Modeling of the high-speed punching drummer barriersas a set of hollow cylinders | Author : Anatolii Kovtun, Volodimir Tabunenko | Abstract | Full Text | Abstract :Were analyzed the characteristics of damaging elements of artillery systems and small arms. Were analyzed the characteristics and structures of personal Armor protection. Modern protection has layered structure. The main blow of high speed sub munitions takes the hard plate. They can be made of metal or high-strength double-layer panels. At a meeting with the panel the toe of bullet was destroyed. As a result of growing area of interaction between the bullet and the panel, there is a deflection and uncoupling ceramic bullet while destruction. When you hit the drummer in the obstacle created several types of wave perturbations that propagate with different velocities. These effects cause is a complex stress state structure, whose intensity decreases rapidly with time. The aim of the article is to investigate the interaction of high-striker with a protective barrier in the form of a set of hollow cylinders. The methods that are used: Improving personal armor protection can be achieved by applying the optimum combination of new materials and advanced structural and circuit design. Character penetration drummer an obstacle may change if the obstacle is to imagine a structure that consists of a set of hollow cylinders. Considered the process of interaction, of high-speed impactor, with a protective barrier, in the form of a set of hollow cylinders. In contact with the surface layer drummer obstacles by having an expanded, drummer enters the hollow cylinder, which closely hugs the side surface of the impactor, creating resistance to motion. When moving drummer in the cylinder is converting kinetic energy into energy impactor cylinder and deformation work to overcome friction. Thus, the energy of drummer extinguished intermediate layer and redistributed to the power frame inner layer. following results are obtained. The proposed a model to determine the depth of penetration drummer an obstacle in the form of a set of hollow cylinders. There are results of the calculations. It is proposed to further improve the protection of personal Armor achieve by applying the optimum combination of new materials and advanced structural and circuit design. |
| Synthesis of the asynchronous traction drive control system by the ACOR method | Author : Valentin Noskov, Maksym Lipchanskyi, Gennadij Gejko | Abstract | Full Text | Abstract :The subject of the study in the article is the analysis of methods for the synthesis of automatic control systems (ACS) for rolling stock with an asynchronous traction drive (ATD). The goal is assurance the quality of the processes dynamics, the accuracy of bringing objects to a specified point in the phase space, and minimizing energy costs for control processes in conditions of deterministic and random perturbations. The task is selection the method of optimal ACS synthesis, which allows providing the required indicators of ATD work quality. Analysis of the problems of optimal control of moving train traction drive showed that it is most promisingly to use the method of analytic construction of regulators by the criterion of generalized work (ACOR) for the synthesis of object management systems, which are described by systems of nonlinear differential equations. AKOR method allows to synthesize regulators that optimize control processes not only for deterministic, but also for random perturbations. However, the use of this method is possible for objects whose mathematical model is described by a system of differential equations in which control enters linearly. In connection with the fact that controls are non-linear in the ATD, to use the AKOR method, its adaptation was performed and expressions were obtained for the controls that determine the structure of the optimal regulator. Conclusions: an approach for the synthesis of the asynchronous traction drive ACS using the AKOR method is proposed. Adaptation of this method was carried out taking into account nonlinear controls. |
| Method of multiagent web-oriented environment synthesis based on information satellites | Author : Igor Shostak, Andrii Sobchak, Olga Popova, Maksim Mischenko | Abstract | Full Text | Abstract :Purpose. Creation of a favorable web-oriented environment through the production of satellite agents in the form of doorways, which makes it possible to increase the information content of the object of production of a virtual instrument-making enterprise. Results. In the article the method of increasing the informative value of the Virtual Instrument Making Enterprise products using information satellites is considered, based on the synthesis of a multi-agent web-based environment through the production of satellite agents in the form of doorways. A detailed step-by-step algorithm for creating such information satellites in the form of doorway sites, with a basic emphasis on informativeness, is disclosed. The main problem related to the loss of production potential, as well as its solution using the proposed method, is presented. Conclusions.The method allows not only to adapt equipment to the market by means of its timely modernization, but also allows to provide market conditions, competitiveness of products and their sale with minimum expenses of monetary resources, which determines the demand for production and forms a portfolio of orders. |
| Justification of perspectives directions of upgrading radiocommunication systems of Armed Forces Ukraine | Author : Ruslan Zhyvotovskyi, Sergii Petruk | Abstract | Full Text | Abstract :Aim. In the article explore issues and directions of the innovative approach to the development of automated complexes and radio communication facilities for special purposes. During the research it was determined that the effectiveness of the military radio communication system would be improved by facilities of modernization of the latest facilities of radio communication of foreign production or by improving the existing system of military radiocommunication. Presented directions and features of leading research and development works for the improvement and development of channels and systems of military radio communication, the creation of nodes and centers of radio communication, automated complexes and radio communication of special purpose were presented. Was given generalized approach to the construction of the system of automated radio communication, antenna-hardware complexes, software and hardware complexes of radio prediction and planning of use of radio frequency resource. Conclusions. According to the results of the conducted researches, conceptual decisions about the system engineering and technological reconfiguration of the existing radio communication system are proposed, which will allow to work in the automated radio networks as part of the radio centers of information and telecommunication units; to unify the facilities and complexes of radio communication with facilities of communication and automation, to provide counter work with the equipment of the old park, as well as to construct a fundamentally new radio communication system with the ability to calculate the planning and forecasting of the radio frequency resource. |
| Analysis of modern condition of military radiocommunication system | Author : Igor Romanenko, Andrii Shyshatskyi | Abstract | Full Text | Abstract :Aim of the article is to conduct an analysis of military communications systems that were used in the area of conducting antiterrorist operation in theDonetsk and Lugansk regions. The article analyzes the modern facilities of military communication, namely: military radiocommunication systems, military satellite communication systems, military systems of radio relay and tropospheric communication. The advantages and disadvantages of each type of communication are considered, the causes of their occurrence were considered, and the ways of solving these reasons in the future were substantiated. An analysis of the main technical characteristics of military communication systems, opportunities, advantages and disadvantages has been conducted. The perspectives for the development of military communication systems have been determined on the basis of the analysis of the military facilities of communication used in the article, which are used in the region of the antiterrorist operation in theDonetsk and Lugansk regions. To eliminate the problematic issues mentioned in the article, the authors of the article are proposing to launch their own military satellite for the needs of the Armed Forces of Ukraine; To develop new models of military communication; To conduct deep modernization of the existing radio stations, command-staff cars, radio relay and tropospheric stations; To integrate telecommunications equipment adopted in the last years into a single information space of the Armed Forces of Ukraine, as well as to reach agreement with representatives of leading telecommunication equipment manufacturers regarding the transfer of technologies and deployment of production in the territory of Ukraine. |
| Analysis of the current status of intelligent system "Internet of Things" and trends in the development | Author : Alla Goriushkina, Roman Korolev | Abstract | Full Text | Abstract :The subject of study in the article is the processes of analysis and evaluation of attack intelligent systems “Internet of Things” (IoT). The goal is to reduce the potential attacks due to the risks of intellectual functioning of the IoT systems, through the timely adoption of security measures. Objectives: the classification of attacks on all levels of intelligent systems, IoT, highlighting the main factors and their causes; the following results are obtained. The analysis of the current state of intelligent systems, IoT, analyzed all levels of functioning, and classification of hackers on the factors of their occurrence. The negative consequences negatively affecting the basic characteristics of the functioning of the IoT systems. As a result, a block diagram of attacks at all levels of the IoT. Conclusions. The article analyzes the current state of intelligent systems “Internet of Things” (IoT). It is shown that a significant increase in computer network devices connected to the network creates new opportunities for the development of modern society in the field of science and technology. However, the significant development of “Internet of Things” is directly proportional to increases the possibility of attacks in computer networks. Therefore, the scientific direction improvement of existing or development of new algorithms, models, and their implementation to ensure major safety criteria for IoT are relevant. |
| The intelligence theory mathematical apparatus formal base | Author : Abed Thamer Khudhair | Abstract | Full Text | Abstract :Purpose. The main task of the theory of intelligence is to describe mathematically the laws governing the intellectual activity of a human. This requires to obtain using physical and objective methods to obtain formal description of the subjective states of a human sufficiently complete for practical purposes. Human thoughts, sensations, perceptions and awareness are all subjective states. This paper is tasked to develop a multidimensional predicate model of comparator identification - the basic experimental method of the intelligence theory and to substantiate the axiomatics of this model. Methods. The comparator identification method developed in this paper provides the possibility of obtaining objective knowledge of subjective states of human intelligence. According to the comparator identification method with his behavior the subject realizes some finite predicate, the properties of which are experimentally studied and mathematically described. The comparator identification method is based on the algebra of finite predicates, Boolean algebra and the axiomatic method. Results. As a result of the comparator identification method application, we obtain a mathematical description of the studied subjective states of a subject, as well as the form of the function underlying the transformation of physical objects into subjective images generated by them. Conclusions. The results of this paper provide a mathematical substantiation of the possibility of using the comparator identification method in human intelligence modeling. |
| Development of the method and program model of the static analyzer of harmful files | Author : Svitlana Gavryilenko, Dmitriy Saenko | Abstract | Full Text | Abstract :The subject of research in this article is the methods of analyzing malicious software. The goal is to improve the secure functioning of computer systems (CS) and protect them from the effects of computer viruses. Research target: the research of modern means of software antivirus protection; analysis of the methods of creating a file signature; the development of a software model for static file detection, based on the analysis of the PE structure; the generation of tables of features that are inherent to families of viruses such as Worms, Backdor, Trojan; the obtainment binary signatures of malicious and secure software. The methods used are: analysis of the code in a Hex file, file hashing algorithms. The following results are obtained. The PE-structure of the file has been analyzed; sections have been selected for further analysis. A software model of static file detection has been developed and the analysis of secure and malicious files has been performed. Features in the form of strings and API functions have been selected; a bitmask has been formed for further file analysis. 3500 files of malicious and safe software has been scanned, their analysis has been performed. Signatures of each malicious file have been encoded and stored in the signature database. Using the developed software model, a study has been made of the possibility of detecting modifications to malicious software. Conclusions. A method and software model of static detection of malicious files has been developed, which allow automatic obtainment of a set of file features and draw a conclusion about the severity of the file. |
| Elastomer composition properties forecast using percolation model | Author : Natalia Evdokimenko, Lyudmila Pisotska, Nina Kuchuk | Abstract | Full Text | Abstract :The results of theoretical and experimental studies on development of methodology for assessing geometric parameters elastomeric phase morphology compositions based on an analysis of the problems in percolation and Ferhyulsta differential equation. Established that the geometric probability phase transitions, a given content heterophase sharply reduced in case heterophase particle size reduction. With the developed technique Calculations geometric parameters of the rubber phase morphology to assess the impact of the nature and content all ingredients on the structure and properties of rubber. The principles of construction the optimal composition of elastomer (rubber and polyurethane block). Established that maximum deformation-strength properties sold in case formation of morphological structure with a minimum particle size heterophase. The optimal block for polyurethanes morphology is that, on the one hand, provides the highest probability of preservation of properties for heterophase rigid blocks providing high strength, on the other hand - saving properties of variance environment for high elasticity. The results, based on analysis in problems of percolation well aligned with known experimental data, by light scattering, by optical and electron microscopy. The approach has practical value for optimization of elastomeric compositions, as well as to developing brand range block polyurethanes. |
| Analysis of information-telecommunication network risk based on cognitive maps and cause-effect diagram | Author : Viktor Kosenko, Olga Malyeyeva, Elena Persiyanova, Anton Rogovyi | Abstract | Full Text | Abstract :The subject matter of the article is the processes of analysis and risk assessment of information and telecommunications networks. The aim is to reduce the potential losses caused by the risks of information and telecommunications network (ITN) functioning by taking timely risk management measures. The objectives are: classification of ITN risks, highlighting the main factors and causes of their occurrence; formation of a systematic presentation of risks to identify their manifestation and consequences; development of the method for assessing the influence of the risk and private risk on probable consequences; obtaining a quantitative risk assessment of ITN. The methods used are: system analysis of risks, method of cognitive maps, cause-and-effect analysis. The following results are obtained: classification of private risks of ITN according to the reasons and the factors of their occurrence is made; the negative consequences affecting the basic characteristics of the operation of ITN are defined; as a result, the structural system model of ITN risks is formed, in which the relationships between the elements of the main aspects of risk are shown; the method based on the theory of causal analysis is suggested in order to quantify the risk impact on ITN functioning. The risk model is based on the construction and analysis of probabilistic or fuzzy cognitive maps. Experts estimate the level of influence of private risks on the characteristics of the network in order to make decisions on risk management. The generalized structure of the cause-effect diagram of the risk factors, manifestation and consequences is developed; on ITN basis the method for quantifying the probability of risk consequences is suggested. The quantitative assessment of probable malfunctioning of the network that is determined by a specific effect (taking into account ITN probability), which is caused by private risks is also made. Conclusion. The suggested approach for quantitative assessment of ITN risk is based on the method of cause-and-effect analysis and enables taking into account both the factors causing it and probable consequences. The obtained results can be used to determine probable failures and losses in ITN functioning on the basis of the information about the degree of risk factors effects, risk events and consequences, and the cause-effect relationships between them. Thus, potential losses can be identified; measures to manage the risks of ITN functioning can be taken. |
| Development of digital steganography techniques for copyright protection, based on the watermark | Author : Vladimir Oleshchenko, Vladimir Pevnev | Abstract | Full Text | Abstract :The increasing value of information protection is an important question in our fast-paced world. Especially acute is the question of copyright protection, which is against the backdrop of increasing the number of generated content, has become a real problem. The unauthorized use of foreign Intellectual Property of liability leads to great economic author`s losses. In order to minimize cases of data theft, steganography requires a large number of ways to conceal the fact of the information transfer (in contrast to cryptography, where you actually encrypted the message itself). Steganography is changing the image in a way that only the sender and the intended recipient is able to detect the message sent through it. It is invisible, and thus the detection is not easy. It is a better way of sending secret messages than encoded messages or cryptography as it does not attract attention to itself. Among the already proposed, existing steganography methods, such as: Digital prints (DP), steganography watermark (SW), hidden data (HD), in this work, attention is paid to watermarks (SW). SW implies the presence of the same labels for each container copy. In particular, the SW can be used to confirm the copyright. For example, when you recording video, you can intersperse information about recording time, in each frame, or the camcorder model, or name of your camcorder or the information about operator. If the footage gets into the hands of a rival company, you can try to use the watermark to confirm authorship of the record. If the key is kept secretly by the owner of the camera, then you can use the SW as a confirmation the authenticity of the photo and / or video images. Digital watermarks are used to protect the copyright or proprietary rights to the digital images, digitized photographs or other artwork. The main requirements that apply to this integrated data, are reliability and resistance to distortion. In modern systems, the formation of the digital watermark embedding the principle of label being a narrowband signal over a wide frequency range of the image to be marked. Digital watermarks have a small amount, however, subject to the above requirements for their integration using more sophisticated methods than to embed a message or header. This report is examined the possibility of using methods of steganography, which is based on the use of watermarks to protect and hide information to protect copyright. |
| A GERT model of an algorithm for analyzing security of a web application | Author : Anna Semenova, Mark Dubrovskyi, Vitalii Savitskyi | Abstract | Full Text | Abstract :The subject of the study in the article is the mathematical network GERT model algorithm for analyzing the security of web applications, which allows you to find an arbitrary distribution function and the probability density function for the execution time of security of a Web application analysis algorithm. Objectives: The analysis of the problem and formulation of the task, task solution, flow chart of security of a Web application analysis, GERT model of security of a Web application analysis algorithm, probability density function for the execution time of security of a Web application analysis algorithm. The methods that are used: Methods of graph theory, security testing algorithms, methods of probability theory and mathematical statistics. The following results are obtained. An algorithm for testing the security of web applications is developed. A mathematical model of the algorithm for testing Web application security was developed, the model allowed to find an arbitrary distribution function of the statistical value of the vulnerability testing time. The probability distribution function for testing the security of web applications is found. This will make calculations and identify the most likely case of the law of distribution of the random value of the time of testing Web application security. Conclusion. A mathematical model of the algorithm security of a Web application analysis has been developed based on an exponential GERT network that is different from known models through taking into account DOM structure execution or analysis. The model can be used to study processes in automated systems as well as to develop new data security tools and protocols. Using exponential stochastic GERT models makes it possible to employ results obtained in an analytical form (functions, distribution densities) for comparative analysis and studies of more complex computer systems using mathematical methods. |
| Investigation of the observation conditions on the terrain of war operation using GIS technology | Author : Elshan Giyas oglu Hashimov, Azad Agalar oglu Bayramov | Abstract | Full Text | Abstract :The modern geoinformation systems (GIS) have been widely applied in Armed Forces for preparation and control of battle operations, for information providing of tactic activities, for improvement of topographic maps etc. In real situations during war activity the Geography information about situation on the terrain can be ofthen changed. So, in this cause the application of usual maps isn’t effective. Only the modern automated control systems can provide fast changing information documenting. The observation condition is one of the terrain features for providing information about enemy troops position and facilities. This feature helps to detemine the distance of sight between any observation points, the invisibility factors of terrain. It is depended on nature of relief plant cover, human settlements and other objects, also meteorological conditions, influencing on the visibility. As result of correct organization of observation, the obtained data help commander to estimate completely the military operation area and adopt a reasonable de?ision. In paper the observation conditions between two points of mountain terrain during battle operation have been investigated using GIS technology. The experiments for estimation of observation situation in mountain terrain has been carried out for one of the chosen region of the Caucasus. The visible and invisible areas have been revealed on the line of sight between two selected oversight points. The invisibility factors have been calculated and studied in depended on camera platform height. The visible and invisivle areas are determined under 0-180° angle in range 17941.16 m. The height profile between observations points and the digital heights model of investigated terrain have been constructed and analysed. At the various heights of camera observation platform the 3D heights models of the visible and invisivle areas have been constructed The invisibility factors between two delected viewpoints have been calculated. It is determined that if the heght of camera platform is increased above-ground level then the invisible area is decreased. ArcGIS software has been used for development and calculation measured results. |
| Exposure systems used in the assessment of EMF impact on living organisms | Author : Pawel Cala, Pawel Bienkowski | Abstract | Full Text | Abstract :The subject of the study in the article is the processes of analysis and exposure assessment of electromagnetic field on humans. The main goal is to optimize size of the exposure antenna systems, its electrical parameters and generated electromagnetic field (EMF) for different frequency range. Objectives: Electromagnetic field (EMF – Electromagnetic Fields) studies on living organisms are one of the important branches of biomedical research. Most of this type of research is conducted using dedicated exposures system with fixed and controlled EMF exposure conditions. The purpose of biomedical research is to determine the influence of electromagnetic fields on living organisms. For this purpose the exposure systems are designed. The main task of the exposure antenna system, is to produce the EMF with known and controlled parameters in a specific EMF area. Depending on the frequency and the component (E or H) of the electromagnetic field used, different types of systems are used. For low frequencies (for instance 50 Hz common frequency) and magnetic fields, Helmholtz solenoids or coils are used, and for electric fields - flat capacitors (E Field). For higher frequencies field E is used for systems with linear antennas or TEM lines. There are also dedicated probes for invasive tissue heating. Each solution has its advantages and limitations and usually there are no universal solutions for all cases. Results: For the generation of a low frequency magnetic field up to several hundred Hz, the Helmholtz solenoid or coil is generally used because of its relatively simple construction, the ability to obtain high intensity and good homogeneity of the field in a relatively large area relative to the dimensions of the whole system. The homogeneous field area can be determined analytically based on system geometry or measurement. Otherwise it looks for exposure system above few MHZ. To create a homogeneous EMF in the field of radio frequencies, the exposure systems - usually the TEM lines (Crawford compartment) or sometimes the GTEM are very likely to be used. In both cases there are frequency and spatial limitations - the homogeneous field is assumed to be maximally present. At 1/3 the height between the plates of the chamber and at the same time the maximum frequency of operation of the TEM chamber can be described by the approximate dependence of fmax [MHz] = 50 / d [m], resulting in a chamber operating at 1 GHz. The work piece does not exceed a height of about1.5 cmwith a diameter of about4 cm. Larger working areas, but at the same time, a lower homogeneity of the field can be obtained in the GTEM chamber - but at the same time the GTEM chamber has much larger geometric dimensions. Another way is to produce PEM with the parameters in open space - in the vicinity of the antenna. In this case, it is very important to select an antenna so that the expected homogeneous area can be obtained at an acceptable distance from the antenna - in order to maintain high EMF intensity and to reduce the radiation of the antenna beyond the desired area. This can be achieved by limiting the emission area by, for example, shielding or using EMF absorbers. In addition authors simulate novel ablation antenna for ablation treatment. Conclusions: Assessing the impact of EMF on biological objects is an interdisciplinary studies that requires the involvement of biological or medical specialists, as well as the EMF standard field and metrology specialist. In this work we have taken the subject of correct selection and description used in the experience of exposure systems. The authors presented the most commonly used EMF emitters in the low frequencies and microwave bands, as well as new model of the ablation treatment antenna. |
| Advanced method of scaling the flexible methodology of software development | Author : Serhii Semenov, Kassem Khalifeh, Maksym Zakharchenko | Abstract | Full Text | Abstract :The subject of the article is an improved way to scale flexible methodology of software development. The goal is to reduce the potential losses caused by the security risks of software development and operation at most stages of its life cycle. Objectives: analysis of existing methodologies and approaches to software development, exploring the possibilities for scaling methodologies within individual projects, improving the overall design of the software development cycle, developing a software development management framework for both the individual project and the development organization as a whole, developing practical Recommendations to improve the security of software at various stages of the life cycle. The methods that are used: system analysis of risks, cause-and-effect analysis. The following results are obtained. The analysis of existing flexible software development methodologies has been carried out, prospective directions and approaches of this industry have been determined, and the opportunities for scaling flexible methodologies have been identified. The scheme of the life cycle of software development is improved, the distinctive feature of which is the introduction of additional subsections and roles aimed at increasing the security of software. The structure of software development management is improved, which differs from the known ones taking into account the security risks in the development process. Practical recommendations for using an improved method of scaling a flexible methodology have been developed. Conclusions. The implementation of the proposed improved method of scaling the existing software development methodology differs from those known by the inclusion and use of additional security specialists in the development team. This may entail some slowdown in code execution and an increase in the number of detected defects (bugs) during alpha testing, and, therefore, an increase in the life time of bugs. However, in the future, these local impairments can achieve a better end result (improving the safety of the developed software) and provide both rapid growth of functionality and an acceptable level of service quality. And this, in turn, will be an attractive motive for further cooperation between the customer and the developer. |
|
|