Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
4 результатів
Результати пошуку
Документ Development of methodological support for the assessment and stratification of national HEI according to the level of innovation activity(Primedia eLaunch, 2021) Ponomarenko, Volodymir; Rayevnyeva, Olena; Yermachenko, Volodymyr; Yevseiev, Serhii; Poliakova, H.; Milov, Oleksandr; Labunska, S.; Brovko, Olha; Shmatko, Oleksandr; Aksonova, IrynaДокумент University monitoring and stratification system: methodological basis for construction(Primedia eLaunch, 2021) Ponomarenko, Volodymir; Rayevnyeva, Olena; Yermachenko, Volodymyr; Yevseiev, Serhii; Poliakova, H.; Milov, Oleksandr; Labunska, S.; Brovko, Olha; Shmatko, Oleksandr; Aksonova, IrynaДокумент Design and evaluation of an IOTA-based medical information system(Національний авіаційний університет, 2023) Shmatko, Oleksandr; Kliuchka, Yaroslav; Korolov, Roman; Khvostenko, Vladyslav; Dunaiev, SergiiThe traditional medical information systems are plagued by issues such as data breaches, lack of privacy, and data integrity concerns. This paper presents the design and evaluation of an IOTA-based medical information system aimed at addressing these challenges. In recent years, blockchain technology has emerged as a powerful tool for securing and managing data in a decentralized manner. One area where this technology has the potential to revolutionize the way we do things is in e-medicine. E-medicine, or electronic medicine, refers to the use of technology to deliver healthcare services remotely. This includes telemedicine, online consultations, and remote monitoring of patients' health status. IOTA blockchain technology, in particular, has a lot of potential in e-medicine. IOTA is a distributed ledger technology that uses a directed acyclic graph (DAG) instead of a traditional blockchain. The main ad-vantage of this approach is that it eliminates the need for miners and makes the system more scalable, fast, and energy-efficient. IOTA is also designed to be feeless, making it an ideal choice for microtransactions. In e-medicine, IOTA can be used in several ways. One potential use case is for secure and decentralized storage of patients' medical records. Medical records are highly sensitive and contain confidential information that needs to be protected from unauthorized access. By using IOTA's tamperproof and immutable ledger, patients can have more control over their medical records and choose who has access to them. This can be especially useful in situations where patients need to share their medical records with multiple healthcare providers or research institutions. By leveraging the unique features of IOTA, such as its feeless microtransactions, scalability, and distributed ledger technology, the proposed system enhances security, privacy, and interoperability in healthcare informationДокумент Algorithm of information security risk assessment based on fuzzy-multiple approach(Національний технічний університет "Харківський політехнічний інститут", 2019) Yevseiev, S. P.; Shmatko, Oleksandr; Romashchenko, NataliiaThe subject of the study is the process of assessing the level of information security risk that is being implemented with the help of the fuzzy logic apparatus. The purpose of this work is to develop a methodology for assessing the degree of information security risk, which would avoid the uncertainty factor, that occurs when some parts of information about the analyzed automated information system are absent. The methodology is based on the use of fuzzy logic and fuzzy sets and implies the introduction of the term sets for each of the system characteristics and the linguistic assessment of the indicators. The tasks to be solved are to analyze existing information security risk assessment methodologies for identifying their strengths and weaknesses. On the basis of the conducted analysis, a new method for assessing the risk of automated information systems information security is proposed. The following resultswere obtained: the advantages and disadvantages of qualitative and quantitative methodologies for assessing the risk degree of automated systems information security were identified; the main stages of the proposed methodology were described; the degree of information security risk is calculated in comparison to the FAIR methodology. Conclusion: The methodology presented in the article provides an opportunity to translate the obtained results of risk assessment from a mathematical language into a linguistic form that is more comprehensible to the decision-maker. This increases the effectiveness of the management of automated information systems protection mechanisms.