Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8022
Serhii Toliupa, Mykola Brailovskyi, Ivan Parkhomenko
W chwili obecnej szybki rozwój technologii sieciowych i globalnej informatyzacji społeczeństwa uwypukla problemy związane z zapewnieniem wysokiego poziomu bezpieczeństwa systemów informacyjnych. Wraz ze wzrostem liczby incydentów komputerowych związanych z bezpieczeństwem nastąpił dynamiczny rozwój systemów wykrywania ataków. Obecnie systemy wykrywania włamań i ataków to zazwyczaj oprogramowanie lub sprzętowo-programowe rozwiązania automatyzujące proces monitorowania zdarzeń występujących w systemie informatycznym lub sieci, a także samodzielnie analizujące te zdarzenia w poszukiwaniu oznak problemów bezpieczeństwa. Nowoczesne podejście do budowy systemów wykrywania ataków na systemy informacyjne jest pełne wad i słabych punktów, które niestety pozwalają szkodliwym wpływom na skuteczne pokonanie systemów zabezpieczania informacji. Zastosowanie metod inteligentnej analizy danych pozwala wykryć w danych nieznane wcześniej, nietrywialne, praktycznie użyteczne i dostępne interpretacje wiedzy niezbędnej do podejmowania decyzji w różnych sferach ludzkiej działalności. Połączenie tych metod wraz ze zintegrowanym systemem wspomagania decyzji umożliwia zbudowanie skutecznego systemu wykrywania i przeciwdziałania atakom, co potwierdzają wyniki modelowania.
{"title":"BUDOWA SYSTEMÓW WYKRYWANIA ATAKÓW NA PODSTAWIE METOD INTELIGENTNEJ ANALIZY DANYCH","authors":"Serhii Toliupa, Mykola Brailovskyi, Ivan Parkhomenko","doi":"10.5604/01.3001.0012.8022","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8022","url":null,"abstract":"W chwili obecnej szybki rozwój technologii sieciowych i globalnej informatyzacji społeczeństwa uwypukla problemy związane z zapewnieniem wysokiego poziomu bezpieczeństwa systemów informacyjnych. Wraz ze wzrostem liczby incydentów komputerowych związanych z bezpieczeństwem nastąpił dynamiczny rozwój systemów wykrywania ataków. Obecnie systemy wykrywania włamań i ataków to zazwyczaj oprogramowanie lub sprzętowo-programowe rozwiązania automatyzujące proces monitorowania zdarzeń występujących w systemie informatycznym lub sieci, a także samodzielnie analizujące te zdarzenia w poszukiwaniu oznak problemów bezpieczeństwa. Nowoczesne podejście do budowy systemów wykrywania ataków na systemy informacyjne jest pełne wad i słabych punktów, które niestety pozwalają szkodliwym wpływom na skuteczne pokonanie systemów zabezpieczania informacji. Zastosowanie metod inteligentnej analizy danych pozwala wykryć w danych nieznane wcześniej, nietrywialne, praktycznie użyteczne i dostępne interpretacje wiedzy niezbędnej do podejmowania decyzji w różnych sferach ludzkiej działalności. Połączenie tych metod wraz ze zintegrowanym systemem wspomagania decyzji umożliwia zbudowanie skutecznego systemu wykrywania i przeciwdziałania atakom, co potwierdzają wyniki modelowania.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71277662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8021
A. Romanova, S. Toliupa
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.
分析了可能被用作攻击信息和通信系统的工具的隐写术方法。提出了确保抵御此类攻击的可能解决方案。
{"title":"STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS","authors":"A. Romanova, S. Toliupa","doi":"10.5604/01.3001.0012.8021","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8021","url":null,"abstract":"An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47286579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8039
J. Wilk-Jakubowski
The article includes description of process of Sun transits, including indispensable information on the parameters employed to show their impact on these phenomena. On this basis the date, the start time and the end time and the duration time of Sun transits could be presented for a given location. The main considerations are pertinent to propagation studies. The part of results connected with Sun transits for the limited frequencies of Ku band (downlink) in satellite systems, depending on the antennae, is presented in this article.
{"title":"SUN TRANSITS IN GEO SATELLITE SYSTEMS IN THE ASPECT OF RADIO WAVES PROPAGATION","authors":"J. Wilk-Jakubowski","doi":"10.5604/01.3001.0012.8039","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8039","url":null,"abstract":"The article includes description of process of Sun transits, including indispensable information on the parameters employed to show their impact on these phenomena. On this basis the date, the start time and the end time and the duration time of Sun transits could be presented for a given location. The main considerations are pertinent to propagation studies. The part of results connected with Sun transits for the limited frequencies of Ku band (downlink) in satellite systems, depending on the antennae, is presented in this article.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49016272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.7982
Victor Makhniy, Oksana Kinzerska, I. Senko
A comparative analysis of various methods for the decomposition of broad bands into individual components has been carried out. It is shown that the most universal are the methods of modulation spectroscopy and direct differentiation of conventional spectral characteristics, which, unlike the widely used Alentsev-Fock method, are applicable to spectra of any type (luminescence, transmission, absorption, etc.). The features and capabilities of the direct differentiation method are used to identify the structure in the emission spectra and transmission of ZnSe single-crystal substrates.
{"title":"ANALYSIS OF THE SEPARATION METHODS OF OPTICAL SPECTRA FOR INDIVIDUAL COMPONENTS","authors":"Victor Makhniy, Oksana Kinzerska, I. Senko","doi":"10.5604/01.3001.0012.7982","DOIUrl":"https://doi.org/10.5604/01.3001.0012.7982","url":null,"abstract":"A comparative analysis of various methods for the decomposition of broad bands into individual components has been carried out. It is shown that the most universal are the methods of modulation spectroscopy and direct differentiation of conventional spectral characteristics, which, unlike the widely used Alentsev-Fock method, are applicable to spectra of any type (luminescence, transmission, absorption, etc.). The features and capabilities of the direct differentiation method are used to identify the structure in the emission spectra and transmission of ZnSe single-crystal substrates.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71277407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8016
V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva
The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.
{"title":"DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR","authors":"V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva","doi":"10.5604/01.3001.0012.8016","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8016","url":null,"abstract":"The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71277643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8025
B. Volochiy, M. Zmysnyi, L. Ozirkovskyy, Volodomyr Onyschchenko, Yuriy Salnyk
The effectiveness of guard signaling complexes (GSC), when there is an important validity of the classification of moving objects (MO), is evaluated by the following indexes: probability of GSC task execution; probability of partial fulfillment of the task; probability of user’s “deception”. Accordingly, the performance indicators of the GSC, in turn, depend on the indexes of the functionality of its constituents: probability of fixation of moving object by seismic sensor, probability of correct classification of MO type and probability of receiving radio signal by the system of receiving and displaying information (SRDI). The article describes a discrete-continuous stochastic model of of GSC reaction to moving object crossing control zone, in which three seismic sensors are installed. Majority principle of identifying the type of moving object was used on the receiving part of the complex. A comparative analysis of the effectiveness of guard signaling complexes using one, two and three sensors in control zone are carried out.
{"title":"IMPROVEMENT OF FIDELITY OF MOVING OBJECTS CLASSIFICATION IN GUARD SIGNALING COMPLEXES WITH SEISMIC SENSORS","authors":"B. Volochiy, M. Zmysnyi, L. Ozirkovskyy, Volodomyr Onyschchenko, Yuriy Salnyk","doi":"10.5604/01.3001.0012.8025","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8025","url":null,"abstract":"The effectiveness of guard signaling complexes (GSC), when there is an important validity of the classification of moving objects (MO), is evaluated by the following indexes: probability of GSC task execution; probability of partial fulfillment of the task; probability of user’s “deception”. Accordingly, the performance indicators of the GSC, in turn, depend on the indexes of the functionality of its constituents: probability of fixation of moving object by seismic sensor, probability of correct classification of MO type and probability of receiving radio signal by the system of receiving and displaying information (SRDI). The article describes a discrete-continuous stochastic model of of GSC reaction to moving object crossing control zone, in which three seismic sensors are installed. Majority principle of identifying the type of moving object was used on the receiving part of the complex. A comparative analysis of the effectiveness of guard signaling complexes using one, two and three sensors in control zone are carried out.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71277589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8032
B. Blagitko, Yuriy Mochulsky
By means of mathematical modelling, the main features of emergency landing of quadrocopter are determined. The results of simulate landings of the quadrocopter in cases of failure of one of four pairs of electric motor screw are given. The methods of safe landing of an unmanned quadrocopter in case of failure of one of four pairs of motor-screw are proposed. The basis of the proposed methods is to use a parachuting effect. Parachuting achieved by forced off the power of the motor, which is located at the opposite end of the same yoke as faulty motor. As a result, the vertical speed of the quadrocopter at the time of landing significantly decreases in comparison with the speed of free fall.
{"title":"METHOD OF SAFE LANDING THE EMERGENCY QUADROCOPTER","authors":"B. Blagitko, Yuriy Mochulsky","doi":"10.5604/01.3001.0012.8032","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8032","url":null,"abstract":"By means of mathematical modelling, the main features of emergency landing of quadrocopter are determined. The results of simulate landings of the quadrocopter in cases of failure of one of four pairs of electric motor screw are given. The methods of safe landing of an unmanned quadrocopter in case of failure of one of four pairs of motor-screw are proposed. The basis of the proposed methods is to use a parachuting effect. Parachuting achieved by forced off the power of the motor, which is located at the opposite end of the same yoke as faulty motor. As a result, the vertical speed of the quadrocopter at the time of landing significantly decreases in comparison with the speed of free fall.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49125955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.8023
M. Khobzei, D. Vovchuk, Magdalena Michalska
This paper presents an overview of the main possible applications of wire medium in different field of radio engineering. Wire media possesses the unique electromagnetic properties. There is a number for approaches for manufacturing the wire media of different shapes from microwave frequency up to optical one. The wire media that consists of parallel metallic rods finds application for narrow and broadband power radiation in photovoltaic devices, imaging, endoscopy and many others. The wire metastructures such as hyperlens and brush are applicable to the antennas of wide frequency range.
{"title":"OVERVIEW OF APPLICATIONS OF WIRE MEDIUM IN RADIO ENGINEERING MEANS","authors":"M. Khobzei, D. Vovchuk, Magdalena Michalska","doi":"10.5604/01.3001.0012.8023","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8023","url":null,"abstract":"This paper presents an overview of the main possible applications of wire medium in different field of radio engineering. Wire media possesses the unique electromagnetic properties. There is a number for approaches for manufacturing the wire media of different shapes from microwave frequency up to optical one. The wire media that consists of parallel metallic rods finds application for narrow and broadband power radiation in photovoltaic devices, imaging, endoscopy and many others. The wire metastructures such as hyperlens and brush are applicable to the antennas of wide frequency range.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47626793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-16DOI: 10.5604/01.3001.0012.7980
M. Slyotov, A. Slyotov
The possibility of obtaining zinc selenide and zinc sulfide layers of hexagonal modification by isovalent substitution method is shown. They are characterized by intensive luminescence which is formed by the dominant annihilation of bound excitons for α-ZnSe and recombination on donor-acceptor pairs for α-ZnS. The resulting radiation covers the violet wavelength range. Quantum radiation efficiency reaches η = 10–12% for α-ZnSe and η = 5–8% for α-ZnS. The radiation is characterized by high temperature stability and repeatability of characteristics and parameters.
{"title":"THE SOURCES OF RADIATION IN THE SHORT-WAVE RANGE ON THE BASIS OF II-VI HETEROLAYERS","authors":"M. Slyotov, A. Slyotov","doi":"10.5604/01.3001.0012.7980","DOIUrl":"https://doi.org/10.5604/01.3001.0012.7980","url":null,"abstract":"The possibility of obtaining zinc selenide and zinc sulfide layers of hexagonal modification by isovalent substitution method is shown. They are characterized by intensive luminescence which is formed by the dominant annihilation of bound excitons for α-ZnSe and recombination on donor-acceptor pairs for α-ZnS. The resulting radiation covers the violet wavelength range. Quantum radiation efficiency reaches η = 10–12% for α-ZnSe and η = 5–8% for α-ZnS. The radiation is characterized by high temperature stability and repeatability of characteristics and parameters.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71277363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.5604/01.3001.0012.5276
A. Sharko
The paper presents one-dimensional discrete-continuous model of power spectrum estimation of the acoustic emission signal, that allows filtering the oscillating components of the acoustic emission signals. The mathematical formalism describing the environment was discussed, initiating the signals of acoustic emission. The problem of spectral analysis and synthesis of acoustic emission signals was solved with the help of Fourier transform. The dependence of acoustic vibrations spectra on the size of the medium parameters and microstructure has been discussed, as well.
{"title":"MODELS AND METHODS OF PROCESSING OF INFORMATION ON LOADS OF ACOUSTIC SIGNALS IN TECHNICAL DIAGNOSTIC SYSTEMS","authors":"A. Sharko","doi":"10.5604/01.3001.0012.5276","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5276","url":null,"abstract":"The paper presents one-dimensional discrete-continuous model of power spectrum estimation of the acoustic emission signal, that allows filtering the oscillating components of the acoustic emission signals. The mathematical formalism describing the environment was discussed, initiating the signals of acoustic emission. The problem of spectral analysis and synthesis of acoustic emission signals was solved with the help of Fourier transform. The dependence of acoustic vibrations spectra on the size of the medium parameters and microstructure has been discussed, as well.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47652381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}