Роман Вікторович Корольов, А.М. Ткачов, Н.І. Воропай, М. Мамедов, Е. Багіров
{"title":"Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes","authors":"Роман Вікторович Корольов, А.М. Ткачов, Н.І. Воропай, М. Мамедов, Е. Багіров","doi":"10.30748/soi.2022.168.03","DOIUrl":"https://doi.org/10.30748/soi.2022.168.03","url":null,"abstract":"The development of information technologies in cyberspace is associated with the development of security services in the components of security: cybersecurity, information security and information security. To provide security services, as a rule, cryptographic algorithms and functions based on symmetric and asymmetric cryptography systems are used. An integral part of such cryptosystems are pseudo-random number generators that allow you to generate a random sequence over a period. One of the evaluation criteria is the duration of the period and its guarantee, i.e. ensuring the randomness produced by the random number generator, another criterion is cryptographic strength - the ability to resist hacking by intruders. On the strength of pseudo-random number generators, symmetric flow cryptosystems are formed that ensure the strength of the cryptogram. The article analyzes the methods for constructing symmetric stream cryptosystems, proposes cryptographic generators of pseudo-random number sequences (PRNGs), the security of which is based on the complexity-theoretic problem of syndromic decoding. An improved method for generating PRNGs is proposed, which makes it possible to provide a guaranteed period of generated sequences.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69584024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of coordinates of air object by ADS-B receiver system with application of MLAT technology in the multi-target situation","authors":"Андрей Викторович Федоров, М.Ю. Дергоусов, О.О. Шевченко, О.М. Пилипович, О.В. Сердюк","doi":"10.30748/soi.2022.168.05","DOIUrl":"https://doi.org/10.30748/soi.2022.168.05","url":null,"abstract":"It was shown the possibility of determining the coordinates of air objects during the combination of information from radars and ADS-B receiver system with MLAT technology use in the presence of a large number of targets, with additional use of correlation processing of received signals. Was analyzed the factors influencing the accuracy of determining the coordinates of air objects, a brief analysis of the capabilities of ADS-B technology. The advantages of correlation processing of received signals with additional MLAT technology use is the ability to determine the coordinates of air objects with high accuracy in the presence of a large number of targets.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47108339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of noise radiance point sources multichannel direction finding systems resolution by linear prediction method","authors":"В.В. Джус, Є.С. Рощупкін, С.В. Кукобко, С.В. Герасимов, Н.Ч. Дроб, М.Л. Трофимова","doi":"10.30748/soi.2021.167.02","DOIUrl":"https://doi.org/10.30748/soi.2021.167.02","url":null,"abstract":"The resolution of multichannel direction finding systems of independent noise radiance point sources is estimated quantitatively under a limited learning sample on the basis of a linear prediction methods “bank” and modified Capon algorithms.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69584245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The ways to organize of distance learning in higher military educational institutions of Ukraine and the world during overcome of the coronavirus infection pandemic Covid-19","authors":"В.В. Калачова, Оваід Сальман Рашід, О.М. Місюра, В.Ф. Третяк, Л.В. Сафошкіна, Р.О. Гончар","doi":"10.30748/soi.2021.167.03","DOIUrl":"https://doi.org/10.30748/soi.2021.167.03","url":null,"abstract":"The global informatization of modern society, development of telecommunication, communicular and information technologies - on the one hand and the powerful challenges to all humanity in the form of epidemics (coronavirus infection COVID-19, bird flu, various forms of pneumatic and hepatitis), natural and man-made disasters, military and political conflicts, wars - from the second, determine significant changes in priority forms of educational process, and distance learning (DL), in these conditions, becomes the only possible option for providing quality educational services with minimal financial expenses for its organization.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69584290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
С.І. Березіна, О.І. Солонець, Кювон Лі, М. В. Борцова
{"title":"An information technique for segmentation of military assets in conditions of uncertainty of initial data","authors":"С.І. Березіна, О.І. Солонець, Кювон Лі, М. В. Борцова","doi":"10.30748/soi.2021.167.01","DOIUrl":"https://doi.org/10.30748/soi.2021.167.01","url":null,"abstract":"To solve the applied task of detecting military assets in aerospace images the presented paper investigates the processes of constructing segmented maps of the images. The goal is to develop an information technique for detecting military assets in conditions of uncertainty of initial data. To achieve the goal, the following tasks were formulated: 1) to analyze usability of the existing segmentation methods for automatic detection of military assets in the images; 2) if the existing methods are inapplicable, to develop a new algorithm to solve the problem. In the paper the following methods are used: the methods of digital image processing, the methods of Boolean algebra and fuzzy sets, the methods of statistical analysis. The following results are received. Analysis of the known segmentation methods showed that due to camouflage coloring of the military assets, similarity of their color characteristics to those of underlying surfaces and due to the presence of large number of textured fragments in the images those methods provide segmented maps of poor quality. Among the common problems arising when conventional methods are used there are wrong segmentation, when the received contours do not coincide with the borders of the objects of interest; oversegmentation, when there are a lot of minor segments which produce \"litter\" objects; undersegmentation, when potentially possible segments are missed etc. As the conventional methods are inapplicable, in the paper it is suggested using the fuzzy logic systems. For each pixel the probability of the fact that the pixel belongs to the object or to the background is calculated. For making decision whether a pixel belongs to the object the production rules based on the chosen most significant factors (probabilistic values of spectral sub-bands, belonging of the neighboring pixels to the object, jumps of brightness in spectral sub-bands on the object's borders) are constructed. Conclusion. The suggested technique ensures high-quality definition of objects' borders, thus considerably increasing the reliability of military assets recognition.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49582851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
П.Ю. Костенко, В. В. Слободянюк, Д. В. Карлов, Є.В. Ветлугін, В.О. Лєбєдєв
{"title":"Метод фільтрації мультиплікативного шуму на зображеннях з використанням технології сурогатних даних","authors":"П.Ю. Костенко, В. В. Слободянюк, Д. В. Карлов, Є.В. Ветлугін, В.О. Лєбєдєв","doi":"10.30748/soi.2021.167.04","DOIUrl":"https://doi.org/10.30748/soi.2021.167.04","url":null,"abstract":"У статті розглядається метод фільтрації мультиплікативного шуму на цифровому зображенні, заснований на представленні гомоморфного образу зображення в векторно-матричному фазовому просторі і використанні нетрадиційних методів багатомірного статистичного аналізу, а саме – технології сурогатних даних, яка дозволяє з єдиного зображення, спотвореного мультиплікативним шумом, формувати псевдоансамбль “сурогатних” зображень із подальшим їхнім усередненням. Проведено імітаційне моделювання запропонованого методу фільтрації шуму. Проведений візуальний порівняльний аналіз просторової і радіометричної роздільної здатності запропонованого й деяких відомих методів фільтрації шуму та їх чисельних мір якості. Показано, що запропонований метод демонструє кращу просторову та радіометричну роздільну здатність у порівнянні з найпоширенішими методами фільтрації шуму.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47379707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scattering characteristics of surface ships with complex shape","authors":"О.І. Сухаревський, В.О. Василець, І.Є. Ряполов","doi":"10.30748/soi.2021.167.06","DOIUrl":"https://doi.org/10.30748/soi.2021.167.06","url":null,"abstract":"Based on the previously developed by the authors method for estimating the scattering characteristics of objects located near the interface between two half-spaces, the scattering data of a large Project 775 landing ship (NATO codification: Ropucha) are obtained. A surface model of the ship under study and the results of calculations of its scattering characteristics are given. Scattering characteristics were obtained for different probing conditions. The radar cross-section circular diagrams, mean and median radar cross-section values, averaged in different azimuth aspect ranges of probing for the object under study are presented.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69583839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Niederriter crypto-code design models on LDPC-codes","authors":"С.С. Погасій, С.В. Мілевський, О.С. Жученко, Б.П. Томашевський, І.Р. Рагімова, С.В. Сергієв","doi":"10.30748/soi.2021.167.05","DOIUrl":"https://doi.org/10.30748/soi.2021.167.05","url":null,"abstract":"The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69583829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the mechanism for median image filtering in computer systems and special purpose networks","authors":"О.О. Тимочко, В.В. Ларін","doi":"10.30748/soi.2021.166.05","DOIUrl":"https://doi.org/10.30748/soi.2021.166.05","url":null,"abstract":"A successful solution to solve an impulse noise is to use median filtration proposed by John Tuke in 1971 for the analysis of economic processes. It should be noticed that median filtration is a heuristic processing method, its algorithm is not a mathematical solution to a strictly formulated problem. Therefore, the researchers pay much attention to the analysis of the image effectiveness processing on its basis and comparison with other methods. When applying a median filter, each image pixel is sequentially processed. For median filtration, a two-dimensional window (filter aperture) is used, usually has a central symmetry, with its center located at the current filtration point. The dimensions of the aperture are among the parameters that are optimized in the process of analyzing the algorithm efficiency. Image pixels, that appear within the window, form a working sample of the current step. However median filtering smoothens the image borders to a lesser degree than any linear filtering. The mechanism of this phenomenon is very simple and is as follows. Assume that the filter aperture is near the boundary separating the light and image's dark areas, with its center located in the dark area. Then, most likely, the work sample will contain more elements with small brightness values, and, consequently, the median will be among those elements of the work sample that match this area of the image. The situation changes to the opposite, if the aperture center is shifted to the region of higher brightness. But this means the presence of sensitivity in the median filter to brightness variations.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69584234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Багатокритеріальна (векторна) оптимізація портфеля валют при нестохастично невизначеному зовнішньому економічному середовищі","authors":"С.В. Гадецька, В.Ю. Дубницький, Ю.І. Кушнерук, О.І. Ходирєв, І.В. Шкодіна","doi":"10.30748/soi.2021.166.01","DOIUrl":"https://doi.org/10.30748/soi.2021.166.01","url":null,"abstract":"На основі аналізу літератури встановлено, що невизначеності різної природи, які властиві операціям по конвертації валют з урахуванням чинника часу, вимагають використовувати хеджування валютних ризиків. Встановлено, що серед моделей хеджування ризиків одна з найбільш поширених моделей – модель Марковіца. В роботі розглянуто її використання за результатами можливих значень курсу валют у майбутньому. Для розв’язання задачі у майбутньому часі запропоновано використання інтервальних чисел, представлених в системі ЦЕНТР-РАДІУС. В роботі запропоновано наступні методики: визначення основних статистичних характеристик зміни курсів валют, включених до складу портфелю; визначення статистичного зв'язку між окремими валютами, включеними до складу портфелю; визначення статистичних властивостей часового ряду даних про зміну курсу валют. Сформульована задачу Марковіца як задачу багатокритеріальної (векторної) оптимізації портфеля валют при нестохастично невизначеному зовнішньому економічному середовищі. Розв’язання такої задачі (структура портфелю валют) одночасно дає можливість максимізувати прибуток і одночасно мінімізувати ризик операцій, пов’язаних з конверсією валют. Для розв’язання задачі використано згортку критеріїв, яка забезпечує зменшення відносних значень цільових функцій від їх оптимальних значень рівномірно.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69583512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}