protected object
Recently Published Documents


TOTAL DOCUMENTS

73
(FIVE YEARS 43)

H-INDEX

2
(FIVE YEARS 1)

Author(s):  
A. Pinchuk ◽  
M. Garbuz ◽  
P. Zeleny ◽  
D. Harnets ◽  
D. Ivanov

Analysis of combat losses of aircraft in local armed conflicts in recent decades shows that most cases of aircraft hits are related to the impact of guided surface-to-air and air-to-air missiles equipped with homing warheads. The use of modern guided missiles equipped with homing warheads is one of the main threats to aircraft of various types. This is due to the fact that modern guided missiles are characterized by high speed, maneuverability, accuracy of aiming and difficulty of detection. Solving the problem of protecting aircraft from guided missiles consists of several stages: detection of missile launch; confirmation that the detected missile is heading directly toward the protected object; missile identification and decision-making on the most effective countermeasure system employment. At present, there are no missile launch detection systems that guarantee a 100% probability of threat detection, but an analysis of aviation combat losses in local armed conflicts in recent decades convincingly shows that the number of combat losses of aircraft equipped with such systems is much lower than those in which missile launch detection is carried out visually. For example, most of the Soviet Union's losses during the war in Afghanistan and the United States‟ losses during Operation “Desert Storm” in Iraq were related to the use of portable anti-aircraft missile systems, which missiles were equipped with infrared homing warheads. Realizing the scale of the threat posed by such missiles, most of the world's leading countries have significantly increased the expenses on development new or improvement existing countermeasures. As a result, the aggregate losses of coalition forces in Iraq, Afghanistan and Syria since 2001 clearly suggest that these costs have paid off, with losses from the use of portable anti-aircraft missile systems significantly reduced, while the total number of combat sorties increased. Therefore, in the face of all the challenges and threats posed to Ukraine due to the aggressive actions of the Russian Federation, conducting research in the interests of aviation of the Armed Forces of Ukraine to improve the effectiveness of missile detection systems for ensuring timely detection of threats, warning of aircraft crew and activation in the automatic mode the means of countermeasures is as relevant as ever.


2021 ◽  
pp. 104-111
Author(s):  
N. I. Skoropysova

The article discusses the key issues of the interpretation of the concept of “defamation” in the countries of Western Europe. In a modern social and legal state, considerable attention is paid to the protection of individual rights and freedoms as the foundations of democracy. One of the basic personal rights is the right to personal dignity, protection of honor and reputation. Analysis of the structures of the current legislation, the positions of the Supreme Court, acts of the European Court, as well as classical and newest scientific approaches, defamation is an offense expressed in the dissemination of inaccurate information that violates the right of a legal entity to a business reputation. Honor, dignity, business reputation are constituent elements of such categories as personal moral rights and intangible benefits, in order to ensure the realization and functioning of the rights of which, a well-thought-out, well-coordinated and effective protection mechanism must be produced. Attention is focused on the fact that for the proper operation of such a mechanism, it is necessary to determine, first of all, the protected object, what are its features and boundaries that need to be regulated by law. Indeed, in the case of securing an incomplete list of protected in the legislation, fixing in the norms not all signs of the protected or the presence of gaps in the regulation of this legal relationship, the potential for abuse of the right or misinterpretation of its norms arises. National laws define in different ways whether the burden of proof lies with the plaintiff or the defendant. It is concluded that defamation is one of the unlawful acts that infringe upon honor, dignity and reputation and requires further study in the practice of the European Court. In dealing with defamation cases, courts always need to find a compromise and strike a balance between freedom of expression, freedom of thought and speech, and protection of dignity, honor and reputation.


Author(s):  
Roman Arhat ◽  
Serhiy Shlyk ◽  
Viktor Shchetynin ◽  
D. Moloshtan ◽  
Volodymyr Drahobetskyi ◽  
...  

An impact-resistant layered element consisting of two outer layers from highly rigid material and an inner layer from viscoelastic material has been developed. The item reduces the barring effect on the protected object. The design peculiarity is that the outer part has a bend with a deflection arrow within 10… 15 thicknesses, and has a connection of the outer layers from high-stiff material on opposite edges with staples from plastic material, which during plastic deformation flows into the edge holes coaxially in the outer layers, on the inner side of the impact-resistant element is attached a shock-absorbing layer from elastic foamed polymeric material, the back surface of which corresponds to the surface of the protected object. For the parts manufacture it has been developed bending sheet parts method in which the bending the part shelves with a bending element with their subsequent straightening. The aim is to increase the process productivity and the geometric dimensions’ accuracy of the part. Modeling the process of parts spontaneous forming "Impact-resistant element upper sheet" on the reverse and direct schemes is performed by the finite element method in the AnSYS / AutoDYN system. The study purpose is to develop technology and modeling the process of the impact-resistant element sheet parts deformation.


2021 ◽  
Vol 4 (3) ◽  
pp. 144-154

This note explores the current state of and perspectives on the legal qualification of artificial intelligence (AI) outputs in Ukrainian copyright. The possible legal protection for AI-generated objects by granting sui generis intellectual property rights will be examined. As will be shown, AI remains a very challenging subject matter for legal regulation. This article seeks to identify the pros and cons of proposals in the Draft Law of Ukraine ‘On copyright and related rights’ on sui generis right relative to AI-generated objects. A comparative analysis of the EU Database Directive provisions is conducted regarding sui generis right to non-original databases. Investment theory will be considered as the only justification for a sui generis right protection of AI outputs aimed at the protection of substantial investments. The special criteria identifying the scope of the substantial investments in computer-generated objects are unclear in the Draft Law of Ukraine ‘On copyright and related rights’. The proposed provisions are considered premature since they cover the concept of fully autonomous AI. The article concludes that the adoption of the proposed provisions may lead to excessive legal protection, as a special category of protected object is not identified.


2021 ◽  
Vol 5 (2) ◽  
pp. 132-144
Author(s):  
K. V. Maslov ◽  
A. S. Matnenko

The subject. The key characteristics of risks and threats in state control context are researched comprehensively.The purpose of the article is to confirm or disprove hypothesis that threats and risks should be the basis for determining the content of other elements of the system of state control and supervision.The methodology. The authors use the formal legal interpretation of normative acts, as well as systemic approach and analysis of philosophical literature, concepts of the security the-ory and monographs in different branches of law.The main results, scope of application. The relationship between the concepts of "threats" and "risks" is determined, and their author's definitions are proposed. A threat in control and supervisory activities is a set of events or acts that cause or are capable of causing damage to socially significant values. Risks are such threats to socially significant values, which are expressed in the actions of participants of social relations. Risks are associated with an incorrect assessment of the objective situation and can lead to harm with varying degrees of probability. The categories "risk" (in the negative aspect) and "threat" highlight two facets of the same entity. When describing malicious phenomena as threats, attention is focused on the possibility of causing harm as an integral attribute of such phenomena. Understanding them as risks allows us to give a quantitative description of the probability of occurrence of harmful consequences of the impact of a particular act on the protected object. Problems are identified in the reflection of the essential characteristics of risks and threats in the current legislation on state control (supervision) and in the new Federal Law of 31.07.2020 No. 248-FZ "On State Control (Supervision) and Municipal Control in the Russian Federation". The analysis of the Russian legislation shows that there is no comprehensive approach to fixing the essential characteristics of threats and risks, which are aimed at minimizing the control and supervisory activities. New Russian Law No. 248-FZ of 31.07.2020 also demonstrates that the legislator does not have a systematic approach to identifying risks and other threats and therefore effective measures to counteract their implementation through control and supervisory activities are not determined. The scientific substantiation of the characteristics of risks and threats in general allows both to enrich the theory of public control, and to improve the legislation on control and supervisory activities, as well as to increase the effectiveness of the protection of public interests in the process of its application.Conclusions. The key nature of threats and risks for determining other elements of the sys-tem of state control and supervision is substantiated The use of the term “threat" is preferred because of its more universal nature. Threats determines both the goals and principles of control and supervisory activities in any area, as well as its forms and methods.


Author(s):  
Алексей Александрович Порошин ◽  
Кирилл Александрович Попонин ◽  
Вера Владимировна Королева ◽  
Наталья Александровна Сизонова

Рассмотрены вопросы разработки требований к программному обеспечению автоматизированного рабочего места диспетчера пожарно-спасательного подразделения, а также разработки требований к формату отображения информации на экране монитора в системах передачи извещений о пожаре. Предложены варианты отображения информации на экране монитора автоматизированного рабочего места с учетом представления на нем различных информационных атрибутов: меню настройки, поле отображения плана объекта защиты, поле пиктограмм для управления информацией и ее квитирования, поле счетчика числа тревожных сигналов, поле изменения параметров объектов и др. There is considered the elaboration of requirements for the software of automated workplace of the dispatcher of fire and rescue unit. The elaboration of requirements for display format of information on the monitor screen in fire notification transmission systems is also examined. There are proposed variants of information displaying on the monitor of automated workstation, taking into account the presentation of various information attributes, such as: the setup menu, the field for displaying the plan of protected object, the icon field for managing information and its acknowledgment, the field of counter of alarms’ number, the field for changing objects parameters, etc.


2021 ◽  
Vol 5 (2) ◽  
pp. 71-79
Author(s):  
Oleg Rubel

Introduction. Kuyalnyk estuary has a remarkable medical and health potential of national importance, its unique properties are of international value, which predetermines recognition of respective areas as protected areas. In addition, proximity of Kuyalnyk estuary to the city of Odesa causes expansion of not only cooperation vectors with representatives of business groups in Odesa region, as  well as creating demand in service market at this area. However, presently, economiс-ecological potential of Kuyalnyk estuary area is not used properly, which significantly affects social and infrastructural level of this area, and decreases investment attraction of this resort. Aim and tasks. In this paper it is proposed to consider theoretical and methodological principles of developing ecologically oriented business activity at the stage of planning protected object: Natural National Park (NNP) “Kuyalnitskiy”; to analyze tools for cooperation with economic private sector representatives, which will ensure protected areas development as a multifunctional space. Results. This paper substantiates ways to develop regional program of targeted economiс-ecological support for entrepreneurial activity development in the areas of Ukrainian nature reserve fund; it is suggested implementing public-private policy that allows developing future Natural National Park “Kuyalnitskiy” as innovative area – “space” aimed at streamlining processes of nature management, creating new formats of business activity, improving ecological-economic situation in the region, creating conditions for sustainable development. Conclusions. Taking into account dual economic and regulatory status of Kuyalnyk estuary, it is necessary to plan such vectors of business activity that can simultaneously meet the needs of sanatoriums and have environmentally friendly format that will consider reasonable level of anthropogenic load at this area. The proximity to the city of Odesa will ensure development and market demand for various types of economic-ecological business activities, as well as appropriate level of “neighbourhood urban planning”.


Author(s):  
Gennadiy Kamyshentsev

Gennadiy Kamyshentsev, Tetiana Tiahun, Olga Shevchenko DEVELOPMENT OF THE CONTROL ALGORITHM OF THE INFORMATION AND TECHNICAL METHOD OF ACOUSTIC CONTROL OF THE EMERGENCY OF THE TERRORISTIC HYSTERISTIC In the work on the basis of the analysis of vulnerability of objects of critical infrastructure, the structural scheme of the control algorithm of the information and technical method of acoustic control of emergence of an emergency situation of terrorist character on objects of critical infrastructure of Ukraine is developed. It is proved that the main task of the process of managing a terrorist emergency at a critical infrastructure facility is to prevent intruders from entering a protected facility by detecting and terminating their actions in a timely manner. At the same time, the range of control of detection means located on the protected object is limited to several kilometers. The use of acoustic information from external surveillance systems located at traffic interchanges, in satellite cities, controlled areas of private structures and its analysis of events occurring in the thirty-kilometer zone, will allow the collection of everyday factors to detect in advance the signs of terrorist emergencies. nature, which will significantly increase the effectiveness of the entire system of physical protection of the protected object. Accordingly, the control algorithm of the information and technical method of acoustic control of terrorist emergencies at protected critical infrastructure by integrated use of acoustic control systems within the perimeter and approaches to it consists of nineteen blocks located at seven levels. connected by logical connections, and provides distribution of data on the fixed video and audio images, their binding and identification, creates conditions for detection of hostile and obviously hostile actions against the protected object, provides registration of deviations in behavior of people , in the use of transport and other phenomena, which as a result of careful systematization of the obtained data allows to identify signs of preparation of a terrorist act against a protected object and further prevent the development of an emergency situation or prevent its spread. Key words: emergency situation, acoustic control, information and technical method


Author(s):  
Вадим Георгиевич Ерышов

В статье рассматривается аналитическая модель процесса технической защиты конфиденциальной информации, обрабатываемой на защищаемом объекте информатизации в терминах теории Марковских случайных процессов. Данная модель может быть использована при построении системы технической защиты информации защищаемого объекта информатизации. The article considers an analytical model of the process of technical protection of confidential information processed on the protected object of informatization in terms of the theory of Markov random processes. This model can be used in the construction of a system of technical protection of information of the protected object of informatization.


Sign in / Sign up

Export Citation Format

Share Document