2018 рік
Permanent URI for this community
Browse
Browsing 2018 рік by Issue Date
Now showing 1 - 20 of 80
Results Per Page
Sort Options
Item Загальні підходи до формування артикуляційних таблиць української мови для оцінки стану захисту складнозашумленої мовної інформації. GENERAL APPROACHES TO THE FORMATION OF ARTICULATION TABLES OF THE UKRAINIAN LANGUAGE TO ASSESS THE STATE OF PROTECTION OF EXCESSIVE NOISE SPEECH INFORMATION(2018) Нужний, С.М.; Nuzhnyi, S.M.; Заноскіна, П.В.; Zanoskina, P.V.The protection of speech information from leakage by acoustic and vibrational channels refers to the most important tasks of information security. The peculiarity of the current state is the existence of a significant lag of methods and devices of protecting the linguistic information in Ukraine from the possibilities of the malefactors to intercept and restore the information received. This is determined to the availability and approachable of high-sensitivity devices for malefactors, as well as the accelerated development of mathematical methods for digital processing of phonograms. A significant contribution to the urgency of the problem is the imperfection of the method of evaluate the level of protection of speech information. In Ukraine, the criterion of security is the value of the signal / noise ratio at the boundary of the controlled zone and its compliance with the normative value. This approach does not take into account the possibilities of noise clearing and restoration of the malefactor of intercepted language information.The use of active noise interference systems with a high level additionally leads to the formation of significant problems. In the USA and Europe the estimation of the speech information protection by objectivized methods is based on the speech residual intelligibility coefficient determination, which is calculated from the spectral analysis results. To undertake specialized experiments, it is necessary to develop formalized test signals synthesized on the basis of Ukrainian language articulation tables. Nowadays, there are no such tables, and there are no methods for synthesizing them. This does not allow determining the assessment of the level of protection of hard-noise speech information. The statistical researches the frequency of the use of the letters of the Ukrainian alphabet in the specialized texts of professional appointment are conducted. Categories “Information Security”, “Criminalistics” and “Economics” are considered. This approach allows developing recommendations for the synthesizing of articulation tables that will be adapted to the professional features of speech information on a particular object. The further research direction is to obtain the allophones use frequency and to synthesize the specialized complex articulation tables of the Ukrainian, English, Greek and Russian languages on the basis of the information obtained.Item Додатковий бронезахист транспортних засобів із використанням комбінованих кераміко-полімерних матеріалів(2018) Власов, В.А.; Нешпор, О.В.; Мазна, О.В.; Самусь, Є.В.The composition and structure of additional vehicle armor were investigated. It is shown that the structure of the combined material with the content of ceramic, polymer composite and metal layers is the most effective for the creation of promising protective structures. Designs have been developed for the additional protection of light-armored vehicles (LBT) against weapons of 12.7 and 14.5 mm caliber with the content of ceramic, fiber-polymer and metal layers. The increase of the level of ballistic protection and increased survivability of elements of the LBT structure, more than doubled weight compared to traditional metal armor, the possibility of easy dismantling and repair in field conditions are stated.Item Обгрунтування вимог до сучасного спеціального транспорту для проведення робіт із розмінування територій та перевезення вибухонебезпечних предметів і речовин(2018) Будзинський, М.П.; Диких, О.В.; Гусак, О.В.; Кисіль, М.В.Paper deals with the issues of carrying out activities on the demining of territories, transportation and liquidation of withdrawn explosive objects and substances. Analysis of foreign and domestic vehicles for the demining and transportation of detected explosive substances and objects to the places of destruction or storage is carried out; the basic requirements for modern special vehicles are developed.Item РОЗВИТОК КОНСТРУКЦІЇ КАЙДАНКІВ. DEVELOPMENT OF HANDCUFFS CONSTRUCTION(2018) Бакал, М.А.; Bakal, M.A.; Власов, В.А.; Vlasov, V.A.The paper is devoted to the analysis of the development of handcuffs structures. Today, police officers and other law enforcement officers prevent criminal acts, during the arrest and convoy of suspected persons or offenders, are widely used special means of restrictive action – handcuff. An analysis of available sources of information revealed the existence of bundles of various designs. Like any special tool, handcuff need to be improved in order to increase the effectiveness of their use, as well as the provision of such important requirements in the context of human rights protection as injury prevention. In the article, the authors, on the basis of popular scientific and technical sources, consider the development of the structure of the handcuffs, their characteristic design features and the peculiarities of their application. Research on the development of the design was carried out by analytical and observational methods. To study the principle of the mechanisms of modern chains, experiments were carried out on their application, with observance of safety rules when handling with special means. Scientific novelty of the study is to determine the term “handcuff” and their classification as a special type of special means on the basis of the reference area of the human body, on which they are fixed. A detailed classification of handcuffs construction is made on the basis of separate constructive solutions of handcuffs, made at different stages of their development. In the conclusions, the authors, on the basis of the analysis, draw a conclusion on the need to standardize the processes of development, improvement and industrial fabrication of the bundles by developing normative and technical documentation in which the general technical (in particular, constructive) requirements for the bundles will be determined, a clear classification of bands, definition terms and concepts, as well as requirements for the safety of the handcuffs. Materials of the research can be used in the development of the national standard on handcuffs, the draft of which is currently published on the official website of the State Research Institute of the Ministry of Internal Affairs of Ukraine.Item Побудова узагальненої математичної моделі групового матричного криптографічного перетворення. GENERAL CONSTRUCTION OF MATHEMATICAL MODEL OF GROUP MATRIX CRYPTOGRAPHIC TRANSFORMATION(2018) Сисоєнко, С.В.; Sysoienko, S.V.; Миронець, І.В.; Myronets, I.V.; Бабенко, В.Г.; Babenko, V.H.In the process of conducting this scientific research, the model for constructing a cryptographic transformation based on the use of two-operand operations has been improved by implementing hierarchical group transformation, and finding the new relationships between the direct and inverse operations to improve the encryption results. It is proposed to apply the method of increasing the stability of pseudo- random sequences to improve the quality of cryptographic transformation based on the hierarchical application of two-operand information transformation operations. The model of cryptographic transformation has been improved based on the use of two- operand operations, by implementing a hierarchical structure of the transformation to increase the results stability. A method has been developed for increasing the speed of implementation of a group matrix cryptographic transformation based on the proposed generalized mathematical model of a matrix of group cryptographic transformation by reducing the complexity of the construction and implementation of the inverse transform, which provided a reduction of mathematical complexity and speed cryptographic transformation. Based on the study of the mathematical model of two-operand group matrix cryptographic transformations, a generalized (by the number of operands) mathematical model of the matrix of group cryptographic transformation is proposed and its correctness is verified. Based on the generalized mathematical model of the matrix of group cryptographic transformation, a method is developed for increasing the speed of group matrix cryptographic transformation. According to the results of modeling and practical implementation of the developed method, quantitative characteristics of the decrease in complexity and increase in the speed of implementation of the mathematical model of the matrix of group cryptographic transformation were determined which depend on matrices of arbitrary dimension. On the basis of the mathematical apparatus of block matrices, the correctness of the generalized mathematical model for constructing the inverse group matrix cryptographic transformation was verified.Item Дальність дії тепловізора та чинники, які на неї впливають. ACTION RADIUS OF THERMAL IMAGER AND FACTORS AFFECTING IT(2018) Неня, О.В.; Nenia, O.V.Several technical and optical factors, observation conditions that affect the range (detection distance of thermal radiation) of thermal grids, including military ones, which are simultaneously the main criteria for their selection, are considered. Such concepts as “detection range”, “recognition,” and “identification,” characterizing different degrees of the vision of the target (object) with a thermal imager, are highlighted. Attention is drawn to a probabilistic index – the Johnson criterion, which, although it is probabilistic, since it depends on a number of random factors, is however the most universal and widespread one. It gives a forecast of the efficiency of the thermal imaging camera for solving a specific problem in certain conditions. Among the important factors affecting the range of action of thermal imagers, the thermal transparency of the atmosphere is considered. Since thermal radiation weakens due to the absorption of gas by molecules, dust, aerosols, etc., an important component of the effective operation of thermal imagers is the so-called “transparency win- dows” – spectral ranges convenient for their work. Among the technical factors that significantly affect the range of the thermal imager, paper details the resolution of its photodetector (or matrix), the dimensions of which (the number of sensitive elements (pixels) located horizontally and vertically) determine the final image clarity. An important parameter that significantly affects the range of a thermal imager is the focal length of the objective lens (lens) of the thermal imager, collects and focuses IR radiation on the matrix in accordance with the temperature distribution of the observed object. The radius of action of the thermal imager depends on the focal length of the lens, which also affects the so- called instantaneous sector of the system overview (IFoV) – the angular resolution of the system. The value of the focal length and angular resolution are inversely proportional, which is enshrined in the paper by mathematical calculations. Speaking about the focal length of the lens, we should not forget about the sharpness of the displayed space, which depends on the lens aperture, and which characterizes the degree of attenuation by the lens (lens system) of the infrared imager from the object of observation. Paper concluded that determining the range of the thermal imager, as a function of multiple variables, requires a fairly complex simulation.Item Синтез груп двохоперандних операцій криптоперетворення на основі перестановлюваних схем. SYNTHESIS OF GROUPS TWO-OPERAND OPERATIONS OF CRIPTOCONVERSION ON THE BASIS OF PERMUTATION SCHEMES(2018) Козловська, С.Г.; Kozlovska, S.H.Cryptography is one of the most effective means of data protection nowadays. One way of increasing the cryptographic algorithms stability is increasing their variability. Increasing the crypto algorithms variability directly depends on the number of cryptographic transformation operations, used in it. Using permutations in constructing modified operations is one of the effective means of expanding the capabilities of developers in building cryptographic algorithms. However, it was not paid enough attention to synthesis the operations’ mathematical groups on the basis of permutations. The purpose of the work is to construct a complete group of two-operand operations of cryptographic transformation, on the basis of the known, due to the establishment and application of permutational interconnections between the truth tables. The following research results were obtained while achieving the goal. In the course of the research, it was found that the permutation schemes for constructing truth tables of the cryptographic transformation of the two-operation sets of operations of the first mathematical group do not overlap. The complex of sets of truth tables of crypto transformation’s two-operand operations of the first mathematical group creates a complete group of sets of cryptographic transformation’s two-operand operations truth tables. The application of the rearrangement schemes group provides the construction of a cryptographic transformation operations complete group based on any of the operations of this group. The use of a group of permutation schemes allows you to build a complete group of permutation tables, presented both explicitly and in a formalized form. The obtained results allow making a conclusion that the application of rearrangement schemes’ constructed group will provide the construction of a complete group of sets of cryptographic transformation’s two-operand operations of an unknown group, based on one known operation. Rearrangement schemes for synthesis the truth tables of cryptographic transformation’s two-operand operations are constructed. It is established that the constructed schemes are not overlapped and create a complete group of sets for the truth tables synthesis. The application of the rearrangement schemes group provides construction the complete group of a cryptographic transformation’s operations, based on any of the operations, and also provides the construction of a complete group of tables of explicitly represented substitutions as well as formalized substitutions.Item Конструктивні особливості бронювання автомобілів. CONSTRUCTIVE FEATURES OF CAR ARMOURING(2018) Шевченко, В.О.; Shevchenko, V.O.Paper provides a brief historical reference on the creation of armoured vehicles. The relevance of armouring of means of moving people and cargoes is considered. There are historical examples of vehicles armouring. The countries-originators of cars armouring and the initial experience of their use in the First World War are noted. The directions and general technical requirements for the secret amour of socalled “civilian” armored cars are presented. The constructive features of car armouring of both serial cars and vehicles created for specific customer requirements are described. The description of processes of factory and cars armouring is given. Attention is focused on the principal differences and features, the pros and cons of such cars armouring are evaluated. Methods and options used in the creation of armored vehicles for the transportation of special vehicles are considered. The approaches to armour the cars and trucks are described. Various options for armour of cars for transportation of special vehicles are estimated. There are examples of the increasement of the cost of the car after armouring. The levels of secret car armouring are updated depending on the goals, cost of the work, the probability of attack and modern technical capabilities. The protective properties of the car armour made in accordance with the developed project of its armour protection have been evaluated. The examples of modern materials used for armouring cars are given, and their capabilities are assessed depending on the attack options on the object and the characteristics of the probable means of destruction. The so-called “opaque armour”, multilayer polymers and bullet-resistant glass are described. Examples of breakage of armour by means of defeat are given. The capabilities of various modern sniper complexes are evaluated and potential ways of protection against their use are analyzed. The constructive features of creating cars with secret armour are systematized in accordance with an improvement of the means of destruction, the capabilities of modern materials for armour protection and the trends of technical progress. An importance of using armoured cars is shown. General requirements for cars with secret armour are described: its so-called “armored capsules”, glass, door locks and hinges, engine and its systems, transmission, running gear, wheels, luggage compartment, bumpers, life support systems and a driver’s view. Several recommendations for the constructive features of secret car armouring are formulated depending on the specific requirements that will be applied to it. Attention is drawn to the importance of the issues of preserving mobility, safety, convenience and the specifics of driving an armored car.Item VIDEO ENCODING AND DECODING METHOD. Метод кодування та декодування відео(2018) Zybin, Serhii; Зибін, С.; Kis, Hennadii; Кіс, Г.Nowadays a multimedia content requires the improvement of communication technology. Compression is a process of data redundancy elimination or reducing. Effective storing multimedia and transmission of the data is an actual task. Inpainting can recover homogenous regions in a natural-looking manner, even when certain kinds of limited structure are present. However, conventional image inpainting is not effective at regenerating significant visual structure, especially if they are unique or have special, exact placement in the image. Method for vision-based image compression (HVS), e.g., compression based on structure-aware in-painting discarding regions where features are not detected. Such systems and methods significantly boost image (and video) compression and coding efficiency. The overall result of using the content information is a higher compression ratio than conventional techniques, especially for images that have some redundant visual structure, and a high perceptual fidelity to the original image.Item МІЖНАРОДНИЙ ПРИНЦИП ПРЕЗУМПЦІЇ ВІДПОВІДНОСТІ ТА ЙОГО ЗАБЕЗПЕЧЕННЯ В ДІЯЛЬНОСТІ ОРГАНУ З ОЦІНКИ ВІДПОВІДНОСТІ ДЕРЖАВНОГО НАУКОВО-ДОСЛІДНОГО ІНСТИТУТУ МВС УКРАЇНИ. INTERNATIONAL PRINCIPLE OF CONFORMITY AND ITS SUPPORT IN THE ACTIVITIES OF THE BODY OF AN ESTIMATION OF THE CONFORMITY OF THE STATE RESEARCH INSTITUTE MIA UKRAINE(2018) Клименко, А.В.; Klymenko, A.V.Reformation of the national system of technical regulation related with European legislation, the regulations of the World Trade Organization and international organizations for standardization – ISO, IEC, ITU – is a necessary condition for the effective economic development of Ukraine. Thus, one of the priority directions of state policy in a certain area is the process of gradual transition from compulsory certification of products to assessing their compliance with technical regulations requirements, regulated by the norms of the Bill of Ukraine “About Technical Regulations and Conformity Assessment” dated January 15, 2015, No 124-VIII. At the same time, the analysis of national and international legislation gave grounds for general conclusions that the introduction in Ukraine of the institution of conformity assessment to the requirements of technical regulations is carried out on the basis of and in accordance with European experience in the field of technical regulation, regulated according to the “New Approach” to technical harmonization and standardization and “Global Approach” in the field of conformity assessment. Thus, the definition of the effectiveness of the action in Ukraine of the “New” and “Global” approaches led to the relevance of this study. In particular, the article provides a brief description of the basic principles of the “New” and “Global” directives, establishing requirements regarding product safety, protection of workers’ health and the environment, as well as conformity assessment methods and is mandatory. It is determined that the “Global Approach” implies the establishment of uniform criteria for conformity assessment procedures and the appointment of special bodies that carry out these procedures (presumption of conformity). It is established that the accreditation carried out by the relevant national accreditation body of Ukraine is a new, mandatory, requirement for the appointment of conformity assessment bodies to perform functional tasks in accordance with technical regulations. Paper provides information on the scope of accreditation of the conformity assessment body of the State Research Institute MIA Ukraine, and its activities for compliance with the principles and criteria of the “New” and “Global” approaches are investigated, in particular, regarding the compliance with the international presumption of conformity principle as the necessary condition for the effectiveness of such activities.Item Дослідження матеріалів для захисту людини від шкідливих чинників навколишнього середовища. RESEARCH OF MATERIALS TO PROTECT HUMAN FROM HARMFULL ENVIRONMENTAL INFLUENCES(2018) Дячок, Т.М.; Diachok, T.M.; Березенко, С.М.; Bereznenko, S.M.; Бакал, В.П.; Bakal, V.P.; Александров, М.Є.; Aleksandrov, M.Ye.The paper is devoting to researching of properties of materials for protection of the person from harmful factors. The issue of protecting people from the influence of external harmful factors to date is very relevant. There are a number of factors, constitutes a threat to the human health in the process of life. The nature of the dangerous influence on the person of external factors is quite diverse by nature of origin, the nature of interaction with the organism and the consequences that cause the action of harmful factors. For protect against the influence of dangerous harmful factors, personal protective equipment is used, the leading place among which is the special protective clothing. When designing protective clothing, important to investigate the properties of materials, as well as the impact of the processes of clothing use on the properties of these materials. The analysis of harmful factors and the study of general properties of protective materials was carried out by analytical and observation methods. Investigation of the influence of operation factors on the change of the properties of textile materials for protective clothing was carried out by experimental method (for the experiment, a tear-off machine of the brand RT-250 was used). The scientific novelty determined by the influences of the washing process on the values of bursting and elongation during the rupture of materials for the manufacture of protective clothing (fabric CORDURA NIR and CORDURA MK, jersey Cool- Max). Based on the results of the study, the authors conclude that the wet processing improves the bursting characteristics of the materials being studied. At the same time, the authors emphasize the need for a comprehensive study of the quality indicators of the materials in question in order to fully determine their protective properties. In the conclusions, the authors suggest the use of investigated fabrics for the manufacture of protective clothing for protection against mechanical damage, and also indicate that the jersey under study does not lose the strength characteristics during washing. Research materials can be used to improve the design of clothing protective special.Item Спеціальні засоби, споряджені речовинами сльозогінної та дратівливої дії.Special Means Equipped with Substances of Tear and Irritant Action(2018) Марченко, О. С.; Marchenko, O.У статті розглянуто засоби активної оборони, споряджені речовинами сльозогінної та дратівливої дії (аерозольні та струменеві балони, пристрої миттєвого розпилювання подразнюючих речовин: газові гранати та патрони до газових пістолетів та револьверів), особливості їх застосування працівниками Національної поліції та Національної гвардії України під час охорони громадського порядку, перспективи підвищення ефективності їх використання за рахунок удосконалення конструкції та застосування додаткових пристроїв.В статье рассмотрены средства активной обороны, оснащенные веществами слезоточивого и раздражающего действия (аэрозольные и струйные баллоны, устройства мгновенного распыления раздражающих веществ: газовые гранаты и патроны к газовым пистолетам и револьверам), особенности их применения работниками Национальной полиции и Национальной гвардии Украины во время охраны общественного порядка, перспективы повышения эффективности их применения за счет совершенствования конструкции и применения дополнительных устройств.Paper deals with active defense means equipped with tear and irritating substances (aerosol and jet bottles, devices for instantaneous spraying of irritants: gas grenades and cartridges for gas pistols and revolvers), peculiarities of their use by the employees of the National Police and the National Guard of Ukraine during the protection of public order, the prospects of increasing the efficiency of their application by the improvement of the design and use of additional devices.Item Розвиток систем контролю доступу до транспортних засобів. DEVELOPMENT OF ACCESS CONTROL SYSTEMS FOR VEHICLES(2018) Білогуров, В.А.; Bilohurov, V.A.; Заїчко, К.В.; Zaichko, K.V.; Назарок, Д.С.; Nazarok, D.S.The paper deals with the confrontation between means and methods of illegal possession of vehicles or their disassembly, and means, which prevent the beginning of unlawful actions, and also hinder their completion. The subjects of consideration were mechanical devices, which blocked the opening of the door, hood, trunk of the vehicle, blocked the steering shaft, shaft gearbox to prevent theft. Automobile alarms without remote control and their vulnerability to the attacker are considered, possible ways to bypass signaling. With the development of threats to the property of citizens in the market began to appear means and technology in the field of protection against robbery. Over time, certain stages of development take place in the development of technology. The appearance of movable property such as motor vehicles has, to a certain extent, accelerated the development of protection. One of the areas of protection technology can be the protection of domestic and industrial premises, the protection of motor vehicles and etc. In the early stages of development, locking devices with physical keys were widely used. The history of the use of padlocks has almost a century history. The next stage in the development of access systems can be considered the emergence of alarms, which were included in the case of unauthorized entry into the vehicle. It should be referred to as mechanical and electromechanical devices with sirens and capacitive sensors, sensors for opening contacts or breaking the glass (vibrations) of the vehicle. The further direction in improving both ergonomic properties and increasing the stability from the influence of intruders can be considered the introduction of automotive signaling remote action. The article deals with the codes of increased stability: the double dynamic code D-2, the double dynamic code D-square, DID technology used in transponders-tags, through which the security system recognizes the owner. The dynamic code Time Code, in which the signal is encoded Radiant, contains information with a time label. The basic principles of signal coding are defined - Keeloq Code Hopping. The means of breaking alarms using the radio scanner, grader is considered. The functional and technical specifications of the modern remotely controlled car alarm system with multichannel control (8192 channels) and increased immunity from breaking code (DUPLEX DIALOG) and possibility of control from any point of the world (Bilarm GPS / GSM) are presented.Item ВИЗНАЧЕННЯ ПОНЯТТЯ "ХОЛОДНА ЗБРОЯ" В НАЦІОНАЛЬНИХ СТАНДАРТАХ УКРАЇНИ. DEFINITION OF THE CONCEPT OF “COLD ARMS” IN THE NATIONAL STANDARDS OF UKRAINE(2018) Коваль, М.В.; Koval, M.V.In the article, based on a detailed analysis of available scientific and legal sources, definitions of the concepts “Arms” and “Cold Arms”, attention is directed to the importance and necessity of building a precise definition of “cold arms”, with the aim of approval in the legislation of Ukraine. There are many shortcomings in native legislation, which require the earliest elimination. Among the objects of the rights of citizens and other entities the arms occupies a special place, of its specific properties. The category of “Arms” and “Cold Arms” is abstract, since it covers a multitude of diverse objects and devices that have various properties. Legislative acts of “Cold Arms”; they do not including classifications, which would cover the whole list, on which the relevant administrative-legal regime should be spread. In this regard, legal definitions of arms become defining value, as well as its legal classification is clearly defined, which became the basis for determining the content and also duties of the participants in the legal relationship, construction of the administrative-legal regime of arms circulation in Ukraine. Attempted overcome to controversial issues, that arise regarding the classification of Cold Arms in Ukraine, through the prism of the current native legislation was rendered. The problem issues of cold arms are considered in accordance with the specifics of its applications. Types of cold arms, its specification, method of manufacture and level of autonomy for certain historical and ethnic types. Taken cognizance into consideration the opinion of the scientists of the authors of criminal-law and forensic literature on the concept of Cold Arms. Set up of criminal liability for the use of Cold Weapons, the legislator proceeds from the public security of various acts, connected primarily with the that the use of arms in a certain way creates conditions for murder, causing serious harm to health, used in the execution of robberies and other serious crimes. Thus, the possibility of defeating a weapon at a distance actually excludes it from the category of Cold Arms, but this creates a gap, the essence of which is the impossibility of classifying a cold weapon that has a dual function. According to the modern methodology used by the Ministry of Internal Affairs of Ukraine (MIA of Ukraine) and the criteria it contains, not all knives, including those, may fall under the notion of Cold Arms, are namely Cold Arms. In practice, most of the errors occur when analyzing the subjective side of the acquisition, sale, wearing and manufacturing of Cold Arms. The criminal law provides for direct intent when committing these acts. The content of the intention should include the knowledge that the subject is a Cold Arms, and the actions what has been done, are socially dangerous. A number of conclusions and recommendations for the definition of “Cold Arms” are formulated.Item Методика й алгоритм структуризації задач управління телекомунікаціними мережами військового призначення.(2018) Бовда, Е.М.Paper deals with the analysis of management problems on the basis of two methods of an analysis of management functions: the method of streamlining information flows and the method based on the construction of the objectives of the structure. It is shown that in the systems of operational management (which are the part of the system of engineering) the design of their organizational structures should be based on a general methodological basis, which represents management activity as a purposeful (functional feature), which proceeds in the time (temporal sign) and spatial (spatial sign) framework. The procedure for identifying strongly bound tasks corresponding to the task of constructing rational areas of activity is given. Methodology and algorithm for vertical structuring of management problems, which can be applied to the analysis of the hierarchy of tasks solved by an organizational structure in control systems are suggested.Item Впровадження технології безконтактного обміну даними в телекомунікаційні системи.Implementation of the Technology of Contactless Data Exchange in Telecommunication Systems(2018) Ткаленко, О.М.; Tkalenko, O.Досліджено області телекомунікаційних систем, що працюють із технологією безконтактного обміну даними та області, у яких зберігається можливість упровадити NFC. Досліджено основні фактори, які стримують розвиток NFC в Україні, установлено фактори для активного розвитку технології в Україні, проаналізовано найважливіші відмінності між NFC і RFID. Розглянуто способи впровадження технології NFC, вибір правильного типу чіпа. Розроблена схема організації випробувальної установки для перевірки пристрою на відповідність вимогам безконтактного обміну даними. Запропоновано розширити сфери застосування NFC впровадженням технології в різні телекомунікайні системи.Исследованы области телекоммуникационных систем, работающих с технологией бесконтактного обмена данными и области, в которых есть возможность внедрить NFC. Исследованы основные факторы, сдерживающие развитие NFC в Украине, установлены факторы для активного развития технологии в Украине, проанализированы важнейшие различия между NFC и RFID. Рассмотрены способы внедрения технологии NFC, выбор правильного типа чипа. Разработана схема организации испытательной установки для проверки устройства на соответствие требованиям бесконтактного обмена данными. Предложено расширить сферы применения NFC внедрением технологии в различные телекомуникационные системы.Spheres of telecommunication systems working with non-contact data communication and area technologies in which there is an opportunity to implement NFC are studied The main factors hindering the development of NFC in Ukraine are investigated, factors for the active development of technology in Ukraine are detennined, the most important differences between NFC and RFID are analyzed. Methods of implementing NFC technology, choosing the right type of a chip are considered. The scheme of organizing the test facility for testing the device to meet the requirements of contactless data exchange is developed. It is suggested to extend the scope of an application of NFC by introducing technology into various telecommunication systems.Item Порівняльний аналіз протоколів множинного доступу з контролем несної та виявленням конфліктів. COMPARATIVE ANALYSIS OF MULTIPLE ACCESS PROTOCOLS WITH CONTROL OF THE BEARING ONE AND CONFLICT DETECTION(2018) Єрохін, В.Ф.; Yerokhin, V.F.; Полякова, А.С.; Poliakova, A.S.In the paper the equations of stationaries of protocols carrier sense multiple access with conflict detection and additional assumption about conflict resolution at the physical layer are considered. An analysis of the throughput increasing of communication systems with random multiple access with the introduction of the conflicts resolution procedure at the physical layer is carried out. For analyzing multiple access protocols the methods of probability theory, mass-service theory, and asymptotic analysis in the queueing theory are used. For carrier sense multiple access with conflict detection protocol construction the graphs and for the protocol analysis of the solution only pairwise conflicts and forbidden processing of single applications is substantiated. On the graphs, each vertex represents the state of the system. The edges of the graph are oriented and demonstrate possible transitions from one state to another. In the graph, draw only those edges are drawn that show transitions with non-zero probability. The convenience of this method of description of the queuing systems is in its clarity and the possibility of the implementation of a simple rule for the system of differential equations for the probability of queuing systems. Mathematical model of such a system of mass service was constructed. By further transformations, the transition to the stationary conditions was carried out. Requirements of the elementary stream with the parameter enter the service system with an infinite number of devices. It is shown that in comparison with the classical protocol, in assumption of pair conflicts resolving procedures at the physical layer, with such access protocol the throughput of the communication system will be significantly increased. The results of the throughput analysis of the few protocols are mentioned. Now it is possible to draw such conclusions that as the range of signals is stable and it is impossible to expand it, and the needs for communication transfer are growing, the introduction of demodulators capable of separating several inter-wining signals can significantly increase the throughput of channels. At the same time, there is the need to use new algorithms of multiple access protocols, the analysis of which shows the feasibility of their use.Item Діяльність технічного комітету стандартизації ТК-184 "Продукція спеціального призначення": сучасний стан(2018) Подойніцин, В.М.Paper deals with the organization, creation, formation and activities of the Technical Committee for Standardization TK-184 “Special Purpose Products”, as well as provides an information about the results of TC work for 2017.Item Передовий досвід техніко-криміналістичного забезпечення кінологічної служби в системі МВС України(2018) Лук'янчиков, Б.Є.; Лук'янчикова, В.Є.Paper highlights current issues of providing the Canine Service of the Ministry of Internal Affairs of Ukraine with technical equipment. On the basis of the analysis of the activities of national cynologist units, the relevance of the creation for these units of modern requisites for training and setting the smell of service-searching dogs is substantiated. A number of issues and difficulties that hinder this process are shown. Attention is drawn to the fact that as a result of the research work “Requisit-N”, “Requisit-B” and “Aport”, scientific results have been obtained that are aimed at implementation into the activity of practical subdivisions effective odor properties (imitators) of narcotic drugs and explosives, and also an improved container for their placement. Attention is drawn to the successful testing of the products in practical canine units of the Ministry of Internal Affairs of Ukraine.