Telecommunication and information technologies
Latest Publications


TOTAL DOCUMENTS

78
(FIVE YEARS 78)

H-INDEX

0
(FIVE YEARS 0)

Published By State University Of Telecommunications

2412-4338

Author(s):  
V. V. Sobchuk ◽  
◽  
M. O. Mozhayev ◽  

An analysis of the functioning of the forensic information system is carried out. It is determined that the huge information capacity of images in one way or another limits the possibilities of their use in solving various scientific and practical problems, including in forensic science. As a result of the analysis it is established that the rapid progress of technical means of photography, video recording, telecommunication technologies expands the possibilities of traditional means of capturing photo, video and new (mobile, network, specialized, space) with new data formats, requires constant updating of special expertise. in the field of digital photography. Existing methods of image processing, however, do not fully solve the problem of their effective representation, which makes the search for new effective methods of image representation relevant. To solve this problem, the use of orthogonal transformations is proposed. The article solves the current scientific and technical problem of analysis of various adaptive orthogonal transformations of information to identify more effective. To solve this complex and multifaceted problem, the article studies the so-called wavelet packets, or adaptation in the frequency domain; the algorithm of a double tree, or adaptation of the basis of decomposition both in frequency, and in spatial areas is analyzed; researches of dimension of library of bases for all transformations and their computational complexity are carried out. As a result of the conducted researches it is established that prospects of application of this or that algorithm depend on the concrete application. In addition, it is likely that better results can be achieved if we separate the segmentation process from the transformation using wavelet packets. Currently, effective segmentation algorithms have been developed that can be successfully applied. After segmentation, each segment is reduced to a rectangular shape, and it is transformed using wavelet packets. Thus, the main goal of the study is solved - it is established that adaptive orthogonal transformations, in comparison with traditional wavelet transforms, allow to improve up to 10% of the value of the peak signal-to-noise ratio at low coding speeds.


Author(s):  
O. V. Senkov ◽  

The article considers the problem of optimizing the exchange of information in the conditions of uncertainty that arises in the process of functioning of converged networks. The uncertainties formulated in the paper are characterized by discrepancies in the "interests" of different network nodes, varying degrees of awareness or incomplete data on the value of system parameters. Such uncertainties lead to a decentralized process management strategy in a converged network. The problem of interaction of network nodes is considered from the point of view of game theory, at the same time players act as separate nodes of system, the exchange of information between which is limited by conditions of uncertainty. Decision-making procedures are formulated for the following cases: when one node is the center and the other opposes it and the center knows information about the choice of the second player; when the center does not know the capabilities of the second player, and the uncertainty lies in the random nature of the strategy of the second player; network node synergy model. For the first case, the optimal control is based on the maximum action of the first station (center) and the maximum resistance of the other station (second player) and can use the maximum model. For the second case, the limitations of the strategy of the game (including the strategy of punishment of the player) are determined and it is proved that the gain, more than the maximum guaranteed result of the center, cannot be obtained on any other class of strategies. The relation of the center to the uncertainty in the model based on the synergetic concept of the operation of convergent networks is such that it seeks to maximize the linear convolution of the values of its criterion. The peculiarities of constructing a strategy for the exchange of information between individual nodes of the network in the presence and absence of isolated points in the set of choices of the player who opposes the center are studied. The developed model of interaction of heterogeneous subsystems of the telecommunication network in the conditions of uncertainty can be used for situations when nodes have incomplete information about both the system as whole and other nodes.


Author(s):  
O. A. Zolotukhina ◽  
◽  
D. G. Voloshyn ◽  
V. V. Davydov ◽  
V. О. Brechko ◽  
...  

The article is devoted to the development and research the unmanned aerial vehicle safe flight trajectory calculation and adjustment process imitation model. The main distinguishing feature of the presented model is taking into account the signals of radar stations during the determination and adjustment the location of the aerial vehicle in the case of an autonomous flight and adapting the route based on possible obstacles and deviations. This will improve the safety of the unmanned aerial vehicle flight trajectory. Main studies of path planning methods approaches are analyzed. It was concluded that two-dimensional representation and visualization has disadvantages. Based on disadvantages, the three-dimensional calculated trajectory visualization of a flight mission by an unmanned aerial vehicle simulation model is developed. The simulation model combines the solution of following subtasks: a) modeling a three-dimensional environment with obstacles; b) building an unmanned aerial vehicle trajectory in such environment with avoidance the obstacles. Missions simulation is performed based on developed software system, sequentially, step by step. The following results of the simulation are achieved: 1) a special graphical interface for entering input data and displaying the results is developed; 2) the subsystem for simulation the space for performing a flight task taking into account the location and signals of external influences (for example, radar stations) was developed; 3) the subsystem for flight trajectory simulation calculation and visualization is developed. The software system is built using Delphi based on modular basis. The functional software system structure and the order of each functional module operation are described in article. The system’s graphical interface structure is discussed separately. An example of calculating and adjusting the safe flight trajectory of an unmanned aerial vehicle is illustrated.


Author(s):  
R. V. Kyrychok ◽  
◽  
G. V. Shuklin

The article considers the problem of determining and assessing the quality of the vulnerability validation mechanism of the information systems and networks. Based on the practical analysis of the vulnerability validation process and the analytical dependencies of the basic characteristics of the vulnerability validation quality obtained using the Bernstein polynomials, additional key indicators were identified and characterised, which make it possible to assert with high reliability about the positive progress or consequences of the vulnerability validation of the target corporate network. The intervals of these indicators were experimentally determined at which the vulnerability validation mechanism is of high quality. In addition, during the calculations, a single integral indicator was also derived to quantitatively assess the quality of the vulnerability validation mechanism of the corporate networks, and an experimental study was carried out, as well as the assessment of the quality of the automatic vulnerability validation mechanism of the db_autopwn plugin designed to automate the Metasploit framework vulnerability exploitation tool. As a result, it was proposed the methodology for analysing the quality of the vulnerability validation mechanism in the corporate networks, which allows one to quantify the quality of the validation mechanism under study, which in turn will allow real-time monitoring and control of the validation progress of the identified vulnerabilities. Also, in the study, the dependences of previously determined key performance indicators of the vulnerability validation mechanism on the rational cycle time were obtained, which makes it possible to build the membership functions for the fuzzy sets. The construction of these sets, in particular, allows making decisions with minimal risks for an active analysis of the security of corporate networks.


2020 ◽  
Vol 66 (1) ◽  
pp. 109-119
Author(s):  
V. M. Akhramovych ◽  
◽  
V. M. Chegrenec

2020 ◽  
Vol 66 (1) ◽  
pp. 99-108
Author(s):  
A. V. Trystan ◽  
◽  
A. О. Berezhnyi ◽  
I. M. Kryzhanivskyi ◽  
O. A. Salash ◽  
...  

2020 ◽  
Vol 66 (1) ◽  
pp. 197-204
Author(s):  
A. V. Selyukov ◽  
◽  
Yu. I. Khlaponin

Author(s):  
S. Yu. Hohonyants ◽  
◽  
A. O. Klochko ◽  
O. A. Salash ◽  
Ye. G. Rudenko

The development of the information society determines the study of the introduction of information technology in the educational process of educational institutions as a tool for self-development, self-realization, social and communicative adaptation. Creating an information and educational environment of the educational institution is responsible for the success of the introduction of information and communication technologies in education at all levels. Theoretical analysis of the concept of "information and educational environment" is presented and its main characteristics are highlighted: openness, expandability, scalability, integration, adaptability. The principles on which information and educational environments should be created are formulated: multicomponent, integrity, distribution, adaptability. The functions of the information and educational environment in the distance learning system are revealed. It is shown that the information-educational environment satisfies the information-educational needs of the participants of the educational process, timely and high-quality provision of educational material, maintains connections "inside" and with "external" information space, fixes the relationship of content addressed to different subjects. The structure of the information and educational environment of the Ivan Chernyakhovsky National University of Defense of Ukraine is presented, which is an integral part of the integrated use of information and communication technologies in the educational process. A prerequisite for creating an information and educational environment is the availability of electronic content, technologies and means of electronic communication of all participants in the educational process. Information and educational environment is possible only if the development of all its components - management, content, organizational, technological. The management component includes the educational policy of the educational institution. The content component includes information and methodological resources. The organizational component performs integrating, systematizing and informational functions. The technological component is directly related to the choice of software.


Author(s):  
O. G. Plyushch ◽  
◽  
V. V. Vyshnivskyi ◽  
S. V. Prokopov ◽  
S. M. Ishcheryakov

Problems of securing noise immunity and information transmission concealment in telecommunication networks of information systems are considered. In order to improve performance, it is proposed to use scrambling coding sequences, which spread the spectrum of the bits being transmitted. To synthesize new scrambling coding sequences, tenth degree primitive polynomial is used. Autocorrelation properties of the obtained scrambling coding sequence are studied. Limitations caused by those properties are deduced. In order to establish a possibility of synthesized scrambling coding sequence use in the telecommunication networks data transmission channels, it is carried out computer simulation of the transmission process of the bit set, whose spectrum is spread by the obtained sequence. In the process of computer simulation, a mixture of the desired signal in the form of a scrambled bit set, internal noise of information transmission channel and interfering signal was formed. While the powers of the internal noise and interfering signal remained constant, power of the bit sequence gradually assumed three discrete values. As a result of the research, it is established that utilization of the synthesized scrambling sequence permits to perform extraction of the bits being transmitted, under conditions in which the power of the noise interfering signal and the internal noise of the channel surpasses power of the desired channel by up to 18 decibel. The limitations set by the use of the synthesized coding sequence are described. An inference concerning a possibility of obtained coding sequence use in practical implementation of telecommunication channels of information networks is made.


Sign in / Sign up

Export Citation Format

Share Document