Publication date: 2024-08-10 06:38:00
Authors: Melikov Agassi; Gasimov Vagif; Ahmadov Samur
Category: Computer Science
Summary: The relevance of the problem under study lies in the growing threat of cyberattacks and unauthorized access to corporate data. The need for
effective data management at the moment is due to the increased importance of securing corporate devices, which requires in-depth analysis and
understanding of the role of data management in this context. The aim of the study is to comprehensively analyze the role of information
governance in securing organizational technology. The used methods were: experiment, systematization, comparison, analysis, synthesis. The
main findings of the study emphasize the importance of information management in securing enterprise technology. The study involves the
development of a C++ program designed to simulate different scenarios of using data management strategies. This program is designed to
demonstrate the effectiveness of different information security techniques in organizational technologies. In addition, a comparative analysis of
data control techniques designed to protect organizational devices has been carried out. The results of this analysis are presented in the form of a
table that discusses the various aspects of information management in this context. And the developed structural diagram of information
management in organizations presents the main components and processes required to secure organizational technology. The paper also provides
examples of practical applications of data control techniques in large corporations, emphasizing their importance in protecting sensitive
information. This research makes a practical contribution by providing organizations not only with theoretical foundations but also with concrete
data governance strategies to enhance the security of corporate devices, which is essential for today’s companies in the face of growing cyber
threats. Limitations of the study include biases, simulated situations, and an inability to adequately address issues that arise in the actual world,
such as organizational culture and cyber threats.
Author keywords: Information Control, Cybersecurity of Technology Assets, Information Governance, Commercial Equipment Security, Information Security
Integration
Publication date: 2024-07-11 06:52:00
Authors: Achyutha Krishnamoorthy; Srinivas R. Chakravarthy; Agassi Melikov; Viswanath C. Narayanan
Category: Computer Science
Summary: This is the PREFACE to the Special Issue “Queueing-inventory: analytical and simulation
modeling and classical and retrial queues and inventory”. The year 2022 was the 30th anniversary
of Queueing-inventory. It was in that connection that the guest editors requested
Professor Endre Boros, the Editor-in-Chief of Annals of Operations Research, for permission
to guest edit a special issue. This was granted by the Editorial Board of the journal.
Author keywords: Queueing-inventory, Classical queue, Retrial queue, Classical inventory,
Retrial inventory, Analytical and simulation modeling
Publication date: 2024-03-19 06:56:00
Authors: Melikov, Agassi; Poladova, Laman; Sztrik, Janos
Category: Computer Science
Summary: A model of a single-server queuing-inventory system (QIS) with a limited waiting buffer for
consumer customers (c-customers) and catastrophes has been developed. When a catastrophe occurs,
all items in the system’s warehouse are destroyed, but c-customers in the system are still waiting
for replenishment. In addition to c-customers, negative customers (n-customers) are also taken into
account, each of which displaces one c-customer (if any). The policy (s, S) is used to replenish stocks.
If, when a customer enters, the system warehouse is empty, then, according to Bernoulli’s trials, this
customer either leaves the system without goods or joins the buffer. The mathematical model of
the investigated QIS is constructed in the form of a continuous-time Markov chain (CTMC). Both
exact and approximate methods for calculating the steady-state probabilities of constructed CTMCs
are proposed and closed-form expressions are obtained for calculating the performance measures.
Numerical evaluations are presented, demonstrating the high accuracy of the developed approximate
formulas, as well as the behavior of performance measures depending on the input parameters.
In addition, an optimization problem is solved to obtain the optimal value of the reorder point to
minimize the expected total cost.
Author keywords: queuing-inventory system; catastrophes; finite waiting room; steady-state probabilities;
space merging method; calculation algorithm