Кафедра "Програмна інженерія та інтелектуальні технології управління ім. А. В. Дабагяна"

Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/1665

Офіційний сайт кафедри http://web.kpi.kharkov.ua/asu

Від січня 2022 року кафедра має назву "Програмна інженерія та інтелектуальні технології управління ім. А. В. ДАБАГЯНА" (тоді ж, у січні 2022 року в окремий підрозділ виділилася кафедра "Інформаційні системи та технології"), попередні назви – "Програмна інженерія та інформаційні технології управління" (від 2015), "Автоматизовані системи управління" (від 1977); первісна назва – кафедра автоматичного управління рухом.

Кафедра автоматичного управління рухом заснована в 1964 році задля підготовки інженерів-дослідників у галузі автоматичного управління рухом з ініціативи професора Харківського політехнічного інституту Арега Вагаршаковича Дабагяна та генерального конструктора КБ "Електроприладобудування" Володимира Григоровича Сергєєва.

Кафедра входить до складу Навчально-наукового інституту комп'ютерних наук та інформаційних технологій Національного технічного університету "Харківський політехнічний інститут".

У складі науково-педагогічного колективу кафедри працюють: 4 доктора технічних наук; 24 кандидата наук: 22 – технічних, 1 – фізико-математичних, 1 – економічних, 1 – доктор філософії; 3 співробітників мають звання професора, 19 – доцента, 1 – старшого наукового співробітника.

Переглянути

Результати пошуку

Зараз показуємо 1 - 3 з 3
  • Ескіз
    Документ
    Module of selecting the company development strategic goals in the Enterprise Performance Management System
    (М. О. Бондаренко, 2018) Moskalenko, V.
    The procedure for the strategic goals setting has been considered as a part of the business process for creation of the enterprise development program. For goals selection it is proposed to use the Analytic Hierarchy Process. In consequence of application of direct and reverse analytic hierarchy process, are determined the estimates of changes in the enterprise performance when the goals are reached. Realizing the Analytic Hierarchy Process is carried the comparison of the estimates of changes in the company performance indicators when achieving the goals in question. By analyzing these estimates the potential goals and achievement strategies are selected. Strategies are defined by the aspects of the company development: production, finance, personnel, marketing. The result of this procedure is desired strategic goals selected from among all of such goals which would be less risky, i.e. would be to a lesser extent subject to external impacts. The business process of the development program forming is the basis of the strategic planning module of the Enterprise Performance Management system. Implementation of such a process will permit to realize the strategic alignment and to increase the company efficiency by setting adequate strategic goals.
  • Ескіз
    Документ
    Decision support system for set-up of investment portfolio as a part of company development program
    (М. О. Бондаренко, 2018) Moskalenko, V.; Kachanova, S.
    The analysis carried out in this paper describes the functionality of existing investment decision support systems. A business process for the formation of an investment portfolio as part of the company development program was proposed. The portfolio consists of three parts: a portfolio of development projects of the company, a portfolio of projects of other companies and a portfolio of securities. The architectural solution for the software implementation of the decision support system in the field of portfolio investment is presented. It is proposed to present the DSS for the formation of an investment portfolio in the form of five containers, in which the corresponding tasks are performed: evaluation of investment projects; evaluation of securities; Assessment of the importance of investments for the development of the company; allocation of the company investment funds between portfolios; formation of the company investment portfolio. This decision support system is associated with Enterprise Performance Management systems which are designed for information and analytical support of strategic company management processes. Implementing of DSS that the user can solve package investment problems for making certain investment decisions and solve them in package for implementing the company development program during the strategic period.
  • Ескіз
    Документ
    Development of Niederreiter hybrid crypto-code structure on flawed codes
    (PC Technology center, 2019) Yevseiev, S. P.; Tsyhanenko, O. S.; Gavrilova, A.; Guzhva, V.; Milov, O.; Moskalenko, V.; Opirskyy, I.; Roma, O.; Tomashevsky, B.; Shmatko, O.
    The use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector) requires an increase in the speed of cryptographic transformation of the system as a whole. For this purpose, it is proposed to use flawed codes. Flawed codes allow you to increase the speed of code transformations by reducing the power of the field while damaging the plaintext and reducing the amount of data transferred by damaging the ciphertext. This approach allows the construction of hybrid crypto-code structures based on the synthesis of Niederreiter modified crypto-code structures on modified (shortened or extended) codes on elliptic curves with damaging procedures. A significant difference from classical hybrid (complex) cryptosystems is the use of asymmetric cryptosystems to ensure data security with fast crypto-transformation procedures (generation and decoding of a codogram). The paper discusses methods for constructing flawed codes and approaches for using the Niederreiter hybrid crypto-code structure on modified elliptic codes. Practical algorithms are proposed for using the MV2 damage mechanism in the Niederreiter crypto-code structure on modified elliptic codes, which makes it possible to implement a hybrid crypto-code structure. The results of a comparative assessment of energy consumption for the formation of an information package with various methods of damage, which determined the choice of damage method in practical algorithms. The conducted studies confirm the competitive efficiency of the proposed cryptosystem in Internet technologies and mobile networks, ensuring practical implementation on modern platforms and the necessary cryptographic strength under post-quantum cryptography.