Перегляд за Автор "Shmatko, O."
Зараз показуємо 1 - 4 з 4
Результатів на сторінці
Налаштування сортування
Документ An algorithm for sea-sky line detection under visible sea image(Національний технічний університет "Харківський політехнічний інститут", 2018) Shmatko, O.; Aleksiyev, V.; Dong, L.Subject of research is the process of sea-sky line detection, based on color feature. The purpose of this work is to develop the method is based on color feature as well as textural information. It consists of sea sky region extraction and horizon detection, which is more precise and fast no matter in the sceneries created by camera mounted on board or on shore. The tasks to be solved is: to propose the new linear fitting metric in sea-sky line extraction. The following results were obtained. The proposed linear fitting method was studies. The performance of proposed horizon detection method is estimated by comparison to other 3 state-of-art methods based on 13 challenging testing videos under different circumstances. The 3 methods are: the method based on discriminates and eigen values of covariance matrices in RGB space (H-DE); the method adopting probability distribution functions of sea and sky region (H-PDF) and the method by multi-scale cross modal linear feature (MSCM). The video sequences can be classified into two categories: the camera mounted on board and with camera mounted on shore horizon. The proposed linear fitting method can rectify the outlier values. The experimental results on a sequence of test videos demonstrate that the proposed sea-sky line detection method has a higher accuracy and it is more robust and efficient than other existed methods.Документ Cybersecurity: security of Linux operating system(Novyi Svit – 2000, 2021) Yevseiev, S. P.; Pogasiy, S.; Goloskokova, A.; Shmatko, O.; Melnik, M.Reference and methodical recommendations on the implementation of laboratory works in the study of the basics of working with the Linux operating system are provided. The issues of working with the Linux command line, process management, memory management and account management are considered. The problematic issues of cybersecurity in the process of working with the Linux operating system are highlighted. Recommended for students of the first (bachelor’s) level of specialty 125 "Cybersecurity", 121 "Software engineering", 122 "Computer sciences", 126 "Information systems and technologies".Документ Development of Niederreiter hybrid crypto-code structure on flawed codes(PC Technology center, 2019) Yevseiev, S. P.; Tsyhanenko, O. S.; Gavrilova, A.; Guzhva, V.; Milov, O.; Moskalenko, V.; Opirskyy, I.; Roma, O.; Tomashevsky, B.; Shmatko, O.The use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector) requires an increase in the speed of cryptographic transformation of the system as a whole. For this purpose, it is proposed to use flawed codes. Flawed codes allow you to increase the speed of code transformations by reducing the power of the field while damaging the plaintext and reducing the amount of data transferred by damaging the ciphertext. This approach allows the construction of hybrid crypto-code structures based on the synthesis of Niederreiter modified crypto-code structures on modified (shortened or extended) codes on elliptic curves with damaging procedures. A significant difference from classical hybrid (complex) cryptosystems is the use of asymmetric cryptosystems to ensure data security with fast crypto-transformation procedures (generation and decoding of a codogram). The paper discusses methods for constructing flawed codes and approaches for using the Niederreiter hybrid crypto-code structure on modified elliptic codes. Practical algorithms are proposed for using the MV2 damage mechanism in the Niederreiter crypto-code structure on modified elliptic codes, which makes it possible to implement a hybrid crypto-code structure. The results of a comparative assessment of energy consumption for the formation of an information package with various methods of damage, which determined the choice of damage method in practical algorithms. The conducted studies confirm the competitive efficiency of the proposed cryptosystem in Internet technologies and mobile networks, ensuring practical implementation on modern platforms and the necessary cryptographic strength under post-quantum cryptography.Документ A new framework designed for knowledge management in distributed software development(Національний технічний університет "Харківський політехнічний інститут", 2019) Shmatko, O.; Dong, Liang; Havrylova, A.; Aleksiyev, V.The software development with distributed teams becomes a critical popular nowadays. Not only for the efficiency and effectiveness the distributed teams provide, but also the distributed teams can supply whole-day works with lower costs. Software development is a kind of knowledge-driven industry which depends on the expertise of employees. Although many scholars have long investigated knowledge management as well as distributed software development, the combination that knowledge management in distributed software development is not a enough explored topic in the past decade’s years. In this paper, a review of relevant extant literature on knowledge management in distributed software development is provided. The relationship between two objects and the factors on knowledge sharing are summarized. By analysis of the characteristics and features of knowledge management, the social media-based framework of knowledge management for distributed software development is proposed.