2024 № 3 Сучасні інформаційні системи
Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/82430
Переглянути
12 результатів
Результати пошуку
Документ Decentralized information systems in intelligent manufacturing management tasks(Національний технічний університет "Харківський політехнічний інститут", 2024) Nevliudov, Igor; Novoselov, Sergiy; Sychova, Oksana; Gopejenko, Viktors; Kosenko, NataliiaThe object of research: the process of distributed management of production processes in intelligent manufacturing. The subject of the study: a model of a decentralized system of technological process management in the production area of a modern plant, taking into account the concept of Industry 4.0. In this work, the simulation of the decentralized information system for controlling the production site of intelligent manufacturing using manipulator robots with an angular coordinate system based on servo drives, which act as stepper motors, is carried out. The result of the simulation is the stability of the decentralized cyber-physical system to external influences for the selected transient characteristics.Документ Sequential intrusion detection system for zero-trust cyber defense of IoT/IIoT networks(Національний технічний університет "Харківський політехнічний інститут", 2024) Sobchuk, Valentyn; Pykhnivskyi, Roman; Barabash, Oleg; Korotin, Serhii; Omarov, ShakhinThe Internet of Things (IoT) and the Industrial Internet of Things (IIoT) and their widespread application make them attractive targets for cyber attacks. Traditional cybersecurity methods such as firewalls and antivirus software are not always effective in protecting IoT/IIoT networks due to their heterogeneity and large number of connected devices. The zero-trust principle can be more effective in protecting IoT/IIoT networks. This principle assumes on no inherent trustworthiness of any user, device, or traffic, requiring authorization and verification before accessing any network resource. This article presents a zero-trust-based intrusion detection system (IDS) that uses machine learning to secure IoT/IIoT networks. The aim of this article is to develop a two-component IDS for detecting and classifying cyber-attacks. The proposed design for an Intrusion Detection System (IDS) achieves high accuracy in detecting attacks while maintaining optimal performance and minimizing additional computational costs. This is especially crucial for real-time network monitoring in IoT/IIoT environments.Документ Implementation of unsupervised learning models for analyzing the state's security level(Національний технічний університет "Харківський політехнічний інститут", 2024) Laktionov, Oleksandr; Shefer, Oleksandr; Laktionova, Iryna; Halai, Vasyl; Podorozhniak, AndriiThe process of creating unsupervised learning models and their peculiarities in tasks of analyzing the state's security level has been investigated. Techniques for creating the basic k-means model and its improvement through the use of Pearson correlation as a distance metric have been considered. Determining cluster centers was performed by both the basic method and the Cochran's maps method. The optimal quality indicator, according to the results of clustering, was considered to be the model demonstrating the minimum value of the DaviesBouldin index. The proposed model for clustering the state's security level differs from existing ones by using as input estimates derived from a comprehensive indicator based on the principles of interaction and emergent properties. This allows obtaining advantages of the clustering model in terms of the Davies-Bouldin index.Документ Decomposition of integrated high-density IoT data flow(Національний технічний університет "Харківський політехнічний інститут", 2024) Kuchuk, Heorhii; Kalinin, Yevhen; Dotsenko, Nataliia; Chumachenko, Igor; Pakhomov, YuriyThe concept of fog computing made it possible to transfer part of the data processing and storage tasks from the cloud to fog nodes to reduce latency. But in batch processing of integrated data streams from IoT sensors, it is sometimes necessary to distribute the tasks of the batch between the fog and cloud layers. For this, it is necessary to decompose the formed package. But the existing methods of decomposition do not meet the requirements for efficiency in high-density IoT systems. The subject of study in the article are methods of decomposition of integrated data streams. The purpose of the article is to develop a method of decomposition of an integrated data stream in a dense high-density Internet of Things fog environment. This will reduce the processing time of operational transactions.Документ Recursive method of forming an optimal set of tasks according to the criterion of maximizing earnings(Національний технічний університет "Харківський політехнічний інститут", 2024) Krepych, Svitlana; Spivak, IrynaThe work is devoted to the problem of a person's search in the current difficult times, when there is no work at all, or insufficient wages for normal living, the possibility of additional earnings. The analysis of the current state of the labor market and software systems with offers of vacant jobs showed that there are a sufficient number of such systems in general access and easy to use. One of their disadvantages is focusing only on vacancies that require full or partial employment (for example, the IT field) of a person. Such systems do not provide the possibility of hourly work, and then a person must independently search for offers on various advertising sites, in Telegram channels, Instagram, etc. Another and the most important problem is finding such additional income that would have the maximum impact on a person. The maximization criterion in this case for any person will be the maximum possible amount of earnings for a certain period of time. After all, each proposal has its own complexity and its own price, as well as the time of implementation. Conclusion: based on the results of working out this recursive method, prototypes of its implementation in practice with the formation of an optimal set of tasks and the laying of a route on Googlemap are also illustrated.Документ The method of self-organization of information networks in the conditions of the complex influence of destabilizing factors(Національний технічний університет "Харківський політехнічний інститут", 2024) Kashkevich, Svitlana; Litvinenko, Olexander; Shyshatskyi, Andrii; Salnyk, Serhii; Velychko, ViraThe experience of modern military conflicts of the past decades and the experience of the Russian-Ukrainian war, requires a fundamental revision of approaches regarding the order of organizing the interaction of information networks and their individual components. Traditional approaches to organization require significant time to organize the interaction of information network elements and also depend significantly on the experience and personal qualities of administrators who operate them. That is why, in this research, the authors proposed a method of organizing information networks under the influence of destabilizing factors. The work of the specified method was modeled on the example of the selforganization of the information network of the operational group of troops (forces).Документ The issue of training of the neural network for drone detection(Національний технічний університет "Харківський політехнічний інститут", 2024) Hashimov, Elshan; Khaligov, GiblaliIn the article, the issue of mistaking birds for UAVs, which is considered one of the main problems in the process of detecting unmanned aerial vehicles (UAVs) through cameras, was considered. The object of the study is a method of training an artificial intelligence model so that the detection system does not mistake drones for birds. In order to solve this problem, as an alternative to creating a new complex model, the retraining method was used by making some changes to the previously developed model. The aim of the study is to train an artificial intelligence model using certain methods to detect drones and prevent them from being mistaken for birds.Документ Development of a method for assessing the adequacy of a computer system model based on Petri nets(Національний технічний університет "Харківський політехнічний інститут", 2024) Shyman, Anna; Kuchuk, Nina; Filatova, Anna; Bellorin-Herrera, OleksandraThe purpose of modeling any system using a Petri net is to study the behavior of the modeled system based on the analysis of the defined properties of the Petri net. Therefore, it is necessary to develop a method for assessing the adequacy of the model, based on the assessment of the degree of its correspondence to the behavior of the system. The object of research is the behavior of a system model built using a Petri net. The subject of the research is the value of the deviation of the simulated processes from the real values. The goal of the research is to develop a method for assessing the adequacy of the description of the dynamics of the researched process in a model of a computer system based on Petri nets.Conclusions. The developed method makes it possible to assess the adequacy of the model based on Petri nets with accuracy to the entered assumptions. The method allows timely background history of dynamic processes and justify the choice of its length. The method also allows reducing the possibility of an irrational increase in the size of the synthesized model.Документ Post-filtering of lossy compressed noisy images and its efficiency prediction(Національний технічний університет "Харківський політехнічний інститут", 2024) Rebrov, Volodymyr; Vozel, Benoit; Lukin, VladimirThe object of the study is the process of lossy compression of noisy images and their post-filtering. The subject of the study is the approach to efficient two-stage processing (compression and post-filtering) for better portable graphics (BPG) coder and prediction of its efficiency. The goal of the study is to analyze performance characteristics of the considered two-stage approach and to propose an approach to their prediction. Conclusions: based on the results of the study, it is worth 1) predicting performance characteristics for the two-stage processing; 2) adapting the processing to image complexity and noise intensity.Документ Excel-орієнтований калькулятор для обчислення значень деяких спеціальних функцій математичної та теоретичної фізики(Національний технічний університет "Харківський політехнічний інститут", 2024) Гадецька, Світлана Вікторівна; Дубницький, Валерій Юрійович; Кушнерук, Юрій Іонович; Ходирєв, Олександр Іванович; Черепньов, Ігор АркадійовичМета дослідження: Розробка EXCEL-орієнтованого калькулятора для обчислення значень спеціальних функцій математичної і теоретичної фізики. Об'єкт дослідження: спеціальні функції математичної і теоретичної фізики. Предмет дослідження: чисельні методи набуття значень спеціальних функцій. Отримані результати: Запропоновано та реалізовано EXCEL-орієнтовані алгоритми обчислення найбільш поширених спеціальних функцій математичної і теоретичної фізики. Викладено способи адаптивного визначення кількості інтервалів при чисельному інтегруванні, які необхідні для досягнення прийнятої точності обчислень. Для невласних інтегралів запропоновано процедуру їх заміни на інтеграли з кінцевими межами, які забезпечують виконання обчислень із заданою точністю.