100 results
Search Results
2. РОЗРОБКА ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ ЗБЕРІГАННЯ ТА ЗАХИСТУ ДАНИХ ДЛЯ ПРИВАТНОГО ТА КОРПОРАТИВНОГО ЗАСТОСУВАННЯ
- Author
-
Гаврилюк, Б. В., Зоріло, В. В., Кушніренко, Н. І., and Осколкова, О. Р.
- Subjects
PASSWORD software ,COMPUTER passwords ,BANKING industry ,ONLINE banking ,INTERNET service providers ,BANK accounts ,SOCIAL media ,EMAIL systems - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
3. METHODOLOGICAL SUBSTANTIATION OF THE TOOLS OF ANALYSIS OF FINANCIAL STATEMENTS DURING THE TRANSITION TO THE NEW TECHNOLOGICAL INSTITUTION.
- Author
-
Zakharchenko, Vitaliy I. and Metil, Tetiana K.
- Subjects
CORPORATE finance ,SMALL business ,CONTENT analysis ,FINANCIAL instruments ,FINANCIAL management ,TIRE manufacturing - Abstract
The article provides a methodological justification for assessing the state of financial management of the enterprise using the category of "technological way". The paper presents a conditional view of the sedentary technological structure in the form of: axes as a group of interconnected new industries, technologies, enterprises; disk as a manufacturing sector that unites large industrial enterprises that produce competitive serial products; Tires are mainly small and medium-sized enterprises that generate the latest products and technologies and undergo trial marketing. The paper considers the structure of the axis of the technological structure of financial management of the enterprise, as well as providing financial instruments - financial assets and financial liabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. INCREASING THE ROBUSTNESS OF THE STEGANO GRAPHIC METHOD WITH CODE CONTROL WHEN OPERATING WITH DIGITAL VIDEO.
- Author
-
Yavorskyi, O. O. and Sokolov, A. V.
- Subjects
- *
DIGITAL video , *GRAPHIC methods , *VIDEO compression , *COMPUTATIONAL complexity , *INFORMATION resources management , *INFORMATION storage & retrieval systems - Abstract
The development of information technologies, which has led to an increase in the amount of multimedia content in World traffic, makes the role of the steganographic component in modern information protection systems significant. At the same time, to ensure steganographic protection of information in real-time when operating with digital video, the steganographic method is expected to meet the main effectivity criteria, as well as provide a low level of computational complexity, which is possible when performing steganographic transformation in the spatial domain of the container. One such modern method is the steganographic method with code control of additional information embedding. The problem of increasing the robustness of the specified steganographic method in the conditions of compression attacks by compression algorithms of digital video, primarily, the widespread MPEG-4 algorithm, is of particular interest. The purpose of this paper is to increase the robustness against attacks by compression of the steganographic method with code control of additional information embedding when operating with digital video. In this paper, experimental research on the robustness of the steganographic method with code control of additional information embedding in the conditions of a co mpression attack against the emb edded message by digital video compression algorithm MPEG-4 when embedding information using different colour models is performed. It is shown that embedding additional information in the Y-component of the YCbCr colour model allows reducing the number of errors when extracting additional information by 17%. It is also proposed to embed additional information using the steganographic method with code control only in dynamic blocks, which made it possible to reduce the number of errors when extracting additional information by 8%. The obtained results can be applied in practical steganographic applications to increase the robustness of the applied steganographic component of information protection systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. COMBINED ALGORITHMS FOR DETERMINING THE INITIAL SOLUTION OF DISCRETE OPTIMIZATION PROBLEMS.
- Author
-
Yukhimenko, B. I., Volkova, N. H., and Kozina, Yu. Yu.
- Subjects
- *
GREEDY algorithms , *ANT algorithms , *MATHEMATICAL ability , *KNAPSACK problems , *SIMULATED annealing , *ALGORITHMS , *COMPUTATIONAL complexity - Abstract
The problem of solving the task of discrete optimization is not completely solved. Lack of publications, scientific developments, algorithms and software products do not give the ability to transfer the mathematical apparatus of solving discrete optimization problems to the class P of computational complexity. All analytical and combinatorial algorithms for solving problems of linear and non-linear optimization are NP completeness. There are developments to improve the efficiency of robotic algorithms, they are filled with requests and actual ones. In this paper, it is proposed to use deterministic and probabilistic methods for forming a priority queue of decision vector components in order to assign positive values to them. After the formation of the variant of the solution, it is possible to vectorize as if the approached solution is taken away from the record value of the goal function, which in exact algorithms is like a solution, which results in a polyp. In this paper has a method for forming a priority line for concretizing the components of the solution vector. The basis of deterministic methods is the idea of a greedy algorithm. The location in the queue is determined by the value of the corresponding component of the cost vector. The appearance of the value of non-visibility in the system of restrictions increases the priority of the component. Behind such a way, another method of determination is modified. Probability assessment probability of priorities is based on the ideas of algorithms in an ant colony and simulated annealing. The scope of probability indicates the significance of the component - a contender for a positive value. A numerical example of a small variability of the task about a knapsack has been introduced, which demonstrates the imitation of a nearby solution. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. INCREASING THE ROBUSTNESS OF THE STEGANOGRAPHIC METHOD WITH CODE CONTROL OF THE ADDITIONAL INFORMATION EMBEDDING AGAINST NOISE ATTACKS.
- Author
-
Hulid, D. O. and Sokolov, A. V.
- Subjects
- *
ADDITIVE white Gaussian noise , *EMBEDDING theorems , *INFORMATION resources management , *NOISE , *NOISE control - Abstract
The increase in the amount of multimedia content generated, stored and transmitted by modern information systems leads to an increase in the role of the steganographic component in information protection systems. At the same time, significant requirements are put to the applied steganographic methods regarding their effectiveness, which include sufficient bandwidth, ensuring the reliability of perception, and resistance to attacks against the embedded message. The performance of the steganographic methods is of great importance, especially if it is intended to be used in real-time on a resource-constrained platforms. One of the modern steganographic methods, which is characterized by providing the main effectiveness indicators with a small computational complexity due to the execution of steganographic transformation in the space domain of the container, is a steganographic method with code control of additional information embedding. However, despite the rather high indicators of resistance to noise attacks, which can occur in many practical applications, the issue of increasing the resistance of steganographic transformation to these types of attacks remains relevant. The purpose of the paper is to increase the resistance to noise attacks of the steganographic method with code control of additional information embedding. The paper researches attacks against an embedded message with two types of noise: additive white Gaussian noise and "Salt and Pepper" noise. In the paper, experimental research on the effects of the structure of the codeword used on the robustness of the steganographic method with code control against a noise attack by additive white Gaussian noise was performed, which made it possible to develop practical recommendations regarding the parameters of the steganographic method with code control under the conditions of this type of attack. The application of the BAN method (broadband signal, attenuator, narrowband signal) is proposed to increase the resistance of the steganographic method with code control against the "Salt and Pepper" noise attack, which allowed to reduce the number of errors when extracting additional information in conditions of this noise by 48%. The results obtained in this paper can be useful for the application of the steganographic method with code control in practice in the conditions of transmission of a steganographic message over channels characterized by the presence of noise attacks against the embedded message. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. РОЗРОБКА СТЕГАНОГРАФІЧНОГО МЕТОДУ ВБУДОВИ БІНАРНОГО ЦИФРОВОГО ВОДЯНОГО ЗНАКУ В ЗОБРАЖЕННЯ НА ОСНОВІ ДИСКРЕТНОГО КОСИНУСНОГО ПЕРЕТВОРЕННЯ
- Author
-
Ахмаметьєва, Г. В. and Кирилюк, В. О.
- Subjects
DIGITAL watermarking ,DISCRETE cosine transforms ,DATA mining ,DIGITAL images ,PEPPERS ,NOISE - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
8. МОДИФІКАЦІЇ АЛГОРИТМУ ВИЯВЛЕННЯ РУХУ КАМЕРИ
- Author
-
Кордюк, В. В. and Лебедєва, О. Ю.
- Subjects
- *
OPTICAL flow , *CAMERA movement , *VIDEO surveillance , *MOTION capture (Human mechanics) , *DIGITAL cameras , *VIRTUAL reality , *TRACK & field - Abstract
Video analysis is a very important tool in video surveillance systems with one or more cameras. Among the most promising features are tracking the movement of objects - tracking. The current state of development in the field of tracking is considered in the work. There are several types of trekking. Pixel Tracking is the tracking of the movement of a specific point (pixel) or group of points on the original video sequence. The result of this process is the trajectory of the pixel, corresponding to the movement of an object in the frame. Matchmoving is a complex process that allows you to create a three-dimensional scene with a digital camera based on the available video sequence, which exactly repeats the movement of a real camera. Motion Capture is a technology designed to determine the position and orientation of a real object in a virtual environment, determining the position and orientation of a real object in space is carried out using special sensors and markers. Each of these types of tracking can be used on its own or as part of more complex processes. The paper develops a modification of the camera motion detection algorithm, which works in the field of Pixel Tracking. The description of the main approaches to motion estimation is given, namely recursive raster algorithms, frequency domain algorithms, optical flow algorithms and block matching methods. The urgency of the work, its purpose and objectives are given. The paper describes a method of arranging blocks in a video sequence frame, which are used to calculate the movement of the camera. Similarity metrics are used to estimate the similarity of the blocks, namely the correlation coefficient. The paper describes the steps of the developed modification of the camera motion detection algorithm. The results of the modification of the camera motion detection algorithm are presented. The result of this work is an indicator of the visual quality of tracking in the form of a 2D image of the camera motion vector. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. МЕТОДИКА ОЦІНКИ ЗАХИЩЕНОСТІ ІНФОРМАЦІЙНИХ СИСТЕМ
- Author
-
Батечко, С. В., Лебедєва, О. Ю., and Зоріло, В. В.
- Subjects
- *
INFORMATION technology security , *COMPUTER systems , *INFORMATION storage & retrieval systems , *SECURITY systems , *INFORMATION technology - Abstract
The paper considers the current state of developments in the field of security assessment. The problem of information technology security is becoming increasingly important in the implementation of computer systems as their role in the informatization of society. Ensuring the security of information technology is a complex problem that is solved in the areas of improving the legal regulation of information technology, improving methods and means of their development, development of certification systems, ensuring appropriate organizational and technical conditions of operation. The paper considers systemic problems of information systems security, lists the threats that can cause one or more harmful effects on systems. The paper provides a list of standards and regulations that can be used to assess the quality of the information system or individual indicators. The urgency of the work, its purpose and objectives are given. A key aspect of solving the problem of information technology security is to develop a system of requirements, criteria and indicators of the level of information technology security. The paper describes in detail the structure of the ISO 15408 standard, which was chosen as the basis of the developed methodology. The ISO 15408 standard consists of three parts. The paper uses the second part of the standard, which contains a universal systematized catalog of functional safety requirements and provides for the possibility of detailing and expanding them according to certain rules. The developed method of assessing the security of information systems is given. The paper describes the main indicators used to assess the security of information systems in the developed methodology. A software product has been developed that implements the described technique and the program interface is presented in the form of the main program windows. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. МОДЕЛЮВАННЯ ОРГАНІЗАЦІЙНИХ ЗАХОДІВ ДЛЯ СТВОРЕННЯ ПОЛІТИКИ БЕЗПЕКИ ОРГАНІЗАЦІЇ З ВИКОРИСТАННЯМ БІЗНЕС-ПРОЦЕСІВ
- Author
-
Радуш, В. В., Лебедєва, О. Ю., Кушніренко, Н. І., and Зоріло, В. В.
- Subjects
INFORMATION technology security ,SECURITY systems ,INFORMATION storage & retrieval systems ,INFORMATION measurement ,POLICY sciences ,WORKFLOW management ,WORKFLOW - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
11. ВИЯВЛЕННЯ ПОРУШЕНЬ ЦІЛІСНОСТІ ЦИФРОВОГО ЗОБРАЖЕННЯ В КОНТЕКСТІ ЦИФРОВОЇ КРИМІНАЛІСТИКИ
- Author
-
Берія, Д. Ю., Войтовецька, М. Є., Козаченко, Н. Г., Зоріло, В. В., and Лебедєва, О. Ю.
- Subjects
DIGITAL image processing ,DIGITAL images ,DIGITAL image correlation ,DIGITAL forensics ,PIXELS ,TEST methods ,FALSIFICATION ,DIGITAL media - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
12. РОЗРОБКА ЗАХИЩЕНОЇ АВТОМАТИЗОВАНОЇ ВЕБ-СИСТЕМИ ТЕСТУВАННЯ ЗНАНЬ
- Author
-
Перерва, С. О. and Трифонова, К. О.
- Subjects
WEB-based user interfaces ,INFORMATION technology security ,COMPUTER software testing ,UNIVERSITIES & colleges ,PSYCHOLOGY of teachers - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
13. РОЗВИТОК СТИВІДОРНИХ ПІДПРИЄМСТВ ЯК ОДИН ІЗ ЗАСОБІВ ПОКРАЩЕННЯ СТАНУ ЕКОНОМІКИ РЕГІОНУ
- Author
-
Zamlynskyi, Viktor A. and Yakovenko, Oleksandra I.
- Subjects
LOADING & unloading ,HARBORS ,ECONOMIC development ,COMPETITIVE advantage in business ,PUBLIC-private sector cooperation ,REVERSE logistics - Abstract
Copyright of Economics: Time Realities is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
14. ДІАГНОСТИКА ХВОРОБИ СЕРЦЯ НА ОСНОВІ ДЕРЕВ РІШЕНЬ
- Author
-
Пенко, В. Г., Шпінарева, І. М., and Ярощук, О. В.
- Subjects
- *
DECISION trees , *RANDOM forest algorithms , *BOOSTING algorithms , *PROBLEM solving , *HEART failure , *STATISTICS - Abstract
The volume of medical data in the world is enormous. Electronic medical records are growing rapidly. Therefore, in order to establish the correct diagnosis, with a large number of different analyzes (CT, cardiograms, etc.), intelligent systems for predicting cardiovascular diseases come to the aid of the doctor. The prediction problem is solved by machine learning methods. The most popular machine learning method for classification and prediction are decision trees. The idea behind decision trees is to split the set of possible values of the feature vector (independent variables) into disjoint sets and fit a simple model for each such set. Decision trees allow you to get high accuracy in solving many problems, while maintaining a high level of interpretation. The decision tree is built automatically depending on the statistical data. This paper examines different types of decision trees: CART, ID3, C4.5, Random Forest, Gradient Boosting. Based on the analysis of these types, the best result for predicting cardiovascular diseases was obtained by the Random Forest and Gradient Boosting methods. The random forest method is based on the construction of an ensemble of decision trees, each of which is constructed from a sample obtained from the original training sample using a bootstrap. Another ensemble is the Gradient Boosting method. Its main difference from Random Forest is that in Random Forest trees are built independently of each other, while Gradient Boosting improves the previous model at every step. Using a decision tree (Random Forest and Gradient Boosting), you can predict the vulnerability to heart disease in patients with reasonable accuracy. The paper proposes improvements to the Gradient Boosting method by modifying boosting. Namely, at each step of the algorithm, a new ensemble item is constructed based not on the entire training sample, but only on a random subsample of a fixed size. This idea is a combination of gradient boosting and bagging techniques. The Heart Disease UCI set is used as initial data. The heart_failure_clinical_records set was used to test the performance of the improved Gradient Boosting algorithm. As a result of the work carried out, an algorithm was obtained that allows increasing the accuracy of predicting cardiovascular diseases from 89% to 94%. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
15. МЕТОД ЗАХИСТУ ІНФОРМАЦІЇ В КОМП ЮТЕРНИХ СИСТЕМАХ ЗА ДАНИМИ АЙТРЕКІНГУ
- Author
-
Шаманіна, Т. В. and Павленко, В. Д.
- Subjects
COMPUTER user identification ,BIOMETRIC identification ,COMPUTER systems ,SOFTWARE development tools ,PROBLEM solving ,EYE tracking - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
16. РОЗРОБКА АВТОМАТИЗОВАНОЇ СИСТЕМИ РЕЦЕНЗУВАННЯ СТАТЕЙ ДЛЯ НАУКОВОГО ЖУРНАЛУ
- Author
-
Шеремет, Г. О.
- Subjects
ALGORITHMS ,DIGITAL technology ,AUTHOR-editor relationships ,DATABASE design ,INTELLECTUAL property - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
17. РОЗРОБКА МАТЕМАТИЧНОЇ МОДЕЛІ ПОВЕДІНКИ ВІРТУАЛЬНОГО НАТОВПУ
- Author
-
Симонова, О. М. and Бобок, І. І.
- Subjects
URBAN growth ,COLLECTIVE behavior ,PROTEST movements ,INTERNET censorship ,TRAFFIC flow - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
18. AN APPROACH TO THE ELIMINATION OF CONFLICTS IN MULTI-AGENT SYSTEMS BASED ON DIJKSTRA'S ALGORITHM.
- Author
-
Penko, V. G., Penko, O. V., and Kogan, V. V.
- Subjects
- *
MULTIAGENT systems , *ALGORITHMS , *DISTRIBUTED algorithms - Abstract
The task of path finding by an agent is one of the basic tasks and is of great practical importance. As a rule, this is an optimization task that is solved in the space of the state graph in order to minimize the length of the path. Such a task becomes more difficult and becomes even more popular if it is solved on the basis of one graph space by several agents. In this case, another practically important optimization parameter appears, which is expressed by the number of conflicts between agents. Such an abstract formulation of the task has numerous variants of formalization and a large number of approaches to its solution. In this paper, the main element of the approach is the application of the classic Dijkstra algorithm, which is executed sequentially by each agent. When finding the shortest route, each agent modifies the graph space in such a way as to reduce the probability of conflicts with subsequent agents. This approach is original and a number of computational experiments were performed to verify it using software developed for this purpose. The experiments that were conducted demonstrate the adequate behavior of the main algorithm. The work analyzes the limitations inherent in the proposed approach within the framework of the abstract formulation of the task. The directions of further development of the basic approach have been determined. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. DETECTION OF AUDIO FAKES BY MEANS OF ARTIFICIAL INTELLIGENCE.
- Author
-
Stetsovskyi, M. A., Zorilo, V. V., and Lebedeva, O. Yu.
- Subjects
- *
ARTIFICIAL intelligence , *CONVOLUTIONAL neural networks , *DIGITAL audio , *DIGITAL images , *APPLICATION software - Abstract
The development of information technologies, including artificial intelligence, is leading to their widespread use in many areas of our lives. With the rapid development of artificial intelligence, the number of cases of its application to generate digital images, audio, video, etc. is growing. Counterfeiting digital audio files is dangerous from the point of view of being used by criminals to exert information and psychological influence and manipulate society and individuals. There are modern methods for detecting audio fakes made by artificial intelligence. They are highly accurate, but not without drawbacks. The main drawback is the complex architecture and high resource intensity. The aim of this paper is to develop a neural network that would allow detecting audio fakes with satisfactory accuracy and whose training would not require significant computing resources. A method was chosen for modification, namely, the method of detecting audio fakes using a convolutional neural network. The method for detecting audio fakes was modified by building a model with a new architecture with fewer layers, which significantly reduced the time and computational resources required compared to analogues. The experimental results obtained using the modified method show satisfactory efficiency and accuracy of the system. Errors of the first kind amounted to 24%, errors of the second kind - 9%. The developed modification is implemented in a software application with a convenient and simple interface. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. OPTIMIZATION METHODS AND INFORMATION TECHNOLOGIES IN ACTIVE EXPERIMENT.
- Author
-
Yershova, N. M. and Kryvenkova, L. Yu.
- Subjects
- *
SCIENTIFIC literature , *COMPREHENSION testing , *EDUCATIONAL literature , *METHODS engineering , *ORDER picking systems , *VIDEO coding - Abstract
Despite the fact that the effectiveness of experiment planning methods, especially when solving applied problems, has been proven more than once, the ideas of a multifactorial experiment are very slowly being introduced into science and engineering practice. The reasons for this are: the complexity of organizing the experiment; the parameters of the systems under study are of a complex dynamic nature and are subject to significant influences of changes in environmental conditions; the apparent complexity of the planning and calculation matrix discourages researchers with insufficient mathematical background; many manuals on the application of a multifactorial experiment are written at a level inaccessible to engineers, given the training in the disciplines of mathematical and computer cycles in technical universities. The experiment occupies the main place among the methods of obtaining information about the internal relationships of phenomena in nature and technology. As the processes and phenomena under study become more complex, the costs of the equipment and the experiment increase. During the tests, a large amount of experimental data is collected that requires processing and analysis. At the same time, the duration of the analysis, comprehension of the test results and their accounting for adjusting the characteristics of new products is very significant. The systems approach involves considering all elements of an active experiment as a single system. From these positions, it is necessary to present the general properties of the experiment as an object of study and give recommendations on the choice of mathematical techniques and methods that the experimenter can use when choosing decisions during the preparation of the experiment, its conduct and processing of the results. It is very important to choose methods and tools for processing experimental data. Despite the fact that, since 2002, many works have been proving the effectiveness of using the Excel analysis package for processing experimental data, the scientific and educational literature still uses coding of variables, randomization of experiments, and the choice of critical values of the criteria for assessing the quality of mathematical models from tables. In addition, optimization methods are not used in the works for forecasting. In this paper, in order to accelerate the process of introducing effective computer processing methods into science and engineering practice, the implementation of the methodology for processing active experiment data using Excel is presented. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. ИССЛЕДОВАНИЕ РЕЖИМОВ ШИФРОВАНИЯ С ПРОПУСКОМ БЛОКОВ
- Author
-
Соколов, А. В. and Корж, А. О.
- Subjects
BLOCK ciphers ,DATA encryption ,COMPUTING platforms ,INFORMATION technology security ,MOBILE operating systems - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
22. МОДИФІКАЦІЯ МЕТОДУ ХЕШ-СТЕГАНОГРАФІЇ, ЗАСНОВАНОГО НА ПЕРЕДАЧІ ПОСЛІДОВНОСТІ ЦИФРОВИХ ЗОБРАЖЕНЬ
- Author
-
Зоріло, В. В., Лебедєва, О. Ю., and Бохонько, М. В.
- Subjects
IMAGE analysis ,TEXT messages ,DIGITAL images ,CRYPTOGRAPHY ,ALGORITHMS ,HASHING - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
23. УСКОРЕННЫЙ АЛГОРИТМ ОДНОСТОРОННЕГО ВЕТВЛЕНИЯ ДЛЯ РЕШЕНИЯ ЗАДАЧ ЛИНЕЙНОГО ПРОГРАММИРОВАНИЯ С БУЛЕВЫМИ ПЕРЕМЕННЫМИ.
- Author
-
Юхименко, Б. И.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
24. АЛГОРИТМИ ПОШУКУ ЗАЛИШКІВ ДОВГИХ ЧИСЕЛ ДЛЯ ЗАДАЧ АСИМЕТРИЧНОЇ КРИПТОГРАФІЇ
- Author
-
Тимошенко, Л. М., Івасьєв, Ю. М., Лотоцький, О. Я., and Гаврилей, В. М.
- Abstract
At the present stage of providing information security of the state, it is important to make secret military communication networks. One of the key areas to secret a network is the use of cryptographic methods for information protection, in particular, asymmetric cryptography. To improve asymmetric cryptography algorithms we can find the remains of long numbers. The implementation of known algorithms for finding the remains of long numbers has a number of significant drawbacks. The paper analyzes two new methods of finding long-numbered residues, their drawbacks, and computational complexities. The method proposed by the authors is described, its algorithm and block diagram are presented. The computational complexities of the three researched methods are studied. The numerical complexity evaluation experiment shows that when performing modular operations used in asymmetric cryptographic algorithms, when transferring numbers from the decimal system to the system of the numbers of residual classes, the proposed method should be used. The method has less complexity. There are two ways of further consideration. It is well-known that the algorithm effectiveness gain is equal to the ratio of computational complexity and equal 2. The application developed in the high-level programming language C ++ allows us to investigate the time characteristics of the two methods. In this paper, we give a fragment of the testing of the application for double Mersenne numbers and a graphic representation of the dependence of the time of finding the remnants of large numbers from the prime number for which the remainder is. The developed algorithm for finding the remnants of large numbers allowed to increase the speed compared to the known due to the use of the properties of residues and the numerical basis of Rademacher. This reduced the computational complexity and increased the efficiency of the algorithm compared with the known twice, which proves the expediency of its use in processing long numbers in asymmetric cryptographic information security systems to increase the speed of encryption and cryptanalysis. [ABSTRACT FROM AUTHOR]
- Published
- 2018
25. ПАРАМЕТРИЧЕСКИЙ СИНТЕЗ ДИСКРЕТНО-АДАПТИВНОЙ ОДНОКАНАЛЬНОЙ ПО ДОПЛЕРОВСКОЙ ЧАСТОТЕ СИСТЕМЫ ОБРАБОТКИ СИГНАЛА В УСЛОВИЯХ ГАУССОВЫХ ПОМЕХ
- Author
-
Цевух, И. В., Соколов, А. В., and Сакович, А. А.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
26. УДОСКОНАЛЕННЯ СИСТЕМ РЕГУЛЮВАННЯ ВОДОГРІЙНИХ КОТЛІВ
- Author
-
Тігарєв, А. М. and Тігарєва, Т. Г.
- Subjects
- *
AUTOMATIC control systems , *GAS as fuel , *HEAT of combustion , *AIR-fuel ratio (Combustion) , *PID controllers , *NATURAL gas , *COMBUSTION gases - Abstract
The article considers the option of improving the automatic control systems for natural gas combustion as a fuel for boilers. The aim of the improvement is to optimize the gas-air ratio to maintain the set temperature in the heated rooms, depending on the ambient temperature. In most of the currently used hot water boilers, the gas / air ratio is maintained in accordance with the regime maps without taking into account the economic and environmental combustion of gas, without automatically taking into account the ambient temperature. The desire to reduce excess fuel consumption necessitates the creation of automatic control systems that would maintain the required temperature of the coolant at the boiler outlet at different ambient temperatures. The main principle of increasing efficiency is the maximum possible use of available (lower) heat of combustion QnP. The main components of losses of warmth at the same time are losses with q2 flue gases and losses from so incomplete combustion of q3 fuel. The amount of harmful emissions into the atmosphere depends of both of these indicators that are closely related to the coefficient of excess air α in the burning fuel flare. The paper analyzes several types of fuel-air ratio control systems, notes their advantages and disadvantages. It is con-cluded that the greatest positive effect can be achieved only with the use of systems of continuous automatic control and regulation of the fuel-air ratio. The article proposes the structure of the control system that moni-tors the ambient temperature and changes the temperature at the boiler outlet accordingly. At the same time, in order to be able to operate the system in a significant range of ambient temperatures and maintain economical fuel combustion, the use of adaptive PID controllers is proposed on the basis of tabular changes in their set-tings. To ensure environmentally friendly fuel combustion, a "rebound" mode is used. The simulation of tem-perature change in the control system showed the possibility of its practical for house heating systems with low-power boilers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. ВИЯВЛЕННЯ ЧАСТИН ЦИФРОВОГО ЗОБРАЖЕННЯ, ЗМЕНШЕНИХ ПІСЛЯ ФАЛЬСИФІКАЦІЇ
- Author
-
Гулич, В. В., Зоріло, В. В., and Лебедєва, О. Ю.
- Subjects
- *
DATA integrity , *INFORMATION technology security , *FALSIFICATION , *DIGITAL images , *ALGORITHMS - Abstract
At a time when the use of digital content in all spheres of life is constantly growing, the ability to verify the authenticity of digital files, in particular digital images, is extremely important in protecting information from integrity violations. In the information war, photo fakes are always used to achieve certain, often criminal, goals. Both society as a whole and individuals must take care of information security and protect their information space from unverified information. Modern methods of detecting violations of the integrity of graphic information to some extent address some issues of information security, however, they are not universal and often require development, improvement, additional research and so on. Thus, existing methods for detecting such a common method of image falsification as scaling are effective only in cases where the falsified part is enlarged, however, when reducing part of the image, they are not effective. Moreover, in open printing the problem of detecting reduced scalable parts of the image is not covered. Therefore, the aim of this work is to increase the efficiency of scaling detection as digital image falsification by developing an algorithm for detecting scaling with a negative coefficient. In this paper, the method of error level analysis is adapted to detect reduced parts of the digital image. The efficiency of the adapted method in terms of errors of the 1st and 2nd kind was: errors of the 1st kind - 2%, 2nd kind - 7%. In addition, it has been found that this method is also effective in detecting simultaneously scalable (reduced) and moved parts of a digital image. This method detects artifacts (errors) in the digital image, which occur when reducing its part - the falsified area has a higher high-frequency component than the rest of the image, which is amplified under the influence of compression after saving the falsification in a lossy format. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. ВИЯВЛЕННЯ ВТОРГНЕНЬ В МЕРЕЖУ ІНТЕРНЕТУ РЕЧЕЙ ШЛЯХОМ АНАЛІЗУ НАЯВНОСТІ АНОМАЛІЙ В МЕРЕЖЕВОМУ ПОТОЦІ ТРАФІКУ AAA ПРОТОКОЛІВ
- Author
-
Гальчинський, Л. Ю.
- Subjects
- *
CYBERTERRORISM , *INTERNET of things , *TRAFFIC flow , *MODERN civilization , *INTERNET security , *MACHINE learning - Abstract
Today, one of the most powerful trends in innovative change in the modern world is the Internet of Things IoT. And although this trend is essentially only at an early stage, it already plays a significant role in the modern world, in modern civilization. It is safe to predict that further expansion of its scope. However, the emergence of this phenomenon is also accompanied by the emergence of related problems. This is especially true of cyber threats, which can cause significant harm to both the Internet of Things itself and the people who use those networks. Accordingly, there is a need for means to combat these threats. This is a rather complex problem, which primarily requires the development of methods and technologies for detecting such threats. At the same time, there are no clear concepts of relevant solutions for cyber security of various IoT applications, especially where financial resources are limited. Therefore, research is currently relevant to find solutions that may be acceptable for relatively low-budget facilities. The aim of the work is to obtain a method for detecting intrusions into the IoT network by detecting anomalies in the network traffic flow of AAA protocols. This problem is complicated by the fact that the solution found must comply with basic security policies. The study conducted in this paper showed that such a solution is possible in principle by using the capabilities of the AAA RADIUS protocol and the use of machine learning. Machine learning methods were tested on the UNSW_NB15 dataset. For machine learning, pre-processing was performed to normalize and standardize the data. Computer experiments have tested the suitability of detecting a set of cyberattacks for different models of machine learning. It was shown that the formulated approach has the potential to be used in practical developments to detect intrusions in the IoT network. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. УСОВЕРШЕНСТВОВАНИЕ СТЕГАНОГРАФИЧЕСКОГО АЛГОРИТМА, ОСНОВАННОГО НА SIGN-НЕЧУВСТВИТЕЛЬНОСТИ СИНГУЛЯРНЫХ ВЕКТОРОВ БЛОКОВ МАТРИЦЫ ИЗОБРАЖЕНИЯ
- Author
-
Кобозева, А. А., Мокрицкий, В. А., Батиене, Л. Е. М., and Бобок, И. И.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
30. СИСТЕМА МОДЕЛЮВАННЯ КІБЕРАТАКИ ПІДМІНОЮ ОРС-СЕРВЕРА ПРИ КОМП'ЮТЕРНОМУ УПРАВЛІННІ ТЕХНОЛОГІЧНИМИ УСТАНОВКАМИ
- Author
-
Зозуля, А. А., Стопакевич, О. А., and Стопакевич, А. О.
- Subjects
- *
INDUSTRIAL controls manufacturing , *CYBERTERRORISM , *PROCESS control systems , *NETWORK PC (Computer) ,DEVELOPED countries - Abstract
According to a September 2021 report by Positive Technologies, 91% of the world's industrial companies have information systems vulnerable to cyberattacks. The industrial sector is the second most attacked sector in the U.S., and the leading one in developed countries. Ukraine ranks sixth and seventh in the top 20 for the largest industrial attacks. Many scientific publications are devoted to industrial cybersecurity in the world, but, unfortunately, in Ukraine this area of cybersecurity is poorly studied. To develop the topic of increasing the level of cybersecurity of industrial control systems, we focused on the problems of cybersecurity of the lower level of control - the operator control station of the technological plant. Previously, we investigated the problem of cybersecurity of the industrial computer network of the lower level Modbus RTU. Continuing the topic, in this paper we investigate the cybersecurity of important software - the OPC server. This study proposes to pay attention to a vulnerability that has not yet been investigated. This vulnerability is related to the fact that having an extensive network of workstations in the enterprise, an attacker can substitute OPC server on any workstation (usually the most important one in production) with his own OPC server and do it in such a way that on the one hand to bring the technological unit of the selected site to stop or crash, but on the other hand to prevent the operator of technological unit, watching the SCADA-system on the computer screen, from noticing anything. A special diagnostic system has been developed to detect a cyber attack. Appropriate software has been developed and, with its help, all solutions have been simulated in real time using components of real industrial software and Modbus network model. The developed solutions and software can be used in industry. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. THE FIBONACCI Q-MATRIX CODING METHOD.
- Author
-
Sviridov, A. V. and Petrushina, T. I.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
32. ОПТИМАЛЬНІСТЬ НЕУСІЧЕНОЇ ПОСЛІДОВНОЇ ПРОЦЕДУРИ ВАЛЬДА В ЗАДАЧАХ ПЕРЕВІРКИ ДВОХ ПРОСТИХ ПРОГНОЗІВ НЕСАНКЦІОНОВАНОГО ДОСТУПУ В ІНФОРМАЦІЙНИХ МЕРЕЖАХ ДЕРЖАВИ
- Author
-
Дудикевич, В. Б., Опірський, І. Р., Гаранюк, П. І., and Ваврічен, О. А.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
33. АНАЛИЗ ЭВРИСТИЧЕСКОГО МЕТОДА ПОСТРОЕНИЯ БАЙЕСОВСКИХ СЕТЕЙ С ТОЧКИ ЗРЕНИЕ ПРОГРАММНОЙ РЕАЛИЗАЦИИ В РАМКАХ РАСШИРЯЕМОЙ АРХИТЕКТУРЫ.
- Author
-
Таран, Е. Ю. and Пенко, В. Г.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
34. УСОВЕРШЕНСТВОВАНИЕ СТЕГАНОАНАЛИТИЧЕСКОГО МЕТОДА, ОСНОВАННОГО НА АНАЛИЗЕ ПРОСТРАНСТВЕННОЙ ОБЛАСТИ ЦИФРОВЫХ КОНТЕЙНЕРОВ.
- Author
-
Ахмаметьева, А. В.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
35. РЕКУРРЕНТНЫЕ МЕТОДЫ СИНТЕЗА ПОСЛЕДОВАТЕЛЬНОСТЕЙ С ОПТИМАЛЬНЫМ ПИК-ФАКТОРОМ СПЕКТРА УОЛША-АДАМАРА.
- Author
-
Мазурков, М. И. and Соколов, А. В.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
36. О ВЛИЯНИИ ВИДА ОРТОГОНАЛЬНОГО ПРЕОБРАЗОВАНИЯ НА ПИК-ФАКТОР СПЕКТРА СИГНАЛОВ В СИСТЕМАХ С CDMA.
- Author
-
Мазурков, М. И., Соколов, А. В., and Барабанов, Н. А.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
37. Analysis of uncertainty and incertitude in the risk assessment when development and implementation of integrated management systems.
- Author
-
Morteza, Rajab Zadeh, Zaloga, V. A., and Sushchenko., N. V.
- Abstract
This paper is devoted to research of the problems associated with uncertainty and incertitude in the risk assessment, which can take place in developing and implementing an integrated management system. Analysis of current researches on the use of the concepts of "uncertainty" and "incertitude" in the risk assessment is carried out. The classification of types of uncertainty and incertitude in the risk assessment of an integrated management system is developed. Recommendations are given on methods to overcome the problems associated with the uncertainties and incertitudes that occur in the development and implementation of an integrated management system. It became possible through a more accurate risk assessment. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
38. Complex method of detection and localization of cloning areas in digital images.
- Author
-
Zorilo, V. V. and Lebedeva, Ye. Yu.
- Abstract
Developing methods aiming at identification of digital images integrity violation is an important problem of complex system of information security. Cloning method, realized in the most of graphic editors, is often used to compromise the integrity of the image related to unauthorized changes. Therefore, the task of cloning identification is a relevant one. In addition to the cloning identification it is also important to clarify the contours of the cloned area. In this paper we propose a polynomial comprehensive method to identify areas of cloning as a falsification of the digital image. It allows to locate the cloned areas with a higher precision compared to modern analogues. Complex method is based on two modern clone detection techniques, using a common approach to the analysis of the state and technology of the information system functioning. It includes two stages: "fast rough" cloning area identification and a "slow" identification of the contour of the cloning area using a limited image subarea containing a clone. The method proposed can be adapted for the digital video. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
39. ОРГАНИЗАЦИЯ ВОЗМОЖНОСТИ САМОВЫРАЖЕНИЯ СТУДЕНТОВ ПРИ ИЗУЧЕНИИ ДИСЦИПЛИНЫ «ПРОГРАММИРОВАНИЕ И ПОДДЕРЖКА ВЕБ- ПРИЛОЖЕНИЙ».
- Author
-
Скакун, Л. В.
- Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2014
40. ANALYTICAL ASPECTS OF THE IMPACT OF THE MILITARY CONFLICT ON THE WOMEN AND CHILDREN OF UKRAINE AND MECHANISMS OF INTERACTION WITH THEM BY VOLUNTEER ORGANIZATIONS.
- Author
-
Filyppova, Svitlana V., Fox, Lea, and Svinarova, Hanna B.
- Subjects
WOMEN military personnel ,WAR ,VOLUNTEERS ,VOLUNTEER service ,WOMEN volunteers - Abstract
The article explores the theoretical and methodological aspects of population vulnerability during armed conflicts and the issues of violence in such conditions. The essential characteristics of vulnerability, its signs, and features in the context of war are discussed. An analysis of vulnerability and violence is conducted based on online surveys of vulnerable women and children on one side, and volunteer organizations providing assistance to vulnerable population groups on the other side within the framework of an international project investigating the impact of armed conflict on vulnerable population groups. It is argued that addressing such problems requires immediate resolution at both the governmental and non-governmental levels for the effective re-socialization of vulnerable population groups after the conflict concludes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. СОЗДАНИЕ ОБУЧАЮЩЕЙ СИСТЕМЫ НА ОСНОВЕ ИГРОВОЙ ПЛАТФОРМЫ UNREAL PLATFORM 4
- Author
-
Тигарев, В. М. and Винокуров, Р. A.
- Abstract
With the expansion of Internet capabilities, distance learning is actively developing in the world, as well as in Ukraine. Distance learning is gradually becoming the standard throughout the world. The term "online school" is becoming popular and it consists of distance learning through various communication platforms and videoconferences with the teacher. There are various training systems. This approach will allow students to go deeper into the material studied by not only visualizing the studied object, but also ability to rotate 3D objects, and go around using VR content. This approach is based on a person's visual perception, when the text is reinforced not by figurative thinking, but by a parallel representation of the image on the screen in order to avoid mistakes of perception and misunderstanding. The paper describes the basic principles of creating a learning system for distance learning based on the game platform Unreal Platform 4. Game platform allows you to create from scratch a product that will include the management of the objects' actions and the creation of various simulations that may not necessarily be physically correct or real. The proposed learning system is a new generation of distance learning system. The constituent elements of the work with the teaching material are sequentially described. A block diagram of creating a test lesson on the discipline "Design systems" is presented. The block diagram shows in detail the computer programs in which the work was carried out and the processes that were performed. Features of work with the learning system are considered in detail. It's been created the animation assistant, which makes the learning process easier. Test training courses were created in ONPU about 3D modeling in CAD. The advantages of using the game platform for creating a learning system are shown. The training system was approved at the regional competition of startups SpringUp in Odessa. New training courses for students of specialty 122 "Computer Science", specialization - "Computer Design" are being developed. [ABSTRACT FROM AUTHOR]
- Published
- 2018
42. ПРОВЕРКА ПРАВИЛЬНОСТИ ПРИНЯТИЯ РЕШЕНИЙ БЕСПИЛОТНЫХ ЛЕТАТЕЛЬНЫХ АППАРАТОВ ПРИ РАСПОЗНОВАНИИ ОБЪЕКТОВ
- Author
-
Хорошко, В. О., Хохлачева, Ю. Е., and Калантаевская, С. В.
- Abstract
This paper proposes a solution to the problem of optimizing the processing of incoming information from a UAV for object recognition in the absence of the necessary amount of initial information. The proposed private methods of object recognition can be easily implemented on computer equipment, which are located both on board the UAV and at a ground station. These methods make it possible to promptly receive an answer to the correctness of the decisions made regarding the object being explored. In the practical construction of recognition systems that are used in UAVs, it is necessary to use large amounts of data on the signs of objects. The construction of logical systems of recognition of objects containing a large number of classes and features, and the evaluation of their effectiveness is associated with considerable difficulties. The most significant indicator of the effectiveness of the recognition system is the probability of the correct solution of problems of recognition of unknown objects. With other things being equal, in particular, under conditions of optimal processing of a posteriori information, the value of this indicator is the higher, the greater the amount of incoming information is used in the recognition of this object. Moreover, under certain restrictions imposed by the signs used in recognition, the probability of a unique solution to the recognition problem increases and increases. The implementation of priorities in the field of creation and use of UAVs should be based on the use of high-tech achievements and world experience in the use of UAVs, taking into account the state of development of the national research and production base and the realization of the accumulated scientific, technical and technological potential of Ukraine in the information, aviation, space, telecommunications and related areas, the availability of appropriate infrastructure in Ukraine, and also taking into account the real economic, geopolitical and military requirements and capabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2018
43. СОЗДАНИЕ ПОДСИСТЕМЫ ПРОЕКТИРОВАНИЯ И АНАЛИЗА НАГРУЗОК РАМЫ ЭЛЕКТРОСКУТТЕРА В СОВРЕМЕННЫХ САПР
- Author
-
Тигарев, В. М. and Гончаренко, А. А.
- Abstract
In this paper, the principles of creating a framework design framework in CAD Autodesk Inventor are discussed. The information model of the electric scooter frame is proposed, which consists of five levels. Based on the created information model, the technique and technology of building an electric scooter frame were developed. After comparing the steps of creating a computer parametric frame model. First, we create a skeleton-vectorparametric sketch of a spatial frame. Based on the sketch frame sketch created in the "Frame Design" environment, we model the main file of the three-dimensional parametric assembly. In this file, the framework of the frame and connection of components is profiled. An application for designing automation in the iLogic environment of Autodesk Inventor CAD is created, which uses the received parametric model of an electric scooter frame for three configurations. The developer is a user-friendly interface for managing the design of the frame. The analysis of the distributed load on the luggage part of the frame, the lateral load on the frame base and the load on the front part of the structure are carried out. Mechanical loads on the frame elements were carried out for three designs: passenger, cargo, and freight. Optimization of three variants of designs on elements and materials is carried out. The passenger version of the frame can be made of aluminum. The cargo and passenger variant of the frame must be made of steel structures with elements of retaining loads in the form of ribs of rigidity. The proposed subsystem, allowing you to control the time when security is required, the passenger and reliability for power loads. For the first time, an information model for the creation of the supporting structure of an electric catcher has been proposed. A further continuation is the automation of the creation of a complete design of an electric scooter and an analysis of its static and dynamic characteristics. [ABSTRACT FROM AUTHOR]
- Published
- 2018
44. АЛГОРИТМ ВОССТАНОВЛЕНИЯ ИЗОБРАЖЕНИЙ, ПОЛУЧАЕМЫХ С БЕСПИЛОТНЫХ ЛЕТАТЕЛЬНЫХ АППАРАТОВ.
- Author
-
Хорошко, В. А. and Дуксенко, Н. А.
- Abstract
In this paper, issues related to the operation of unmanned aerial vehicles (UAVs) in the conditions of active electronic countermeasures are discussed. An important factor in UAV's work is to restore the image which it gives on the ground. In consequence of processing the receptor field of this image using proposed algorithm allows for each of the figures to extend its generic feature, and it is distributed its generic feature and it is distributed simultaneously to all the pieces of a video image. Thus, it is possible to easily recover and isolate separately from any image presented on the receptor field, which allows to recognize and classify the image in real time. [ABSTRACT FROM AUTHOR]
- Published
- 2016
45. ОСНОВЫ НОВОГО ПОДХОДА К ВЫЯВЛЕНИЮ РЕЗУЛЬТАТОВ КЛОНИРОВАНИЯ В ЦИФРОВОМ ИЗОБРАЖЕНИИ В УСЛОВИЯХ ВОЗМУЩАЮЩИХ ВОЗДЕЙСТВИЙ.
- Author
-
Кобозева, А. А. and Григоренко, С. Н.
- Abstract
In this paper it is proposed basics of a new approach to identify cloning results, conducted in digital images, in additional disturbing influences conditions in a digital image after cloning, that may be considered as lossy compression, add noise, blur, etc. The approach is based on identifying the comparability of the surface parts, which is put into correspondence the analyzed image appropriate clones and its preimage. The surface is determined by the graph of the interpolation spline, approaching the function of the image, and the elements of the image are regarded as the interpolation nodes. It is proved that as the main quantitative characteristics of such comparability is advisable to use the volume of a cylindrical body with generator parallel to the axis OZ, bounded from above corresponding part of the interpolation function graph, bounded below - plane XOY. [ABSTRACT FROM AUTHOR]
- Published
- 2015
46. КЛАССИФИКАЦИЯ МАТЕМАТИЧЕСКИХ МОДЕЛЕЙ СИСТЕМ ЗАЩИТЫ ИНФОРМАЦИОННОГО ПРОСТРАНСТВА ДЛЯ УПРАВЛЕНИЯ ВОЗДУШНЫМ ДВИЖЕНИЕМ.
- Author
-
Орехов, А. Н. and Хорошко, В. А.
- Abstract
The paper deals with the classification system model information space systems, air traffic control for a set of three criteria that allow the simulation of its operation, but the choice of modeling methods necessary to assess the level of possible relationships between the elements of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2015
47. ВЫЯВЛЕНИЕ НАРУШЕНИЙ ЦЕЛОСТНОСТИ ЦИФРОВОГО ИЗОБРАЖЕНИЯ ПУТЕМ ИСПОЛЬЗОВАНИЯ СТЕГАНОГРАФИЧЕСКИХ АЛГОРИТМОВ.
- Author
-
Кобозева, А. А., Бобок, И. И., and Дзюбинская, Л. М.
- Abstract
In this paper we propose a method for identifying the changes of image completion based on stegano transformation of original image. In the case of using the steganography algorithm that resistant for disturbing influences proposed method provides the possibility of identifying nonoriginal areas of the image, even when image was saved in lossy formats. The developed method allows to allocate a specific method of image completion violations - cloning; identify the cloned area and its prototype; separate clone in the case of absence of post-processing from the original image that has not been done before. [ABSTRACT FROM AUTHOR]
- Published
- 2015
48. ЭКСПЕРИМЕНТАЛЬНАЯ ПРОВЕРКА ПРОЯВЛЕНИЯ СЛЕДОВ МОНТАЖА В ЦИФРОВЫХ ФОНОГРАММАХ.
- Author
-
Рыбальский, О. В. and Соловьев, В. И.
- Abstract
The paper discusses the results of experimental detection of editing traces in digital audio records. It was proved experimentally that both cutting of the pause fragments from voice records and adding the pre-cut fragments into pauses results in the changes in signal spectrum at editing locations. It was proposed to develop a methodology for the expertise of digital audio records. [ABSTRACT FROM AUTHOR]
- Published
- 2015
49. АНАЛИЗ ТОПОЛОГИИ СЕТИ ПЕРЕДАЧИ ИНФОРМАЦИИ.
- Author
-
Скоробогатько, Е. А., Тимченко, Н. П., Хорошко, В. А., and Хохлачёва, Ю. Е.
- Abstract
The paper deals with the optimization of structures and software modeling complex systems and information transfer with the analysis of the stability of the topology information transmission systems based on the concept of duality, as well as the efficiency of transmission of confidential information processing steps and recommendations on the capacity of these steps and systems in general. [ABSTRACT FROM AUTHOR]
- Published
- 2015
50. АВТОМАТИЗАЦІЯ КОНФІГУРУВАННЯ БЕЗПЕЧНОГО ПІД'ЄДНАННЯ ДО КОРПОРАТИВНИХ МЕРЕЖ
- Author
-
Паталашко, П. Ю. and Кушніренко, Н. І.
- Subjects
INFORMATION technology ,INFORMATION technology security ,WEB services ,TRUST ,INFORMATION resources ,VIRTUAL private networks ,COMPUTER networks - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.