration, authentication, and authorization of the requests is discussed. An investigation of the proposed functionality is made on the basis of stochastic analytical modelling by using the apparatus of Markov chains and statistical processing and interpretation of the obtained results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.