Abstract

The activity of the executive bodies of the State power consists in making management decisions within the framework of the implementation of their powers. The effectiveness of this process is determined by the document flow and records management system (SEDD). The introduction of the SEDD is one of the priorities of the authorities of various levels, the successful implementation of which will ensure the transition to a higher level of their functioning. However, the implementation of the electronic document and office management system in the authorities is not fast enough. Thus, the relevance of the study is caused by the importance of increasing the efficiency of the electronic document circulation system in the executive bodies of the state power, which becomes possible only when applying mathematical models, modern and reliable algorithms and complexes of quality assessment programs according to certain criteria. The purpose of the study is to develop mathematical models, a software complex to improve the performance of executive bodies of state power. The authors have determined that the object of the study simulation is an electronic document circulation system. The main objectives of document flow modeling in executive bodies of state power are: to increase efficiency of management activity; accelerate the movement of documents; to reduce labour input of documents processing. The authors use the formalization method. The main conclusion of the research is, that by mean of using mathematical modeling, a mathematical model of business process optimization was built in the course of implementing an electronic document flow and office management system in the executive bodies of state power. A software package has been developed based on it software complex “Evaluation of management processes from the implementation of SEDD” has been developed in the programming environment C #, which is an object-oriented programming language and is based on a strict component architecture and implements advanced code security mechanisms.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.