The research of levels of description of modern critical application systems

Authors

DOI:

https://doi.org/10.15276/opu.2.66.2022.13

Keywords:

critical application system, system description level, interdependent systems, system potential

Abstract

At the current stage of economic and technical development, one of the most important problems is maintaining the reliability and fault tolerance of critical application systems used in the management of nuclear power plants, air, rail and road transport, technological units in metallurgy, the oil and gas industry, etc. The general trend of the development of critical application systems is characterized by the following factors: an increase in the degree of complexity of control objects, an expansion of the composition and level of complexity of solved functional tasks, a reduction in decision-making time, an increase in the cost of errors and the probability of large-scale emergency situations. The main reasons for the escalation of dangerous situations are failures in critical application systems. The publication examines the concept of a critical application system, examines the question of levels of description of critical application systems, examines the issue of interdependent subsystems based on the concept of potential and information technologies supporting the reliability and fault tolerance of critical application systems. For such systems (power supply and energy supply systems, water supply and drainage, etc.), an urgent problem is to ensure the objectivity, reliability and adequacy of forecasting and prevention of dangerous and possible cascading effects that can lead to man-made accidents and catastrophes. This can significantly affect the functioning, stability and survivability of systems of critical application, the ecological and technogenic safety of the surrounding territories, and the safety of life of the population of Ukraine. In the event of damage to the system of critical application, which can be sudden and intense, it will lead to an emergency situation of a man-made nature.

Downloads

Download data is not yet available.

References

Ivanyuta S. Threats to critical infrastructure and their impact on the state of national security (monitoring of the implementation of the National Security Strategy). Analytical note. Кyiv : NISD, 2017. 10 p.

Romankevich V.A., Poleshchuk S.A., Potapova E.R. Analysis of hit possibilities multi-processor control system in a dangerous state with consideration performance of processors. Journal of Qafqaz university- Mathematics and computer science. 2014. P.2, N 1. P. 118–126.

Kosenko Yu., Safonov M., Kolenko V. Object-oriented approach in the step model of control of structural elements. Materials I of the International Scientific and Practical Internet conference. Problems and prospects of the development of science at the beginning of the third millennium in the countries. Pereyaslav-Khmelnytskyi. 2012. pp. 234–235.

Babych Yu., Babych M., Tonkonohyi V. Determination of individual characteristics of the subject of critical infrastructure, which affect the process of restoration of his professional knowledge in knowledge-oriented decision support systems. High technologies in mechanical engineering. 2014. Issue 1(24). P. 3–11.

Bolt I., van den Hoven M., Blom L., Bouvy M. To dispense or not to dispense? Ethical case decision-making in pharmacy practice. International Journal of Clinical Pharmacy. 2015. Vol. 37, № 6. P. 978–981.4. Kosenko Yu., Roslyakova S., Nosov P. The system of identification of functional entropy of the subject of critical infrastructure. Collection of scientific works on the materials of the international scientific and practical conference. Contemporary trends in theoretical and applied research. Odessa. 2013. Issue 2. P. 50–54.

Accompanying document to the proposal for a Council decision on creating a Critical Infrastructure Warning Information Network (CIWIN) – Impact assessment (SEC/2008/2702). URL: http://eur-lex.europa.eu.

Чумаченко С., Кутовий О., Михайлова А. (2020) «Застосування експертно-аналітичних методів для оцінювання загроз об’єктам критичної інфраструктури оборонно-промислового комплексу на сході України. Науковий журнал «Інженерія природокористування». 2021. (4(18). C. 114–123. DOI: 10.37700/enm.2020.4(18).114-123.

Klyatchenko Y., Tarasenko V., Boyarinova J., Kalynovskiy Y. (2013). Vector Functionally-Oriented Processors with Vertical Parallelism for Operations on Quaternions. Advances in Electrical and Computer Engineering. 2013. 13, N. 4. P. 65–68.

Lunova O.V. The modeling of scenarios for techno-ecosystem development. Geo-Technical Mechanics Collected of Scientific Papers. 2018. 143. P. 40–48 DOI: https://doi.org/10.15407/geotm2018.143.040.

Gateway Redundancy Using Common Address Redundancy Protocol (CARP) / R. Nur, Z. Saharuna, I. Irmawati, I. Irawan, and R. Wahyuni. IJITEE (International Journal of Information Technology and Electrical Engineering). 2019. V. 2, № 3. P. 71.

Defining Homeland Security : Analysis and Congressiona l Considerations : Report for Congress R42462 / Congressional Research Service. 2012. April 3. 15 p.

Downloads

Published

2022-12-02

How to Cite

[1]
Babych, Y., Babych, M., Pavlishko, A. and Mamedova, A. 2022. The research of levels of description of modern critical application systems. Proceedings of Odessa Polytechnic University. 2 (66) (Dec. 2022), 110–115. DOI:https://doi.org/10.15276/opu.2.66.2022.13.

Issue

Section

Informacion technology. Automation