#4
Permanent URI for this community
Browse
Browsing #4 by Issue Date
Now showing 1 - 18 of 18
Results Per Page
Sort Options
Item СТАБІЛЬНВСТЬ АВТЕНТИФІКАЦІЙНИХ ОЗНАК ВНУТРІШНІХ ЕЛЕКТРИЧНИХ ШУМІВ КОМ'ПЮТЕРІВ. STABILITY OF AUTHENTICATION SIGNS OF INTERNAL ELECTRICAL NOISE OF COMPUTERS(2019) Нємкова, Олена Анатоліївна; Niemkova, Olena; Шандра, Зіновій Антонович; Shandra, ZinoviiThe article is devoted to an experimental study of the influence of external electromagnetic fields of various natures, as well as the most probable internal causes that arise during computer operation on authentication templates of internal electrical noise. As authentication templates of computer noise, bit and peak templates were used, which were calculated from the values of the normalized autocorrelation functions of discrete samples of internal electrical noise, as well as the corresponding thresholds were calculated. The use of such templates is possible due to the property of the autocorrelation function of stationary noise to maintain a constant shape. The presence of strong external electromagnetic fields can distort the noise measured by the ADC of the computer so that the distance between the current template and the template, measured in the absence of electromagnetic disturbances, is greater than the threshold. The instability of internal electrical noise may be due to the operation of a pulse- width converter of the power supply (DC/AC), which is possible with a variable load on the central processor. The effects of various factors that could be causing instability of internal electrical noise were measured using a laptop with a low noise level. It was experimentally proved that such factors as the operation of the central processor with an average load (the average load on the cores of the central processor was 68 %), the operation of the video card in the movie viewing mode (without sound), fluctuations in the external temperature from 5 °C to 36 °C, work office and household appliances, including mobile and radiotelephones, the conditions of electric transport do not affect the template within the authentication threshold. External factors that can significantly affect the pattern, such as intense electromagnetic radiation in close proximity to airports, broadcast towers, or in pre-thunderstorm weather, have a fairly low implementation risk, of the order of 3–5 %, therefore, re-conducting noise measurement at subsequent times will enable authentication.Item ТЕХНІЧНИЙ КОНТРОЛЬ ЯКОСТІ ОДНОСТРОЮ (ФОРМЕНОГО ОДЯГУ). TECHNICAL QUALITY CONTROL OF UNIFORMS (UNIFORMS-STYLE CLOTHES)(2019) Сергієнко, Любов Григорівна; Serhiienko, LiubovThe article deals with the peculiarities of technical control of uniform samples (uniform-style clothes). Technical quality control is the basis of any method of quality management as in Ukraine but also abroad. Quality control is understood as verification of conformity of quantitative, qualitative characteristics of products or process, on which the quality of products depends on the established technical requirements. Technical control of uniforms (uniforms-style clothes) includes checking the compliance of products (samples) with the established technical requirements and standard. Its essence consists in obtaining information about the state of the object of control and comparing the obtained results with the established requirements fixed in drawings, standards, supply contracts and the like. The current classifications of types and methods of garment control require improvement in accordance with each product range. The article considers the peculiarities of technical control of garments. The basic types of technical control, as well as methods of quality control of garments are defined. On the basis of the conducted analysis of types and methods of control the table of basic principles of carrying out of scientific and technical examination of samples of uniform (uniform- style clothes) is made. Research of types and control methods for uniforms (uniform-style clothes) was carried out by the method of theoretical and analytical research on existing classifications of types and control methods for garments. The novelty of receiving the findings lies in the fact that on the basis of theoretical research the objects, methods, means of checking the uniform samples are determined, and also the table of basic principles of carrying out the scientific and technical examination of the uniform samples (uniform-style clothes) is compiled. The author concludes that the process of scientific and technical expertise of items (kits) of uniforms (uniforms-style clothes) is an important milestone for obtaining high-quality uniforms (uniform-style clothes). The research results can be used in the process of scientific and technical expertise of items (kits) of uniform (uniform-style clothes).Item БАГАТОРІВНЕВА БЕЗПЕКА ІНФОРМАЦІЙНИХ СИСТЕМ. MULTI-LEVEL SECURITY OF INFORMATION SYSTEMS(2019) Дудикевич, Валерій Богданович; Dudykevych, Valerii; Микитин, Галина Василівна; Mykytyn, HalynaMulti-level Information Security (infosec) model of Information Systems (IS) is made of three levels: external, internal and mandatory security policy. External and internal security levels are based on conception “object – threat – protection”. Among the IS external security threats: the absence of zones of authorized access, unauthorized access (UAA) in the equipment repair mode, hardware and power supply failures. To protect information on IS external level are used: access control systems, radio frequency identification systems, closed circuit television, biometric systems that provides: access control and restriction, monitoring of buildings and rooms by using workstations, usage of passwords and employees’ access sharing , biometric protection against UAA. The threats of internal IS was considered: objective, subjective, casual, purposeful. Among the casual threats to IS security: failures and malfunctions of hardware, power supply failures, sensor glitches etc. Purposeful threats are based on offender’s behavior model and lead to leakage of confidential data, its unauthorized modification and its purposeful destruction. Technologies of providing infosec on hardware and software IS levels were presented. The infosec hardware levels provides: detection of tap devices, suppression of side electromagnetic radiation and interference etc. The infosec software level provides: subject identification/authentication, encryption of information resources, detecting software taps etc. Mandatory security policy provides a high level of information protection security due to the algorithm of countering information leakage from high- access objects to low-access objects. Multi-level IS security model is universal-designed and can be modified for informatization tasks and intellectualization of public infra- structure objects in the area of providing security infosec.Item ОСОБЛИВОСТІ ВИГОТОВЛЕННЯ ЧАВУННИХ ДЕТАЛЕЙ ЗІ ЗНОСОСТІЙКОЮ ТА УДАРОСТІЙКОЮ ЧАСТИНАМИ З ОДНОГО РОЗПЛАВУ. FEATURES OF CAST-IRON PARTS WITH WEAR-RESISTANT AND SHATTERPROOF PARTS FROM THE SAME MELTDOWN(2019) Фесенко, Максим Анатолійович; Fesenko, Maksym; Фесенко, Анатолій Миколайович; Fesenko, Anatolii; Кучинський, Юрій Дмитрович; Kuchynskyi, Yurii; Филь, Руслан Сергійович; Fyl, RuslanIn this article the results of researches concerning new technological methods of production of cast iron parts (castings) with differentiated properties in their local parts from the base melt melted in one melting aggregate are given. It is noted that using cast iron castings with differentiated properties is a promising area of various industries for the design of new machines, mechanisms and other special equipment with improved performance characteristics. It is stressed that cast iron parts with differentiated properties, especially with the combination of parts made of wear-resistant white and shatterproof high-strength cast irons, are practically not used in industry. The most widespread foundry methods of production of cast iron with differentiated properties have been analyzed and their main drawbacks have been revealed, which promoted the development of new foundry methods and conduction of corresponding researches. According to the new technological methods the differentiation of cast iron structure and properties in different parts of castings is achieved due to the in-shno- form processing of the base melt flow, which is melted in one melting unit, in separate reaction chambers of the casting system of the casting mold of carbido-utvoryuvalnym and spheroidalnym additives. This makes it possible to manufacture castings with a combination of the structure and properties of wear-resistant white cast iron and high- strength high-strength cast iron with spheroidal graphite, designed for use in shock- free as well as shock-abrasive wearing. Mathematical and physical modeling and full-scale experiments were carried out, which confirmed the possibility of realization of the proposed technological methods and made it possible to establish optimal conditions and modes of formation of differentiated structures and properties in castings. The advantages of the proposed technological methods of differentiating the structure and properties of metal castings, as well as the prospects of their use in various industries for a wide range of cast products are highlighted.Item ЗАСТОСУВАННЯ ЦІАНАКРИЛОВОГО МЕТОДУ ВИЯВЛЕННЯ ЛАТЕНТНИХ СЛІДІВ РУК ІЗ ВИКОРИСТАННЯМ ВАКУУМНОЇ КАМЕРИ. THE HARNESSING OF CIANOACRYLATE METHOD OF DETECTING LATENT HANDPRINTS USING A VACUUM CHAMBER(2019) Мамотенко, Петро Іванович; Mamotenko, PetroThe article highlights the mechanism of reaction between the esters of cyanoacrylic acid with amino acids and water contained in sweat and adipose substance. Examples of the suitability of the cyanoacrylate method for the detection of hand marks on different types of surfaces under study are given. It is noted that the proposed method is most suitable for the identification of hand marks on surfaces such as polyethylene films, cellophane, various types of metals and alloys, plastics, glossy dense cardboard, glossy and copying paper, smooth leather substitute. Attention is drawn to the fact that the method is not suitable for detecting traces on porous surfaces (paper, unpainted cardboard, wood, the like). It is emphasized that after detection of traces of cyanoacrylate, it becomes impossible to conduct biomedical studies of the sweat and adipose. The advantages and disadvantages of the cyanoacrylate method are analyzed, and the methods of its application with the help of cyanoacrylate chambers (atmospheric type and vacuum) and gas burners are given. The peculiarities of chamber design (atmospheric type and vacuum) are considered, comparative analysis is carried out, advantages and disadvantages of their use are shown, in particular, due to their design. Design and principle of functioning of the prototype of cyanoacrylate and vacuum chamber for detection of latent handprints developed by the State Research Institute of the Ministry of Internal Affairs of Ukraine in cooperation with Shostak V. V. on request of the State Research and Expert and Criminalistic Centre of the Ministry of Internal Affairs of Ukraine within the framework of the research and development work “Development and production of the prototype of the vacuum chamber for detection of latent handprints by cyanoacrylate method”, cipher “Vacuum” are considered. Highlighted the advantages of the developed prototype, in particular: the absence of overexposure of traces due to the exclusion from the process of polymerization of the “background” catalyst due to atmospheric moisture; uniform manifestation of handprints on long objects regardless of their position inside the working chamber due to the uniform distribution of cyanoacrylate vapor throughout the working volume and effective detection of traces, even on tightly adjoining surfaces. The necessity of equipping the forensic units of the Ministry of Internal Affairs of Ukraine with cyanoacrylate cameras and introduction of cyanoacrylate method to expand the possibility of detecting latent handprints and create conditions for increasing the efficiency of work of forensic experts.Item ПОБУДОВА МАТЕМАТИЧНОЇ ГРУПИ СИМЕТРИЧНИХ ОПЕРАЦІЙ НА ОСНОВІ ДОДАВАННЯ ЗА МОДУЛЕМ ДВА. THE SYMMETRIC OPERATIONS’ MATHEMATICAL GROUP CONSTRUCTING BASED ON MODULO-2 ADDITION(2019) Лада, Наталія Володимирівна; Lada, Nataliia; Козловська, Світлана Григоріївна; Kozlovska, Svіtlana; Рудницький, Сергій Володимирович; Rudnytskyi, SerhiiThe article is devoted to improving the quality of the stream ciphering systems for confidential information encryption through increasing the variability of cryptographic transformations by using a new group of two-operand two-bit operations synthesized basing on modulo-2 addition. For achieving the aim, a comparative analysis of two-operand operations with one-operand operations was performed, which showed that the first four operations can be obtained basing on the first four one-operand operations of the first operand processing, by adding the modulo-2 addition operation of their base operation of transforming the second operand, and by modulo-2 adding the basic operation of processing the second operand it can be obtained the other two-operand operations from inversion operations’ subgroups. The results of classifying a group of two- operand two-bit symmetric operations of information’s cryptographic transformation were visualized, which made it possible to establish relationships between groups of one-and two-operand operations. Basing on the obtained results, a method for synthesizing the operations’ group of modulo-2 addition is developed for stream ciphering based on the modulo-2 addition operation. The method’s crux is in the base group’s two-bit two-operand operations synthesis, based on combining the same basic operations of converting the first and second operands by modulo-2 addition. Constructing a complete mathematical group of these operations is carried out by the additional use of permutation operations and operands’ inversion of the base group operations. The application of the method allows synthesizing all the twenty-four modifications of two-bit symmetric modulo-2 addition operations based on applying the three basic one-operand two-bit operations of information cryptographic conversion.Item ОСОБЛИВОСТІ КОНСТРУКЦІЇ НАВЧАЛЬНО-ТРЕНУВАЛЬНОЇ ГРАНАТИ ЗВУКОВОЇ ДІЇ БАГАТОРАЗОВОГО ВИКОРИСТАННЯ. FEATURES OF THE CONSTRUCTION OF THE TRAINING GRENADE OF SOUND EFFECT OF MULTIPLE USE(2019) Марченко, Олександр Сергіович; Marchenko, OleksandrThe article considers the necessity of increasing the effectiveness of training of the staff of the subdivisions of the Ministry of Internal Affairs of Ukraine and the development of training aids for this purpose, in particular, the training grenade of sound effects of multiple use to strengthen the staff of the subdivisions of the National Police of Ukraine skills of safe behavior and effective use of flash-bang grenades “Teren-7M”. According to Article 42 of the Law of Ukraine “On the National Police”, a police commissioner to stop unlawful acts shall apply special means, a list of which is defined in Article 45 of the same Law [1]. At the same time, the level of professional training of an employee is determined not only by the ability to correctly assess the degree of necessity to use a special tool, but also by his or her ability to apply it effectively and to the maximum extent possible. Therefore, it is logical to conclude that the ability is acquired during training sessions. Creating reusable means of training is necessary for a positive solution to the issue of the important method of education, i.e. constant practice of special means application both during the educational process in educational institutions of the Ministry of Internal Affairs system and during regular trainings of personnel in the course of service, especially for practice of employee’s actions in extreme situations, such as counteraction to an armed offender. The necessity of creating a training grenade of sound effects of multiple use for training personnel in skills and techniques when using the light and sound grenade “Teren-7M”, which is due to the danger of this grant in case of violation of the rules of application, has been justified. For the purpose of choosing the optimal design of the training device, the analysis of the available training grenades for different purposes both in Ukraine and abroad was carried out. It has been established that in Ukraine there are training grenades for training personnel in the skills and techniques of using combat grenades (RGD-5, F-1 and others). According to the code, training grenades of sound impact are widely used, in which blank cartridges of different calibers are used to create a sound effect. However, such grenades cannot be used by the employees of the National Police of Ukraine, because their design does not fully reproduce the sequence of operations when using the light and sound grenade “Teren-7M”. Therefore, we have developed a design of the training grenade of sound effect of multiple use, which includes the possibility of conducting full-scale training, organized the development and manufacture of an effective model of training grenade, as well as testing its operability and handling comfort.Item ЗАБЕЗПЕЧЕННЯ НЕОБХІДНОГО РІВНЯ ЗАХИСТУ І КОНТРОЛЬ ЗАХИСНИХ ВЛАСТИВОСТЕЙ КЕРАМІКО-ПОЛІМЕРНИХ БРОНЕЕЛЕМЕНТІВ. PROVIDING THE REQUIRED LEVEL OF PROTECTION AND CONTROL OF THE PROTECTIVE PROPERTIES CERAMIC-POLYMER ARMOUR ELEMENTS(2019) Мазна, Олександра Вікторівна; Mazna, Oleksandra; Нешпор, Олексій Вячеславович; Neshpor, Oleksii; Самусь, Євген Вікторович; Samus, Yevhen; Вересенко, Юрій Віталійович; Veresenko, Yurii; Чижаньков, Євген Юрійович; Chyzhankov, YevhenRecently, light-armoured ceramics and combined materials containing layers of ceramics and polymer composites have been increasingly developed. According to the cost indicators, the possibility of using raw materials of domestic production, specific weight and high protective properties of the most acceptable for Ukraine ceramics from silicon carbide. When developing and manufacturing armoured structures, both for individual protection and vehicle protection, the greatest attention is paid to the physical and mechanical properties and specific weight of ceramics, but a clear relationship between mechanical properties and ballistic efficiency has not yet been established. Manufacture of ceramic-polymer protective products has the following mandatory stages of quality control: input control of materials, 100 % control of weight, geometric dimensions, protection area, availability of internal defects with the help of X-ray defectoscopic method. Thus, proper quality control at all stages of ceramic and polymeric protective products manufacture makes it possible to guarantee the necessary level of protective properties. However, it should be noted that ballistic tests have been and remain the necessary and most reliable method of monitoring the protective properties of armour protection products. Ballistic tests are carried out according to standard methods in accredited laboratories in the quantity approved for certain types of tests (certification, presentation, acceptance, periodic, etc.). World experience in developing and manufacturing armour-plated materials and structures shows that the implementation of high resistance to dynamic loads while maintaining the weight advantages (especially for individual protection and defense of aircraft) is associated with the use of ceramic elements with reactively baked silicon carbide or hot-pressed boron carbide (lighter than silicon carbide, but more valuable). Ballistic tests with the use of validated methods and ensuring the repeatability of the method remain necessary and the most reliable method of monitoring the protective properties of armour protection products.Item УДОСКОНАЛЕННЯ НАУКОВО-МЕТОДИЧНОГО АПАРАТУ З ВИЗНАЧЕННЯ ТА НОРМУВАННЯ ПАЛИВНОЇ ЕКОНОМІЧНОСТІ СПЕЦІАЛІЗОВАНИХ ТРАНСПОРТНИХ ЗАСОБІВ ДЛЯ ПЕРЕВЕЗЕННЯ ОСОБОВОГО СКЛАДУ ПРАВООХОРОННИХ ОРГАНІВ. IMPROVEMENT OF THE SCIENTIFIC-METHODICAL APPARATUS FOR DETERMINATION AND RATIONING OF FUEL EFFICIENCY OF SPECIALIZED VEHICLES FOR TRANSPORTATION OF LAW ENFORCEMENT PERSONNEL(2019) Смерницький, Дем'ян Вікторович; Smernytskyi, Demian; Гуляєв, Андрій Володимирович; Huliaiev, Andrii; Диких, Олександр Вікторович; Dykykh, Oleksandr; Кисіль, Микола Васильович; Kysil, MykolaThe article considers the specifics of using automobile transport for fulfilling official tasks of the units of the National Guard of Ukraine and the Central Bodies of the Executive Power related to the performance of law enforcement functions, in particular, armored special-purpose vehicles, which are created on the basis of the chassis of general purpose vehicles to perform certain functions with enhanced protection against means of destruction and used for various types of official tasks, such as transportation of personnel, intelligence, communication, material and medical support, etc. Necessity of development and manufacture of armored vehicles for various purposes for the units of the Armed Forces of Ukraine and the Central Executive Authorities and the National Guard of Ukraine is determined. Pressing and actual problem on improvement of fuel efficiency of modern technical means by analysis and search of possible ways of increasing efficiency of motor fuel use and estimation of influence of technical characteristics of a power drive on fuel efficiency are considered. The analysis of researches and estimation of fuel systems of automobiles, scientific- methodical device on a substantiation of methods of definition and planning of fuel efficiency of specialized vehicles depending on change of the basic constructive and other factors taking into account conditions of use on appointment is carried out. The urgency and practical significance of the research of the quantitative basis of the change of the linear fuel consumption at the known technical characteristics of the modern technical means depending on the main factors that are formed in the real operation are determined: the tasks that are performed by the modern technical means, the type and condition of the roads, the speed of movement and loading of the car. Core indicators that influence the calculation of fuel and economic characteristics of wheeled vehicles are enumerated. Justified necessity to improve the scientific- methodical apparatus for determination and standardization of fuel efficiency of modern technical means used in various operating conditions.Item SDR-ТЕХНОЛОГІЇ ПРИХОВАНИХ ЛІНІЙ РАДІОЗВ'ЯЗКУ. SDR-THECHNOLOGIES OF ÑOVERT RADIO LINES(2019) Євграфов, Дмитро Вікторович; Yevhraphov, DmytroThe possibilities of Software Defined Radio (SDR) – technologies in the correlation processing of linear-frequency modulated (LFM) signals are examined. The structure of the correlation receiver of maximum likelihood is justified using modern SDR technologies. Since the signal arrival time is unknown after analog-to-digital conversion (ADC), the signals are fed to the correlation processing channels and to the maximum selection device, the signals from which are sent to the decision-making device. The decision maker evaluates the message that is transmitted if the signals exceed a certain detection threshold. The influence of the amplitude quantization of the signal on the detection process is analyzed, since with insufficient ADC bit depth, the signal is simply lost in the quantization noise. It is shown that the existing ADC bits allow processing signals with large bases, which makes it possible to use SDR technologies to create correlation receivers of chirp signals. The synthesis results are illustrated by simulations in the software environment Mathcad and Excel. For comparison, the simulation results are presented at the output of a conventional digital receiver, with a bandwidth that is equal to the band of the chirp signal. It is shown that to solve the analysis problem in the future, it is necessary to use the apparatus of two-component Markov processes, which allows one to find the distribution of the absolute maxima of random processes and sequences obtained by their discretization.Item СИСТЕМА ПРОСТЕЖУВАНОСТІ - ШЛЯХ ДО БЕЗПЕЧНОСТІ ПІРОТЕХНІЧНИХ ВИРОБІВ. TRACEABILITY SYSTEM – THE WAY TO SAFETY OF PYROTECHNIC PRODUCTS(2019) Клименко, Алла Володимирівна; Klymenko, AllaThe Law of Ukraine “On Technical Regulations and Conformity Assessment” dated January 15, 2015 No. 124-VIII regulates that the products supplied to the market or placed into commission must comply with the regulations currently applicable in Ukraine (technical regulations, standards, product specifications) [1]. In other words, if the products are subject of technical regulations (TR), such products must undergo conformity assessment according to the procedures specified in the relevant technical regulations. Thus, the purpose of the article is proving that the traceability of pyrotechnic products allows tracing the history of the product and contributes to market surveillance. It allows the market supervision authorities identify responsible economic entities and obtain evidence of fireworks compliance with the established requirements. Traceability is important for ensuring effective compliance through market surveillance of corrective measures, including seizure and feedback. It is possible to trace the movement of hazardous or unsuitable products in the distribution chain and to define the role and responsibilities of the business entity in that chain. Traceability allows market surveillance authorities to track the movement of products to the factory gate and, in some cases, from the factory to the end user. According to the manufacturer, traceability is important because it makes effective control of the production process and suppliers to the sale of products, as well as control over the chain of distribution of products after their introduction into circulation. In the case of discrepancies, manufacturers can reduce the impact of recalls or withdrawals, depending on the accuracy of their traceability system. Manufacturers and importers should keep records of the registration numbers of the pyrotechnic products which they supply to the market and provide this information to the market surveillance authorities upon request. Information contained in the article may be useful for customers, business entities, representatives of market supervision, personnel, conducts conformity assessment, and other interested persons.Item ПУТИ ПОВЫШЕНИЯ ЭФФЕКТИВНОСТИ КРИМИНАЛИСТИЧЕСКОЙ ИДЕНТИФИКАЦИИ АППАРАТУРЫ ЦИФРОВОЙ ЗВУКОЗАПИСИ. WAYS OF ENHANCING THE EFFECTIVENESS OF FORENSIC IDENTIFICATION OF DIGITAL AUDIO RECORDING EQUIPMENT(2019) Рыбальский, Олег Владимирович; Rybalskyi, Oleh; Соловьев, Виктор Иванович; Soloviov, Viktor; Журавель, Вадим Васильевич; Zhuravel, VadymThe article deals with the issues of building a toolkit for diagnosing the originality of digital soundtracks and identification of digital audio recording equipment. One of the last variants of creation of the expert toolkit intended for identification of digital recording equipment is the “Fractal” toolkit, but its efficiency is reduced because identification signs are allocated from signals of pauses in the language information (pauses between words) recorded on a phonogram. The purpose of the article is to improve the expert toolkit for identification of sound recording equipment based on the fractal approach to the signals of its own noises. It is suggested to use the separation of hardware noises not only from pauses, but also from a mixture of signals with the entire duration of the phonogram. At the same time, the volume of information from which the identification features of the equipment are allocated increases significantly. Such separation of the own noise signals ensures the increased efficiency of the identification system. The proposed methods of separation and processing of self-similar structures from phonograms, used as identification features in the examination. One of the proposed methods is based on the separation of self-similar structures of the phonogram’s own noises along its entire length from their mixture with language and sound environment signals. The second method provides for mandatory building of error curves of the first and second types when developing the system. When building them, it is necessary to use a large amount of data that can be obtained from a limited number of phonograms by dividing them into separate sections of different lengths in automatic mode. It has been established that for phonograms lasting more than 20 seconds, the error curves are stable, in other words, they practically do not change. The degree of closeness of parameters of self-similar structures, separated from the compared phonograms, is offered to define as the module of distance between the normalized fractal curves, received at measurements of fractal characteristics. The proposed methods allow increasing considerably the efficiency of establishing the originality of soundtracks and identification of digital recording equipment during the expertise.Item СУЧАСНІ СПОСОБИ УНІФІКАЦІЇ ДЕТАЛЕЙ ОДНОСТРОЮ (ФОРМЕНОГО ОДЯГУ). WAYS OF UNIFYING THE DETAILS OF THE UNIFORM (UNIFORM-STYLE CLOTHES)(2019) Сергієнко, Любов Григорівна; Serhienko, Liubov; Ващук, Наталія Федорівна; Vashchuk, Nataliіa; Бакал, Віталій Павлович; Bakal, VitaliiIn the article modern unifying methods of clothes are considered, and also constructive and technological unification of uniform details (uniform-style clothes) are defined. Unification is the most common and effective ways of standardization. Unification of products is accompanied by revealing of optimum design and technological decisions and typing by combining (mix) the most successful design and technological decisions. Unification enables reducing the volume of design works and design period, reducing the terms of creation new equipment, reducing the cost of development of new products, reducing production costs, increasing the level of mechanization and automation of production processes. Unification improves product quality, reliability and durability through careful development of product design and manufacturing technology. The current methods of unifying details require improvement in accordance with the items of clothing. In the article the authors suggest the structure of the main objects of uniform details unification (uniform-style clothes) and the structure of the main principles of uniform details unification (uniform-style clothes). Research of constructive and technological unification of uniform details was carried out by a method of theoretical and analytical research of existing ways of clothes unification. The scientific novelty of the obtained results consists in the fact that on the basis of theoretical researches fundamental principles of uniforms details unification (uniforms- style clothes) are defined, and also on the example of modern subjects of police officers’ uniforms the table of the generalized unification of details of products is presented. Summing up, the authors conclude that constructive and technological unification of uniforms details (uniforms-style clothes) contributes to the generalization of mechanization and automation of processing of the most labor-intensive clothing units, as well as reduces the costs of equipment changeover and increases labor productivity. The results of the research can be used in the development of new subjects of uniform (uniform-style clothes).Item МЕТОД КОДУВАННЯ ЗНАЧУЩОЇ КООРДИНАТНО-ЯСКРАВІСНОЇ СКЛАДОВОЇ ВІДЕОЗНІМКА В ІНФОКОМУНІКАЦІЙНИХ СИСТЕМАХ. METHOD OF ENCODING THE SIGNIFICANT COORDINATE- BRIGHTNESS COMPONENT OF VIDEO IMAGES WITHIN INFO- COMMUNICATION SYSTEMS(2019) Бараннік, Володимир ВІкторович; Barannik, Volodymyr; Сорокун, Антон Дмитрович; Sorokun, Anton; Бабенко, Юрій Михайлович; Babenko, Yurii; Яковенко, Олександр Васильович; Yakovenko, OleksandrThe article is devoted to building the method of video encoding at the level of individual frames of the video stream in real time (in the process of transmission of video data to recipients) to improve the functioning of network multimedia video services due to the fact that the share of video data that are transmitted over the network is constantly growing. As a result, traffic becomes more complex, along with the intellectualization of network services. However, the quality of the video data received is constantly increasing. Thus, the task of increasing the efficiency of video services on the basis of information and communication networks remains relevant. This task can be solved as at the level of end nodes, and at the level of traffic management within the network nodes. However, the possibilities of such traffic management in conditions of its complexity are limited, because the overall load on the network remains constant. One of the most common and effective solutions is coding methods aimed at reducing the intensity of video data in the network. But the possibilities of traditional methods without further quality reduction have reached their theoretical limit. Under these conditions, the most rational methods are those that are based on eliminating new types of redundancy. This takes into account the fact that the method developed should provide redundancy without making additional mistakes. The method described in this article suggests an approach to building a code representation of a significant coordinate-brightness component of video. Coding is based on the description of the coordinate-brightness component in the form of a structural position number with global and local inequality of values of neighboring elements. This approach includes a two-hierarchical scheme of code value formation for a set of areas of coherence after an unequal sub-sample with the detection and exclusion of elements with equal values.Item ДІЯЛЬНІСТЬ ТЕХНІЧНОГО КОМІТЕТУ ТК 076 "ВІЙСЬКОВА ТЕХНІКА, ОЗБРОЄННЯ І ВИБУХОВІ РЕЧОВИНИ" У СКЛАДІ АВСТРІЙСЬКОГО ІНСТИТУТУ СТАНДАРТИЗАЦІЇ. ACTIVITIES OF THE TECHNICAL COMMITTEE TC 076 “MILITARY EQUIPMENT, WEAPONS AND EXPLOSION MATERIALS” WITHIN THE AUSTRIAN INSTITUTE OF STANDARDIZATION(2019) Подойніцин, Валерій Михайлович; Podoinitsyn, ValeriiIn the article the questions of organization, creation, formation, sphere of activity, goals and tasks of technical committee of standardization TC 076 “Military equipment, armament and explosives” are considered, structural subdivisions (working groups) of the mentioned committee working as a part of the Austrian institute of standardization are also submitted. Furthermore, it provides basic market information, which is based on the ÎNORMEN standards developed by the 076 Committee. Historical aspects of establishing a European defense agency are considered, as well as full names of the states agency’s members. A historical overview on creating the Austrian Institute for Standardization and the primary goals of the Institute is provided. Risk analysis was carried out in the development of national standards of the Republic of Austria, which belongs to the European Defense Agency and some international and regional defense organizations and standardization organizations. The primary task of the Austrian Institute for Standardization (hereinafter Institute) is developing and publishing Austrian standards. Additionally, the Institute cooperates with other national and international standardization organizations DIN, CEN, ISO and the like. Most of the standards currently applicable in Austria, more than 20,000 of them, belong to European origin. The share of European (and international) standards in the publication of Austrian standards is almost 80 %. However, there are a number of Austrian national standards.Item СЕРЕДНІЙ ЧАС ДО ПОЧАТКУ УСПІШНОГО ОБСЛУГОВУВАННЯ В ТЕЛЕКОМУНІКАЦІЙНИХ СИСТЕМАХ ІЗ ВИПАДКОВИМ МНОЖИННИМ ДОСТУПОМ ТА ВИЯВЛЕННЯМ КОНФЛІКТІВ. AVERAGE TIME BEFORE SUCCESSFUL MAINTENANCE IN TELECOMMUNICATIONS SYSTEMS WITH RANDOM MULTIPLE ACCESS AND CONFLICT DETECTION(2019) Єрохін, ВІктор Федорович; Yerokhin, Victor; Полякова, Анастасія Сергіївна; Poliakova, Anastasiіa; Сбоєв, Роман Юрійович; Sboiev, RomanAt present, the global growth of communication needs makes us more efficient in using of the frequency spectrum. The development of communication systems requires an increase of throughput, while the frequency spectrum is limited, which will not allow to increase the width of the channel or their number. Assuming that it is possible to transmit several interfering signals at one frequency, then the problem is to separate these signals. It is obvious that the complexity of demodulation procedures will increase significantly compared to the classical ones. Therefore, it is necessary to determine whether such an increase of complexity will be justified. To answer this question, you need to determine how the throughput of some random multiple access system, where multiple reusing of the frequency resource is possible, may increase. For the research carrier sense multiple access protocol with conflicts detection was chosen, which have become widespread in the packet networks for their successful combination of the relative simplicity of access algorithms and sufficiently high efficiency. The main characteristics of the random multiple access protocols are the throughput and the average time before the start of successful service and we choose the second for research. The purpose of the research is evaluation and comparative analysis of the average time before the start of successful service of varieties of multiple access protocols with carrier sense and conflict detection with additional assumptions about the conflicts resolving at the physical layer. The object of research is random multiple access communication systems. The subject of research is asymptotic methods for analyzing multiple access protocols. This method was first proposed by A. Nazarov. In this case, complete solutions can usually be obtained only in exceptional situations characterized by the forced imposition of rigid simplifying restrictions on the statistical nature of the processes in research. Due to these limitations, approximate solutions to the problem can be obtained with fairly broad assumptions about inbound flow statistics and service discipline, even in the absence of an explicit form of appropriate distributions. Therefore, estimates of the basic parameters random multiple access protocols can be obtained in a low-cost analytical way, without full-scale or simulation modeling.