Кафедри

Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393

Переглянути

Результати пошуку

Зараз показуємо 1 - 4 з 4
  • Ескіз
    Документ
    Research and prototyping methods of steganography using mosaic
    (Національний технічний університет "Харківський політехнічний інститут", 2020) Pevnev, Volodymyr; Voikov, Yurii
    The paper considers the possibility of using a mosaic composed of many miniature images to hide the fact of text information transmission. The results of the study of optimal mosaic construction when using steganographic methods of hiding information are presented. The use of the proposed algorithms implies the use of сryptographically secure pseudorandom number generator with dynamically changing parameters for concealing information. The generators are used to determine the location of information bits in a certain mini-images, as well as in a specific pixels and color channels. Using the proposed algorithm, no more than twenty-five percent of the color channels are changed, provided that one bit per color is used. This paper is supplemented with illustrations and examples of how the algorithm works.
  • Ескіз
    Документ
    Analysis and research of well-known orchestration systems for the construction of microservice infrastructure
    (Національний технічний університет "Харківський політехнічний інститут", 2020) Pevnev, Volodymyr; Trehub, Yuliia
    Modern orchestration systems are being studied. Using different virtualization methods is it a good way to reduce construction time, equipment costs and support system operations during infrastructure construct. The article provides a detailed analysis of existing virtualization tools. A comparative analysis of modern solutions shows that the Kubernetes tool is one of the best tools for orchestration. The features of sharing orchestration systems together with different Cloud providers are presented in the article, comparisons of the cloud providers themselves are presented too.
  • Ескіз
    Документ
    Use of a method of Pascal of calculation of checksums in noiseproof coding
    (Національний технічний університет "Харківський політехнічний інститут", 2019) Pevnev, Volodymyr; Tsuranov, Mikhail; Zemlianko, Heorhii; Kharchenko, Vyacheslav
    The subject matter of the article is opportunity use of a method of Pascal for finding of remainders of division of large numbers when using CRC. The goalis to analyze a possibility of use of a method of Pascal for definition of remainders of division in the CRC systems. Tasks: to analyze a possibility of use of CRC for noise-immune coding in different channels, to show a possibility of application of a method of Pascal for an image of noise-immune coding with use of checksums. The used methodsareanalytical method, methods of modal arithmetic’s. The received such results. The technique of calculation of Checksum of the message which are used for the control of integrity and restoration distorted the message is developed. Conclusions. Use of a method of Pascal for definition of remainders of division allows accelerating considerably process of search of various options the message, which will be restored. Realization of the offered method allows creating parallel structures, which give the chance to solve a problem of recovery of the message on the scale of real time.
  • Ескіз
    Документ
    Database security: threats and preventive measures
    (НТУ "ХПІ", 2018) Pevnev, Volodymyr; Kapchynskyi, Serhii
    The subject matter of the article is the variety of different threats and vulnerabilities which can occur while developing, managing and maintaining different databases and database management systems. The goalis to analyze the described threats and provide the most appropriate solutions. The tasks to be solved are: analyze the variety of different threats and vulnerabilities and select the most common and problematic ones, propose the most appropriate preventive measures or solutions for each of items selected. Ensuring database security is very critical for the organizations. As the complexity of the databases increases, we may tent to have more complex security issues of database.