#3
Permanent URI for this community
Browse
Browsing #3 by Issue Date
Now showing 1 - 19 of 19
Results Per Page
Sort Options
Item Дальність дії тепловізора та чинники, які на неї впливають. ACTION RADIUS OF THERMAL IMAGER AND FACTORS AFFECTING IT(2018) Неня, О.В.; Nenia, O.V.Several technical and optical factors, observation conditions that affect the range (detection distance of thermal radiation) of thermal grids, including military ones, which are simultaneously the main criteria for their selection, are considered. Such concepts as “detection range”, “recognition,” and “identification,” characterizing different degrees of the vision of the target (object) with a thermal imager, are highlighted. Attention is drawn to a probabilistic index – the Johnson criterion, which, although it is probabilistic, since it depends on a number of random factors, is however the most universal and widespread one. It gives a forecast of the efficiency of the thermal imaging camera for solving a specific problem in certain conditions. Among the important factors affecting the range of action of thermal imagers, the thermal transparency of the atmosphere is considered. Since thermal radiation weakens due to the absorption of gas by molecules, dust, aerosols, etc., an important component of the effective operation of thermal imagers is the so-called “transparency win- dows” – spectral ranges convenient for their work. Among the technical factors that significantly affect the range of the thermal imager, paper details the resolution of its photodetector (or matrix), the dimensions of which (the number of sensitive elements (pixels) located horizontally and vertically) determine the final image clarity. An important parameter that significantly affects the range of a thermal imager is the focal length of the objective lens (lens) of the thermal imager, collects and focuses IR radiation on the matrix in accordance with the temperature distribution of the observed object. The radius of action of the thermal imager depends on the focal length of the lens, which also affects the so- called instantaneous sector of the system overview (IFoV) – the angular resolution of the system. The value of the focal length and angular resolution are inversely proportional, which is enshrined in the paper by mathematical calculations. Speaking about the focal length of the lens, we should not forget about the sharpness of the displayed space, which depends on the lens aperture, and which characterizes the degree of attenuation by the lens (lens system) of the infrared imager from the object of observation. Paper concluded that determining the range of the thermal imager, as a function of multiple variables, requires a fairly complex simulation.Item Конструктивні особливості бронювання автомобілів. CONSTRUCTIVE FEATURES OF CAR ARMOURING(2018) Шевченко, В.О.; Shevchenko, V.O.Paper provides a brief historical reference on the creation of armoured vehicles. The relevance of armouring of means of moving people and cargoes is considered. There are historical examples of vehicles armouring. The countries-originators of cars armouring and the initial experience of their use in the First World War are noted. The directions and general technical requirements for the secret amour of socalled “civilian” armored cars are presented. The constructive features of car armouring of both serial cars and vehicles created for specific customer requirements are described. The description of processes of factory and cars armouring is given. Attention is focused on the principal differences and features, the pros and cons of such cars armouring are evaluated. Methods and options used in the creation of armored vehicles for the transportation of special vehicles are considered. The approaches to armour the cars and trucks are described. Various options for armour of cars for transportation of special vehicles are estimated. There are examples of the increasement of the cost of the car after armouring. The levels of secret car armouring are updated depending on the goals, cost of the work, the probability of attack and modern technical capabilities. The protective properties of the car armour made in accordance with the developed project of its armour protection have been evaluated. The examples of modern materials used for armouring cars are given, and their capabilities are assessed depending on the attack options on the object and the characteristics of the probable means of destruction. The so-called “opaque armour”, multilayer polymers and bullet-resistant glass are described. Examples of breakage of armour by means of defeat are given. The capabilities of various modern sniper complexes are evaluated and potential ways of protection against their use are analyzed. The constructive features of creating cars with secret armour are systematized in accordance with an improvement of the means of destruction, the capabilities of modern materials for armour protection and the trends of technical progress. An importance of using armoured cars is shown. General requirements for cars with secret armour are described: its so-called “armored capsules”, glass, door locks and hinges, engine and its systems, transmission, running gear, wheels, luggage compartment, bumpers, life support systems and a driver’s view. Several recommendations for the constructive features of secret car armouring are formulated depending on the specific requirements that will be applied to it. Attention is drawn to the importance of the issues of preserving mobility, safety, convenience and the specifics of driving an armored car.Item VIDEO ENCODING AND DECODING METHOD. Метод кодування та декодування відео(2018) Zybin, Serhii; Зибін, С.; Kis, Hennadii; Кіс, Г.Nowadays a multimedia content requires the improvement of communication technology. Compression is a process of data redundancy elimination or reducing. Effective storing multimedia and transmission of the data is an actual task. Inpainting can recover homogenous regions in a natural-looking manner, even when certain kinds of limited structure are present. However, conventional image inpainting is not effective at regenerating significant visual structure, especially if they are unique or have special, exact placement in the image. Method for vision-based image compression (HVS), e.g., compression based on structure-aware in-painting discarding regions where features are not detected. Such systems and methods significantly boost image (and video) compression and coding efficiency. The overall result of using the content information is a higher compression ratio than conventional techniques, especially for images that have some redundant visual structure, and a high perceptual fidelity to the original image.Item МІЖНАРОДНИЙ ПРИНЦИП ПРЕЗУМПЦІЇ ВІДПОВІДНОСТІ ТА ЙОГО ЗАБЕЗПЕЧЕННЯ В ДІЯЛЬНОСТІ ОРГАНУ З ОЦІНКИ ВІДПОВІДНОСТІ ДЕРЖАВНОГО НАУКОВО-ДОСЛІДНОГО ІНСТИТУТУ МВС УКРАЇНИ. INTERNATIONAL PRINCIPLE OF CONFORMITY AND ITS SUPPORT IN THE ACTIVITIES OF THE BODY OF AN ESTIMATION OF THE CONFORMITY OF THE STATE RESEARCH INSTITUTE MIA UKRAINE(2018) Клименко, А.В.; Klymenko, A.V.Reformation of the national system of technical regulation related with European legislation, the regulations of the World Trade Organization and international organizations for standardization – ISO, IEC, ITU – is a necessary condition for the effective economic development of Ukraine. Thus, one of the priority directions of state policy in a certain area is the process of gradual transition from compulsory certification of products to assessing their compliance with technical regulations requirements, regulated by the norms of the Bill of Ukraine “About Technical Regulations and Conformity Assessment” dated January 15, 2015, No 124-VIII. At the same time, the analysis of national and international legislation gave grounds for general conclusions that the introduction in Ukraine of the institution of conformity assessment to the requirements of technical regulations is carried out on the basis of and in accordance with European experience in the field of technical regulation, regulated according to the “New Approach” to technical harmonization and standardization and “Global Approach” in the field of conformity assessment. Thus, the definition of the effectiveness of the action in Ukraine of the “New” and “Global” approaches led to the relevance of this study. In particular, the article provides a brief description of the basic principles of the “New” and “Global” directives, establishing requirements regarding product safety, protection of workers’ health and the environment, as well as conformity assessment methods and is mandatory. It is determined that the “Global Approach” implies the establishment of uniform criteria for conformity assessment procedures and the appointment of special bodies that carry out these procedures (presumption of conformity). It is established that the accreditation carried out by the relevant national accreditation body of Ukraine is a new, mandatory, requirement for the appointment of conformity assessment bodies to perform functional tasks in accordance with technical regulations. Paper provides information on the scope of accreditation of the conformity assessment body of the State Research Institute MIA Ukraine, and its activities for compliance with the principles and criteria of the “New” and “Global” approaches are investigated, in particular, regarding the compliance with the international presumption of conformity principle as the necessary condition for the effectiveness of such activities.Item Порівняльний аналіз протоколів множинного доступу з контролем несної та виявленням конфліктів. COMPARATIVE ANALYSIS OF MULTIPLE ACCESS PROTOCOLS WITH CONTROL OF THE BEARING ONE AND CONFLICT DETECTION(2018) Єрохін, В.Ф.; Yerokhin, V.F.; Полякова, А.С.; Poliakova, A.S.In the paper the equations of stationaries of protocols carrier sense multiple access with conflict detection and additional assumption about conflict resolution at the physical layer are considered. An analysis of the throughput increasing of communication systems with random multiple access with the introduction of the conflicts resolution procedure at the physical layer is carried out. For analyzing multiple access protocols the methods of probability theory, mass-service theory, and asymptotic analysis in the queueing theory are used. For carrier sense multiple access with conflict detection protocol construction the graphs and for the protocol analysis of the solution only pairwise conflicts and forbidden processing of single applications is substantiated. On the graphs, each vertex represents the state of the system. The edges of the graph are oriented and demonstrate possible transitions from one state to another. In the graph, draw only those edges are drawn that show transitions with non-zero probability. The convenience of this method of description of the queuing systems is in its clarity and the possibility of the implementation of a simple rule for the system of differential equations for the probability of queuing systems. Mathematical model of such a system of mass service was constructed. By further transformations, the transition to the stationary conditions was carried out. Requirements of the elementary stream with the parameter enter the service system with an infinite number of devices. It is shown that in comparison with the classical protocol, in assumption of pair conflicts resolving procedures at the physical layer, with such access protocol the throughput of the communication system will be significantly increased. The results of the throughput analysis of the few protocols are mentioned. Now it is possible to draw such conclusions that as the range of signals is stable and it is impossible to expand it, and the needs for communication transfer are growing, the introduction of demodulators capable of separating several inter-wining signals can significantly increase the throughput of channels. At the same time, there is the need to use new algorithms of multiple access protocols, the analysis of which shows the feasibility of their use.Item Оцінювання ймовірності реалізації загроз інформаційній системі на різних рівнях стеку ТСР/ІР. EVALUATION OF THE POSSIBILITY OF REALIZING OF THREATS TO THE INFORMATION SYSTEM AT DIFFERENT STAGES OF TCP / IP(2018) Опірський, І.Р.; Opirskyi, I.R.; Тишик, І.Я.; Tyshyk, I.Y.In the paper the basic classical models of security informational systems and their description are given. Statistical analysis of attempts of information threats in information systems with open architecture is carried out. The simulation of the probability of threats to information at different levels of the protocol stack TCP/IP is conducted, the simulation results are analyzed. In order to determine the effectiveness of the implementation of information threats to information systems with open architecture, the task is to carry out a statistical analysis of the attempts to implement information threats in such information systems, to simulate the probability of implementing threats of information in information systems at different levels of the TCP / IP protocol stack, to analyze the obtained probability of implementation threats to information in TCP / IP-based information systems. Graphs of time series are constructed that correspond to changes in the relative frequency of attempts to realize information threats from the registered time values and graphs of the experimental and theoretical normal distribution of the probabilities of realization of threats. It is resulted that the obtained average value as a whole (for network, transport and application levels) meets the criteria of reliability.It has also been shown that the non-compliance with the validity criteria of an assessment obtained on the basis of data on attempts to implement threats at the channel level is due to the large number of null values of relative frequencies, which is due to the very rare implementation of information threats at this level of the stack. As a result of the simulation, the significance of the statistical probability of realizing information threats in IP for each level of the TCP / IP protocol stack is obtained. It is established that the obtained values of the statistical probability of realization of information threats in general coincide with the theoretical values, which gives grounds to assert about the sufficient accuracy of an approximation and its applicability to assess the statistical probability of realizing the information threats at different levels of the TCP / IP protocol stack. In addition, since the likelihood of the implementation of information threats increases with each next higher level of the stack, it is obviously relevant for further development and implementation of security protocols at the higher levels of the TCP / IP stack.Item Дистанційні методи електронного контролю об'єктів. DISTANCE METHODS OF ELECTRONIC CONTROL OF OBJECTS(2018) Рибальський, О.В.; Rybalskyi, O.V.; Крутофіст, І.М.; Krutofist, I.M.; Кудінов, В.А.; Kudinov, V.A.Basic methods of the construction of the system of control of personality systems are considered. It is shown, that the used systems aren’t bar enough to external interferences. It gives the possibility to the malefactors to block alarming and imitating the signals of the normal condition of devices of control. An aim of the paper is the development of the method of increasement of stability of the system to the possible blocking and imitation of work of the checking system. It is shown that an application in the system of the sessions of connection, conducted in random moments, allows to promote its stability. The increasement of stability and application of code sequences of the signals chosen by chance for every session of connection. Method of construction of control system of such devices is worked out, having enhanceable firmness to external interferences. Thus, the time of subsequent session, chosen by chance, and casual code sequences are formed during the current session of connection and passed from the base station to the supervisory device. Time of subsequent session of connection gets out from the set maximal interval of time between sessions, which is determined by register length and by the clock rate used in the system. This choice is realized true by chance by application of generator of noise. The system on the basis of this generator and threshold devices forms a signal, setting a register in some casual position, qualificatory time of subsequent session. Analogical character is forming of casual code sequence for this session. These operations in the system are conducted in the automatic mode. All these actions are produced automatically without intervention of an operator, therefore the parameters of the next session of connection are unknown to him. It eliminates the preliminary drafting of curriculum of sessions of connection and table of the code sequences applied in every session. The increasement of firmness is arrived at due to that neither the malefactors nor operator, checking the location of the controlled personality, don’t know either time or check code, which will be used during the next session of connection. Possibility of the influence of a man on the process of control is thus removed.Item Сучасні криміналістичні засоби виявлення потожирових слідів рук людини. MODERN CRIMINALISTIC MEANS OF IDENTIFICATION OF THE LONG-TERM HUMAN BEARINGS(2018) Грусевич, В.О.; Hrusevych, V.O.Paper is devoted to the study of modern forensic means of detecting traces of human hands on various surfaces in laboratory and extra-ballast conditions. In particular, the focus is on reviewing and analyzing the latest forensic developments, such as alloxan, DFO, ruthenium tetroxide, as well as the products of Sirchie company, which does not contain any foreign DNA. Peculiar features of individual means of detecting finger-prints are highlighted by positive qualities and disadvantages. It is noted that the use in forensic practice of reagents, alloxan and DFO significantly simplifies the process of detecting the finger-prints, since it is a one-stage treatment, which does not require further treatment with metal salts of bivalent metals. On the basis of the study of the stages of the mechanism of practical application of ruthenium tetroxide, it is noted that the process of detecting finger-prints should be carried out in well-ventilated rooms, either under traction or in special closed cells (glass vessels), since the used solution is a weak irritant. It is noted that the advantage of the method of detecting latent finger-prints using tetraoxide ruthenium in its sufficient versatility, ease and speed of detecting latent traces on objects-tracers without pre- training, as well as the possibility of further by use other excellent detection methods. The method also allows the detection of traces on such complex surfaces as heat- sensitive paper, human skin, and a sticky layer of adhesive tapes. According to the results of the analysis of fingerprint powders from Sirchie, it is emphasized that they have a fine-dispersed structure, thereby providing a good sticking to the substance of the tired substance and as a result of the excellent quality of fingerprints of the human hands. This powder can be used on porous, and non-porous surfaces, such as: colored wood, metal, most plastic coatings. According to the results of the research, a number of author’s conclusions, suggestions and generalizations have been suggested.Item Перспективи створення мпеціалізованих транспортних засобів для кінологічних підрозділів та служб системи Міністерства внутрішніх справ України. PROSPECTS OF CREATION OF SPECIALIZED VEHICLES FOR CYNOLOGICAL DIVISIONS AND SERVICES OF THE MINISTRY OF INTERIOR OF UKRAINE(2018) Смерницький, Д.В.; Smernytskyi, D.V.; Будзинський, М.П.; Budzynskyi, M.P.; Диких, О.В.; Dykykh, O.V.; Приходько, В.І.; Prykhodko, V.I.Paper deals with the peculiarities of operative and service activities of cynological divisions and services of central executive authorities whose activities are directed and coordinated by the Cabinet of Ministers of Ukraine through the Ministry of Internal Affairs and the National Guard of Ukraine. The capacity of specialized vehicles for the transportation of cynologists and guard dogs has been analyzed and the main requirements that influence the process of development, manufacture and testing of these vehicles are determined. The purpose of the paper is to carry out an analysis of existing specialized vehicles for the transportation of cynologists and guard dogs, as well as to formulate requirements that should be put forward in the development and production of new specialized vehicles for the cinema units and services of the Ministry of Interior and the National Police of Ukraine. Several aspects of creation, historical genesis, classification and certain types of specialized vehicles for the transportation of cynologists and guard dogs on the basis of vehicles UAZ-31514, UAZ-3909 “Farmer”, UAZ-3163 “Patrio”, VAZ-2123 “Niva Chevrolet” and a specialized cynological trailer-complex for the transportation of guard dogs, special equipment and property for their maintenance. Information is given about the àctivitus carried out in the Ministry of Internal Affairs of Ukraine for the development and production of specialized cynological vehicles on the basis of a passenger car with a type of a body wagon, a truck with a whole-metal body van, a cargo-passenger and a specialized cynological trailer for cynological units of the Department of Organization of Cynological Activities of the National Police of Ukraine. Basic requirements and directions of the development of specialized cynological vehicles for the transportation of the personnel of the Cynological Service and guard dogs, special equipment and property for their maintenance have been formed.Item Аналого-дискретний пристрій, захищений від витоку побічних електромагнітних випромінювань. ANALOG-DISCRETE DEVICE PROTECTED FROM CONTINUOUS ELECTROMAGNETIC RADIATION(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Опірський, І.Р.; Opirskyi, I.R.; Гаранюк, П.І.; Haraniuk, P.I.; Березюк, Б.М.; Bereziuk, B.M.; Ракобовчук, Л.М.; Rakobovchuk, L.M.The design of an analog-discrete device is developed. Its feature is the absence of external voltage sources, converters and voltage dividers, and thus protected from leakage of side electromagnetic radiation. Since the electro-optical effects in liquid crystals have a threshold character, this property will lie at the basis of the use of liquid crystals to create indicators with a low level of radiation. These indicators are distinguished by a low power consumption, high reliability, simple design and low cost. The transformation of an electrical signal into an optical counting occurs in a liquid crystal display. This is achieved due to the fact that the reference electro- optical elements are connected with a voltage divider, whose role is performed by a high-level electrode, which is contained inside the indicator. The electro-optical reference elements are formed by mutually penetrating combing electrodes placed on the same glass substrate of the indicator. This greatly simplifies the technology of manufacturing the device, because the thickness of the layer of liquid crystal becomes insignificant and there is no need to strictly withstand it. The measured voltage is applied to contact pads, which are located at the ends of high-level electrode, which acts as a voltage divider. From the divider, the voltage is fed to one part (upper) of the comb electrodes, and to the second part (lower) of the electrodes, mutually penetrating with the help of a low-anode electrode. The topology of electrodes, including comb, is performed by milling fine films with an argon laser. In the study, we found out the criterion of the possibility of constructing a reference device with different degrees of reference, which uses the electro-optical effect in a liquid crystal with threshold voltage. And it has been shown that if such equality is not fulfilled, it is necessary to change the levels of voltage reference. The results of studies and calculations of the device on the twist effect and the effect of dynamic light scattering are presented. The results of experimental studies are quite consistent with the calculations, which testifies to the possibility of practical application of an analog-discrete display unit.Item Нетрадиционные реализации микрополосковых СВЧ-устройств. NON-TRADITIONAL IMPLEMENTATION OF MICROSTRIP MICROWAVE DEVICES(2018) Глушеченко, Э.Н.; Hlushechenko, E.N.An analysis of the propagation modes of electromagnetic waves in microwave devices is given. The features of the traveling-wave mode are considered on the example of a waveguide (classical) directional traveling-wave filter. The basic block diagram of the NBF is given, on the basis of an analysis of which the requirements for the implementation of such a filter on microstrip are formed. The reasons for the lack of the required microstrip coupler with 3 dB transient attenuation are explained. A method for implementing the necessary 3dB coupler based on the well-known tandem composite coupler is suggested. The process of its modification into a 3dB coupler with an autonomous secondary channel is described. The feasibility of a single-cavity microstrip directional traveling-wave filter based on a modified tandem-type microstrip coupler has been theoretically substantiated and experimentally confirmed. A comparative analysis of the amplitude-frequency characteristics of directional traveling-wave filters in the classical and microstrip versions is given.Item Застосування бездротових відеокамер як елемент екіпірування службових собак. APPLICATION OF WIRELESS VIDEO CAMERAS AS AN OPERATING ELEMENT OF GUARD DOGS(2018) Лопатін, С.І.; Lopatin, S.I.; Буран, В.В.; Buran, V.V.Paper deals with modern experience of using portable high-tech equipment for guard dogs by specialists from foreign countries, application of the latest technologies for solving the problems of counteraction to crime in Ukraine. The latest statistics on the detection of crimes and offenses with the participation of cynologists and guard dogs were given. It is indicated on the development of telecommunication facilities and the possibility of equipping cynological units with special equipment for the transmission of video images, both during the conduct of law enforcement and the rescue of people. The features of dogs, characteristic behavior and the appropriate way of movement are noted, they have a number of important functions that aren’t accessible to either man or robots (drones). It has been outlined that equipment for wireless transmission of information must meet a number of functional requirements. Conventional equipment on sale for video transmission does not meet the requirements of cynological divisions during special operations. Along with this, there are several problems related to fixing it and one of the less important problems is related to the ergonomic use of animals directly. It is known that foreign objects and telecommunication facilities can constitute a significant obstacle for animals and not only as an additional weight. During the creation and selection of equipment, attention is focused not only on the purely technical parameters and characteristics such as stabilization and clarity of the image, but also on the features of the equipment. The necessity of an improvement and improvement of the existing material and technical support of cinema units through the use of modern video information transmission systems and their application in the activities of the National Police of Ukraine is substantiated. A review of two advanced communication systems and a remote control of the dog is made, the main technical characteristics and features of the use of the noted devices are indicated. There are some ways to improve the effective use of official dogs in law enforcement activities. Paper concludes that the analysis and study of the experience of law enforcement agencies of foreign states will facilitate the formation of recommendations during the selection of equipment.Item Розробка теоретичних основ методу відокремлення цифрового зображення, збереженого у форматі без втрат, від зображення, збереженого із втратами. DEVELOPMENT OF THEORETICAL BASIS OF THE METHOD OF SEPARATING DIGITAL IMAGE SAVED IN A FORMAT WITHOUT LOSSES FROM A IMAGE SAVED WITH LOSSES(2018) Бобок, І.І.; Bobok, I.I.; Кобозєва, А.А.; Kobozieva, A.A.Information integrity is one of the main properties of the information security object. The use of information content is often possible only if its integrity is not compromised. The task of identifying violations of the integrity of an information remains relevant one. Particular difficulties arise if the violation of the integrity of information content leads to its very minor disturbances. Today, digital images, video, digital audio are often used as information contents. The work is devoted to the analysis of digital images. Currently, the storage and transmission of digital images is carried out in two fundamentally different forms – with losses and without losses. Unauthorized actions on the image often lead to a difference in the format of the original image from the one whose integrity is violated. This is typical for a steganography, when the organization of a hidden communication channel uses the steganographic method, which is not resistant to attacks against the embedded message, and the image in a lossy format acts as a container. Establishing the fact of a format change here is a pointer to the transformation of the image, to the violation of its integrity, can be used for the purposes of steganoanalysis. Paper developed a theoretical basis of the method of separaton of a digital image, which was originally stored in a lossless format, from that which was saved to a lossless format from a lossy format. The basis of the future method is the analysis of the normalized separation of the maximum singular numbers of blocks of the image matrix. The blocks are obtained as a result of the standard partition of the matrix. During the examination, the image is re-stored in a lossy format (Jpeg) with quality factors. The curve reflecting the dependence of the number of blocks of a digital image for which the normalized separation of the maximum singular numbers does not change after being saved in Jpeg as a function of the quality factor is analyzed. During development, the concept of a pronounced local maximum of a function was introduced and formalized. The existence/absence of a pronounced local maximum on the mentioned curve is a pointer to the format of the original image with loss/ lossless.Item Аспекти формування вимог до систем виявлення безпілотних повітряних суден (апаратів). ASPECTS OF FORMING REQUIREMENTS FOR DETECTION SYSTEMS OF UNMANNED AERIAL VEHICLES (UAV (A))(2018) Заїчко, К.В.; Zaichko, K.V.The rapid development of the market for unmanned aerial vehicles (UAV (A)) contributed to their implementation in various sectors of industry, agriculture, economy and entertainment. In turn, the unlimited possibility of acquiring and, accordingly, unregulated and careless use of such devices leads to irreversible consequences, including severe ones. This year in June the Temporary Use of Airspace was published for the consi- deration and discussion of citizens. A new name for devices has been suggested – remotely manned aircraft. It is proposed to introduce the registration of these devices and obtain appropriate permits for flights nearby airports, roads, houses and structures of crowded places, etc. Unauthorized use of UAV (A) can not be left out of the attention of the law enforcement system, especially in mass events. There is a need for monitoring and insurance of the possibility of counteracting unauthorized flights of UAV (A) over protected objects and on objects representing an area of a high danger. The creation of detection and response systems must meet a number of requirements. Continuous development and modernization of UAV (A) devices involves state-of-the-art control technologies that have increased the resistance to interference. The possibility of updating parameters and characteristics of UAV (A) (amplifiers for the increasement of the range of remote controls, coding of control channels and information transmission) is not excluded, and this will greatly complicate the tasks of law enforcement agencies. Technical systems and means of monitoring and counteraction to the UAV (A) that are planned to be equipped must meet the current technical requirements and have a developed architecture that will make it impossible to observe moral aging throughout their lifetime.Item Розвиток протимінної діяльності в Україні. DEVELOPMENT OF CONTINGENCY ACTIVITY IN UKRAINE(2018) Филь, Р.С.; Fyl, R.S.Paper deals with the issues of the development of mimetic activity in Ukraine. Data are given on the area of mine clearance of the liberated territories of Donetsk and Luhans’k regions, the number of disposed explosive objects and registered victims from mines and other explosive remnants of war. In order to reveal the problems of the chosen topic of research, the purpose of the paper was to study the essence of mimetic activities and to review the development of legislation in this area in Ukraine. The content of the concept “offensive activity” is analyzed and its main tasks are defined, in particular: informing the population about the mine danger and the danger of explosive remnants of war; demining of land and water resources and food; restoration of infrastructure in demarcated areas; assistance to victims; destruction and storage of ammunition; recovery of the economy in the affected region. Components of mine action, namely: information on mine danger and mine clearance (“humanitarian demining”) are characterized. The current regulatory framework in the field of mine action in Ukraine, as well as existing draft laws on the implementation of mine action, it was established that the absence of a single specialized law on mine activity inhibits the effective implementation of the demining of territories on its East, not only domestic specialists, but also international non-governmental organizations. The results of the activity of the authorized agency on mine action in Ukraine are analyzed. It is proposed to establish a clear legal mechanism for the organization and coordination of mine action activities by the national body for the effective demining of zones of armed conflict in the Donets’k and Luhans’k regions, which would establish a procedure for attracting highly skilled personnel and international non-governmental organizations to this activity, would act as a customer of research and developmental works on the development of the latest special equipment for demining units and the sources of funding of mentioned activities are determined.Item Проектування жилетів для службових собак. DESIGN OF VESTS FOR GUARD DOGS(2018) Будзинський, М.П.; Budzynskii, M.P.; Бакал, В.П.; Bakal, V.P.; Алексанров, М.Є.; Aleksandrov, M.Y.The article is devoted to the design of vests for service dogs. Vests for dogs of various designs are widely used by private owners of dogs, and special services, in particular, the cynological units of the police. At the same time, the working conditions of service dogs ànd ordinary dogs are different. There is a need for designing vests, the design of which would meet the purpose and conditions of use of service dogs. However, today the subject of most popular and scientific sources is devoted to designing clothes for dogs, without taking into account the specifics of their use and the typical dimensional features of breeds of service dogs. In this article, the authors determine the initial requirements for the design of vests for service dogs, consider the design features of existing vests, lead to a system of their sizes. The study of the initial requirements for the design of vests was carried out by an analytical method and a method of observation. When determining the main sizes of service dogs of different breeds, an instrumental method was used (measurements were made using a centimeter tape 2000 mm). The structural features of the vests and the basic sizes of the vests are determined by means of analysis and comparison methods, and also by the instrumental method. The experimental sample of the vest for service dogs is made using modern sewing equipment. Dynamic compliance of the sample is determined by method of modeling the situation. Scientific novelty consists in certain basic dimensional features for the design of vests for service dogs, as well as in determining the dependence of the size of vests on the breed, age and sex of the dog. Based on the conducted experiments (measurements of dogs of service breeds), the authors conclude that it is inexpedient to design a universal waistcoat of uniform size and emphasize the need to design waistcoats in different sizes. The practical significance of the study is the development of an experimental vest sample for service dogs. The conclusions contain the initial requirements for the design of vests for service dogs, determined by the authors. The materials of the article can be used to improve the process of designing clothes for official dogs of cynological units of the National Police of Ukraine.Item Критична інфраструктура в аспекті євроінтеграційного курсу України у сфері забезпечення кібербезпеки. CRITICAL INFRASTRUCTURE IN THE ASPECTS OF THE UKRAINIAN EUROSTATION CURRENCY COURSE IN THE FIELD OF PROVISION OF CYBER SECURITY(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Гаранюк, П.І.; Haraniuk, P.I.; Березюк, Б.М.; Bereziuk, B.M.; Ракобовчук, Л.М.; Rakobovchuk, L.M.; Дзяний, Н.Р.; Dzianyi, N.R.Paper presents the current state of cyber security in Ukraine, the USA and EU countries. On the basis of a comparative analysis, it has been established that to date, cybersecurity in Ukraine as an industry is at the initial level of development. The signing of the Association Agreement, its further ratification by Ukraine and a number of EU member states, stipulate the need to identify the first steps that Ukraine should take in order to bring its approaches in this area in line with the approaches applied in the EU in the area of critical infrastructure protection. Identified documents that need to be given special attention in the development of the national regulatory framework in the field of critical infrastructure protection. The specified documents are intended to bring the requirements of national legislation to the maximum as far as possible to the requirements for the functioning and protection of critical infrastructure in the field of energy and transport, as defined in the EU directives and specified in the Association Agreement between Ukraine and the EU. The measures of raising the level of critical infrastructure in the aspect of the European integration course of Ukraine are analyzed. In particular, taking into account the European integration course of our state, it has been established that in developing a system of critical infrastructure protection in Ukraine, efforts should be made to achieve consistency of the national legislation with EU normative acts regarding: general principles of the protection of critical infrastructure; interpretation of the main terms; consistency in the priority of protecting critical infrastructure; methodology for comparison and identification of priority objects in different sectors; implementation of the critical infrastructure protection standards in force in the EU. The main recommendations for raising the level of cyber security of critical infrastructure in Ukraine are substantiated, among them: comprehensive improvement of regulatory legal regulation of protection of critical infrastructure and development of international cooperation in the field of critical infrastructure protection. Therefore, the protection of critical infrastructure in Ukraine should be an integral part of the pan-European security mechanism.