2018 рік
Permanent URI for this community
Browse
Browsing 2018 рік by Title
Now showing 1 - 20 of 80
Results Per Page
Sort Options
Item THE METHOD OF AUTHENTICATION OF LAPTOPS BY INTERNAL ELECTRICAL FLUCTUATIONS. Метод автентифікації ноутбуків внутрішніми електричними флуктуаціями(2018) Niemkova, Olena; Нємкова, Олена; Shandra, Zenovii; Шандра, Зіновій; Voitusik, Stepan; Войтусік, СтепанThe article is devoted to the method of authentication of laptops based on the correlation analysis of their internal electric fluctuations. The following results were obtained: the authentication of each laptop can be carried out uniquely by its internal electrical fluctuation; uniqueness of authentication is provided by the invariants of the autocorrelation function of fluctuations; the authentication sign is based on an analysis of the shape of the graph of the autocorrelation function. The authentication algorithm is presented.Item VIDEO ENCODING AND DECODING METHOD. Метод кодування та декодування відео(2018) Zybin, Serhii; Зибін, С.; Kis, Hennadii; Кіс, Г.Nowadays a multimedia content requires the improvement of communication technology. Compression is a process of data redundancy elimination or reducing. Effective storing multimedia and transmission of the data is an actual task. Inpainting can recover homogenous regions in a natural-looking manner, even when certain kinds of limited structure are present. However, conventional image inpainting is not effective at regenerating significant visual structure, especially if they are unique or have special, exact placement in the image. Method for vision-based image compression (HVS), e.g., compression based on structure-aware in-painting discarding regions where features are not detected. Such systems and methods significantly boost image (and video) compression and coding efficiency. The overall result of using the content information is a higher compression ratio than conventional techniques, especially for images that have some redundant visual structure, and a high perceptual fidelity to the original image.Item Автоматическая сегментация фонограмм по паузам речевого потока.Automatic Segmentation of Phonograms by Pauses in Speech Flow(2018) Рыбальский, О. В.; Соловьев, В. И.; Журавель, В. В.; Rybalskyi, O.; Solovev, V.; Zhuravel, V.Рассмотрены вопросы создания системы автоматическою выделения пауз из речевого потока, записанного на фонограмме. Показано, что использование автоматической сегментации пауз является необходимым условием создания современных средств экспертизы материалов и аппаратуры аналоговой и цифровой звукозаписи. Рассмотрены характеристики пауз, образующихся в свободном осмысленном речевом потоке, и показано, что минимальная длительность паузы, подлежащей выделению, составляет 50 мсек. Определены характеристики сигналов пауз, которые могут использоваться при построении системы автоматической сегментации. Показаны особенности сигналов, содержащихся в паузах фонограмм. Представлены разработанные методы и средства, использованные при создании такой системы, и проиллюстрированы результаты ее работы.Розглянуто питання створення системи автоматичного виділення пауз з мовленнєвого потоку, записаного на фонограмі. Показано, що використання автоматичної сегментації пауз є необхідною умовою створення сучасних засобів експертизи матеріалів та апаратури аналогового й цифрового звукозапису. Розглянуто характеристики пауз, що утворюються у вільному осмисленому мовленнєвому потоці, і показано, що мінімальна тривалість паузи, яка підлягає виділенню, складає ЗО мсек. Визначено характеристики сигналів пауз, які можутпь використовуватися при побудові системи автоматичної сегментації. Показано особливості сигналів, іцо містяться в паузах фоногралі. Представлено розроблені методи та засоби, використані при створенні такої системи, та проілюстровано результати її роботи.The issues of creation of the system of automatic selection of pauses are considered from a speech stream written on a phonogram. It is shown that the use of automatic segmentation of pauses is the necessary condition of creation of modem facilities of examination of materials and apparatus of the analog and digital audio recording Descriptions of pauses appearing in a free intelligent speech stream are considered and it is shown that minimum duration of pause subject to the selection 50 ms makes Descriptions of signais of pauses which can be used for the construction of the System of automatic segmentation are certain. The features of the signais contained in the pauses of phonograms are shown. The worked out methods and facilities, used for création of such System, are presented, and her job performances are illustrated.Item Аналого-дискретний пристрій, захищений від витоку побічних електромагнітних випромінювань. ANALOG-DISCRETE DEVICE PROTECTED FROM CONTINUOUS ELECTROMAGNETIC RADIATION(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Опірський, І.Р.; Opirskyi, I.R.; Гаранюк, П.І.; Haraniuk, P.I.; Березюк, Б.М.; Bereziuk, B.M.; Ракобовчук, Л.М.; Rakobovchuk, L.M.The design of an analog-discrete device is developed. Its feature is the absence of external voltage sources, converters and voltage dividers, and thus protected from leakage of side electromagnetic radiation. Since the electro-optical effects in liquid crystals have a threshold character, this property will lie at the basis of the use of liquid crystals to create indicators with a low level of radiation. These indicators are distinguished by a low power consumption, high reliability, simple design and low cost. The transformation of an electrical signal into an optical counting occurs in a liquid crystal display. This is achieved due to the fact that the reference electro- optical elements are connected with a voltage divider, whose role is performed by a high-level electrode, which is contained inside the indicator. The electro-optical reference elements are formed by mutually penetrating combing electrodes placed on the same glass substrate of the indicator. This greatly simplifies the technology of manufacturing the device, because the thickness of the layer of liquid crystal becomes insignificant and there is no need to strictly withstand it. The measured voltage is applied to contact pads, which are located at the ends of high-level electrode, which acts as a voltage divider. From the divider, the voltage is fed to one part (upper) of the comb electrodes, and to the second part (lower) of the electrodes, mutually penetrating with the help of a low-anode electrode. The topology of electrodes, including comb, is performed by milling fine films with an argon laser. In the study, we found out the criterion of the possibility of constructing a reference device with different degrees of reference, which uses the electro-optical effect in a liquid crystal with threshold voltage. And it has been shown that if such equality is not fulfilled, it is necessary to change the levels of voltage reference. The results of studies and calculations of the device on the twist effect and the effect of dynamic light scattering are presented. The results of experimental studies are quite consistent with the calculations, which testifies to the possibility of practical application of an analog-discrete display unit.Item Аналіз сучасного стану безпеки інтернету речей. ANALYSIS OF THE CURRENT SECURITY SITUATION IN THE INTERNET OF THINGS(2018) Дудикевич, В.Б.; Dudykevych, V.B.; Кеньо, Г.В.; Keno, H.V.; Стосик, Т.Р.; Stosyk, T.R.The paper exzamines the problems of Internet of things security. An overview of the use of the Internet of things, dynamics of its distribution and improvement are made. The opinion of the leading experts of the IT industry about the problems of safety of “smart” devices are highlighted. On the basis of the reviewed literary sources, expert opinions of leading IT industry specialists, statistics and recent cases of Internet security breaches, the relevance of the topic and the current unsatisfactory condition of the industry are determined, which is a consequence of negligence, underestimation of threats and insufficient coverage of the issues in information sources. In a part of the work the actual problems of Internet safety at the level of its organization are considered, vulnerability of cloud service, untrusted gateway, wireless communication channels, implementation of authentication and device authorization are analyzed. It is shown that the main sources of vulnerability are Internet devices themselves, which often do not have any protection from cyber attacks. The reasons of unsatisfactory condition of Internet of things safety are analyzed, the existing threats and reasons of their occurrence are shown. It was revealed that the main reason for this situation is the lack of minimum security measures, including penetration tests, prohibition of simple passwords, etc., due to the desire to provide companies maximum producing profits. Cyber attacks on routers and IP video devices and the implications that they cause are listed. The present condition of the state and international regulation of the Internet of things problems, standardization and certification are analyzed. The main principles, the implementation of which are foreseen in the standards, are given. On the basis of the analysis, a list of recommendations and proposals aimed at minimizing threats to the Internet has been developed.Item Аналіз імовірнісно-геометричного методу визначення місцеположення рухомих об'єктів.Analysis of the Probabilistic-Geometric Method for the Definition of the Location of Movable Objects(2018) Бєляєвський, Л. С.; Сердюк, А. А.; Топольськов, Є. О.; Bieliaievskvi, L.; Serdiuk, A.; Topolskov, Y. O.У статті наводиться обґрунтування методу мінімізації форматів похибок визначення координат і траєкторій рухомих об’єктів на основі обробки інформації багатопозиційних (у тому числі й супутникових) навігаційних систем та комплексів. Отримані результати дають можливість розробити методики та алгоритми просторово-часової обробки інформації у багатопозиційних та комплексних навігаційних системах, що забезпечать підвищення точності навігаційних визначень координат і траєкторій рухомих об’єктів. В статье приводится обоснование метода минимизации форматов погрешностей определения координат и траекторий подвижных объектов на основе обработки информации многопозиционных (в том числе и спутниковых) навигационных систем и комплексов. Полученные результаты дают возможность разработать методики и алгоритмы пространственно-временной обработки информации в многопозиционных и комплексных навигационных системах, обеспечивающих повышение точности навигационных определений координат и траекторий движущихся объектов.The obtained results allow developing methods and algorithms of space-time information processing in multi position and complex navigation systems that will improve the accuracy of navigation determinations coordinates and trajectories of moving objects.Item Аспекти створення спецтранспорту для перевезення осіб, узятих під варту. Aspects of the Creation of Special Transport for the Transportation of Persons taken into Custody(2018) Смерницький, Д.В.; Гуляєв, А.В.; Гусак, О.В.; Приходько, В.І.; Prykhodko, V.; Smernytskyi, D.; Guliaiev, A.; Gusak, O.Спеціалізовані автомобілі та інші транспортні засоби спеціального призначення для перевезення за визначеними маршрутами ув’язнених та осіб, взятих під варту, завжди були необхідні в конвойних підрозділах Міністерства внутрішніх справ України. У статті йдеться про історію виникнення та аспекти створення і використання спеціалізованих транспортних засобів для перевезення осіб, взятих під варту, закордонного та вітчизняного виробництва. Специализированные автомобили и другие транспортные средства специального назначения для перевозки по определенным маршрутам заключенных и лиц, взятых под стражу, всегда были необходимы в конвойных подразделениях Министерства внутренних дел Украины. В статье речь идет об истории возникновения и аспектах создания и использования специализированных транспортных средств для перевозки лиц, взятых под стражу, зарубежного и отечественного производства. Specialized cars and other transport vehicles of the special setting for transportation on certain routes prisoners and persons kept in custody always were actual and needed in escort subdivisions of law enforcement authorities. Paper is about the origin and aspects of creation and use of the foreign and home specialized transpoit vehicles for transportation of the persons kept in custody.Item Аспекти формування вимог до систем виявлення безпілотних повітряних суден (апаратів). ASPECTS OF FORMING REQUIREMENTS FOR DETECTION SYSTEMS OF UNMANNED AERIAL VEHICLES (UAV (A))(2018) Заїчко, К.В.; Zaichko, K.V.The rapid development of the market for unmanned aerial vehicles (UAV (A)) contributed to their implementation in various sectors of industry, agriculture, economy and entertainment. In turn, the unlimited possibility of acquiring and, accordingly, unregulated and careless use of such devices leads to irreversible consequences, including severe ones. This year in June the Temporary Use of Airspace was published for the consi- deration and discussion of citizens. A new name for devices has been suggested – remotely manned aircraft. It is proposed to introduce the registration of these devices and obtain appropriate permits for flights nearby airports, roads, houses and structures of crowded places, etc. Unauthorized use of UAV (A) can not be left out of the attention of the law enforcement system, especially in mass events. There is a need for monitoring and insurance of the possibility of counteracting unauthorized flights of UAV (A) over protected objects and on objects representing an area of a high danger. The creation of detection and response systems must meet a number of requirements. Continuous development and modernization of UAV (A) devices involves state-of-the-art control technologies that have increased the resistance to interference. The possibility of updating parameters and characteristics of UAV (A) (amplifiers for the increasement of the range of remote controls, coding of control channels and information transmission) is not excluded, and this will greatly complicate the tasks of law enforcement agencies. Technical systems and means of monitoring and counteraction to the UAV (A) that are planned to be equipped must meet the current technical requirements and have a developed architecture that will make it impossible to observe moral aging throughout their lifetime.Item Вибір параметрів еліптичних кривих у задачах шифрування інформаційних потоків(2018) Якименко, І.З.; Тимошенко, Л.М.; Касянчук, М.М.The analysis of information flow protection systems using the mathematical apparatus of elliptic curves (EC) was conducted in this paper on which basis the main advantages were established, namely, the speed and relatively small length of the key. It provides unique capabilities for building reliable and efficient cryptographic algorithms. Despite the significant advantages of EC in cryptographic information security systems, there are also some difficulties that hamper the practical use of EC in these systems. They are conditioned by the need for solving such urgent classes of tasks – providing a simple number of p – module for the conversion of groups of points of an elliptic curve, generating parameters and bases on the EC, finding the order of EC. Therefore, studies were conducted on the choice of parameters of the EC according to certain criteria, taking into account which can build information flow protection systems that will provide the necessary level of stability and security against unauthorized access. The theoretical foundations of cryptography on the basis of the mathematical apparatus of elliptic curves and the estimation of computational complexity of the methods of point exponentiation, which are basic in encrypting information flows in computer systems are presented. Based on the conducted studies, the graphs of the dependence of memory volume M of each method, depending on the width of the window w, when bit input parameters of the EC 200 bit and the time complexity. The latter points indicate a significant advantage of the method of maximum memory compared with the method of exponentiation at a fixed point, and in two cases, there is a slight decrease in computing resources approximately 1.25 times with an increase in the dimension of the window. It is also established that the method of exponentialization at a fixed point needs much less memory.Item Вибір способу керування переносом електродного металу при механізованому зварюванні модульованим.Selection of a Method for the Control of Carrying of Electrode Metal at Mechanized Welding with Modulated Current(2018) Гуляєв, А.В.; Будзинський, М.П.; Диких, О.В.; Guliaiev, A.; Budzynskyi, M.; Dykykh, O.У статті на підставі аналізу сил, які діють на краплю рідкого металу електрода при механізованому зварюванні, показано, що сила тяжіння, а також електродинамічна сила можуть бути використані для прискорення відриву краплі рідкого металу від торця електрода, таким чином забезпечуючи перехід до дрібнокраплинного переносу рідкого металу. За результатами аналізу визначено перспективне направлення керування переносом електродного металу в процесі механізованого зварювання модульованим струмом та можливість отримання більш якісного шару наплавленого металу, а також зменшення температурного впливу на основний метал.В статье на основании анализа сил, действующих на каплю жидкого металла электрода при механизированной сварке, показано, что сила тяжести, а также электродинамическая сила могут быть использованы для ускорения отрыва капли жидкого металла от торца электрода, тем самым обеспечивая переход к мелкокапельному переносу жидкого металла. За результатами анализа определено перспективное направление управление переносом электродного металла, в процессе механизированной сварки модулированным током и возможность получения более качественного слоя наплавленного металла, а таклсе уменьшение температурного воздействия на основной метал.In the paper, on the basis, of an analysis of the forces acting on the drop of a liquid metal electrode in mechanized welding, it is shown that gravity and electrodynamic force can be used to accelerate the separation of a drop of a liquid metal from the end of the electrode, thus ensuring the transition to the fine-grained, transfer of the liquid metal. Accoiding to the results of the analysis, the perspective direction of the transfer of electrode metal in the process of mechanized welding with modulated current and the possibility as well as reducing the temperatureof obtaining a better layer of the weld metal, influence on the base metal, was determined.Item ВИЗНАЧЕННЯ ПОНЯТТЯ "ХОЛОДНА ЗБРОЯ" В НАЦІОНАЛЬНИХ СТАНДАРТАХ УКРАЇНИ. DEFINITION OF THE CONCEPT OF “COLD ARMS” IN THE NATIONAL STANDARDS OF UKRAINE(2018) Коваль, М.В.; Koval, M.V.In the article, based on a detailed analysis of available scientific and legal sources, definitions of the concepts “Arms” and “Cold Arms”, attention is directed to the importance and necessity of building a precise definition of “cold arms”, with the aim of approval in the legislation of Ukraine. There are many shortcomings in native legislation, which require the earliest elimination. Among the objects of the rights of citizens and other entities the arms occupies a special place, of its specific properties. The category of “Arms” and “Cold Arms” is abstract, since it covers a multitude of diverse objects and devices that have various properties. Legislative acts of “Cold Arms”; they do not including classifications, which would cover the whole list, on which the relevant administrative-legal regime should be spread. In this regard, legal definitions of arms become defining value, as well as its legal classification is clearly defined, which became the basis for determining the content and also duties of the participants in the legal relationship, construction of the administrative-legal regime of arms circulation in Ukraine. Attempted overcome to controversial issues, that arise regarding the classification of Cold Arms in Ukraine, through the prism of the current native legislation was rendered. The problem issues of cold arms are considered in accordance with the specifics of its applications. Types of cold arms, its specification, method of manufacture and level of autonomy for certain historical and ethnic types. Taken cognizance into consideration the opinion of the scientists of the authors of criminal-law and forensic literature on the concept of Cold Arms. Set up of criminal liability for the use of Cold Weapons, the legislator proceeds from the public security of various acts, connected primarily with the that the use of arms in a certain way creates conditions for murder, causing serious harm to health, used in the execution of robberies and other serious crimes. Thus, the possibility of defeating a weapon at a distance actually excludes it from the category of Cold Arms, but this creates a gap, the essence of which is the impossibility of classifying a cold weapon that has a dual function. According to the modern methodology used by the Ministry of Internal Affairs of Ukraine (MIA of Ukraine) and the criteria it contains, not all knives, including those, may fall under the notion of Cold Arms, are namely Cold Arms. In practice, most of the errors occur when analyzing the subjective side of the acquisition, sale, wearing and manufacturing of Cold Arms. The criminal law provides for direct intent when committing these acts. The content of the intention should include the knowledge that the subject is a Cold Arms, and the actions what has been done, are socially dangerous. A number of conclusions and recommendations for the definition of “Cold Arms” are formulated.Item Використання електронних довірчих послуг у системі МВС України. USE OF ELECTRONIC TRUST SERVICES IN THE MINISTRY OF INTERNAL AFFAIRS OF UKRAINE(2018) Чередниченко, А.В.; Cherednychenko, A.V.The article is devoted to the prospects of using electronic trust services, including electronic digital signature, time and electronic seals in electronic documents of state enterprises, state bodies and structures of the Ministry of Internal Affairs of Ukraine. The analysis of advantages and disadvantages of digital signature is carried out. The ways of introduction of alternatives, methods and means of identification of the person when signing electronic documents are described. The introduction of e-government in Ukraine without the effective functioning of the electronic document flow system is impossible. Also important for paperwork in electronic form is the proper study and signing of the document. Taking into account the fact that the scanned document with the signature and seal of the department is not the original document, namely the document signed with the use of electronic digital signature (EDS), according to the Ukrainian legislation will already be a legally significant document. In this article, we will examine and find out what it means, how it is formed, when and why it uses an electronic digital signature. In Ukraine, from 2002-2018, a number of legislative acts and normative and technical documents on EDS were adopted and revised. From that time on, this branch has passed the stage of formation and is currently actively developing. We can separately highlight the adopted by the Cabinet of Ministers of Ukraine “Strategy for the development of the Information Society in Ukraine” of May 15, 2013, No. 386-p. The strategy outlines key areas of innovation: e-government, e-democracy, e-economy, e- commerce, e-service, e-education, e-medicine, e-culture. The number of administrative services that can be arranged electronically by signing an electronic digital signature is steadily increasing. In particular, at the service centers of the Ministry of Internal Affairs of Ukraine, citizens have the opportunity to use administrative services such as: issuance of a certificate of legality, which may be accepted by the elected, most convenient territorial, service center of the Ministry of Internal Affairs. It was stated that in order to improve the functioning of EDS in Ukraine, a number of normative acts were adopted in recent years. Ukraine’s progress in the field of information and communication technologies (ICTs) has affected its assessment in the world.Item Впровадження технології безконтактного обміну даними в телекомунікаційні системи.Implementation of the Technology of Contactless Data Exchange in Telecommunication Systems(2018) Ткаленко, О.М.; Tkalenko, O.Досліджено області телекомунікаційних систем, що працюють із технологією безконтактного обміну даними та області, у яких зберігається можливість упровадити NFC. Досліджено основні фактори, які стримують розвиток NFC в Україні, установлено фактори для активного розвитку технології в Україні, проаналізовано найважливіші відмінності між NFC і RFID. Розглянуто способи впровадження технології NFC, вибір правильного типу чіпа. Розроблена схема організації випробувальної установки для перевірки пристрою на відповідність вимогам безконтактного обміну даними. Запропоновано розширити сфери застосування NFC впровадженням технології в різні телекомунікайні системи.Исследованы области телекоммуникационных систем, работающих с технологией бесконтактного обмена данными и области, в которых есть возможность внедрить NFC. Исследованы основные факторы, сдерживающие развитие NFC в Украине, установлены факторы для активного развития технологии в Украине, проанализированы важнейшие различия между NFC и RFID. Рассмотрены способы внедрения технологии NFC, выбор правильного типа чипа. Разработана схема организации испытательной установки для проверки устройства на соответствие требованиям бесконтактного обмена данными. Предложено расширить сферы применения NFC внедрением технологии в различные телекомуникационные системы.Spheres of telecommunication systems working with non-contact data communication and area technologies in which there is an opportunity to implement NFC are studied The main factors hindering the development of NFC in Ukraine are investigated, factors for the active development of technology in Ukraine are detennined, the most important differences between NFC and RFID are analyzed. Methods of implementing NFC technology, choosing the right type of a chip are considered. The scheme of organizing the test facility for testing the device to meet the requirements of contactless data exchange is developed. It is suggested to extend the scope of an application of NFC by introducing technology into various telecommunication systems.Item Відеоспостереження в публічних місцях та права громадян на приватність: досвід Сполучених Штатів Америки(2018) Харина, Ю.А.Paper considers the issue of the balance between the technical capabilities of civil video surveillance systems and the right of citizens to privacy, the capabilities of these systems to violate the basic rights of citizens. It is stated the insufficient, against expectations, effectiveness of solving the problems of fighting crime, for which these systems are designed, with simultaneous permanent violation of civil rights. An example of the rules for the introduction of civil video surveillance systems is provided, which are intended to help support of the aforementioned balance, offered for use in the United States.Item Дальність дії тепловізора та чинники, які на неї впливають. ACTION RADIUS OF THERMAL IMAGER AND FACTORS AFFECTING IT(2018) Неня, О.В.; Nenia, O.V.Several technical and optical factors, observation conditions that affect the range (detection distance of thermal radiation) of thermal grids, including military ones, which are simultaneously the main criteria for their selection, are considered. Such concepts as “detection range”, “recognition,” and “identification,” characterizing different degrees of the vision of the target (object) with a thermal imager, are highlighted. Attention is drawn to a probabilistic index – the Johnson criterion, which, although it is probabilistic, since it depends on a number of random factors, is however the most universal and widespread one. It gives a forecast of the efficiency of the thermal imaging camera for solving a specific problem in certain conditions. Among the important factors affecting the range of action of thermal imagers, the thermal transparency of the atmosphere is considered. Since thermal radiation weakens due to the absorption of gas by molecules, dust, aerosols, etc., an important component of the effective operation of thermal imagers is the so-called “transparency win- dows” – spectral ranges convenient for their work. Among the technical factors that significantly affect the range of the thermal imager, paper details the resolution of its photodetector (or matrix), the dimensions of which (the number of sensitive elements (pixels) located horizontally and vertically) determine the final image clarity. An important parameter that significantly affects the range of a thermal imager is the focal length of the objective lens (lens) of the thermal imager, collects and focuses IR radiation on the matrix in accordance with the temperature distribution of the observed object. The radius of action of the thermal imager depends on the focal length of the lens, which also affects the so- called instantaneous sector of the system overview (IFoV) – the angular resolution of the system. The value of the focal length and angular resolution are inversely proportional, which is enshrined in the paper by mathematical calculations. Speaking about the focal length of the lens, we should not forget about the sharpness of the displayed space, which depends on the lens aperture, and which characterizes the degree of attenuation by the lens (lens system) of the infrared imager from the object of observation. Paper concluded that determining the range of the thermal imager, as a function of multiple variables, requires a fairly complex simulation.Item Деякі аспекти термінології експертизи матеріалів та засобів відеозвукозапису(2018) Рибальський, О.В.; Журавель, В.В.Paper provides new terms that have arisen and are used in the modern examination of materials and means of video-, audio recording, and their definitions are suggested. Several definitions of some terms used earlier have been corrected as well. The proposed definitions of terms reflect physical and technical essence of the objects they designate. The terminology is suggested to use when drawing up expert conclusions.Item Дистанційні методи електронного контролю об'єктів. DISTANCE METHODS OF ELECTRONIC CONTROL OF OBJECTS(2018) Рибальський, О.В.; Rybalskyi, O.V.; Крутофіст, І.М.; Krutofist, I.M.; Кудінов, В.А.; Kudinov, V.A.Basic methods of the construction of the system of control of personality systems are considered. It is shown, that the used systems aren’t bar enough to external interferences. It gives the possibility to the malefactors to block alarming and imitating the signals of the normal condition of devices of control. An aim of the paper is the development of the method of increasement of stability of the system to the possible blocking and imitation of work of the checking system. It is shown that an application in the system of the sessions of connection, conducted in random moments, allows to promote its stability. The increasement of stability and application of code sequences of the signals chosen by chance for every session of connection. Method of construction of control system of such devices is worked out, having enhanceable firmness to external interferences. Thus, the time of subsequent session, chosen by chance, and casual code sequences are formed during the current session of connection and passed from the base station to the supervisory device. Time of subsequent session of connection gets out from the set maximal interval of time between sessions, which is determined by register length and by the clock rate used in the system. This choice is realized true by chance by application of generator of noise. The system on the basis of this generator and threshold devices forms a signal, setting a register in some casual position, qualificatory time of subsequent session. Analogical character is forming of casual code sequence for this session. These operations in the system are conducted in the automatic mode. All these actions are produced automatically without intervention of an operator, therefore the parameters of the next session of connection are unknown to him. It eliminates the preliminary drafting of curriculum of sessions of connection and table of the code sequences applied in every session. The increasement of firmness is arrived at due to that neither the malefactors nor operator, checking the location of the controlled personality, don’t know either time or check code, which will be used during the next session of connection. Possibility of the influence of a man on the process of control is thus removed.Item Додатковий бронезахист транспортних засобів із використанням комбінованих кераміко-полімерних матеріалів(2018) Власов, В.А.; Нешпор, О.В.; Мазна, О.В.; Самусь, Є.В.The composition and structure of additional vehicle armor were investigated. It is shown that the structure of the combined material with the content of ceramic, polymer composite and metal layers is the most effective for the creation of promising protective structures. Designs have been developed for the additional protection of light-armored vehicles (LBT) against weapons of 12.7 and 14.5 mm caliber with the content of ceramic, fiber-polymer and metal layers. The increase of the level of ballistic protection and increased survivability of elements of the LBT structure, more than doubled weight compared to traditional metal armor, the possibility of easy dismantling and repair in field conditions are stated.Item Дослідження матеріалів для захисту людини від шкідливих чинників навколишнього середовища. RESEARCH OF MATERIALS TO PROTECT HUMAN FROM HARMFULL ENVIRONMENTAL INFLUENCES(2018) Дячок, Т.М.; Diachok, T.M.; Березенко, С.М.; Bereznenko, S.M.; Бакал, В.П.; Bakal, V.P.; Александров, М.Є.; Aleksandrov, M.Ye.The paper is devoting to researching of properties of materials for protection of the person from harmful factors. The issue of protecting people from the influence of external harmful factors to date is very relevant. There are a number of factors, constitutes a threat to the human health in the process of life. The nature of the dangerous influence on the person of external factors is quite diverse by nature of origin, the nature of interaction with the organism and the consequences that cause the action of harmful factors. For protect against the influence of dangerous harmful factors, personal protective equipment is used, the leading place among which is the special protective clothing. When designing protective clothing, important to investigate the properties of materials, as well as the impact of the processes of clothing use on the properties of these materials. The analysis of harmful factors and the study of general properties of protective materials was carried out by analytical and observation methods. Investigation of the influence of operation factors on the change of the properties of textile materials for protective clothing was carried out by experimental method (for the experiment, a tear-off machine of the brand RT-250 was used). The scientific novelty determined by the influences of the washing process on the values of bursting and elongation during the rupture of materials for the manufacture of protective clothing (fabric CORDURA NIR and CORDURA MK, jersey Cool- Max). Based on the results of the study, the authors conclude that the wet processing improves the bursting characteristics of the materials being studied. At the same time, the authors emphasize the need for a comprehensive study of the quality indicators of the materials in question in order to fully determine their protective properties. In the conclusions, the authors suggest the use of investigated fabrics for the manufacture of protective clothing for protection against mechanical damage, and also indicate that the jersey under study does not lose the strength characteristics during washing. Research materials can be used to improve the design of clothing protective special.