Кафедра "Комп'ютерна інженерія та програмування"

Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/1095

Офіційний сайт кафедри https://web.kpi.kharkov.ua/cep

Від 26 листопада 2021 року кафедра має назву – "Комп’ютерна інженерія та програмування"; попередні назви – “Обчислювальна техніка та програмування”, “Електронні обчислювальні машини”, первісна назва – кафедра “Математичні та лічильно-вирішальні прилади та пристрої”.

Кафедра “Математичні та лічильно-вирішальні прилади та пристрої” заснована 1 вересня 1961 року. Організатором та її першим завідувачем був професор Віктор Георгійович Васильєв.

Кафедра входить до складу Навчально-наукового інституту комп'ютерних наук та інформаційних технологій Національного технічного університету "Харківський політехнічний інститут". Перший випуск – 24 інженери, підготовлених кафедрою, відбувся в 1964 році. З тих пір кафедрою підготовлено понад 4 тисячі фахівців, зокрема близько 500 для 50 країн світу.

У складі науково-педагогічного колективу кафедри працюють: 11 докторів технічних наук, 21 кандидат технічних наук, 1 – економічних, 1 – фізико-математичних, 1 – педагогічних, 1 доктор філософії; 9 співробітників мають звання професора, 14 – доцента, 2 – старшого наукового співробітника.

Переглянути

Результати пошуку

Зараз показуємо 1 - 7 з 7
  • Ескіз
    Документ
    Mathematical model of the information system synthesis process
    (ФОП Петров В. В., 2021) Kuchuk, N. G.; Shyman, A.; Davydov, Viacheslav; Hrebeniuk, Daryna
  • Ескіз
    Документ
    Analysis and comparative research of the main approaches to the mathematical formalization of the penetration testing process
    (ФОП Петров В. В., 2021) Liqiang, Zhang; Weiling, Cao; Davydov, Viacheslav; Brechko, Veronika
    In dynamic models, threats (vulnerabilities) can be viewed as a flow of temporary events. If the intervals of real-ized cyber threats are recorded, then a continuous log-list of events related to software security can be formed. In some cases and models, only the number of realized cyber threats for an arbitrary time interval can be recorded. In this case, the software response to threats can be represented only at discrete points. In static models, the implementation of cyber threats is not related to time, but the dependence of the number of errors or the number of implemented test cases (models by error area) on the characteristics of the input data (models by data area) is taken into account. The article analyzes the methods of mathematical formalization of the software penetration testing process. This software testing method is one of many approaches to testing the security of computer systems. The article substantiates the importance of the processes of preliminary prototyping and mathematical formalization. The classification is carried out and the advantages and disadvantages of the main approaches of mathematical modeling are highlighted. The list and main characteristics of dynamic and static models are presented. One of the negative factors of formalization is indicated - the neglect of the factors of a priori uncertainty in the safety parameters in static models.
  • Ескіз
    Документ
    Analysis and comparative studies of software penetration testing methods
    (Національний технічний університет "Харківський політехнічний інститут", 2021) Liqiang, Zhang; Weiling, Cao; Rabčan, Jan; Davydov, Viacheslav; Miroshnichenko, Nataliia
    Information security is one of the most important components in any organization. The disclosure of this information can lead not only to material losses, but also to the loss of the reputation and image of the company, which ultimately, in some cases, can lead to its complete collapse. Therefore, in order to avoid these consequences, it is necessary to analyze the security and reliability of information processing systems. One of the most effective ways to do this is through the use of "penetration testing" methods. The results obtained. The section provides software vulnerabilities analysis. The most frequently used types of attacks and intrusions by cyber intruders are highlighted. In contrast to this, methods comparative analysis for identifying software vulnerabilities was carried out. It is concluded that it is advisable to improve the methods for identifying vulnerabilities through the recommendations complex use taking into account the existing security risks of software tools, the features of modern methodologies and software development tools, as well as the modern software penetration testing methods capabilities.
  • Ескіз
    Документ
    Research of the software security model and requirements
    (Національний технічний університет "Харківський політехнічний інститут", 2021) Semenov, Serhii; Davydov, Viacheslav; Hrebeniuk, Daryna
    The subject of research in the article is a software security model. The aim of the work is to research the quality characteristics of the software and requirements for the software security in order to improve their safety. The article solves the following tasks: researching the shortcomings of the existing security model in order to identifyits main shortcomings; study of the quality characteristics of software that affect its security in order to identify the possibility of improving the quality of software. The following results were obtained: on the basis of the analysis of the existing model of software security, the main features of the attributes of this model were identified, their advantages and disadvantages were given. On the basis of the conducted analytical study, the necessity of improving the existing model of ensuring the security of software has been proved. Existing requirements for software and characteristics that affect its quality are considered. The characteristics of software security are highlighted, the indicators of which should be improved. Conclusions: a software security model has been studied. The need to develop this model is shown by introducing the possibility of adapting the existing requirements for the security of software tools throughout the entire life cycle of software development; the study of the quality characteristics of software showed that to ensure its security, it is necessary to improve the following characteristics: integrity, authentication, confidentiality, access control. However, it was shown that an increase in these characteristics can lead to a deterioration in other indicators of software quality: portability, maintainability, performance.
  • Ескіз
    Документ
    Development the resources load variation forecasting method within cloud computing systems
    (Національний технічний університет "Харківський політехнічний інститут", 2020) Davydov, Viacheslav; Hrebeniuk, Daryna
    The subject of research in the article is the models and methods of resources load forecasting in cloud computing systems using the mathematical apparatus of neural networks. The aim of the work is increasing the efficiency of computing systems resources usage (such as RAM, disk space, CPU, network) by developing methods of resources load forecasting. The article addresses the following tasks: development of an integrated approach to the problems of resources load forecasting within cloud computing systems, which includes thesyn thesis of a combining forecasting neural network; development of a forecasting neural network model based on Elmanneural network; development of a method for training a neural network based on an artificial immunity algorithm; evaluation of the effectiveness of the developed method. To solve the set tasks, the approaches and methods of artificial neural and immune systems were used, as well as methods of theoretical research, which are based on the scientific provisions of the theory of artificial inte lligence, statistic, functional and systemic analyzes. The following resultswere obtained: on the basis of the analysis of resources load forecasting methods in cloud computing systems, the main results of the methods were revealed, the advantages and disadvantages were demonstrated. On the basis of the research resultsanalysis, the necessity of improving analytical methods for forecasting the load has been proved. The method of computing resources load forecasting in cloud computing systems has been improved, which makes it possible to obtain more accurate assessment results and prevent overloads in cloud computing systems. The results obtained are confirmed by the experiments carried out using the means of the infrastructure of private infrastructure services. Conclusions: improved the resources load forecasting method based on the mathematical apparatus of artificial neural networks to improve the efficiency of their usage.
  • Ескіз
    Документ
    Analysis of fractal noise indicators in measuring systems of technical objects
    (Technical University of Sofia, 2018) Davydov, Viacheslav; Zmiivska, Vitalina; Shypova, Тetiana; Lysytsia, Dmytro
    The indicators and characteristics of the estimation of the noise fractality and interference in systems for measuring the characteristics and condition of technical objects are considered. A reasoned choice of indicators used in prospect for the implementation of the fractality estimation method is carried out.
  • Ескіз
    Документ
    Analysis and comparative researches of methods for improving the software
    (Національний технічний університет "Харківський політехнічний інститут", 2020) Mozhaiev, Mykhailo; Davydov, Viacheslav; Liqiang, Zhang
    The results analysis of main methods for identifying software vulnerabilities presents in the article. The results of authors’ research, synthesizing and regulating knowledge about systems for detecting software vulnerabilities, are presented. The software analysis methods used during certification tests are considered. It is shown that the methods and techniques existing for software security analysis use do not ensure the result accuracy under fuzzy input data conditions. This drawback is aggravated by strict requirements for the test scenarios implementation speed. This is largely due to the fact that experts, in order to a decision make, have to conflicting information large amounts analyzed. Consequently, it is necessary to develop a system for identifying vulnerabilities, the main task of which will be to the conflicting information amount minimize used by an expert when making a decision. The most promising direction the existing identifying vulnerabilities systems efficiency increasing is seen in reducing the burden on an expert by methods for identifying vulnerabilities and implementinga decision support system improving. This will significantly reduce the time spent on a decision making on software security, and, as a result, will the software security testing procedure accessible to a developer’s wide range make more.