Browsing by Author "Opirskyi, I.R."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Аналого-дискретний пристрій, захищений від витоку побічних електромагнітних випромінювань. ANALOG-DISCRETE DEVICE PROTECTED FROM CONTINUOUS ELECTROMAGNETIC RADIATION(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Опірський, І.Р.; Opirskyi, I.R.; Гаранюк, П.І.; Haraniuk, P.I.; Березюк, Б.М.; Bereziuk, B.M.; Ракобовчук, Л.М.; Rakobovchuk, L.M.The design of an analog-discrete device is developed. Its feature is the absence of external voltage sources, converters and voltage dividers, and thus protected from leakage of side electromagnetic radiation. Since the electro-optical effects in liquid crystals have a threshold character, this property will lie at the basis of the use of liquid crystals to create indicators with a low level of radiation. These indicators are distinguished by a low power consumption, high reliability, simple design and low cost. The transformation of an electrical signal into an optical counting occurs in a liquid crystal display. This is achieved due to the fact that the reference electro- optical elements are connected with a voltage divider, whose role is performed by a high-level electrode, which is contained inside the indicator. The electro-optical reference elements are formed by mutually penetrating combing electrodes placed on the same glass substrate of the indicator. This greatly simplifies the technology of manufacturing the device, because the thickness of the layer of liquid crystal becomes insignificant and there is no need to strictly withstand it. The measured voltage is applied to contact pads, which are located at the ends of high-level electrode, which acts as a voltage divider. From the divider, the voltage is fed to one part (upper) of the comb electrodes, and to the second part (lower) of the electrodes, mutually penetrating with the help of a low-anode electrode. The topology of electrodes, including comb, is performed by milling fine films with an argon laser. In the study, we found out the criterion of the possibility of constructing a reference device with different degrees of reference, which uses the electro-optical effect in a liquid crystal with threshold voltage. And it has been shown that if such equality is not fulfilled, it is necessary to change the levels of voltage reference. The results of studies and calculations of the device on the twist effect and the effect of dynamic light scattering are presented. The results of experimental studies are quite consistent with the calculations, which testifies to the possibility of practical application of an analog-discrete display unit.Item Оцінювання ймовірності реалізації загроз інформаційній системі на різних рівнях стеку ТСР/ІР. EVALUATION OF THE POSSIBILITY OF REALIZING OF THREATS TO THE INFORMATION SYSTEM AT DIFFERENT STAGES OF TCP / IP(2018) Опірський, І.Р.; Opirskyi, I.R.; Тишик, І.Я.; Tyshyk, I.Y.In the paper the basic classical models of security informational systems and their description are given. Statistical analysis of attempts of information threats in information systems with open architecture is carried out. The simulation of the probability of threats to information at different levels of the protocol stack TCP/IP is conducted, the simulation results are analyzed. In order to determine the effectiveness of the implementation of information threats to information systems with open architecture, the task is to carry out a statistical analysis of the attempts to implement information threats in such information systems, to simulate the probability of implementing threats of information in information systems at different levels of the TCP / IP protocol stack, to analyze the obtained probability of implementation threats to information in TCP / IP-based information systems. Graphs of time series are constructed that correspond to changes in the relative frequency of attempts to realize information threats from the registered time values and graphs of the experimental and theoretical normal distribution of the probabilities of realization of threats. It is resulted that the obtained average value as a whole (for network, transport and application levels) meets the criteria of reliability.It has also been shown that the non-compliance with the validity criteria of an assessment obtained on the basis of data on attempts to implement threats at the channel level is due to the large number of null values of relative frequencies, which is due to the very rare implementation of information threats at this level of the stack. As a result of the simulation, the significance of the statistical probability of realizing information threats in IP for each level of the TCP / IP protocol stack is obtained. It is established that the obtained values of the statistical probability of realization of information threats in general coincide with the theoretical values, which gives grounds to assert about the sufficient accuracy of an approximation and its applicability to assess the statistical probability of realizing the information threats at different levels of the TCP / IP protocol stack. In addition, since the likelihood of the implementation of information threats increases with each next higher level of the stack, it is obviously relevant for further development and implementation of security protocols at the higher levels of the TCP / IP stack.