Кафедра "Комп'ютерна інженерія та програмування"
Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/1095
Офіційний сайт кафедри https://web.kpi.kharkov.ua/cep
Від 26 листопада 2021 року кафедра має назву – "Комп’ютерна інженерія та програмування"; попередні назви – “Обчислювальна техніка та програмування”, “Електронні обчислювальні машини”, первісна назва – кафедра “Математичні та лічильно-вирішальні прилади та пристрої”.
Кафедра “Математичні та лічильно-вирішальні прилади та пристрої” заснована 1 вересня 1961 року. Організатором та її першим завідувачем був професор Віктор Георгійович Васильєв.
Кафедра входить до складу Навчально-наукового інституту комп'ютерних наук та інформаційних технологій Національного технічного університету "Харківський політехнічний інститут". Перший випуск – 24 інженери, підготовлених кафедрою, відбувся в 1964 році. З тих пір кафедрою підготовлено понад 4 тисячі фахівців, зокрема близько 500 для 50 країн світу.
У складі науково-педагогічного колективу кафедри працюють: 11 докторів технічних наук, 21 кандидат технічних наук, 1 – економічних, 1 – фізико-математичних, 1 – педагогічних, 1 доктор філософії; 9 співробітників мають звання професора, 14 – доцента, 2 – старшого наукового співробітника.
Переглянути
Документ 3D-печать на основе аппаратно-программных средств Arduino(Національний технічний університет "Харківський політехнічний інститут", 2017) Мухин, В. В.; Филоненко, Алевтина МихайловнаДокумент Adapted neural network of information support subsystem(Харківський національний університет Повітряних Сил ім. Івана Кожедуба, 2019) Semenov, Sergiy; Lipchanska, Oksana; Lipchanskyi, MaksymSafety of human life, the safety of his material values are main priorities in modern society. Objects of critical infrastructure are in a special risk zone. Accident statistics for them has remained high in recent years. Increased risk and a large number of incidents, including abroad, emphasize the relevance of this problem. An adapted neural network has been proposed for monitoring the situation at a railway crossing and informing the train driver of information about unexpected obstacles through the subsystem of information support in order to reduce the likelihood of an accident or reduce the severity of its consequences. Images from a railway crossing video surveillance camera are obtained. The results of neural network training and modeling using image data are given.Документ Adaptive algorithms of face detection and effectiveness assessment of their use(Національний технічний університет "Харківський політехнічний інститут", 2018) Dergachov, K.; Krasnov, L.; Cheliadin, O.; Zymovin, A.Subject of researc his the detection and recognition of faces. The purpose of this work is creation of modified algorithms of face detection, which are providing automatic brightness stabilization of the analyzed image regardless of brightness level. A technique is proposed for assessing the effectiveness of their work in comparison with the classical algorithm. We will dwell in more detail on the first part of the problem − face detection and recognition. In the meantime,the most popular method used for searching the face area on an image is the Viola-Jones method, which is popular because of its known high speed and efficiency. It is based on an integral image representation, on the method of constructing classifiers based on adaptive boosting algorithm (AdaBoost) and on the combination classifiers in cascade structure method. The Viola-Jones method is firstly using cascades of wavelets (primitives) - Haar features. All of the above made it possible to build a face detector that works in real-time with a fairly high quality. However, there are a lot of disturbing factors, which are limiting the efficiency of such algorithm work. The major of them are spacial face position ambiguity on the analised image and poor quality of stage lighting. The results of the study. The adaptive algorithms of face detection and recognition on digital images and video sequences in real-time, based on the Viola-Jones method, are suggested. An automatic stabilization of frame brightness is additionally added to the classical structure of such algorithms to compensate an effect of changes in the stage illumination level on quality of face detection. The structure of the algorithms is described and the software developed in Python programming language for a face detection and recognition using OpenCV library resources. Video data is processed in real time. An original method for the efficient estimating of the algorithm based on the criterion of the maximum probability of faces and their main elements (eye, nose, mouth) correct detection is proposed and implemented programmatically. The results of work of classic and suggested algorithms are compared. The examples of work and testing of software are given. The use of the obtained results allows to improve the quality of work and the reliability of the results when recognizing faces in different systems.Документ Adaptive decision support systems for cyber security(Національний технічний університет "Харківський політехнічний інститут", 2019) Milov, O.The subject of the researchis the principles and models of adaptive decision support systems in cyber security. The purposeis to develop basic principles and models underlying the operation of adaptive decision support sys tems in the field of cybersecurity. The methods of researchare methods of system analysis, control theory, decision theory, and artificial intelligence. The result of the study. The basic principles and models are proposed, the consideration and use of which in decision support systems will allow the formation of adaptive properties of the described systems. It is shown that the properties of adaptability can be formulated as a learning task. Presents optimization algorithms that underlie learning processes. Conclusion. The combined use of mathematical modeling methods, the theory of adaptation and artificial intelligence methods (training, pattern recognition and problem solving planning) with the corresponding creation of ontologies of cybersecurity systems that ensure the filling of databases, models and knowledge will allow you to implement an effective adaptive decision support system that will be useful a tool for managers at any level at all stages of decision making and implementation. The presented approaches can be used as a basis for building and operating decision support systems, increasing the area of application of such systems due to the formation of their adaptability properties.Документ Aerogeodesis monitoring of potential areas of spontaneous combustion of the forest(NTU "KhPI", 2017) Butenko, Olga; Gorelik, Stanislav; Gusakov, Dmytro; Buravchenko, E.The subject matterof the article is method for detecting potential zones of forest tracts spontaneous combustion using remote sensing data of the Earth. Aim of the article is to show how to increase the speed of decision-making to prevent negative consequences caused by spontaneous combustion of forest areas without a source of fire brought in from outside. Theobject of the research is a comprehensive analysis of the aerogeodesic monitoring data and contact measurements to identify and localize on the satellite images areas with high fire potential in the presence of a fire source directly in the territory of a possible fire. The methodsused are the positions of general physics and higher geodesy, the basics of digital image processing and thematic interpretation. Results of research. The main factors affecting the process of autoignition of forest tracts are analyzed. A method of aerogeodetic monitoring, which is based on a map of thunderstorm activity, is presented. Method is based on remote observations of thunderstorms. At the same time, the map reflectsthe position of active thunderstorm cells in space and the projection of their coordinates on the geodetic map of the forest and is also a route for the purposeful search and elimination of local sources of fire. In order to be able to make quick decisions related to the prevention of negative consequences, an approach is used in which thunder cells are diagnosedfor the purpose of assessing fire hazard by their ability to activate the process of origin of local sources of fire. In this case, we consider such controlled parameters as – the intensity of the electric field of the thunderstorm cell and the coordinates of its spatial position with respect to the forest area. Conclusion: to identify the origination of local sources of fire in the localization of possible autoignition zones, a relationship of thunderstorm clouds with the formation of the CCD wasestablished. Aerogeodesic monitoring of the CCD is thebasis for the operative estimates obtaining of the current object state of observation and prediction of the fire hazard level. The negative impact of forest fires on climate change, both local and global, is quite significant. Insufficient knowledge of this aspect requires further collection of material and its analysis, together with little-known "indirect" factors that cause spontaneous combustion of forest tracts and their individual sites.Документ An algorithm for sea-sky line detection under visible sea image(Національний технічний університет "Харківський політехнічний інститут", 2018) Shmatko, O.; Aleksiyev, V.; Dong, L.Subject of research is the process of sea-sky line detection, based on color feature. The purpose of this work is to develop the method is based on color feature as well as textural information. It consists of sea sky region extraction and horizon detection, which is more precise and fast no matter in the sceneries created by camera mounted on board or on shore. The tasks to be solved is: to propose the new linear fitting metric in sea-sky line extraction. The following results were obtained. The proposed linear fitting method was studies. The performance of proposed horizon detection method is estimated by comparison to other 3 state-of-art methods based on 13 challenging testing videos under different circumstances. The 3 methods are: the method based on discriminates and eigen values of covariance matrices in RGB space (H-DE); the method adopting probability distribution functions of sea and sky region (H-PDF) and the method by multi-scale cross modal linear feature (MSCM). The video sequences can be classified into two categories: the camera mounted on board and with camera mounted on shore horizon. The proposed linear fitting method can rectify the outlier values. The experimental results on a sequence of test videos demonstrate that the proposed sea-sky line detection method has a higher accuracy and it is more robust and efficient than other existed methods.Документ Algorithm of information security risk assessment based on fuzzy-multiple approach(Національний технічний університет "Харківський політехнічний інститут", 2019) Yevseiev, S. P.; Shmatko, Oleksandr; Romashchenko, NataliiaThe subject of the study is the process of assessing the level of information security risk that is being implemented with the help of the fuzzy logic apparatus. The purpose of this work is to develop a methodology for assessing the degree of information security risk, which would avoid the uncertainty factor, that occurs when some parts of information about the analyzed automated information system are absent. The methodology is based on the use of fuzzy logic and fuzzy sets and implies the introduction of the term sets for each of the system characteristics and the linguistic assessment of the indicators. The tasks to be solved are to analyze existing information security risk assessment methodologies for identifying their strengths and weaknesses. On the basis of the conducted analysis, a new method for assessing the risk of automated information systems information security is proposed. The following resultswere obtained: the advantages and disadvantages of qualitative and quantitative methodologies for assessing the risk degree of automated systems information security were identified; the main stages of the proposed methodology were described; the degree of information security risk is calculated in comparison to the FAIR methodology. Conclusion: The methodology presented in the article provides an opportunity to translate the obtained results of risk assessment from a mathematical language into a linguistic form that is more comprehensible to the decision-maker. This increases the effectiveness of the management of automated information systems protection mechanisms.Документ Algorithms and Data Structures(National Technical University "Kharkiv Polytechnic Institute", 2024) Bulba, S. S.; Brechko, V. O.; Kuchuk, N. G.The main data structures are presented, issues of algorithm analysis are discussed, and methods of achieving maximum asymptotic algorithm performance are covered. The material is illustrated with practical examples, and each section includes necessary problems and exercises. For students majoring in 123 "Computer Engineering".Документ Analysis and comparative research of the main approaches to the mathematical formalization of the penetration testing process(ФОП Петров В. В., 2021) Liqiang, Zhang; Weiling, Cao; Davydov, Viacheslav; Brechko, VeronikaIn dynamic models, threats (vulnerabilities) can be viewed as a flow of temporary events. If the intervals of real-ized cyber threats are recorded, then a continuous log-list of events related to software security can be formed. In some cases and models, only the number of realized cyber threats for an arbitrary time interval can be recorded. In this case, the software response to threats can be represented only at discrete points. In static models, the implementation of cyber threats is not related to time, but the dependence of the number of errors or the number of implemented test cases (models by error area) on the characteristics of the input data (models by data area) is taken into account. The article analyzes the methods of mathematical formalization of the software penetration testing process. This software testing method is one of many approaches to testing the security of computer systems. The article substantiates the importance of the processes of preliminary prototyping and mathematical formalization. The classification is carried out and the advantages and disadvantages of the main approaches of mathematical modeling are highlighted. The list and main characteristics of dynamic and static models are presented. One of the negative factors of formalization is indicated - the neglect of the factors of a priori uncertainty in the safety parameters in static models.Документ Analysis and comparative researches of methods for improving the software(Національний технічний університет "Харківський політехнічний інститут", 2020) Mozhaiev, Mykhailo; Davydov, Viacheslav; Liqiang, ZhangThe results analysis of main methods for identifying software vulnerabilities presents in the article. The results of authors’ research, synthesizing and regulating knowledge about systems for detecting software vulnerabilities, are presented. The software analysis methods used during certification tests are considered. It is shown that the methods and techniques existing for software security analysis use do not ensure the result accuracy under fuzzy input data conditions. This drawback is aggravated by strict requirements for the test scenarios implementation speed. This is largely due to the fact that experts, in order to a decision make, have to conflicting information large amounts analyzed. Consequently, it is necessary to develop a system for identifying vulnerabilities, the main task of which will be to the conflicting information amount minimize used by an expert when making a decision. The most promising direction the existing identifying vulnerabilities systems efficiency increasing is seen in reducing the burden on an expert by methods for identifying vulnerabilities and implementinga decision support system improving. This will significantly reduce the time spent on a decision making on software security, and, as a result, will the software security testing procedure accessible to a developer’s wide range make more.Документ Analysis and comparative studies of software penetration testing methods(Національний технічний університет "Харківський політехнічний інститут", 2021) Liqiang, Zhang; Weiling, Cao; Rabčan, Jan; Davydov, Viacheslav; Miroshnichenko, NataliiaInformation security is one of the most important components in any organization. The disclosure of this information can lead not only to material losses, but also to the loss of the reputation and image of the company, which ultimately, in some cases, can lead to its complete collapse. Therefore, in order to avoid these consequences, it is necessary to analyze the security and reliability of information processing systems. One of the most effective ways to do this is through the use of "penetration testing" methods. The results obtained. The section provides software vulnerabilities analysis. The most frequently used types of attacks and intrusions by cyber intruders are highlighted. In contrast to this, methods comparative analysis for identifying software vulnerabilities was carried out. It is concluded that it is advisable to improve the methods for identifying vulnerabilities through the recommendations complex use taking into account the existing security risks of software tools, the features of modern methodologies and software development tools, as well as the modern software penetration testing methods capabilities.Документ Analysis and research of well-known orchestration systems for the construction of microservice infrastructure(Національний технічний університет "Харківський політехнічний інститут", 2020) Pevnev, Volodymyr; Trehub, YuliiaModern orchestration systems are being studied. Using different virtualization methods is it a good way to reduce construction time, equipment costs and support system operations during infrastructure construct. The article provides a detailed analysis of existing virtualization tools. A comparative analysis of modern solutions shows that the Kubernetes tool is one of the best tools for orchestration. The features of sharing orchestration systems together with different Cloud providers are presented in the article, comparisons of the cloud providers themselves are presented too.Документ Analysis of efficiency of application of algorithm and programs of calculation of special points for to modeling diagrams of the state of multicomponent oxide systems(ФОП Тарасенко В. П., 2019) Zakovorotniy, A. Yu.; Rassokha, A.Документ The analysis of expert system for adapting decisions for determining the type of radio response sources(НТУ "ХПІ", 2018) Gatsenko, Serhiy; Buchinsky, YuriyIn this article, the authors of research described the sources of radio radiation and explained the complexity of identifying sources of radioelectronic radiation under a priori uncertainty. Authors of the article state, that the source of radio-electron radiation can be identified by a set of parameters of its signal. It is established that the informational nature of the signal source of radio emission for the devices of radio monitoring depends on how reliable this signal is detected and how accurately (precisely) its parameters are determined, which are useful days of radio monitoring of the message or value. Because signal tracking always takes place against a background of different kinds of interference, the fact of detecting a signal, as well as errors in measuring signal parameters and selecting messages are always random. The problem of determining the type of signal, and therefore the source, which it emits, is partially solved by the preliminary analysis of the ether on the hearing conducted by the operators of radiomonitoring. This makes it possible not to distract from non-informative signals belonging to sources of radio-electronic radiation that are not showing interest to radio monitoring, to shorten the search time for sources of radio-electronic radiation and to minimize the cost of depreciation of equipment. The disadvantage of this method is the necessity to have a sufficient number of trained operators and to constantly increase their training. Was given that the preparation of one operator to a professional level can last 6-12 months, it is very difficult to provide data requirements. Therefore, in the given article it is suggested to analyze the parameters of sources of radio-electronic radiation on a set of parameters of sources signals of radio-electron radiation with the help of expert decision support system concerning determination of sources parameters of radio-electronic radiation. In the article, the authors proposed an expert system for determining the parameters of sources of radio-electronic radiation using a database management system. Unlike machine programs that use procedural analysis, expert systems solve problems in a narrow subject area (specific field of expertise) based on deductive considerations. Such systems are often able to find solutions that are unstructured and poorly defined. They cope with the lack of structuring by involving heuristics, that is, the rules described in accordance with the experience of using the equipment, which may be useful in those situations where the lack of necessary knowledge or time eliminates the possibility of complete analysis.Документ Analysis of fractal noise indicators in measuring systems of technical objects(Technical University of Sofia, 2018) Davydov, Viacheslav; Zmiivska, Vitalina; Shypova, Тetiana; Lysytsia, DmytroThe indicators and characteristics of the estimation of the noise fractality and interference in systems for measuring the characteristics and condition of technical objects are considered. A reasoned choice of indicators used in prospect for the implementation of the fractality estimation method is carried out.Документ Analysis of information structure modeling methods(Петров В. В., 2022) Kuchuk, N. G.; Kotova, O.; Rybalchenko, А.Документ Analysis of information-telecommunication network risk based on cognitive maps and cause-effect diagram(НТУ "ХПІ", 2017) Kosenko, Viktor; Malyeyeva, Olga; Persiyanova, Elena; Rogovyi, AntonThe subject matter of the article is the processes of analysis and risk assessment of information and telecommunications networks. The aim is to reduce the potential losses caused by the risks of information and telecommunications network (ITN) functioning by taking timely risk management measures. The objectives are: classification of ITN risks, highlighting the main factors and causes of their occurrence; formation of a systematic presentation of risks to identify their manifestation and consequences; development of the method for assessing the influence of the risk and private risk on probable consequences; obtaining a quantitative risk assessment of ITN. The methods used are: system analysis of risks, method of cognitive maps, cause-and-effect analysis. The following results are obtained: classification of private risks of ITN according to the reasons and the factors of their occurrence is made; the negative consequences affecting the basic characteristics of the operation of ITN are defined; as a result, the structural system model of ITN risks is formed, in which the relationships between the elements of the main aspects of risk are shown; the method based on the theory of causal analysis is suggested in order to quantify the risk impact on ITN functioning. The risk model is based on the construction and analysis of probabilistic or fuzzy cognitive maps. Experts estimate the level of influence of private risks on the characteristics of the network in order to make decisions on risk management. The generalized structure of the cause-effect diagram of the risk factors, manifestation and consequences is developed; on ITN basis the method for quantifying the probability of risk consequences is suggested. The quantitative assessment of probable malfunctioning of the network that is determined by a specific effect (taking into account ITN probability), which is caused by private risks is also made. Conclusion. The suggested approach for quantitative assessment of ITN risk is based on the method of cause-and-effect analysis and enables taking into account both the factors causing it and probable consequences. The obtained results can be used to determine probable failures and losses in ITN functioning on the basis of the information about the degree of risk factors effects, risk events and consequences, and the cause-effect relationships between them. Thus, potential losses can be identified; measures to manage the risks of ITN functioning can be taken.Документ Analysis of informational counteraction influence on organization of officers management activity(Національний технічний університет "Харківський політехнічний інститут", 2018) Kisel, D.; Salnikova, O.; Antonenko, S.; Shyshatskyi, A.Due to the increase in active use of modern information technologies as one of the means of armed struggle the strategy and tactics of conducting modern wars and military conflicts has changed. To this end, the authors of this article considered the concept of information countermeasures and its impact on the organization of managerial activities of officials. In the course of the study it was established that the leadership of many countries of the world developed the concepts of information wars, taking into account the information vulnerabilities of the conflicting parties, practical implementation of these concepts is carried out through information (information-psychological) operations. The analysis of the military-political leadership views of some developed states of the world on information warfare showed that it has three components: information, technical (information operations), and information-psychological (information-psychological operations). As a result of the study conducted by the authors of this article, it is proposed to adjustthe regulatory documents and to take into account additional destructive factors for the organization of managerial activities of officials, namely, information countermeasures. Also, the authors of the article proposed to change the system of management training, with the purpose of training the latter to make correct and deliberate decisions in the context of information confrontation.Документ Analysis of marсovian systems with a given set of selected states(Національний технічний університет "Харківський політехнічний інститут", 2022) Raskin, Lev; Sukhomlyn, Larysa; Korsun, RomanAnalysis of stationary Marcovian systems is traditionally performed using systems of linear Kolmogorov differential equations. Such systems make it possible to determine the probability of the analyzed system being in each of its possible states at an arbitrary time. This standard task becomes more complicated if the set of possible states of systems is heterogeneous and some special subset can be distinguished from it, in accordance with the specifics of the system functioning. Subject of the study is technology development for such systems analysis. In accordance with this, the purpose of the work is to find the distribution law of the random duration of such a system's stay on a set of possible states until it falls into a selected subset of these states. Method for solving the problem is proposed based on splitting the entire set of possible states of the system into two subsets. The first of them contains a selected subset of states, and the second contains all the other states of the system. Now a subset of states is allocated from the second subset, from which a direct transition to the states of the first subset is possible. Next, a system of differential equations describing the transitions between the formed subsets is formed. The solution of this system of equations gives the desired result – distribution of the random duration of the system's stay until the moment of the first hit in the selected subset of states. The method allows solving a large number of practical problems, for example, in the theory of complex systems reliability with many different failure states. In particular, finding the law of the uptime duration distribution, calculating the average duration of uptime.Документ The analysis of medical expert systems’ use risks(Національний технічний університет "Харківський політехнічний інститут", 2019) Mandrikova, Ludmila; Posternakova, Veronika; Krasovska, Inessa; Symovych, TetyanaIn the following paper the characteristics of medical information computer systems are presented. There were separated out medical expert systems as having significant features. Actual medical expert systems are considered as critical ones, especially sensitive to the occurrence of risks and risk situations. In general, there are common approaches to risk analysis in the development and operation of software. In this work, the classification of risks in accordance with selected methodologies associated with information support, or automation of the diagnostic process is presented. The abovementioned systems are complex software and computer combinations. When creating such complexes, a large number of risks arise, which in turn can cause abnormal situations that, first of all, can lead to serious consequences. Therefore, the identification and qualification of risks in advance, according toexisting risk classifications, can prevent such extraordinary situations. To create such risk-qualifying systems, certain databases have been developed that are founded on studies conducted by a large number of people. In turn, we need to use the work of a large number of specialists to create the necessary knowledge base. Among the chosen risks classification systems, the MSF systemizing was selected for the following study. In order to realize the comparative characteristics of the known MES, the method of inconstant(variant)networks was used based on the selected classification. According to this method, each system was evaluated. Based on the analysis of several methodologies, it has been determined that the use of the MSF methodology is most appropriate when it comes to medical expert systems. The most significant risks that arise during the operation of such systems are identified. When analyzing each risk, the probability of its occurrence is determined and the consequences of its implementation aretaken into account. In the abovementioned MES we have taken into account the risks associated with the operation, interface and user qualification. The selected classification has a large number of risk categories that are relevant to the various stages of the product life cycle, and it makes it possible to identify, classify and deal with the risks arising from the operation of the MES.