Journal Archive

Issue 3 (2023)

Methods and Means of Control in Organizational Systems
THE DIGITAL TRANSFORMATION OF STANDARDIZATION REQUIRES A SYSTEMATIC APPROACH AND PRACTICAL ACTIONS
Annotation: Digital transformation is one of the main trends in the development of modern industries. The development of such an area is impossible without the use of methods for assessing the effectiveness of the proposed activities in this area. The article discusses the process of digital transformation from a systemic perspective. A list of the main significant factors and the main limitations are proposed. A possible variant of the reference model for assessing the effectiveness of standards profiles is described. Attached is the 2024 Smart Standards Development Program.
Page numbers: 4-22.
DIGITAL TRANSFORMATION OF CORPORATE EDUCATIONAL PROCESSES
Annotation: General approaches to the digital transformation of corporate business processes in the conditions of the industrial revolution 4.0 are considered and classified based on the main technological "locomotives". Describes the need to create and support a unified corporate information environment of a modern enterprise. An example is given of combining training and development of employees' competencies with the implementation of basic corporate tasks with the help of an intelligent assistant working with the information repository of the enterprise. The tasks of corporate training and retraining of personnel within the framework of a single information environment of the enterprise are singled out.
Page numbers: 42-46.
System Programming
AN APPROACH TO CREATING A DYNAMIC SEARCH SERVICE FOR HIGHLOAD SYSTEMS
Annotation: There are a lot of high-load systems for searching various information using the Internet. However, such systems havedis advantages and various trade-offs. For example, the search speed may drop, the quality of the search result itself may not satisfy the user, or the search engine may have poor functionality for extracting or filtering data. This paper aims to solve this problem by analyzing existing solutions, considering various approaches and comparing modern frameworks and libraries. The main approaches that will be considered are the possibilities of data caching, searching for batches of information in the database, prioritization of requests, quickly finding similar information, and integrating the proposed solution with cloud platforms. As a result, it will be the service that is not so difficult to add into typical, ready-made systems, where a fast and fault-tolerant algorithm is required to search for information in the database. The service will also be tested in the company customer search system, to show the efficiency and effectiveness of the quick search solution.
Page numbers: 23-35.
System Analysis, Control and Information Processing
APPLICATION OF Q-LEARNING IN IMAGE RECOGNITION
Annotation: This article discusses the Q-learning algorithm based on the use of a neural network with a convolutional neural network architecture. In addition to that, the gradient descent method with the Adam optimizer and the Sparse Categorical Crossentropy loss function is also considered. The training methodology of the agent on examples from the MNIST training dataset and the computation of gradients using the backpropagation algorithm are described. Furthermore, the ε-greedy strategy is described, which is necessary to assist the agent in exploring different actions and choosing the optimal one based on the current state of the environment. Additionally, the article examines training parameters such as the number of epochs and batch size.
Page numbers: 36-41.
METHODOLOGY FOR ASSESSING THE EFFECTIVENESS OF TECHNICAL SUPPORT
Annotation: The purpose of the work is to develop a methodology for assessing the performance of university technical support staff, aimed at creating a universal tool for assessing the quality of services provided. An integrated approach that combines qualitative and quantitative indicators, allowing you to more deeply evaluate and improve your technical support processes.
Page numbers: 55-62.
Methods and systems of information protection
ASSESSMENT OF THE RELIABILITY OF SYMMETRIC AND ASYMMETRIC DATA ENCRYPTION METHODS AND HASHING METHOD
Annotation: The article discusses various methods of data encryption aimed at ensuring security. Experiments were conducted to compare the effectiveness of three methods: symmetric encryption, asymmetric encryption, and hashing. Security metrics such as cryptographic strength, encryption and decryption speed, and resistance to attacks were utilized to evaluate the reliability of each method.
Page numbers: 47-54.
Previous issue

Issue Archive