Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2022.17.167186
S. Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, O. Nechyporuk, Bohdan Horbakha
The rapid development of unmanned aerial vehicles (UAVs), as well as the expansion of the list of actions performed by modern UAVs, led to increased requirements for the safety and reliability of data transmission. In the context of warfare, when confidential information is collected, the protection of such information is a top priority. The practical level of conducting aerial reconnaissance during current warfare demonstrates the urgent need to create UAV which capable of performing flight tasks and aerial reconnaissance in the mode of installed radio interference, and also emphasizes the importance of ensuring the data confidentiality about target objects transmitted by an optical channel for the implementation of their processing in automated systems. The paper provides a review and comparative analysis of modern cryptoalgorithms that are used to ensure data confidentiality during their transmission by radio channel from UAV to ground objects. There are the system of criteria (multi criteria analysis) was used to compare following cryptographic algorithms (similar to AES, NESSIE, etc competitions): block and key sizes; modes of operation; encryption speed; memory requirements; resistance (security) to cryptanalysis. The conducted analysis showed that each cryptographic algorithm has advantages and disadvantages. Also, there is no universal cryptographic algorithm that capable to resolve all privacy problems in UAV. According to the limited resources in the process of UAV operation, it is necessary to create a universal set (dataset) of cryptographic algorithms that could solve various problems in different conditions including different aspects of UAV exploitation. It is these studies that will be devoted to the further work of the authors within the framework of the ongoing scientific project.
{"title":"ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV","authors":"S. Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, O. Nechyporuk, Bohdan Horbakha","doi":"10.28925/2663-4023.2022.17.167186","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.167186","url":null,"abstract":"The rapid development of unmanned aerial vehicles (UAVs), as well as the expansion of the list of actions performed by modern UAVs, led to increased requirements for the safety and reliability of data transmission. In the context of warfare, when confidential information is collected, the protection of such information is a top priority. The practical level of conducting aerial reconnaissance during current warfare demonstrates the urgent need to create UAV which capable of performing flight tasks and aerial reconnaissance in the mode of installed radio interference, and also emphasizes the importance of ensuring the data confidentiality about target objects transmitted by an optical channel for the implementation of their processing in automated systems. The paper provides a review and comparative analysis of modern cryptoalgorithms that are used to ensure data confidentiality during their transmission by radio channel from UAV to ground objects. There are the system of criteria (multi criteria analysis) was used to compare following cryptographic algorithms (similar to AES, NESSIE, etc competitions): block and key sizes; modes of operation; encryption speed; memory requirements; resistance (security) to cryptanalysis. The conducted analysis showed that each cryptographic algorithm has advantages and disadvantages. Also, there is no universal cryptographic algorithm that capable to resolve all privacy problems in UAV. According to the limited resources in the process of UAV operation, it is necessary to create a universal set (dataset) of cryptographic algorithms that could solve various problems in different conditions including different aspects of UAV exploitation. It is these studies that will be devoted to the further work of the authors within the framework of the ongoing scientific project.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2020.7.7284
Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, V. Kraskevich, A. Roskladka, V. Gamaliy
The article addresses one of the most pressing problems for a trading enterprise, namely the problem of routing logistics flows for efficient enterprise management. To optimize itineraries, we use state-of-the-art electronic navigation and mapping systems that can be implemented in modern computer technology, from online services available on any computer to mobile devices. Navigation and mapping systems are distributed software complexes with an array of information stored in database management systems. They involve millions of static objects and huge amounts of dynamic data around the world. To optimize the logistics flows, an algorithm for an automated routing system is described. This system solves the problems of automatic calculation of the construction and recognition of the optimal route between the specified points of its beginning and the end, tracking of movement on a given route and, in the case of congested roads, redirection of logistics flows. Based on the researches and experiments on the formation of a cognitive map in the human mind and the perception of the route description, an algorithm for storing and displaying route data is considered. This algorithm takes into account the personal psychology of perception of cartographic information. Developing an algorithm for describing the routing of trading enterprise traffic flows is creating a model of automatically found path between the predetermined points of its beginning and end. This mapping information is personalized, easy to read, fast to remember, and insensitive to user errors. The proposed algorithm is universal and can be used to solve a wide range of problems of logistic flows optimization.
{"title":"AUTOMATED LOGISTIC FLOW SYSTEM FOR TRADING ENTERPRISE","authors":"Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, V. Kraskevich, A. Roskladka, V. Gamaliy","doi":"10.28925/2663-4023.2020.7.7284","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.7.7284","url":null,"abstract":"The article addresses one of the most pressing problems for a trading enterprise, namely the problem of routing logistics flows for efficient enterprise management. To optimize itineraries, we use state-of-the-art electronic navigation and mapping systems that can be implemented in modern computer technology, from online services available on any computer to mobile devices. Navigation and mapping systems are distributed software complexes with an array of information stored in database management systems. They involve millions of static objects and huge amounts of dynamic data around the world.\u0000To optimize the logistics flows, an algorithm for an automated routing system is described. This system solves the problems of automatic calculation of the construction and recognition of the optimal route between the specified points of its beginning and the end, tracking of movement on a given route and, in the case of congested roads, redirection of logistics flows.\u0000Based on the researches and experiments on the formation of a cognitive map in the human mind and the perception of the route description, an algorithm for storing and displaying route data is considered. This algorithm takes into account the personal psychology of perception of cartographic information. Developing an algorithm for describing the routing of trading enterprise traffic flows is creating a model of automatically found path between the predetermined points of its beginning and end. This mapping information is personalized, easy to read, fast to remember, and insensitive to user errors.\u0000The proposed algorithm is universal and can be used to solve a wide range of problems of logistic flows optimization.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2021.11.100109
M. Moshenchenko, Bohdan Zhurakovskyi
This article discusses the problems of information security in "SmartCity" systems. The comparison of existing solutions and data protocols for wired solutions, such as IPsec, SSL, TLS and wireless systems: ZigBee, Z-Wave, Thread, WeMo. The advantages and disadvantages of each of the existing systems are analyzed. The SmartCity system must be able to recognize a specific situation that arises in the house, city, workplace, when processing large amounts of data, to respond accordingly: one of the systems can control the behavior of other systems using a pre-designed algorithm. The main purpose of the "SmartCity" system is to save energy, which is becoming increasingly important due to their rise in price in Ukraine. Therefore, intellectualization is becoming increasingly popular, catching up with global trends in home automation. However, despite the development and gradual formal and informal standardization of smart city technologies, and any home automation, there is still the problem of choosing protocols for the transfer of information between controlled devices, sensors and other elements. This problem is especially serious when it is necessary to ensure the confidentiality and integrity of data circulating in the system. The purpose of this study is to find a secure network protocol that allows you to use it in automatic signaling equipment, so you can not use special software and hardware solutions to affect the confidentiality and integrity of information.In the article is not the last issue of information security such a house of the city government system or production, can cause very great damage to its owner. As remote management and access to information are quite common nowadays, secure schemes, encryption and protection schemes should be used to reduce the percentage of vulnerabilities and prevent intruders from causing harm.
{"title":"INFORMATION PROTECTION IN “SMART CITY” TECHNOLOGIES","authors":"M. Moshenchenko, Bohdan Zhurakovskyi","doi":"10.28925/2663-4023.2021.11.100109","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.11.100109","url":null,"abstract":"This article discusses the problems of information security in \"SmartCity\" systems. The comparison of existing solutions and data protocols for wired solutions, such as IPsec, SSL, TLS and wireless systems: ZigBee, Z-Wave, Thread, WeMo. The advantages and disadvantages of each of the existing systems are analyzed. The SmartCity system must be able to recognize a specific situation that arises in the house, city, workplace, when processing large amounts of data, to respond accordingly: one of the systems can control the behavior of other systems using a pre-designed algorithm. The main purpose of the \"SmartCity\" system is to save energy, which is becoming increasingly important due to their rise in price in Ukraine. Therefore, intellectualization is becoming increasingly popular, catching up with global trends in home automation. However, despite the development and gradual formal and informal standardization of smart city technologies, and any home automation, there is still the problem of choosing protocols for the transfer of information between controlled devices, sensors and other elements. This problem is especially serious when it is necessary to ensure the confidentiality and integrity of data circulating in the system. The purpose of this study is to find a secure network protocol that allows you to use it in automatic signaling equipment, so you can not use special software and hardware solutions to affect the confidentiality and integrity of information.In the article is not the last issue of information security such a house of the city government system or production, can cause very great damage to its owner. As remote management and access to information are quite common nowadays, secure schemes, encryption and protection schemes should be used to reduce the percentage of vulnerabilities and prevent intruders from causing harm.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114205926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2021.14.131147
Maksym Martseniuk, P. Skladannyi, V. Astapenya
He who possesses information owns the world. This statement is becoming more relevant every day. It is information that has become a tool for modern management and development. Therefore, the role of information technology is also constantly growing along with the risk of their malicious use. Attackers use all possible methods and means of technical intelligence to use potentially possible and create new types of information leakage channels to intercept it. object of information activities. Such oscillations caused by a certain speech (acoustic) signal can be intercepted by means of long-range intelligence. Most often, a laser microphone is used as such. The essence of its action is to emit a laser on the surface of the selected OID, which circulates a speech signal that creates sound vibrations on this surface. The movement of the surface leads to the modulation of the wave by phase, which is manifested in the variable nature of the sound signal Doppler shift of the frequency of the received signal. Often, such a surface is the glass of the windows, which reflects the beam to the receiver, to which is connected a detector that can reproduce the sound from the OID. This study aims to study the dependence of the laser microphone on such factors as: the location of the radiation source and the beam receiver from the membrane; membrane surface material; receiver type; materials of fencing constructions OID. The goal is to create a stand to demonstrate the operation of a laser microphone. The research process is carried out on a smaller scale, which is why an improvised room in the form of a cardboard box was chosen as the OID. Available tools were used to reproduce the operation of the laser microphone, so a laser pointer was chosen as the illuminator, and devices such as a solar panel, a light sensor and a signal amplifier microphone were used as the receiver. The study of the influence of selected factors was performed by measuring the voltage and volume of the acoustic signal using a multimeter and a certified program on the tablet, respectively.
{"title":"EXPERIMENTAL STUDIES OF THE STAND OF SIMULATION MODELING OF LASER MICROPHONE OPERATION FOR REMOVAL OF ACOUSTIC INFORMATION","authors":"Maksym Martseniuk, P. Skladannyi, V. Astapenya","doi":"10.28925/2663-4023.2021.14.131147","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.131147","url":null,"abstract":"He who possesses information owns the world. This statement is becoming more relevant every day. It is information that has become a tool for modern management and development. Therefore, the role of information technology is also constantly growing along with the risk of their malicious use. Attackers use all possible methods and means of technical intelligence to use potentially possible and create new types of information leakage channels to intercept it. object of information activities. Such oscillations caused by a certain speech (acoustic) signal can be intercepted by means of long-range intelligence. Most often, a laser microphone is used as such. The essence of its action is to emit a laser on the surface of the selected OID, which circulates a speech signal that creates sound vibrations on this surface. The movement of the surface leads to the modulation of the wave by phase, which is manifested in the variable nature of the sound signal Doppler shift of the frequency of the received signal. Often, such a surface is the glass of the windows, which reflects the beam to the receiver, to which is connected a detector that can reproduce the sound from the OID. This study aims to study the dependence of the laser microphone on such factors as: the location of the radiation source and the beam receiver from the membrane; membrane surface material; receiver type; materials of fencing constructions OID. The goal is to create a stand to demonstrate the operation of a laser microphone. The research process is carried out on a smaller scale, which is why an improvised room in the form of a cardboard box was chosen as the OID. Available tools were used to reproduce the operation of the laser microphone, so a laser pointer was chosen as the illuminator, and devices such as a solar panel, a light sensor and a signal amplifier microphone were used as the receiver. The study of the influence of selected factors was performed by measuring the voltage and volume of the acoustic signal using a multimeter and a certified program on the tablet, respectively.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123859890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2023.19.4655
Yevhenii Kurii, I. Opirskyy
Managing information security in the organization may be a daunting task, especially considering that it may encompass many areas from physical and network security to human resources security and management of suppliers. This is where security frameworks come in handy and put formality into the process of the design and implementation of the security strategy. While there are a bunch of different information security frameworks out in the wild, the most commonly-found and preferred by security professionals worldwide is ISO/IEC 27001. It combines both the quite comprehensive set of security controls to cover the most important security areas and wide applicability which allows applying this framework to all kinds of organizations. While cyberspace is constantly changing, companies should also adapt their approaches to the organization of information security processes. In order to respond to new challenges and threats to cyber security, the International Organization for Standardization (ISO) at the end of 2022 has published an updated version of the ISO/IEC 27001:2022 standard, which from now on should be taken into account by all organizations that aim to implement and certify its information security management system (ISMS). The purpose of this article is to provide a brief overview of the new edition of the popular standard, фтв describe the key changes in the structure and description of security controls; as well as develop recommendations for achieving compliance with the requirements of the updated version of the standard.
{"title":"ISO 27001: ANALYSIS OF CHANGES AND COMPLIANCE FEATURES OF THE NEW VERSION OF THE STANDARD","authors":"Yevhenii Kurii, I. Opirskyy","doi":"10.28925/2663-4023.2023.19.4655","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.4655","url":null,"abstract":"Managing information security in the organization may be a daunting task, especially considering that it may encompass many areas from physical and network security to human resources security and management of suppliers. This is where security frameworks come in handy and put formality into the process of the design and implementation of the security strategy. While there are a bunch of different information security frameworks out in the wild, the most commonly-found and preferred by security professionals worldwide is ISO/IEC 27001. It combines both the quite comprehensive set of security controls to cover the most important security areas and wide applicability which allows applying this framework to all kinds of organizations. While cyberspace is constantly changing, companies should also adapt their approaches to the organization of information security processes. In order to respond to new challenges and threats to cyber security, the International Organization for Standardization (ISO) at the end of 2022 has published an updated version of the ISO/IEC 27001:2022 standard, which from now on should be taken into account by all organizations that aim to implement and certify its information security management system (ISMS). The purpose of this article is to provide a brief overview of the new edition of the popular standard, фтв describe the key changes in the structure and description of security controls; as well as develop recommendations for achieving compliance with the requirements of the updated version of the standard.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2022.18.7385
N. Barchenko, Volodymyr Lubchak, Tetiana Lavryk
Digitalization is one of the main trends in the development of modern society and the growth factors of the global economy in the coming years. But the progress of technology and the new opportunities of digitalization lead to a rapid growth of cyber threats and cyber incidents. Achieving an appropriate level of digitization of the success of the economy and society is interdependent on the levels of development of information and communication technologies and their protection against possible cyber attacks. The purpose of this work is to develop, from the standpoint of system analysis, formal mathematical models for describing the determination of the national level of digital development of countries, taking into account the national level of cyber security and cyber protection. In order to realize the purpose of the study, data was collected and systematized according to four groups of indicators: the general level of development, the level of digital development of the country, the level of technical infrastructure, and the level of the ability to counter cyber threats. The conducted information analysis made it possible to determine the nomenclature of indicators of digitalization progress and the level of cyber security and cyber protection. Based on it, a structure of component models was formed that describe the necessary elements of the subject area of the task of determining the indicators of the national level of digitalization with the coordination of the indicators of the level of cyber security and cyber protection. The results of the study allow us to assert that the development of the digital economy is impossible without strengthening cyber security both at the state level and at the level of individual entities. Further research will focus on the development of mathematical models for an integral assessment of the state of the country's digital transformation, taking into account the country's ability to counter modern cyber threats.
{"title":"MODEL OF INDICATORS FOR THE ASSESSMENT OF THE NATIONAL LEVEL OF DIGITALIZATION AND CYBER SECURITY OF THE COUNTRIES OF THE WORLD","authors":"N. Barchenko, Volodymyr Lubchak, Tetiana Lavryk","doi":"10.28925/2663-4023.2022.18.7385","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.7385","url":null,"abstract":"Digitalization is one of the main trends in the development of modern society and the growth factors of the global economy in the coming years. But the progress of technology and the new opportunities of digitalization lead to a rapid growth of cyber threats and cyber incidents. Achieving an appropriate level of digitization of the success of the economy and society is interdependent on the levels of development of information and communication technologies and their protection against possible cyber attacks. The purpose of this work is to develop, from the standpoint of system analysis, formal mathematical models for describing the determination of the national level of digital development of countries, taking into account the national level of cyber security and cyber protection. In order to realize the purpose of the study, data was collected and systematized according to four groups of indicators: the general level of development, the level of digital development of the country, the level of technical infrastructure, and the level of the ability to counter cyber threats. The conducted information analysis made it possible to determine the nomenclature of indicators of digitalization progress and the level of cyber security and cyber protection. Based on it, a structure of component models was formed that describe the necessary elements of the subject area of the task of determining the indicators of the national level of digitalization with the coordination of the indicators of the level of cyber security and cyber protection. The results of the study allow us to assert that the development of the digital economy is impossible without strengthening cyber security both at the state level and at the level of individual entities. Further research will focus on the development of mathematical models for an integral assessment of the state of the country's digital transformation, taking into account the country's ability to counter modern cyber threats.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"140 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2022.16.142158
O. Bushma, A. Turukalo
The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.
{"title":"EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES","authors":"O. Bushma, A. Turukalo","doi":"10.28925/2663-4023.2022.16.142158","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.142158","url":null,"abstract":"The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2021.11.110123
S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska
The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.
{"title":"PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT","authors":"S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska","doi":"10.28925/2663-4023.2021.11.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.11.110123","url":null,"abstract":"The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134502254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2022.17.187197
Y. Holovan
The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.
{"title":"INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA","authors":"Y. Holovan","doi":"10.28925/2663-4023.2022.17.187197","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.187197","url":null,"abstract":"The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.28925/2663-4023.2021.14.3649
V. Akhramovich
A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out. Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor. A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection. As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained. Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence. Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented. Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.
{"title":"METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR","authors":"V. Akhramovich","doi":"10.28925/2663-4023.2021.14.3649","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.3649","url":null,"abstract":"A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.\u0000\u0000Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.\u0000\u0000A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.\u0000\u0000As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.\u0000\u0000Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.\u0000\u0000Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.\u0000\u0000Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}