Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем
Latest Publications


TOTAL DOCUMENTS

51
(FIVE YEARS 47)

H-INDEX

0
(FIVE YEARS 0)

Published By Korolov Zhytomyr Military Institute

2076-1546

Author(s):  
М. V. Buhaiov ◽  
V. V. Branovytskyi ◽  
Y. O. Khorenko

One of the most important components of counteracting small unmanned aerial vehicles is their reliable detection. You can use propeller noise to detect such objects at short distances. An energy or harmonic detector is used to receive unmanned aerial vehicles acoustic emission. At low signal-to-noise ratios , which is most common in practice, the harmonic detector provides a higher probability of detection compared to energy. The principle of the harmonic detector is based on spectral analysis of acoustic signals. A mathematical model of the acoustic signal of an aircraft-type unmanned aerial vehicles is proposed. It is shown that at short time intervals (tens of milliseconds) such signals can be considered as stationary and for its analysis can be used known methods of spectral estimation. Nonparametric, parametric and subspace methods of spectral estimation are considered for processing of acoustic emission of unmanned aerial vehicles. To conduct a comparative analysis of different methods of spectral estimation, a statistical quality index was used, which can be calculated as a variation of the estimation of power spectral density. This index characterizes the method of spectral estimation in terms of frequency resolution and the ability to detect harmonic components of the signal into noise and not create interference that exceeds the amplitude of the signal. As a result of researches it was established that at high signal-to-noise ratios parametric methods are more effective in comparison with nonparametric. However, such a statement will be valid only if the correct order of the model. It is shown that the use of spatial methods is impractical for the analysis of acoustic signals of unmanned aerial vehicles. The use of the value of the statistical quality indicator as a threshold for deciding on the presence or absence of the acoustic signal of the unmanned aerial vehicles in the adopted implementation and its further processing should be used at SNR values greater than 5 dB.


Author(s):  
Y. O. Gordienko ◽  
A. O. Lotoshko ◽  
O. O. Paplinskiy

The paper analyzes the methods of processing measurement data of the seismic observation method used in the International Seismic Monitoring System and the Main Center for Special Control of the State Space Agency of Ukraine to solve problems of monitoring nuclear tests at foreign test sites. The directions of improvement of known and development of new methods of processing of measuring data of seismic method of detection in the conditions of presence and absence of a priori information on the form of a seismic signal are defined. If the form of the expected seismic signal is known, then the monitoring of foreign test sites by the seismic grouping system can be realized by supplementing the method of controlled directional reception with a correlation scheme of measurement data processing. In the absence of information on the shape of the seismic signal, the monitoring of the test site is carried out by dividing the group into two subgroups, followed by the cross-correlation method between the original samples of each subgroup. For a network of three-component stations, if there is information about the shape of the expected seismic signal, the method of comparison with the reference signal is used. In the absence of reference signals, monitoring is implemented using system discriminant, which takes into account the kinetic and dynamic properties of the expected signal with a cell from a given area. Possibilities of application of seismic stations of the International system of seismic monitoring are analyzed, use of measuring data which for the decision of problems of monitoring of foreign landfills allows to reduce time of definition of parameters of a seismic event essentially. A feature of the signals registered by seismic stations of the International System is the presence of types of seismic waves characteristic of events with cells in the near zone. Implementation of monitoring of test sites is possible by taking into account the polarization and dynamic properties of seismic waves. The implementation of the proposed approaches will increase the efficiency of solving the problem of detecting nuclear explosions at foreign test sites.


Author(s):  
N. M. Karashchuk ◽  
S. O. Sobolenko ◽  
V. O. Savenko ◽  
I. A. Tsykalov

Analysis of the experience of modern armed struggle shows that timely detection of signals onboard radio sources by radio monitoring systems is an important task. One way to ensure its solution is the use of compact broadband antennas in the centimeter range. Therefore the development and improvement of methods for calculating broadband compact antennas in the centimeter wave range is an important and relevant scientific and practical task. An improved method for calculating a traveling wave antenna based on irregular symmetrical slit lines located arranged on a multilayer dielectric substrate (Vivaldi antennas) is proposed, by taking into account the thickness of the dielectric substrate, the relative effective dielectric constant of the substrate layers and two-way power supply to improve the directional properties of the antenna and its coordination in a given frequency band. In particular, the formulas of the phase multiplier of the system (for two radiating elements) and the resulting pattern of the antenna take into account the two-way power supply and the thickness and relative dielectric constant of the substrate. These advanced formulas for calculating and selecting these options antennas, lengths; maximum and minimum slot width; the coefficient of opening the gap; the width of the strip of symmetrical microstrip power line at the connection of the coaxial power line; the width of the strip at the intersection with the slit line; the width of the symmetrical slit line at the base of the opening; the length of a quarter-wave transformer based on a symmetrical microstrip line; the length of the symmetric microstrip power line; slit length; resonator diameter; the radius of the cover of the structural capacitor. The practical significance of the results obtained lies in the possibility of an approximate calculation of compact broadband antennas in the centimeter wavelength range. The results make it possible to model and manufacture these antennas for radio monitoring systems for onboard radio sources.


Author(s):  
V. S. Savchuk

Modern planning of psychological operations is not possible without the use of information technology, such as modeling tools that ensure the accuracy of planned operations and predict their results. Modern technologies also help to facilitate the perception of information through visualization. Any information, especially on social networks, is easier for analysts to process if it is presented in a schematic form. For example, the target audience of psychological influence in social networks can be represented by a graph. The article solves the urgent problem of verifying the model of the target audience of psychological influence in social networks. The approach to model verification is based on a combination of cognitive criteria of topological structure. Classical methods of verification of mathematical models are used for verification of mathematical calculations. Data visualization is taken as the basis of the cognition criterion. The article presents a method of graph visualization, which sets the mathematical model of the target audience. Visual representation of the graph not only promotes better assimilation, but also speeds up the analysis of the collected information about the target audience through automation. The data obtained during the run of the model are compared with real data, thus confirming the conformity of the behavior of the model to real phenomena. Validation of the model with the help of software was performed by tracing the model. The adequacy of the model is based on the possibility of analysis of the target audience by the user according to the characteristics of individual actors, which make it possible to determine their role and analyze the structure of the target audience as a whole. The theory of analysis of social networks is the basis of the choice of characteristics of the target audience. To assess the adequacy of the model, two characteristics of the target audience were chosen, as centrality in mediation and centrality in its own vector. The results of the calculations are presented using the software application Gephi. Data from the VKontakte social network were used as input data to check the adequacy of the model.


Author(s):  
O. V. Samchyshyn ◽  
I. V. Humeniuk ◽  
K. V. Smetanin ◽  
O. S. Bojchenko

Improving the availability of information technology and increasing the volume of digital traffic leads to an important problem of data protection. A particularly pressing issue is the problem of transmitting confidential data through unsecured communication channels, such as the Internet. Recently, there has been a significant increase in the number of cyberattacks, including attempts to intercept and steal confidential information transmitted through global information networks. Information security in computer information and telecommunication systems is a priority. To date, one of the most reliable methods of protecting information is rightly considered to be encryption. Cryptographic data transformations are the most effective way for a system to maintain the confidentiality of information as it is entered, output, transmitted, processed, and stored, and to resist its destruction, theft, or distortion. But the most effective way to ensure the confidentiality of information is the combined use of steganographic and cryptographic means. In order to ensure high stability of encrypted information when transmitting it through the network of information and telecommunications systems and reduce the threat of unauthorized access to it or attack on the cipher, it is proposed to change the approach to solving the problem of data encryption. A method of encrypting / decrypting digital text information based on the pixel alphabet of a monochrome image, which is based on hiding or distorting graphic data, is proposed. This approach allows you to ensure high stability of encrypted information and significantly reduce the risk of unauthorized access to confidential information or attack on the cipher by encrypting each character with a dynamic random number from the range of values of the corresponding character and hiding the encrypted text in the position of graphic data. sender and recipient only.


Author(s):  
N. M. Karaschuk ◽  
I. A. Tsikalov ◽  
V. O. Savenko

Analysis of the experience of modern struggle shows that the success of combat missions to sone extent depends on the timely detection of information from communication channels, in particular, radio relay communication lines. Increasing the detection range of the radio monitoring station can be achieved by using a mirror parabolic antenna with a radiation in the form of a conical horn with low losses due to the use of a matching device. The constructive decisions of matching devices are analysed and it is determined that most of them are resonant. The substantiation and selection of the design of the dielectric transformer with the length ( – wavelength in a round waveguide, m) for coordination of the conical horn irradiator in the whole band of its operating frequencies for the wave type is carried out. To achieve the goal, the methods of antenna theories and electrodynamics were used, in particular the theory of long lines. A mathematical apparatus has been developed for calculating the parameters of a dielectric transformer (the length ). It is stated that its impedance must be equal to the modulus of load resistance. The calculation of the value of the active transformed resistance according to the formula (10) always gives a positive value of the input resistance, the value of which is greater the greater the reactive load reactance. The reliability of the obtained formulas is confirmed by the convergence of units and graphs of dependences of the changes of the outer radius of the coaxial power line (its impedance), as well as the thickness and place of inclusion on the matching dielectric transformer . The practical significance of the research results lies in the possibility of improving the matching of a horn antenna based on a circular waveguide in the range of its operating frequencies for a certain type of wave.


Author(s):  
О. О. Hrebenuk ◽  
M. U. Bedzay

The experience of the Joint forces operation shows the need to create ACS by the actions of JI units at the tactical level. This due is need to ensure the awareness of geographically distributed units, added forces and means, individual servicemen on the battlefield and a high level of efficiency in the management of units. The article discusses the basic principles of using special software applications for mobile communications, based on geographic information system (GIS) for planning the march of units and subdivisions. The expediency of using a mobile platform based on mobile communications as a software carrier is analyzed. Requirements for information systems based on GIS and software applications for mobile communications have been met in order to slow down the efficiency at the stage of planning the relocation of the unit. For this purpose, it is proposed to develop a software application based on the presented algorithm for calculating the march using GIS. The developed algorithm describes the sequence of actions to automate the process of choosing the optimal route on the map, the calculation of the march and its main parameters. The developed algorithm describes the sequence of actions to automate the process of choosing the optimal route on the map, the calculation of the march and its basic parameters. It’s proposed to use digital maps as cartographic services and technologies of Google Maps or Yandex Maps, which advantages are multi-layered and versatile. This approach could automate calculations, improve the efficiency and effectiveness of the commander's decision on the choice of position area and planning the march. In future, it’s worth noting the expansion of the functionality of the software application to the level of mobile information and reference system of the unit commander by developing special app, as well as the use of known software utilities and information resources.


Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


Author(s):  
O. M. Pereguda ◽  
A. V. Rodionov ◽  
S. P. Samoilyk

The article proposes an approach to increasing the survivability of class I unmanned aerial vehicles in emergency operations which involves development of an onboard information system for identifying emergency occasions in flight and the synthesis of a control action on the unmanned aircraft in case of hazardous factors influence. As the result of the analysis of the main trends in the development of unmanned aerial vehicles onboard control systems, it was found that the leading countries are paying significant attention to increasing their intellectualization level. This is necessary to ensure the fulfilment of complex tasks that are assigned to modern unmanned aerial vehicles in the military and civilian spheres. The main directions of such researches are identifying the problem of swarm application of unmanned aerial vehicles and expanding the capabilities of onboard control systems maintain automatically the values of certain parameters when the flight conditions changes. As the approach to increasing the survivability of a class I unmanned aerial vehicle, a vision of an onboard information system for identifying emergency occasions in flight and synthesis of control action is proposed, the functional purpose of its components is described. It is suggested that this system will be comprised of a subsystem for identifying emergency cases in flight and determining the class I unmanned aerial vehicle threat level and a subsystem for synthesizing control action. Governing documents and regulations for the state aviation of Ukraine determines the list of aircraft emergency occasions. Article mentions the necessity of detailing emergency occasions in flight, which are typical for class I unmanned aerial vehicles and an approach to their classification is proposed. A vision of the nearest partial scientific tasks and a list of expected scientific results of research in this direction are given.


Sign in / Sign up

Export Citation Format

Share Document