Видання НТУ "ХПІ"

Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/62886

Переглянути

Результати пошуку

Зараз показуємо 1 - 7 з 7
  • Ескіз
    Документ
    Decomposition of integrated high-density IoT data flow
    (Національний технічний університет "Харківський політехнічний інститут", 2024) Kuchuk, Heorhii; Kalinin, Yevhen; Dotsenko, Nataliia; Chumachenko, Igor; Pakhomov, Yuriy
    The concept of fog computing made it possible to transfer part of the data processing and storage tasks from the cloud to fog nodes to reduce latency. But in batch processing of integrated data streams from IoT sensors, it is sometimes necessary to distribute the tasks of the batch between the fog and cloud layers. For this, it is necessary to decompose the formed package. But the existing methods of decomposition do not meet the requirements for efficiency in high-density IoT systems. The subject of study in the article are methods of decomposition of integrated data streams. The purpose of the article is to develop a method of decomposition of an integrated data stream in a dense high-density Internet of Things fog environment. This will reduce the processing time of operational transactions.
  • Ескіз
    Документ
    Integration of IoT with cloud, fog, and edge computing: a review
    (Національний технічний університет "Харківський політехнічний інститут", 2024) Kuchuk, Heorhii; Malokhvii, Eduard
    Purpose of review. The paper provides an in-depth exploration of the integration of Internet of Things (IoT) technologies with cloud, fog, and edge computing paradigms, examining the transformative impact on computational architectures. Approach to review. Beginning with an overview of IoT's evolution and its surge in global adoption, the paper emphasizes the increasing importance of integrating cloud, fog, and edge computing to meet the escalating demands for real-time data processing, low-latency communication, and scalable infrastructure in the IoT ecosystem. The survey meticulously dissects each computing paradigm, highlighting the unique characteristics, advantages, and challenges associated with IoT, cloud computing, edge computing, and fog computing. The discussion delves into the individual strengths and limitations of these technologies, addressing issues such as latency, bandwidth consumption, security, and data privacy. Further, the paper explores the synergies between IoT and cloud computing, recognizing cloud computing as a backend solution for processing vast data streams generated by IoT devices. Review results. Challenges related to unreliable data handling and privacy concerns are acknowledged, emphasizing the need for robust security measures and regulatory frameworks. The integration of edge computing with IoT is investigated, showcasing the symbiotic relationship where edge nodes leverage the residual computing capabilities of IoT devices to provide additional services. The challenges associated with the heterogeneity of edge computing systems are highlighted, and the paper presents research on computational offloading as a strategy to minimize latency in mobile edge computing. Fog computing's intermediary role in enhancing bandwidth, reducing latency, and providing scalability for IoT applications is thoroughly examined. Challenges related to security, authentication, and distributed denial of service in fog computing are acknowledged. The paper also explores innovative algorithms addressing resource management challenges in fog-IoT environments. Conclusions. The survey concludes with insights into the collaborative integration of cloud, fog, and edge computing to form a cohesive computational architecture for IoT. The future perspectives section anticipates the role of 6G technology in unlocking the full potential of IoT, emphasizing applications such as telemedicine, smart cities, and enhanced distance learning. Cybersecurity concerns, energy consumption, and standardization challenges are identified as key areas for future research. Стаття містить поглиблене дослідження інтеграції технологій Інтернету речей (IoT) із парадигмами хмарних, туманних і периферійних обчислень, досліджуючи трансформаційний вплив на обчислювальні архітектури. Підхід до огляду. Починаючи з огляду еволюції IoT та його стрімкого поширення в усьому світі, документ підкреслює зростаючу важливість інтеграції хмарних, туманних і периферійних обчислень для задоволення зростаючих вимог до обробки даних у реальному часі, зв’язку з низькою затримкою та масштабованої інфраструктури в екосистема IoT. Опитування ретельно аналізує кожну обчислювальну парадигму, підкреслюючи унікальні характеристики, переваги та проблеми, пов’язані з IoT, хмарними обчисленнями, периферійними обчисленнями та туманними обчисленнями. Обговорення заглиблюється в індивідуальні переваги та обмеження цих технологій, розглядаючи такі проблеми, як затримка, споживання пропускної здатності, безпека та конфіденційність даних. Крім того, у статті досліджується взаємодія між IoT і хмарними обчисленнями, визнаючи хмарні обчислення серверним рішенням для обробки великих потоків даних, створених пристроями IoT. Результати огляду.Визнаються проблеми, пов’язані з ненадійною обробкою даних і проблемами конфіденційності, наголошується на необхідності надійних заходів безпеки та нормативної бази. Досліджується інтеграція периферійних обчисленьз IoT, демонструючи симбіотичні відносини, коли крайові вузли використовують залишкові обчислювальні можливості пристроїв IoT для надання додаткових послуг. Висвітлено проблеми, пов’язані з неоднорідністю периферійних обчислювальних систем, і в статті представлено дослідження обчислювального розвантаження як стратегії мінімізації затримки в мобільних периферійних обчисленнях. Проміжна роль Fog Computing у збільшенні пропускної здатності, зменшенні затримки та забезпеченні масштабованості для програм IoT ретельно досліджується. Визнаються проблеми, пов’язані з безпекою, автентифікацією та розподіленою відмовою в обслуговуванні в туманних обчисленнях. У документі також досліджуються інноваційні алгоритми вирішення проблем управління ресурсами в середовищах fog-IoT. Висновки. Опитування завершується розумінням спільної інтеграції хмарних, туманних і периферійних обчислень для формування цілісної обчислювальної архітектури для IoT. Розділ про перспективи передбачає роль технології 6G у розкритті повного потенціалу IoT, акцентуючи увагу на таких програмах, як телемедицина, розумні міста та покращене дистанційне навчання. Питання кібербезпеки, споживання енергії та проблеми стандартизації визначені як ключові сфери майбутніх досліджень.
  • Ескіз
    Документ
    Hybrid recommender for virtual art compositions with video sentiments analysis
    (Національний технічний університет "Харківський політехнічний інститут", 2024) Kuchuk, Heorhii; Kuliahin, Andrii
    Topicality. Recent studies confirm the growing trend to implement emotional feedback and sentiment analysis to improve the performance of recommender systems. In this way, a deeper personalization and current emotional relevance of the user experience is ensured. The subject of study in the article is a hybrid recommender system with a component of video sentiment analysis. The purpose of the article is to investigate the possibilities of improving the effectiveness of the results of the hybrid recommender system of virtual art compositions by implementing a component of video sentiment analysis. Used methods: matrix factorization methods, collaborative filtering method, content-based method, knowledgebased method, video sentiment analysis method. The following results were obtained. A new model has been created that combines a hybrid recommender system and a video sentiment analysis component. The average absolute error of the system has been significantly reduced. Added system reaction to emotional feedback in the context of user interaction with virtual art compositions. Conclusion. Thus, the system can not only select the most suitable virtual art compositions, but also create adaptive and dynamic content, which will increase user satisfaction and improve the immersive aspects of the system. A promising direction of further research may be the addition of a subsystem with a generative neural network, which will create new virtual art compositions based on the conclusions of the developed recommendation system.
  • Ескіз
    Документ
    Adaptive resource allocation method for data processing and security in cloud environment
    (Національний технічний університет "Харківський політехнічний інститут", 2023) Petrovska, Inna; Kuchuk, Heorhii
    Subject of research: methods of resource allocation of the cloud environment. The purpose of the research: to develop a method of resource allocation that will improve the security of the cloud environment. At the same time, effective data processing should be achieved. Method characteristics. The article discusses the method of adaptive resource allocation in cloud environments, focusing on its significance for data processing and enhanced security. A notable feature of the method is the consideration of external influences when calculating the characteristics of cloud resource requests and predicting resource requests based on a time series test. The main idea of this approach lies in the ability to intelligently distribute resources while considering real needs, which has the potential to optimize both productivity and confidentiality protection simultaneously. Integrating adaptive resource allocation methods not only improves data processing efficiency in cloud environments but also strengthens mechanisms against potential cyber threats. Research results. To ensure timely resource allocation, the NSGA-II algorithm has been enhanced. This allowed reducing the resolution time of multi-objective optimization tasks by 5%. Additionally, research results demonstrate that effective utilization of various types of resources on a physical machine reduces resource losses by 1.2 times compared to SPEA2 and NSGA-II methods.
  • Ескіз
    Документ
    Biometric authentication utilizing convolutional neural networks
    (Національний технічний університет "Харківський політехнічний інститут", 2023) Datsenko, Serhii; Kuchuk, Heorhii
    Cryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that implement various electronic trust services. Developing complete biometric cryptographic systems will allow using personal biometric data as a unique secret parameter instead of needing to remember cryptographic keys or using additional authentication devices. The object of research the process of generating cryptographic keys from biometric images of a person's face with the implementation of fuzzy extractors. The subject of the research is the means and methods of building a neural network using modern technologies. The purpose of this paper to study new methods for generating cryptographic keys from biometric images using convolutional neural networks and histogram of oriented gradients. Research results. The proposed technology allows for the implementation of a new cryptographic mechanism - a technology for generating reliable cryptographic passwords from biometric images for further use as attributes for access to secure systems, as well as a source of keys for existing cryptographic algorithms.
  • Ескіз
    Документ
    Static allocation method in a cloud environment with a service model IAAS
    (Національний технічний університет "Харківський політехнічний інститут", 2022) Petrovska, Inna; Kuchuk, Heorhii
    The article discusses a method that allows the allocation of the required computing resources for the initial launch of a virtual host. The method is focused on the functioning of a virtual host in a cloud environment focused on the service model "Infrastructure as a Service". The subject of research is the methods of static resource allocation in cloud environments. The object of study is the process of functioning of a virtual host in a cloud environment that provides all information technology resources for it. The purpose of the study is to develop a method for the static allocation of resources in the cloud environment, focused on the features of the service model "Infrastructure as a Service". Results: An approach has been developed for carrying out the decomposition of a cloud computing environment with the IAAS service model. The analysis of existing methods of static allocation of resources has been carried out. The application of the method of analysis of hierarchies for this problem is substantiated. A step-by-step algorithm for finding the most acceptable alternative from the set proposed has been developed. An example of the application of the developed method for initializing a virtual host in a cloud environment with the IAAS service model is given. Conclusion. The proposed method makes it possible to rationally use the computing resources of the cloud environment, which uses the "Infrastructure as a Service" service model. Direction for further research. The development of this direction is the development of a method for dynamic redistribution of resources in a cloud environment with the IAAS service model.
  • Ескіз
    Документ
    Modeling the process of two-factor authentication
    (Національний технічний університет "Харківський політехнічний інститут", 2022) Rezanov, Bohdan; Kuchuk, Heorhii
    The relevance of research. Authentication is the process of confirming the authenticity of an object or subject of interaction in an information network by a presented identifier. Usually only one factor is used. However, most information security incidents occur due to the use of one factor. The easiest way to create an extra layer of security for accounts is to use two-factor authentication using 2FA programs. In this case, an additional step occurs, which increases the user authentication time and creates an additional load on the network. Thus, there is a need to create an additional layer of security for accounts in the "Active Directory" directory service without using an additional component on the target system and an additional step in the authentication process, thereby making the authentication process itself simpler and more responsive to the user. The purpose of the article is to develop a model of the two-factor authentication process, which will allow comparison of different approaches to its implementation. Research progress. The proposed model consists of three components: a system submodel, a threat submodel, and a security properties submodel. The analysis performed showed the advantages of using the PERT method for this problem. The simulation of the authentication process was carried out using a third-party service for checking the second factor (DUO) and the proposed method. The final PERT-diagrams are formed. A comparative analysis of these methods in terms of authentication speed was carried out. Conclusion. The developed model makes it possible to assess the quality of two-factor authentication by the selected parameter with a sufficient degree of accuracy. In particular, the proposed method showed more preferable results in terms of authentication speed compared to conventional methods.