Системи та методики обробки інформації
Permanent URI for this collection
Browse
Browsing Системи та методики обробки інформації by Issue Date
Now showing 1 - 12 of 12
Results Per Page
Sort Options
Item Загальні підходи до формування артикуляційних таблиць української мови для оцінки стану захисту складнозашумленої мовної інформації. GENERAL APPROACHES TO THE FORMATION OF ARTICULATION TABLES OF THE UKRAINIAN LANGUAGE TO ASSESS THE STATE OF PROTECTION OF EXCESSIVE NOISE SPEECH INFORMATION(2018) Нужний, С.М.; Nuzhnyi, S.M.; Заноскіна, П.В.; Zanoskina, P.V.The protection of speech information from leakage by acoustic and vibrational channels refers to the most important tasks of information security. The peculiarity of the current state is the existence of a significant lag of methods and devices of protecting the linguistic information in Ukraine from the possibilities of the malefactors to intercept and restore the information received. This is determined to the availability and approachable of high-sensitivity devices for malefactors, as well as the accelerated development of mathematical methods for digital processing of phonograms. A significant contribution to the urgency of the problem is the imperfection of the method of evaluate the level of protection of speech information. In Ukraine, the criterion of security is the value of the signal / noise ratio at the boundary of the controlled zone and its compliance with the normative value. This approach does not take into account the possibilities of noise clearing and restoration of the malefactor of intercepted language information.The use of active noise interference systems with a high level additionally leads to the formation of significant problems. In the USA and Europe the estimation of the speech information protection by objectivized methods is based on the speech residual intelligibility coefficient determination, which is calculated from the spectral analysis results. To undertake specialized experiments, it is necessary to develop formalized test signals synthesized on the basis of Ukrainian language articulation tables. Nowadays, there are no such tables, and there are no methods for synthesizing them. This does not allow determining the assessment of the level of protection of hard-noise speech information. The statistical researches the frequency of the use of the letters of the Ukrainian alphabet in the specialized texts of professional appointment are conducted. Categories “Information Security”, “Criminalistics” and “Economics” are considered. This approach allows developing recommendations for the synthesizing of articulation tables that will be adapted to the professional features of speech information on a particular object. The further research direction is to obtain the allophones use frequency and to synthesize the specialized complex articulation tables of the Ukrainian, English, Greek and Russian languages on the basis of the information obtained.Item Побудова узагальненої математичної моделі групового матричного криптографічного перетворення. GENERAL CONSTRUCTION OF MATHEMATICAL MODEL OF GROUP MATRIX CRYPTOGRAPHIC TRANSFORMATION(2018) Сисоєнко, С.В.; Sysoienko, S.V.; Миронець, І.В.; Myronets, I.V.; Бабенко, В.Г.; Babenko, V.H.In the process of conducting this scientific research, the model for constructing a cryptographic transformation based on the use of two-operand operations has been improved by implementing hierarchical group transformation, and finding the new relationships between the direct and inverse operations to improve the encryption results. It is proposed to apply the method of increasing the stability of pseudo- random sequences to improve the quality of cryptographic transformation based on the hierarchical application of two-operand information transformation operations. The model of cryptographic transformation has been improved based on the use of two- operand operations, by implementing a hierarchical structure of the transformation to increase the results stability. A method has been developed for increasing the speed of implementation of a group matrix cryptographic transformation based on the proposed generalized mathematical model of a matrix of group cryptographic transformation by reducing the complexity of the construction and implementation of the inverse transform, which provided a reduction of mathematical complexity and speed cryptographic transformation. Based on the study of the mathematical model of two-operand group matrix cryptographic transformations, a generalized (by the number of operands) mathematical model of the matrix of group cryptographic transformation is proposed and its correctness is verified. Based on the generalized mathematical model of the matrix of group cryptographic transformation, a method is developed for increasing the speed of group matrix cryptographic transformation. According to the results of modeling and practical implementation of the developed method, quantitative characteristics of the decrease in complexity and increase in the speed of implementation of the mathematical model of the matrix of group cryptographic transformation were determined which depend on matrices of arbitrary dimension. On the basis of the mathematical apparatus of block matrices, the correctness of the generalized mathematical model for constructing the inverse group matrix cryptographic transformation was verified.Item Синтез груп двохоперандних операцій криптоперетворення на основі перестановлюваних схем. SYNTHESIS OF GROUPS TWO-OPERAND OPERATIONS OF CRIPTOCONVERSION ON THE BASIS OF PERMUTATION SCHEMES(2018) Козловська, С.Г.; Kozlovska, S.H.Cryptography is one of the most effective means of data protection nowadays. One way of increasing the cryptographic algorithms stability is increasing their variability. Increasing the crypto algorithms variability directly depends on the number of cryptographic transformation operations, used in it. Using permutations in constructing modified operations is one of the effective means of expanding the capabilities of developers in building cryptographic algorithms. However, it was not paid enough attention to synthesis the operations’ mathematical groups on the basis of permutations. The purpose of the work is to construct a complete group of two-operand operations of cryptographic transformation, on the basis of the known, due to the establishment and application of permutational interconnections between the truth tables. The following research results were obtained while achieving the goal. In the course of the research, it was found that the permutation schemes for constructing truth tables of the cryptographic transformation of the two-operation sets of operations of the first mathematical group do not overlap. The complex of sets of truth tables of crypto transformation’s two-operand operations of the first mathematical group creates a complete group of sets of cryptographic transformation’s two-operand operations truth tables. The application of the rearrangement schemes group provides the construction of a cryptographic transformation operations complete group based on any of the operations of this group. The use of a group of permutation schemes allows you to build a complete group of permutation tables, presented both explicitly and in a formalized form. The obtained results allow making a conclusion that the application of rearrangement schemes’ constructed group will provide the construction of a complete group of sets of cryptographic transformation’s two-operand operations of an unknown group, based on one known operation. Rearrangement schemes for synthesis the truth tables of cryptographic transformation’s two-operand operations are constructed. It is established that the constructed schemes are not overlapped and create a complete group of sets for the truth tables synthesis. The application of the rearrangement schemes group provides construction the complete group of a cryptographic transformation’s operations, based on any of the operations, and also provides the construction of a complete group of tables of explicitly represented substitutions as well as formalized substitutions.Item Аналіз сучасного стану безпеки інтернету речей. ANALYSIS OF THE CURRENT SECURITY SITUATION IN THE INTERNET OF THINGS(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Кеньо, Г.В.; Keno, H.V.; Стосик, Т.Р.; Stosyk, T.R.The paper exzamines the problems of Internet of things security. An overview of the use of the Internet of things, dynamics of its distribution and improvement are made. The opinion of the leading experts of the IT industry about the problems of safety of “smart” devices are highlighted. On the basis of the reviewed literary sources, expert opinions of leading IT industry specialists, statistics and recent cases of Internet security breaches, the relevance of the topic and the current unsatisfactory condition of the industry are determined, which is a consequence of negligence, underestimation of threats and insufficient coverage of the issues in information sources. In a part of the work the actual problems of Internet safety at the level of its organization are considered, vulnerability of cloud service, untrusted gateway, wireless communication channels, implementation of authentication and device authorization are analyzed. It is shown that the main sources of vulnerability are Internet devices themselves, which often do not have any protection from cyber attacks. The reasons of unsatisfactory condition of Internet of things safety are analyzed, the existing threats and reasons of their occurrence are shown. It was revealed that the main reason for this situation is the lack of minimum security measures, including penetration tests, prohibition of simple passwords, etc., due to the desire to provide companies maximum producing profits. Cyber attacks on routers and IP video devices and the implications that they cause are listed. The present condition of the state and international regulation of the Internet of things problems, standardization and certification are analyzed. The main principles, the implementation of which are foreseen in the standards, are given. On the basis of the analysis, a list of recommendations and proposals aimed at minimizing threats to the Internet has been developed.Item Синтез обернених дворозрядових двохоперандних операцій строгого стійкого криптогорафічного кодування. SYNTHESIS OF THE INVERSE TWO-BIT TWO-OPERAND OPERATIONS OF STRONG CRYPTOGRAPHIC ENCODING(2018) Рудницький, В.М.; Rudnytskyi, V.M.; Лада, Н.В.; Lada, N.V.; Федотова-Півень, І.М.; Fedotova-Piven, I.M.; Пустовіт, М.О.; Pustovit, M.O.Construction the new algorithms of stream and block cipher is inextricably linked with the synthesis of new cryptographic transformation operations. Particular attention deserve the operations that in the process of information transformation on the basis of the subdued sequence provide the achievement of strong cryptographic encoding, which means the maximum uncertainty of the cryptographic transformation results. However, it was paid not enough attention to the synthesis of these operations nowadays, and the processes of constructing the inverse operations of strong cryptographic coding were not studied at all. The purpose of the work is to simulate the inverse two-bit two-operand operations of strong cryptographic transformation for usage in stream and block ciphers. For reaching the purpose, the necessity of using one subdued sequence for direct and inverse transformation was taken into account. An approach that allows synthesizing reverse operations for known direct two- bit two-operand operations of strong cryptographic information transformation, based on the technology of combining single-operand operations of strong cryptographic encoding, is proposed. The entire sequence of mathematical transformations, which provides the synthesis of a formalized operation model suitable for practical application in cryptographic primitives, is considered in the article on the example of one operation’s construction. Synthesized operations are implemented on the software level as well as on the hardware level, which provides an ease of reaching the effect of strong cryptographic encoding. Thus, the research made it possible to develop a model of an inverse two-bit two- operand strong cryptographic transformation. The combination of the obtained inverse transformation with the direct at implementation the method of increasing the stability and reliability of stream encryption will provide maximum uncertainty for the results of cryptographic transformation, regardless of the subdued sequences’ quality.Item Дослідження придатності електрокардіограм для біометричної ідентифікації. STUDY OF ELECTROCARDIOGRAMS SUITABILITY FOR BIOMETRIC IDENTIFICATION(2018) Хома, Ю.В.; Khoma, Yu.V.The article describes the requirements for biometric identification systems. It is also pointed out that electrocardiogram is a promising biometric marker for human identity recognition. This paper presents that ECG based biometric systems are almost insensitive to the type and parameters of the ECG measurement instrumentation, the length of records, the number of users in the database, as well as the classification algorithms based on different methods of machine learning. Additional focus on electrocardiogram acquisition for biometric systems has been made. A simple version of the signal aquisition system based on the Arduino Uno platform and e-Health Sensor Platform v.2.0 is presented. The content of the main stages of the signals and data processing in the ECG-based biometric identification system is described. The general research methodology was designed, in particular, for estimating the accuracy of different classification models. Four open-source electrocardiograms that have been used for conducting have been described in the paper. Also presented are six machine learning methods that were used to build a classification model for a system of biometric identification. Current research has shown that the parameters of the ECG measurement instrumentation, in particular the type of electrodes, the sampling rate, and the resolution of the ADC, do not significantly affect the identification of the results. A good correlation was found between the accuracy of all classification algorithms among different databases. It has been established that for well-balanced data, even for a few hundred users, simple algorithms such as k-nearest neighbors (KNN) and linear discriminant analysis (LDA) provide high-accuracy identification. The neural network classifier with one hidden layer also showed high accuracy and stability in all databases, but due to its computational complexity it is expedient to use it in biometric identification systems with heterogeneous datasets of electrocardiograms.Item Оцінка ефективності штучних нейронних мереж. EVALUATION OF THE EFFECTIVENESS OF ARTIFICIAL NEURAL NETWORKS(2018) Кунах, Н.І.; Kunakh, N.I.; Ткаленко, О.М.; Tkalenko, O.M.; Харлай, Л.О.; Kharlai, L.O.The purpose of the article is the use of artificial neural networks to improve the quality of images when increasing their permission. To achieve the goal, various types of most promising artificial neural networks were considered – mathematical models that describe the system of artificial neurons interconnected among them, as well as the implementation of these models. The analysis of modern interpolation algorithms, which include the initialization of paired points by the values of the reduced image, the metrics for assessing the quality of the algorithms; using artificial neural means to increase image resolution; methods of increasing the efficiency of artificial neural networks. A software implementation has been created using several interpolation algorithms and models of artificial neural networks. An analysis of modern approaches to solving the problem of increasing the resolution of images has shown that despite the existence of relatively fast and high-quality algorithms, new methods are constantly emerging. In recent years, artificial neural networks are increasingly used to solve this problem. In most studies, different implementations of the models of the curtain neural networks are used. The algorithms of bicubic interpolation, Lancosha filter, models of artificial neural networks SRCNN and SRGAN were studied in this work. The choice of interpolation algorithms is influenced by the fact that they are quite effective in terms of the ratio of the time of work and the quality of the result. Also, the choice is influenced by the fact that these algorithms are widespread and used in many applications. When comparing results with objective metrics, it can be noted that generative- competitive model copes with image processing more efficiently than the creeping neural network. But adapting such a model requires much more time. Using the generic-competitive network model to handle test images also takes a little more time than the rollout. But the result, which allows both models, far outperforms interpolation algorithms.Item Методологія інтелектуального управління маршрутизацією в конфліктуючих сесорних мережах варіативної топології. METHODOLOGY OF INTELLIGENT ROUTING CONTROL IN CONFLICTING SENSOR NETWORKS OF VARIABLE TOPOLOGIES(2018) Семко, О.В.; Semko, O.V.; Складний, П.М.; Skladannyi, P.M.; Семко, В.В.; Semko, V.V.; Бурячок, В.Л.; Buriachok, V.L.The complication of the topological structures of wireless sensor networks due to their variability determines the need to create new methods for managing data routing and parameters that determine the indicators of the reliability of the functioning of information-telecommunication and computer systems. Methods and algorithms for packet routing and data streams in heterogeneous sensor networks are based on multi- threading (multi-threaded) relay technology as a self-organized, dynamic, service- oriented network of variable topologies. Key elements of sensor networks of variable topologies are sensors that register changes in certain parameters and / or provide their transmission from source nodes to recipient nodes. Methods of artificial intelligence allow to determine the way of solving problems of data flow routing management by integrating the parameters of functioning of sensory networks of variable topology in conditions of guaranteeing reliability and synthesis and choosing guaranteed non- conflict routing management. The problems of synthesis and decision-making decisions concerning the management of data flow routing in conflicting sensor networks of variate topology in conditions of limitations and uncertainties are determined. The development and substantiation of the methodology of intelligent management of data flow routing in conflicting sensor networks of variable topology on the basis of the application of multiplicative theoretical models provides the opportunity to describe the processes of functioning of the network in the form of a mathematical model and a notation (language), which allows determining the optimal data transmission routes according to the criterion that takes into account Indicators (parameters) of indemnity under conditions of limitations and uncertainties. An approach to the creation of distributed intelligent routing management system in self-organized sensory networks is considered on the basis of the use of multilevel theoretical-plural and mathematical models that determine the essence of the system of intellectual control of an object.Item THE METHOD OF AUTHENTICATION OF LAPTOPS BY INTERNAL ELECTRICAL FLUCTUATIONS. Метод автентифікації ноутбуків внутрішніми електричними флуктуаціями(2018) Niemkova, Olena; Нємкова, Олена; Shandra, Zenovii; Шандра, Зіновій; Voitusik, Stepan; Войтусік, СтепанThe article is devoted to the method of authentication of laptops based on the correlation analysis of their internal electric fluctuations. The following results were obtained: the authentication of each laptop can be carried out uniquely by its internal electrical fluctuation; uniqueness of authentication is provided by the invariants of the autocorrelation function of fluctuations; the authentication sign is based on an analysis of the shape of the graph of the autocorrelation function. The authentication algorithm is presented.Item Розробка методу відокремлення цифрового зображення, збереженого у форматі без втрат, від зображення, збереженого із втратами. DEVELOPMENT OF THE METHOD OF SEPARATING DIGITAL IMAGE, STORED IN A LOSSLESS FORMAT, FROM STORED WITH LOSSES(2018) Бобок, І.І.; Bobok, I.I.Information integrity is one of the main properties of the information security object. Unauthorized actions on an image, using it as a container in a stenographical system, often lead to a difference in the format of the original image from the one whose integrity is violated. The establishment of the fact of such a format change is a pointer to the transformation of the image, to the violation of its integrity. The paper developed a method of separating a digital image, which was originally stored in a lossless format, from that which was saved to a lossless format from a losses format. The method is designed to determine the quality factor QF used in the primary compression. The basis of the method is the analysis of the normalized separation of the maximum singular numbers of blocks of the image matrix. The blocks are obtained as a result of the standard partition of the matrix. Concept of a pronounced local maximum of a function allowed automated the process of determining the quality factor QF of the primary compression of a digital image. Two algorithmic implementations of the method are proposed, which have high efficiency, which is determined by errors of the first kind. For one of the algorithmic implementations, errors of the first kind were not identified during the computational experiment. The average value of the number of errors in determining the quality factor QF of the primary compression of the original losses image was 7.5 % when using the first method for determining the pronounced local maximum and 6.5 % when using the second method. The computational complexity of the proposed algorithms of the developed method is determined by the number of blocks of the digital image that is subjected to expertise. For the image with the matrix became operations. If a color image is analyzed (for example, an RGB scheme), the proposed algorithms can be applied both to one (arbitrarily chosen) color component, and for each of them. The developed method is considered by the authors as the basis for developing a method for detecting violations of the integrity of a digital image under conditions of minor disturbances of the original image matrix.Item Полімери, що біологічно розкладаються, як замінники матеріалів синтетичного походження. BIODEGRABILITY POLIMERS AS SUBSTITUTES FOR SYNTHETIC MATERIALS(2018) Березненко, Н.М.; Bereznenko, N.M.; Неня, О.В.; Nenia, O.V.; Кучинський, Ю.Д.; Kuchynskyi, Yu.D.The attention is focused on the actual problem concerning the effective control of environmental pollution. It was pointed out that addressing environmental issues requires a comprehensive approach, which is implemented in particular in the National Strategy for Waste Management till 2030, which defines the general measures in the field of waste management in general and special measures in the field of management of certain types of waste. The purpose of this Strategy was to create conditions for raising the standard of living of the population by introducing a systemic and effective approach to waste management at various levels of state formation, offering methods and technologies for increasing the volume recycling for the further reuse of materials contained in waste, as well as reduction of volumes of formation of waste, especially of synthetic origin, such as polyethylene. With these matters cleared away, the paper highlights the idea of creating compositions and technologies for obtaining polymers that are capable of accelerated decomposition. And although the cost of producing traditional synthetic polymers and their products is much lower compared to the cost of polymers that are capable of accelerating the timetable, it is precisely the use of the latter to be a step in solving the problem of waste disposal. The article covers the results of research of several samples films, composite materials of accelerated decomposition containing different components in different proportions, after their containment in compost. In the studied compositions, the PEGT mark 15803-020 was chosen as a polymer matrix, starch – as the initiator of biological decomposition, cobalt stearate to initiate the photo-oxidation decomposition. The influence of microorganisms on the distribution of these polyethylene compositions is shown. According to the results of the study, a composition of a composite material (polyethylene) with a high decomposition index containing its composition, in particular concentrates of cobalt stearate, citric acid and starch was proposed. This material can become one of the effective solutions for the realization of the objectives of efficient waste management within the integrated waste management system.Item Оцінка ефективності світлосигнальної системи аеродрому в інфрачервоному діапазоні електромагнітних хвиль. ASSESSMENT OF THE EFFICIENCY OF THE AERODROME LIGHT SIGNALING SYSTEM IN THE RANGE OF INFRARED ELECTROMAGNETIC WAVES(2018) Головенський, В.В.; Holovenskyi, V.V.; Неділько, С.М.; Nedilko, S.M.; Лєнков, Є.С.; Lienkov, Ye.S.The reliable operation of the aerodrome lighting system is indispensable for the safety and regularity of civil aviation flights. It must meet all the requirements of all- weather conditions, dailiness and jamming resistance. At the present stage, the robot vision equipment is being developed, which, according to many technical and operational parameters, has advantages over lighting equipment, designed for visual perception of cues. The aerodrome beam signal complex is a rather complicated topological system that solves the problems of detecting, recognizing, identifying signals and objects. Maximizing the efficiency of the technical part of the complex requires the search for physical and technical possibilities for optimizing its components: radiation sources, atmospheric channel, optical system and photodetector. The specified group of components of infrared (IR) communication channel is multiplicative, that is expressed at the ratio of signal / noise at the output of the photodetector. The optimization of the radiation source in the lighting equipment is successful by replacing traditional incandescent lamps with LED (Light-emitted diode) lamps. However, the energy competitiveness of quasi-monochromatic semiconductor diodes of infrared radiation in comparison with thermal radiators is not obvious, since such sources also radiate most of the energy consumed in a wide infrared spectrum range. Therefore, a comparative analysis of the effectiveness of the signaling system in the IR wavelength range for two different sources was conducted: a semiconductor infrared diode and an ideal tungsten filament. For this purpose, a generalized formula is used to calculate the number of signal electrons on one pixel of the matrix photodetector for several atmospheric transparency windows. It is established that for a thermal vision camera of industrial production, the ratio of signal / noise of the IR diode of serial production (even with incomplete coherence of spectra) is 1.7 times more than for an ideal tungsten filament of equal power. When comparing signals in a common transparency window, the excess reaches 14 times. This result is achieved, despite the non-optimal conditions for using an IR diode due to its high energy efficiency. The results show that the IR beam signal system will have even higher performance with the absolute coherence of the IR diode radiation spectrum with the photodetector photosensitivity spectrum and the choice of working wavelengths within the atmospheric transparency windows.