#4
Permanent URI for this community
Browse
Browsing #4 by Issue Date
Now showing 1 - 20 of 24
Results Per Page
Sort Options
Item Загальні підходи до формування артикуляційних таблиць української мови для оцінки стану захисту складнозашумленої мовної інформації. GENERAL APPROACHES TO THE FORMATION OF ARTICULATION TABLES OF THE UKRAINIAN LANGUAGE TO ASSESS THE STATE OF PROTECTION OF EXCESSIVE NOISE SPEECH INFORMATION(2018) Нужний, С.М.; Nuzhnyi, S.M.; Заноскіна, П.В.; Zanoskina, P.V.The protection of speech information from leakage by acoustic and vibrational channels refers to the most important tasks of information security. The peculiarity of the current state is the existence of a significant lag of methods and devices of protecting the linguistic information in Ukraine from the possibilities of the malefactors to intercept and restore the information received. This is determined to the availability and approachable of high-sensitivity devices for malefactors, as well as the accelerated development of mathematical methods for digital processing of phonograms. A significant contribution to the urgency of the problem is the imperfection of the method of evaluate the level of protection of speech information. In Ukraine, the criterion of security is the value of the signal / noise ratio at the boundary of the controlled zone and its compliance with the normative value. This approach does not take into account the possibilities of noise clearing and restoration of the malefactor of intercepted language information.The use of active noise interference systems with a high level additionally leads to the formation of significant problems. In the USA and Europe the estimation of the speech information protection by objectivized methods is based on the speech residual intelligibility coefficient determination, which is calculated from the spectral analysis results. To undertake specialized experiments, it is necessary to develop formalized test signals synthesized on the basis of Ukrainian language articulation tables. Nowadays, there are no such tables, and there are no methods for synthesizing them. This does not allow determining the assessment of the level of protection of hard-noise speech information. The statistical researches the frequency of the use of the letters of the Ukrainian alphabet in the specialized texts of professional appointment are conducted. Categories “Information Security”, “Criminalistics” and “Economics” are considered. This approach allows developing recommendations for the synthesizing of articulation tables that will be adapted to the professional features of speech information on a particular object. The further research direction is to obtain the allophones use frequency and to synthesize the specialized complex articulation tables of the Ukrainian, English, Greek and Russian languages on the basis of the information obtained.Item РОЗВИТОК КОНСТРУКЦІЇ КАЙДАНКІВ. DEVELOPMENT OF HANDCUFFS CONSTRUCTION(2018) Бакал, М.А.; Bakal, M.A.; Власов, В.А.; Vlasov, V.A.The paper is devoted to the analysis of the development of handcuffs structures. Today, police officers and other law enforcement officers prevent criminal acts, during the arrest and convoy of suspected persons or offenders, are widely used special means of restrictive action – handcuff. An analysis of available sources of information revealed the existence of bundles of various designs. Like any special tool, handcuff need to be improved in order to increase the effectiveness of their use, as well as the provision of such important requirements in the context of human rights protection as injury prevention. In the article, the authors, on the basis of popular scientific and technical sources, consider the development of the structure of the handcuffs, their characteristic design features and the peculiarities of their application. Research on the development of the design was carried out by analytical and observational methods. To study the principle of the mechanisms of modern chains, experiments were carried out on their application, with observance of safety rules when handling with special means. Scientific novelty of the study is to determine the term “handcuff” and their classification as a special type of special means on the basis of the reference area of the human body, on which they are fixed. A detailed classification of handcuffs construction is made on the basis of separate constructive solutions of handcuffs, made at different stages of their development. In the conclusions, the authors, on the basis of the analysis, draw a conclusion on the need to standardize the processes of development, improvement and industrial fabrication of the bundles by developing normative and technical documentation in which the general technical (in particular, constructive) requirements for the bundles will be determined, a clear classification of bands, definition terms and concepts, as well as requirements for the safety of the handcuffs. Materials of the research can be used in the development of the national standard on handcuffs, the draft of which is currently published on the official website of the State Research Institute of the Ministry of Internal Affairs of Ukraine.Item Побудова узагальненої математичної моделі групового матричного криптографічного перетворення. GENERAL CONSTRUCTION OF MATHEMATICAL MODEL OF GROUP MATRIX CRYPTOGRAPHIC TRANSFORMATION(2018) Сисоєнко, С.В.; Sysoienko, S.V.; Миронець, І.В.; Myronets, I.V.; Бабенко, В.Г.; Babenko, V.H.In the process of conducting this scientific research, the model for constructing a cryptographic transformation based on the use of two-operand operations has been improved by implementing hierarchical group transformation, and finding the new relationships between the direct and inverse operations to improve the encryption results. It is proposed to apply the method of increasing the stability of pseudo- random sequences to improve the quality of cryptographic transformation based on the hierarchical application of two-operand information transformation operations. The model of cryptographic transformation has been improved based on the use of two- operand operations, by implementing a hierarchical structure of the transformation to increase the results stability. A method has been developed for increasing the speed of implementation of a group matrix cryptographic transformation based on the proposed generalized mathematical model of a matrix of group cryptographic transformation by reducing the complexity of the construction and implementation of the inverse transform, which provided a reduction of mathematical complexity and speed cryptographic transformation. Based on the study of the mathematical model of two-operand group matrix cryptographic transformations, a generalized (by the number of operands) mathematical model of the matrix of group cryptographic transformation is proposed and its correctness is verified. Based on the generalized mathematical model of the matrix of group cryptographic transformation, a method is developed for increasing the speed of group matrix cryptographic transformation. According to the results of modeling and practical implementation of the developed method, quantitative characteristics of the decrease in complexity and increase in the speed of implementation of the mathematical model of the matrix of group cryptographic transformation were determined which depend on matrices of arbitrary dimension. On the basis of the mathematical apparatus of block matrices, the correctness of the generalized mathematical model for constructing the inverse group matrix cryptographic transformation was verified.Item Синтез груп двохоперандних операцій криптоперетворення на основі перестановлюваних схем. SYNTHESIS OF GROUPS TWO-OPERAND OPERATIONS OF CRIPTOCONVERSION ON THE BASIS OF PERMUTATION SCHEMES(2018) Козловська, С.Г.; Kozlovska, S.H.Cryptography is one of the most effective means of data protection nowadays. One way of increasing the cryptographic algorithms stability is increasing their variability. Increasing the crypto algorithms variability directly depends on the number of cryptographic transformation operations, used in it. Using permutations in constructing modified operations is one of the effective means of expanding the capabilities of developers in building cryptographic algorithms. However, it was not paid enough attention to synthesis the operations’ mathematical groups on the basis of permutations. The purpose of the work is to construct a complete group of two-operand operations of cryptographic transformation, on the basis of the known, due to the establishment and application of permutational interconnections between the truth tables. The following research results were obtained while achieving the goal. In the course of the research, it was found that the permutation schemes for constructing truth tables of the cryptographic transformation of the two-operation sets of operations of the first mathematical group do not overlap. The complex of sets of truth tables of crypto transformation’s two-operand operations of the first mathematical group creates a complete group of sets of cryptographic transformation’s two-operand operations truth tables. The application of the rearrangement schemes group provides the construction of a cryptographic transformation operations complete group based on any of the operations of this group. The use of a group of permutation schemes allows you to build a complete group of permutation tables, presented both explicitly and in a formalized form. The obtained results allow making a conclusion that the application of rearrangement schemes’ constructed group will provide the construction of a complete group of sets of cryptographic transformation’s two-operand operations of an unknown group, based on one known operation. Rearrangement schemes for synthesis the truth tables of cryptographic transformation’s two-operand operations are constructed. It is established that the constructed schemes are not overlapped and create a complete group of sets for the truth tables synthesis. The application of the rearrangement schemes group provides construction the complete group of a cryptographic transformation’s operations, based on any of the operations, and also provides the construction of a complete group of tables of explicitly represented substitutions as well as formalized substitutions.Item Дослідження матеріалів для захисту людини від шкідливих чинників навколишнього середовища. RESEARCH OF MATERIALS TO PROTECT HUMAN FROM HARMFULL ENVIRONMENTAL INFLUENCES(2018) Дячок, Т.М.; Diachok, T.M.; Березенко, С.М.; Bereznenko, S.M.; Бакал, В.П.; Bakal, V.P.; Александров, М.Є.; Aleksandrov, M.Ye.The paper is devoting to researching of properties of materials for protection of the person from harmful factors. The issue of protecting people from the influence of external harmful factors to date is very relevant. There are a number of factors, constitutes a threat to the human health in the process of life. The nature of the dangerous influence on the person of external factors is quite diverse by nature of origin, the nature of interaction with the organism and the consequences that cause the action of harmful factors. For protect against the influence of dangerous harmful factors, personal protective equipment is used, the leading place among which is the special protective clothing. When designing protective clothing, important to investigate the properties of materials, as well as the impact of the processes of clothing use on the properties of these materials. The analysis of harmful factors and the study of general properties of protective materials was carried out by analytical and observation methods. Investigation of the influence of operation factors on the change of the properties of textile materials for protective clothing was carried out by experimental method (for the experiment, a tear-off machine of the brand RT-250 was used). The scientific novelty determined by the influences of the washing process on the values of bursting and elongation during the rupture of materials for the manufacture of protective clothing (fabric CORDURA NIR and CORDURA MK, jersey Cool- Max). Based on the results of the study, the authors conclude that the wet processing improves the bursting characteristics of the materials being studied. At the same time, the authors emphasize the need for a comprehensive study of the quality indicators of the materials in question in order to fully determine their protective properties. In the conclusions, the authors suggest the use of investigated fabrics for the manufacture of protective clothing for protection against mechanical damage, and also indicate that the jersey under study does not lose the strength characteristics during washing. Research materials can be used to improve the design of clothing protective special.Item Розвиток систем контролю доступу до транспортних засобів. DEVELOPMENT OF ACCESS CONTROL SYSTEMS FOR VEHICLES(2018) Білогуров, В.А.; Bilohurov, V.A.; Заїчко, К.В.; Zaichko, K.V.; Назарок, Д.С.; Nazarok, D.S.The paper deals with the confrontation between means and methods of illegal possession of vehicles or their disassembly, and means, which prevent the beginning of unlawful actions, and also hinder their completion. The subjects of consideration were mechanical devices, which blocked the opening of the door, hood, trunk of the vehicle, blocked the steering shaft, shaft gearbox to prevent theft. Automobile alarms without remote control and their vulnerability to the attacker are considered, possible ways to bypass signaling. With the development of threats to the property of citizens in the market began to appear means and technology in the field of protection against robbery. Over time, certain stages of development take place in the development of technology. The appearance of movable property such as motor vehicles has, to a certain extent, accelerated the development of protection. One of the areas of protection technology can be the protection of domestic and industrial premises, the protection of motor vehicles and etc. In the early stages of development, locking devices with physical keys were widely used. The history of the use of padlocks has almost a century history. The next stage in the development of access systems can be considered the emergence of alarms, which were included in the case of unauthorized entry into the vehicle. It should be referred to as mechanical and electromechanical devices with sirens and capacitive sensors, sensors for opening contacts or breaking the glass (vibrations) of the vehicle. The further direction in improving both ergonomic properties and increasing the stability from the influence of intruders can be considered the introduction of automotive signaling remote action. The article deals with the codes of increased stability: the double dynamic code D-2, the double dynamic code D-square, DID technology used in transponders-tags, through which the security system recognizes the owner. The dynamic code Time Code, in which the signal is encoded Radiant, contains information with a time label. The basic principles of signal coding are defined - Keeloq Code Hopping. The means of breaking alarms using the radio scanner, grader is considered. The functional and technical specifications of the modern remotely controlled car alarm system with multichannel control (8192 channels) and increased immunity from breaking code (DUPLEX DIALOG) and possibility of control from any point of the world (Bilarm GPS / GSM) are presented.Item ВИЗНАЧЕННЯ ПОНЯТТЯ "ХОЛОДНА ЗБРОЯ" В НАЦІОНАЛЬНИХ СТАНДАРТАХ УКРАЇНИ. DEFINITION OF THE CONCEPT OF “COLD ARMS” IN THE NATIONAL STANDARDS OF UKRAINE(2018) Коваль, М.В.; Koval, M.V.In the article, based on a detailed analysis of available scientific and legal sources, definitions of the concepts “Arms” and “Cold Arms”, attention is directed to the importance and necessity of building a precise definition of “cold arms”, with the aim of approval in the legislation of Ukraine. There are many shortcomings in native legislation, which require the earliest elimination. Among the objects of the rights of citizens and other entities the arms occupies a special place, of its specific properties. The category of “Arms” and “Cold Arms” is abstract, since it covers a multitude of diverse objects and devices that have various properties. Legislative acts of “Cold Arms”; they do not including classifications, which would cover the whole list, on which the relevant administrative-legal regime should be spread. In this regard, legal definitions of arms become defining value, as well as its legal classification is clearly defined, which became the basis for determining the content and also duties of the participants in the legal relationship, construction of the administrative-legal regime of arms circulation in Ukraine. Attempted overcome to controversial issues, that arise regarding the classification of Cold Arms in Ukraine, through the prism of the current native legislation was rendered. The problem issues of cold arms are considered in accordance with the specifics of its applications. Types of cold arms, its specification, method of manufacture and level of autonomy for certain historical and ethnic types. Taken cognizance into consideration the opinion of the scientists of the authors of criminal-law and forensic literature on the concept of Cold Arms. Set up of criminal liability for the use of Cold Weapons, the legislator proceeds from the public security of various acts, connected primarily with the that the use of arms in a certain way creates conditions for murder, causing serious harm to health, used in the execution of robberies and other serious crimes. Thus, the possibility of defeating a weapon at a distance actually excludes it from the category of Cold Arms, but this creates a gap, the essence of which is the impossibility of classifying a cold weapon that has a dual function. According to the modern methodology used by the Ministry of Internal Affairs of Ukraine (MIA of Ukraine) and the criteria it contains, not all knives, including those, may fall under the notion of Cold Arms, are namely Cold Arms. In practice, most of the errors occur when analyzing the subjective side of the acquisition, sale, wearing and manufacturing of Cold Arms. The criminal law provides for direct intent when committing these acts. The content of the intention should include the knowledge that the subject is a Cold Arms, and the actions what has been done, are socially dangerous. A number of conclusions and recommendations for the definition of “Cold Arms” are formulated.Item Аналіз сучасного стану безпеки інтернету речей. ANALYSIS OF THE CURRENT SECURITY SITUATION IN THE INTERNET OF THINGS(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Кеньо, Г.В.; Keno, H.V.; Стосик, Т.Р.; Stosyk, T.R.The paper exzamines the problems of Internet of things security. An overview of the use of the Internet of things, dynamics of its distribution and improvement are made. The opinion of the leading experts of the IT industry about the problems of safety of “smart” devices are highlighted. On the basis of the reviewed literary sources, expert opinions of leading IT industry specialists, statistics and recent cases of Internet security breaches, the relevance of the topic and the current unsatisfactory condition of the industry are determined, which is a consequence of negligence, underestimation of threats and insufficient coverage of the issues in information sources. In a part of the work the actual problems of Internet safety at the level of its organization are considered, vulnerability of cloud service, untrusted gateway, wireless communication channels, implementation of authentication and device authorization are analyzed. It is shown that the main sources of vulnerability are Internet devices themselves, which often do not have any protection from cyber attacks. The reasons of unsatisfactory condition of Internet of things safety are analyzed, the existing threats and reasons of their occurrence are shown. It was revealed that the main reason for this situation is the lack of minimum security measures, including penetration tests, prohibition of simple passwords, etc., due to the desire to provide companies maximum producing profits. Cyber attacks on routers and IP video devices and the implications that they cause are listed. The present condition of the state and international regulation of the Internet of things problems, standardization and certification are analyzed. The main principles, the implementation of which are foreseen in the standards, are given. On the basis of the analysis, a list of recommendations and proposals aimed at minimizing threats to the Internet has been developed.Item Синтез обернених дворозрядових двохоперандних операцій строгого стійкого криптогорафічного кодування. SYNTHESIS OF THE INVERSE TWO-BIT TWO-OPERAND OPERATIONS OF STRONG CRYPTOGRAPHIC ENCODING(2018) Рудницький, В.М.; Rudnytskyi, V.M.; Лада, Н.В.; Lada, N.V.; Федотова-Півень, І.М.; Fedotova-Piven, I.M.; Пустовіт, М.О.; Pustovit, M.O.Construction the new algorithms of stream and block cipher is inextricably linked with the synthesis of new cryptographic transformation operations. Particular attention deserve the operations that in the process of information transformation on the basis of the subdued sequence provide the achievement of strong cryptographic encoding, which means the maximum uncertainty of the cryptographic transformation results. However, it was paid not enough attention to the synthesis of these operations nowadays, and the processes of constructing the inverse operations of strong cryptographic coding were not studied at all. The purpose of the work is to simulate the inverse two-bit two-operand operations of strong cryptographic transformation for usage in stream and block ciphers. For reaching the purpose, the necessity of using one subdued sequence for direct and inverse transformation was taken into account. An approach that allows synthesizing reverse operations for known direct two- bit two-operand operations of strong cryptographic information transformation, based on the technology of combining single-operand operations of strong cryptographic encoding, is proposed. The entire sequence of mathematical transformations, which provides the synthesis of a formalized operation model suitable for practical application in cryptographic primitives, is considered in the article on the example of one operation’s construction. Synthesized operations are implemented on the software level as well as on the hardware level, which provides an ease of reaching the effect of strong cryptographic encoding. Thus, the research made it possible to develop a model of an inverse two-bit two- operand strong cryptographic transformation. The combination of the obtained inverse transformation with the direct at implementation the method of increasing the stability and reliability of stream encryption will provide maximum uncertainty for the results of cryptographic transformation, regardless of the subdued sequences’ quality.Item Дослідження патронів травматичної дії, які виробляються в Україні. INVESTIGATION OF TRAUMATIC ACTION CARTRIDGE PRODUCED IN UKRAINE(2018) Власов, В.А.; Vlasov, V.A.; Гутянтов, С.В.; Hutiantov, S.V.; Біляєва, О.Д.; Biliaieva, O.D.; Криворучко, О.В.; Kryvoruchko, O.V.The paper analyzes the development of production in Ukraine of non-lethal (traumatic) cartridges intended for shooting from short-barreled devices of non-lethal force and smooth-bore rifles. Their tactical and technical characteristics are considered: caliber, overall dimensions (length, diameter), mass of the ball, velocity of the ball at a distance of 3.5 m from the bullous cut, the diameter of the scattering (bulk density), the mass of the cartridge, the distance of application, and others. The general technical requirements of JOE 78-41-016: 2013 are given to cartridges, used by manufacturers in designing technical specifications, namely: basic characteristics and specifications, requirements for designation, reliability, constructive requirements. The schematic representation of cartridges for smoothbore rifles, equipped with an elastic ball and cartridge, a general view of non-lethal impact pistol and revolving cartridges, a ballistic barrel for measuring the flight speed of a projectile, with indication of the requirements for the material from which the trunk must be made, is shown. The classification conclusion on cartridges of non-lethal action based on medical- biological researches of the Ministry of Health of Ukraine is substantiated. In view of the aforesaid information, the paper contains a classification conclusion . The main criteria for determining the severity of the damage to a biological object have been noted. The necessity of mandatory certification of non-lethal (traumatic) cartridges for compliance with the requirements of normative documents and the development of technical regulations is considered. The information provided in the paper may be used by forensic units of the Ministry of Internal Affairs for ballistic research of firearms and traumatic weapons and cartridges to it.Item Оцінка небезпечних відстаней осколкового ураження боєприпасами та саморобними вибуховими пристроями. ASSESSMENT OF DANGEROUS DISTANCE FOR FRAGMENTATION EFFECTS OF MUNITIONS AND IMPROVISED EXPLOSIVE DEVICES(2018) Филь, Р.С.; Fyl, R.S.The paper presents the rationale for the new approach to the analysis of the fragmentation of the explosion, as a striking factor in the explosion of ammunition and improvised explosive devices based on them. Information was provided on the distribution of the dependence of the mass of fragments on their quantity and the type of detonated ammunition. The calculation of the speed of fragments from the epicenter of the explosion, depending on the power of the explosive charge. Based on the obtained values of the velocities and the mass of the fragment, the distances of the dispersal of the fragments upon detonation of the most common types of ammunition are determined. Based on the gas-dynamic theory, the strength of the contact interaction of the fragment with a biological object is indicated. The law of contact pressure distribution is given. The graphic dependence of the change in contact pressure on a biological object from time is shown at different speeds of movement of the fragment. Applying the Poisson law to the distribution density of fragments, they calculate the probability of their damage to a biological object from the speed with which they move. A model is proposed for calculating the degree of damage to a person by fragments, depending on their mass, speed and shape. Cases of the defeat of a person by shrapnel, which fly forward or have the shape of a square, are considered. Dependence of determining the conditional probability of injury to a person by splinters in the explosion of ammunition, which allows determine the affected area from the epicenter of the explosion or calculate the location of protective engineering structures with certain parameters. When calculating the integral function of damage to biological objects, parameters are given for fragments of relatively small mass with a blunt and cutting edge, as well as large primary or secondary fragments. The presented mathematical model for defining fragmentation zones with ammunition and improvised explosive devices based on them is recommended for practical identification by the officers of the National Police of Ukraine and the National Guard of Ukraine of cordoning zones during mass events and counterterrorism operations.Item Дослідження придатності електрокардіограм для біометричної ідентифікації. STUDY OF ELECTROCARDIOGRAMS SUITABILITY FOR BIOMETRIC IDENTIFICATION(2018) Хома, Ю.В.; Khoma, Yu.V.The article describes the requirements for biometric identification systems. It is also pointed out that electrocardiogram is a promising biometric marker for human identity recognition. This paper presents that ECG based biometric systems are almost insensitive to the type and parameters of the ECG measurement instrumentation, the length of records, the number of users in the database, as well as the classification algorithms based on different methods of machine learning. Additional focus on electrocardiogram acquisition for biometric systems has been made. A simple version of the signal aquisition system based on the Arduino Uno platform and e-Health Sensor Platform v.2.0 is presented. The content of the main stages of the signals and data processing in the ECG-based biometric identification system is described. The general research methodology was designed, in particular, for estimating the accuracy of different classification models. Four open-source electrocardiograms that have been used for conducting have been described in the paper. Also presented are six machine learning methods that were used to build a classification model for a system of biometric identification. Current research has shown that the parameters of the ECG measurement instrumentation, in particular the type of electrodes, the sampling rate, and the resolution of the ADC, do not significantly affect the identification of the results. A good correlation was found between the accuracy of all classification algorithms among different databases. It has been established that for well-balanced data, even for a few hundred users, simple algorithms such as k-nearest neighbors (KNN) and linear discriminant analysis (LDA) provide high-accuracy identification. The neural network classifier with one hidden layer also showed high accuracy and stability in all databases, but due to its computational complexity it is expedient to use it in biometric identification systems with heterogeneous datasets of electrocardiograms.Item Оцінка ефективності штучних нейронних мереж. EVALUATION OF THE EFFECTIVENESS OF ARTIFICIAL NEURAL NETWORKS(2018) Кунах, Н.І.; Kunakh, N.I.; Ткаленко, О.М.; Tkalenko, O.M.; Харлай, Л.О.; Kharlai, L.O.The purpose of the article is the use of artificial neural networks to improve the quality of images when increasing their permission. To achieve the goal, various types of most promising artificial neural networks were considered – mathematical models that describe the system of artificial neurons interconnected among them, as well as the implementation of these models. The analysis of modern interpolation algorithms, which include the initialization of paired points by the values of the reduced image, the metrics for assessing the quality of the algorithms; using artificial neural means to increase image resolution; methods of increasing the efficiency of artificial neural networks. A software implementation has been created using several interpolation algorithms and models of artificial neural networks. An analysis of modern approaches to solving the problem of increasing the resolution of images has shown that despite the existence of relatively fast and high-quality algorithms, new methods are constantly emerging. In recent years, artificial neural networks are increasingly used to solve this problem. In most studies, different implementations of the models of the curtain neural networks are used. The algorithms of bicubic interpolation, Lancosha filter, models of artificial neural networks SRCNN and SRGAN were studied in this work. The choice of interpolation algorithms is influenced by the fact that they are quite effective in terms of the ratio of the time of work and the quality of the result. Also, the choice is influenced by the fact that these algorithms are widespread and used in many applications. When comparing results with objective metrics, it can be noted that generative- competitive model copes with image processing more efficiently than the creeping neural network. But adapting such a model requires much more time. Using the generic-competitive network model to handle test images also takes a little more time than the rollout. But the result, which allows both models, far outperforms interpolation algorithms.Item Методологія інтелектуального управління маршрутизацією в конфліктуючих сесорних мережах варіативної топології. METHODOLOGY OF INTELLIGENT ROUTING CONTROL IN CONFLICTING SENSOR NETWORKS OF VARIABLE TOPOLOGIES(2018) Семко, О.В.; Semko, O.V.; Складний, П.М.; Skladannyi, P.M.; Семко, В.В.; Semko, V.V.; Бурячок, В.Л.; Buriachok, V.L.The complication of the topological structures of wireless sensor networks due to their variability determines the need to create new methods for managing data routing and parameters that determine the indicators of the reliability of the functioning of information-telecommunication and computer systems. Methods and algorithms for packet routing and data streams in heterogeneous sensor networks are based on multi- threading (multi-threaded) relay technology as a self-organized, dynamic, service- oriented network of variable topologies. Key elements of sensor networks of variable topologies are sensors that register changes in certain parameters and / or provide their transmission from source nodes to recipient nodes. Methods of artificial intelligence allow to determine the way of solving problems of data flow routing management by integrating the parameters of functioning of sensory networks of variable topology in conditions of guaranteeing reliability and synthesis and choosing guaranteed non- conflict routing management. The problems of synthesis and decision-making decisions concerning the management of data flow routing in conflicting sensor networks of variate topology in conditions of limitations and uncertainties are determined. The development and substantiation of the methodology of intelligent management of data flow routing in conflicting sensor networks of variable topology on the basis of the application of multiplicative theoretical models provides the opportunity to describe the processes of functioning of the network in the form of a mathematical model and a notation (language), which allows determining the optimal data transmission routes according to the criterion that takes into account Indicators (parameters) of indemnity under conditions of limitations and uncertainties. An approach to the creation of distributed intelligent routing management system in self-organized sensory networks is considered on the basis of the use of multilevel theoretical-plural and mathematical models that determine the essence of the system of intellectual control of an object.Item THE METHOD OF AUTHENTICATION OF LAPTOPS BY INTERNAL ELECTRICAL FLUCTUATIONS. Метод автентифікації ноутбуків внутрішніми електричними флуктуаціями(2018) Niemkova, Olena; Нємкова, Олена; Shandra, Zenovii; Шандра, Зіновій; Voitusik, Stepan; Войтусік, СтепанThe article is devoted to the method of authentication of laptops based on the correlation analysis of their internal electric fluctuations. The following results were obtained: the authentication of each laptop can be carried out uniquely by its internal electrical fluctuation; uniqueness of authentication is provided by the invariants of the autocorrelation function of fluctuations; the authentication sign is based on an analysis of the shape of the graph of the autocorrelation function. The authentication algorithm is presented.Item МЕТОДИКИ ВИПРОБУВАНЬ ТА ОСОБЛИВОСТІ ЗАСТОСУВАННЯ В ПОЛІЦЕЙСЬКИХ ПІДРОЗДІЛАХ СНАЙПЕРСЬКИХ ГВИНТІВОК. METHODS OF TESTING AND PECULIARITIES OF USE OF SNIPER RIFLES IN POLICE SUBDIVISIONS(2018) Мамотенко, П.І.; Mamotenko, P.I.The paper deals with issues related to conducting scientific researching in the department of the armed forces of the laboratory for the certification of manual firearms and special means of self-defense within the framework of the research of the State Research Institute of the Ministry of Internal Affairs of Ukraine. Development of departmental general technical requirements and programs, methods of testing sniper rifles for the purpose of obtainig samples of sniper weapons for the needs of the National Police, the National Guard and the State Border Guard Service of Ukraine. The purpose of the paper is systematization existing differences in the use of sniper weapons by police and army snipers such as: legality and policy of combat using, distance of firing, character of purpose, shooting, exchange of rifles, etc.,study of the influence of these differences on the formulation of specific requirements for sniper weapons used by divisions National Police. Highlights problems that formed in the industry due to the lag of the normative base from the needs of the present, and the ways of their solution. The necessity of accreditation for the requirements of the standard DSTU ISO / IEC 17025: 2006 “General requirements for the competence of testing and calibration laboratories” of the testing laboratory for improving the quality of tests is substantiated. Features of combat application of sniper rifles in police units and their influence on tactics, organization, equipment, planning, the whole sphere of sniper works is considered. Data is provided on the current requirements for firing taking into account the capabilities of sniper weapons. The analysis of components of a sniper rifle and their influence on the quality of sniper weapons in general is carried out. The main types of inspections that are used in the process of developing a program and techniques for testing sniper rifles are given. Requirements for the use of the methods specified in international, regional, national standards or manufacturer’s recommended test equipment are formulated. The necessity of evaluating the suitability of their own design methods for their application in test laboratories accredited to meet the requirements of DSTU ISO / IEC 17025: 2006 was stressed.Item Використання електронних довірчих послуг у системі МВС України. USE OF ELECTRONIC TRUST SERVICES IN THE MINISTRY OF INTERNAL AFFAIRS OF UKRAINE(2018) Чередниченко, А.В.; Cherednychenko, A.V.The article is devoted to the prospects of using electronic trust services, including electronic digital signature, time and electronic seals in electronic documents of state enterprises, state bodies and structures of the Ministry of Internal Affairs of Ukraine. The analysis of advantages and disadvantages of digital signature is carried out. The ways of introduction of alternatives, methods and means of identification of the person when signing electronic documents are described. The introduction of e-government in Ukraine without the effective functioning of the electronic document flow system is impossible. Also important for paperwork in electronic form is the proper study and signing of the document. Taking into account the fact that the scanned document with the signature and seal of the department is not the original document, namely the document signed with the use of electronic digital signature (EDS), according to the Ukrainian legislation will already be a legally significant document. In this article, we will examine and find out what it means, how it is formed, when and why it uses an electronic digital signature. In Ukraine, from 2002-2018, a number of legislative acts and normative and technical documents on EDS were adopted and revised. From that time on, this branch has passed the stage of formation and is currently actively developing. We can separately highlight the adopted by the Cabinet of Ministers of Ukraine “Strategy for the development of the Information Society in Ukraine” of May 15, 2013, No. 386-p. The strategy outlines key areas of innovation: e-government, e-democracy, e-economy, e- commerce, e-service, e-education, e-medicine, e-culture. The number of administrative services that can be arranged electronically by signing an electronic digital signature is steadily increasing. In particular, at the service centers of the Ministry of Internal Affairs of Ukraine, citizens have the opportunity to use administrative services such as: issuance of a certificate of legality, which may be accepted by the elected, most convenient territorial, service center of the Ministry of Internal Affairs. It was stated that in order to improve the functioning of EDS in Ukraine, a number of normative acts were adopted in recent years. Ukraine’s progress in the field of information and communication technologies (ICTs) has affected its assessment in the world.Item Розробка методу відокремлення цифрового зображення, збереженого у форматі без втрат, від зображення, збереженого із втратами. DEVELOPMENT OF THE METHOD OF SEPARATING DIGITAL IMAGE, STORED IN A LOSSLESS FORMAT, FROM STORED WITH LOSSES(2018) Бобок, І.І.; Bobok, I.I.Information integrity is one of the main properties of the information security object. Unauthorized actions on an image, using it as a container in a stenographical system, often lead to a difference in the format of the original image from the one whose integrity is violated. The establishment of the fact of such a format change is a pointer to the transformation of the image, to the violation of its integrity. The paper developed a method of separating a digital image, which was originally stored in a lossless format, from that which was saved to a lossless format from a losses format. The method is designed to determine the quality factor QF used in the primary compression. The basis of the method is the analysis of the normalized separation of the maximum singular numbers of blocks of the image matrix. The blocks are obtained as a result of the standard partition of the matrix. Concept of a pronounced local maximum of a function allowed automated the process of determining the quality factor QF of the primary compression of a digital image. Two algorithmic implementations of the method are proposed, which have high efficiency, which is determined by errors of the first kind. For one of the algorithmic implementations, errors of the first kind were not identified during the computational experiment. The average value of the number of errors in determining the quality factor QF of the primary compression of the original losses image was 7.5 % when using the first method for determining the pronounced local maximum and 6.5 % when using the second method. The computational complexity of the proposed algorithms of the developed method is determined by the number of blocks of the digital image that is subjected to expertise. For the image with the matrix became operations. If a color image is analyzed (for example, an RGB scheme), the proposed algorithms can be applied both to one (arbitrarily chosen) color component, and for each of them. The developed method is considered by the authors as the basis for developing a method for detecting violations of the integrity of a digital image under conditions of minor disturbances of the original image matrix.Item Полімери, що біологічно розкладаються, як замінники матеріалів синтетичного походження. BIODEGRABILITY POLIMERS AS SUBSTITUTES FOR SYNTHETIC MATERIALS(2018) Березненко, Н.М.; Bereznenko, N.M.; Неня, О.В.; Nenia, O.V.; Кучинський, Ю.Д.; Kuchynskyi, Yu.D.The attention is focused on the actual problem concerning the effective control of environmental pollution. It was pointed out that addressing environmental issues requires a comprehensive approach, which is implemented in particular in the National Strategy for Waste Management till 2030, which defines the general measures in the field of waste management in general and special measures in the field of management of certain types of waste. The purpose of this Strategy was to create conditions for raising the standard of living of the population by introducing a systemic and effective approach to waste management at various levels of state formation, offering methods and technologies for increasing the volume recycling for the further reuse of materials contained in waste, as well as reduction of volumes of formation of waste, especially of synthetic origin, such as polyethylene. With these matters cleared away, the paper highlights the idea of creating compositions and technologies for obtaining polymers that are capable of accelerated decomposition. And although the cost of producing traditional synthetic polymers and their products is much lower compared to the cost of polymers that are capable of accelerating the timetable, it is precisely the use of the latter to be a step in solving the problem of waste disposal. The article covers the results of research of several samples films, composite materials of accelerated decomposition containing different components in different proportions, after their containment in compost. In the studied compositions, the PEGT mark 15803-020 was chosen as a polymer matrix, starch – as the initiator of biological decomposition, cobalt stearate to initiate the photo-oxidation decomposition. The influence of microorganisms on the distribution of these polyethylene compositions is shown. According to the results of the study, a composition of a composite material (polyethylene) with a high decomposition index containing its composition, in particular concentrates of cobalt stearate, citric acid and starch was proposed. This material can become one of the effective solutions for the realization of the objectives of efficient waste management within the integrated waste management system.Item Оцінка ефективності світлосигнальної системи аеродрому в інфрачервоному діапазоні електромагнітних хвиль. ASSESSMENT OF THE EFFICIENCY OF THE AERODROME LIGHT SIGNALING SYSTEM IN THE RANGE OF INFRARED ELECTROMAGNETIC WAVES(2018) Головенський, В.В.; Holovenskyi, V.V.; Неділько, С.М.; Nedilko, S.M.; Лєнков, Є.С.; Lienkov, Ye.S.The reliable operation of the aerodrome lighting system is indispensable for the safety and regularity of civil aviation flights. It must meet all the requirements of all- weather conditions, dailiness and jamming resistance. At the present stage, the robot vision equipment is being developed, which, according to many technical and operational parameters, has advantages over lighting equipment, designed for visual perception of cues. The aerodrome beam signal complex is a rather complicated topological system that solves the problems of detecting, recognizing, identifying signals and objects. Maximizing the efficiency of the technical part of the complex requires the search for physical and technical possibilities for optimizing its components: radiation sources, atmospheric channel, optical system and photodetector. The specified group of components of infrared (IR) communication channel is multiplicative, that is expressed at the ratio of signal / noise at the output of the photodetector. The optimization of the radiation source in the lighting equipment is successful by replacing traditional incandescent lamps with LED (Light-emitted diode) lamps. However, the energy competitiveness of quasi-monochromatic semiconductor diodes of infrared radiation in comparison with thermal radiators is not obvious, since such sources also radiate most of the energy consumed in a wide infrared spectrum range. Therefore, a comparative analysis of the effectiveness of the signaling system in the IR wavelength range for two different sources was conducted: a semiconductor infrared diode and an ideal tungsten filament. For this purpose, a generalized formula is used to calculate the number of signal electrons on one pixel of the matrix photodetector for several atmospheric transparency windows. It is established that for a thermal vision camera of industrial production, the ratio of signal / noise of the IR diode of serial production (even with incomplete coherence of spectra) is 1.7 times more than for an ideal tungsten filament of equal power. When comparing signals in a common transparency window, the excess reaches 14 times. This result is achieved, despite the non-optimal conditions for using an IR diode due to its high energy efficiency. The results show that the IR beam signal system will have even higher performance with the absolute coherence of the IR diode radiation spectrum with the photodetector photosensitivity spectrum and the choice of working wavelengths within the atmospheric transparency windows.