An increase in the extraction of resources is accompanied by their losses and dilution of ores due to the technogenic impact on ore-bearing massifs. The possibility of preserving the earth’s surface is provided by technologies with filling technological voids with hardening mixtures based on leach tailings, the insufficient activity of which is increased by processing in disintegrators under the influence of high energy. Experimental proof of the possibility of controlling the state of the hardening mixture was obtained in the course of many years of use of the disintegrator as part of the filling complex. The possibility of replacing cement with activated tailings has been proven not only as inert fillers but also as binders, which makes it possible to replace commercial cement with cheaper production of commercial products. Utilization of metals from enrichment tailings of various types of minerals allows the use of secondary tailings without restrictions on sanitary requirements. The combined effect of mechanical and chemical energies allows waste-free disposal of enrichment tailings and creates, in essence, a new base of metal raw materials to meet the needs of industry.
This paper analyzes the models and classification of secure resource management methods in distributed information communication networks in order to identify the most optimal model.
At present, the security of information systems plays a key role not only for large enterprises, but also for individuals. The information presented in the paper considers an innovative approach to the organization of multi-stage protection of information networks based on access matrices created and specified by data on the degree of criticality of protected files against illegal actions of third parties. The authors proposed to use several levels of criticality with three degrees: critical for program running; important for programs; not critical to programs. Besides, an algorithm for determining the criticality level by file extension as universal is proposed as the basic one. Timely response to changes in critical files not only of the operating system, but also of all programs significantly increases the security of enterprise systems. Moreover, the proposed method can be used to minimize the loss of important data.
Today, such areas as coal mining, construction of large facilities, providing enterprises with coal (crushed stone, sand, etc.) reserves, etc., face a problem of providing all employees of a coal mining company with equally understandable information. This is bound to different qualifications of the majority of employees. However, as practice shows, the meaningful use of geographic information systems requires certain skills. Based on the aforesaid, it is possible to conclude that in order to be equally able to use the same information system by different employees, its maximum visualization and simplification of the graphical user interface are required. The results of the studies made it possible to test the presentation pattern by grouping the main functions of the software.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.