Advanced Information Systems

Journal Information
ISSN : 2522-9052
Total articles ≅ 346
Filter:

Latest articles in this journal

Сергій Євсєєв, Роман Корольов, Андрій Ткачов, Анастасія Німченко
Advanced Information Systems, Volume 5, pp 131-135; https://doi.org/10.20998/2522-9052.2021.2.19

Abstract:
The entry of mankind into the era of high technologies, the rapid growth of computer technology contributes to the expansion of the range of electronic services. To ensure the security of confidential information, personal data, cryptographic systems of traditional cryptography (symmetric cryptosystems) and public key cryptography (asymmetric cryptosystems) are used. As a rule, the former provides security services, the latter provide key distribution. However, in the conditions of totalitarian surveillance in society by the special services of developed countries, cryptographic tabs are embedded in cryptographic algorithms, which, on the one hand, provide “quick” access for special services to confidential information, and on the other hand, allow intruders to break into the cryptosystem and obtain user data. The article proposes a modification of the well-known GOST 28147-89 algorithm, which ensures the "elimination" of possible crypto-bookmarks and an increase in crypto-resistance in the post-quantum period (the emergence of a full-scale quantum computer that allows hacking modern symmetric and asymmetric cryptosystems based on Grover and Shor algorithms). It is proposed to use the procedures for modifying the block-symmetric encryption algorithm (BSEA) GOST 28147-89 (2009, 2015) in OFB mode, which will make it possible to form a pseudo-random sequence based on dynamic changes in the S-box, and provide the required level of security.
Сергій Олізаренко, В’Ячеслав Радченко
Advanced Information Systems, Volume 5, pp 126-130; https://doi.org/10.20998/2522-9052.2021.2.18

Abstract:
The paper considers the results of a method development for determining the semantic similarity of arbitrary length texts based on their vector representations. These vector representations are obtained via multilingual Transformers model usage, and direct problem of determining semantic similarity of arbitrary length texts is considered as the text sequence pairs classification problem using Transformers model. Comparative analysis of the most optimal Transformers model for solving such class of problems was performed. Considered in this case main stages of the method are: Transformers model fine-tuning stage in the framework of pretrained model second problem (sentence prediction), also selection and implementation stage of the summarizing method for text sequence more than 512 (1024) tokens long to solve the problem of determining the semantic similarity for arbitrary length texts.
Lev Sakovych, Heorhii Krykhovetskyi, Oleksandr Mikhin, Iurii Myroshnychenko
Advanced Information Systems, Volume 5, pp 120-125; https://doi.org/10.20998/2522-9052.2021.2.17

Abstract:
The purpose of the article is to quantify the impact of the quality of metrological and diagnostic software on the formation of the sequence and limit the number of inspections during maintenance of complex electronic systems, including modern means of communication with digital information processing. As a result of the analysis of the existing system of maintenance the advantages of service of products on a condition are established. In this case, to determine the sequence of inspections do not fully take into account the properties of metrological and diagnostic software. Results of the research. In the article the quantitative estimation of influence of the metrology and diagnostic providing is first considered and got on the indexes of quality of technical maintenance of communication means. It is shown that most influence in a time of implementation of technical service and probability of determination here of the technical state render the diagnostic providing of works with the use of the modern metrology providing. It is also shown that on the value of indexes of quality of technical service preparation of specialists and technological equipment of repair organ influence substantially, abilities of performers in full to use possibilities of modern facilities of measuring technique. Conclusion. The got results it is expedient to draw on at the improvement of existing or creation of new instructions of technical service on the state perspective communication or other difficult wares of the radio electronic systems means.
Galina Cherneva, Pavlо Khalimov
Advanced Information Systems, Volume 5, pp 118-122; https://doi.org/10.20998/2522-9052.2021.1.17

Abstract:
One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user access. However, a large degree of sharing can interfere with the protection of resources, so a sufficiently detailed AC policy should allow selective exchange of information when, in its absence, sharing can be considered too risky in general. Erroneous configurations, faulty policies, as well as flaws in the implementation of software can lead to global insecurity. Identifying the differences between policy specifications and their intended functions is crucial because the correct implementation and enforcement of the policies of a particular application is based on the premise that the specifications of this policy are correct. As a result of the policy, the specifications presented by the models must undergo rigorous validation and legalization through systematic checks and tests to ensure that the specifications of the policies really correspond to the wishes of the creators. Verifying that access control policies and models are consistent is not a trivial and critical task. And one of the important aspects of such a check is a formal check for inconsistency and incompleteness of the model, and the security requirements of the policy, because the access control model and its implementation do not necessarily express policies that can also be hidden, embedded by mixing with direct access restrictions or another access control model.
Alina Kazmirchuk, Olena Zhdanova, Volodymyr Popenko, Maiia Sperkach
Advanced Information Systems, Volume 5, pp 100-106; https://doi.org/10.20998/2522-9052.2021.1.14

Abstract:
The work is devoted to the multiobjective task of scheduling, in which a given set of works must be performed by several performers of different productivity. A certain number of bonuses is accrued for the work performed by the respective executor, which depends on the time of work performance. The criteria for evaluating the schedule are the total time of all jobs and the amount of bonuses spent. In the research the main approaches to solving multiobjective optimization problems were analyzed, based on which the Pareto approach was chosen. The genetic algorithm was chosen as the algorithm. The purpose of this work is to increase the efficiency of solving multicriteria optimization problems by implementing a heuristic algorithm and increase its speed. The tasks of the work are to determine the advantages and disadvantages of the approaches used to solve multicriteria optimization problems, to develop a genetic algorithm for solving the multicriteria scheduling problem and to study its efficiency. Operators of the genetic algorithm have been developed, which take into account the peculiarities of the researched problem and allow to obtain Pareto solutions in the process of work. Due to the introduction of parallel calculations in the implementation of the genetic algorithm, it was possible to increase its speed compared to the conventional version. The developed algorithm can be used in solving the problem of optimal allocation of resources, which is part of the system of accrual of bonuses to employees.
Andrii Kovalchuk, Mykola Oleshchuk, Volodymyr Karlov, Oleh Karpenko, Oksana Biesova, Olena Lukashuk
Advanced Information Systems, Volume 5, pp 82-86; https://doi.org/10.20998/2522-9052.2021.1.11

Abstract:
The multichannel and fixed parameters radars for tracking targets with the phased array antennas are widely used in modern military surveillance systems. The modular integration of a phased antenna array with digital processors allows to realize the command and control functions of antenna patterns for tracking multiple targets in the time resolution modes. Tracking of the air targets in range, radial speed and angular coordinates of evaluations and azimuth is provided by means of the multichannel radars without adaptation modes to the characteristics of external influences. Thus, adjusting the algorithms of tracking systems to the maximum maneuverability of the air targets can lead to a significant reduction in the accuracy of surveillance in comparison with the potentially achievable accuracy for such radars of tracking the linear flight targets in the long duration of time. In the case of adjusting the algorithms of tracking systems to either low intensity of flying targets, or lack of the aircraft maneuvering, it is possible to significantly increase the error of the aircraft flying information, and as a result to have a disruption of tracking the air targets. The increase in the parameters of the tracking error in relation to the influence of external interference were obtained as a result of the study. As a result of research, it is possible to assess the feasibility of adapting to certain characteristics of external influences, and provide recommendations for selecting and fixing the parameters of algorithms of tracking systems to ensure their versatility to surveillance targets with both high maneuverability, and implementing the stealth technology.
Victor Krasnobayev, Sergey Koshman, Dmytro Kovalchuk
Advanced Information Systems, Volume 5, pp 123-128; https://doi.org/10.20998/2522-9052.2021.1.18

Abstract:
The subject of the article is the development of a method for diagnosing data that are presented in the system of residual classes (SRC). The purpose of the article is to develop a method for fast diagnostics of data in the SRC when entering the minimum information redundancy. Tasks: to analyze and identify possible shortcomings of existing methods for diagnosing data in the SRC, to explore possible ways to eliminate the identified shortcomings, to develop a method for prompt diagnosis of data in SRC. Research methods: methods of analysis and synthesis of computer systems, number theory, coding theory in SRC. The following results were obtained. It is shown that the main disadvantage of the existing methods is the significant time of data diagnostics when it is necessary to introduce significant information redundancy into the non-positional code structure (NCS). The method considered in the article makes it possible to increase the efficiency of the diagnostic procedure when introducing minimal information redundancy into the NCS. The data diagnostics time, in comparison with the known methods, is reduced primarily due to the elimination of the procedure for converting numbers from the NCS to the positional code, as well as the elimination of the positional operation of comparing numbers. Secondly, the data diagnostics time is reduced by reducing the number of SRC bases in which errors can occur. Third, the data diagnostics time is reduced due to the presentation of the set of values of the alternative set of numbers in a tabular form and the possibility of sampling them in one machine cycle. The amount of additionally introduced information redundancy is reduced due to the effective use of the internal information redundancy that exists in the SRC. An example of using the proposed method for diagnosing data in SRC is given. Conclusions. Thus, the proposed method makes it possible to reduce the time for diagnosing data errors that are presented in the SRC, which increases the efficiency of diagnostics with the introduction of minimal information redundancy.
Oleksii Khodakovskyi, Larysa Levchenko, Vadym Kolumbet, Anna Kozachuk, Dmytro Kuzhavskyi
Advanced Information Systems, Volume 5, pp 34-38; https://doi.org/10.20998/2522-9052.2021.1.04

Abstract:
The calculation apparatus acceptable for assumptions and simplifications and sufficient for errors of final results for modeling the propagation of electric, magnetic and electromagnetic fields spread over a certain area was proposed. It is shown that to model the propagation of ultra-low frequency electric and magnetic fields (monitors, uninterruptible power supplies, transformers, electric motors and generators) it is possible to consider these sources as dipole and dipole-quadrupole type sources. That is, the field of the local source can be considered as a combination of electric and magnetic dipoles. This makes it possible to delineate with sufficient accuracy the zones of exceeding the maximum allowable field strengths. The calculation apparatus used to determine the radiation intensities of civil aviation radar equipment was adapted to model the propagation of electromagnetic fields of very high and ultra-high frequencies. The calculations of coefficients that take into account the parameters of radiation patterns in the horizontal and vertical planes for the most common radiation sources are given. These ratios and corresponding coefficients can be used to determine the electromagnetic environment in the presence of many high-frequency sources (mobile communication base stations, navigation equipment, radio relay stations, etc.). The proposed approach allows to automate processes of designing the placement of electromagnetic, electronic and radio equipment in production areas and territories, as well as to assess the environmental impact at the stages of design work. This will make it possible to delineate the isolines of the limits of exceeding the maximum permissible levels of electric magnetic and electromagnetic fields for different frequency ranges and categories of equipment and to automatically determine the electromagnetic load at each point of the controlled space.
Валерій Барсов, Олена Костерна, Олександр Плахотний
Advanced Information Systems, Volume 5, pp 91-97; https://doi.org/10.20998/2522-9052.2021.2.12

Abstract:
Study subject. The article proposes and investigates a method for increasing the accuracy of determination of the distance and the obstacle geometric parameters based on object contours determination using a computer vision system that uses low-resolution sensors. The goal is the effectiveness evaluation of the proposed method. Tasks: to conduct experimental researches of the quality indicators of the method of increasing the object contours determination accuracy; evaluate the effectiveness of this method. Used methods: statistical modeling, laboratory scale tests. The obtained results: the analysis of the proposed method efficiency was carried out and the influence of this method on the determination accuracy of the distance and object geometric parameters was evaluated. Conclusions: the considered method made it possible to achieve the increasing the determination accuracy of the distance and geometric object parameters by compensating for image blur using the Lucy-Richardson deconvolution algorithm. The obtained data showed a decrease in the maximum error in determining the distance from 8% to 4% and the error in the geometric object parameters from 7.7% to 5.8%. The implementation of this approach was carried out in the Python programming language.
Володимир Андрусевич, Іван Обод
Advanced Information Systems, Volume 5, pp 78-82; https://doi.org/10.20998/2522-9052.2021.2.10

Abstract:
The paper pays attention to the consideration of the structure of user's information support of the airspace control system at the stage of primary information processing by the joined radar system. This system includes a primary and identification surveillance system, which allows considering the overall structure as a single synchronous network of surveillance information systems. Such a structure can be characterized by an overall integrated quality indicator of the information support of the airspace control system. Such a quality indicator can be the probability of information support, which is the product of the probabilities of correct detection of an air object by the primary radar and identification system on the basis of "friend-foe" and the probability of comparing the coordinate information of primary radar systems and identification systems. This approach allows changing the model of combining information for primary radar systems and identification systems so as to take into account the estimated coordinates of the air object by both information systems due to the weight combination of coordinates of air objects. The calculation of the coordinates of air objects according to the information of the primary radar systems and identification systems allows improving the quality of information support for decision makers in the air traffic control system.
Back to Top Top