{"title":"A METHOD FOR DETERMINING THE EFFECTIVENESS OF A DISTRIBUTED SYSTEM FOR DETECTING ABNORMAL MANIFESTATIONS","authors":"B. Savenko, A. Kashtalian","doi":"10.31891/csit-2022-2-2","DOIUrl":"https://doi.org/10.31891/csit-2022-2-2","url":null,"abstract":"mandatory step, which is carried out to confirm the correctness, feasibility and feasibility of the developed solutions, including architecture, method of maintaining system integrity. \u0000In order to conduct a study on the effectiveness of the use of self-organized distributed systems, anomalies in computer systems were identified in relation to the evaluation criteria. Determining the specifics of the application of the system also affects the choice of criteria for evaluating effectiveness. \u0000The method of determining the effectiveness of the proposed solutions for the developed self-organized distributed system for detecting anomalies in computer systems has been developed. Software has been developed to ensure the functioning of a self-organized distributed anomaly detection system in computer systems to confirm the feasibility of the proposed solutions. \u0000Experimental studies with the developed implementation of a self-organized distributed system for detecting anomalies in computer systems according to the obtained coefficients confirmed the effectiveness of the proposed solutions and the developed distributed system for its operation in the computer network.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Віра Шендрик, Юлія Парфененко, Валентин Майковський, Денис Юрченко, Сергій Шендрик
{"title":"ПІДСИСТЕМА ЗБОРУ, ЗБЕРІГАННЯ ТА ВІЗУАЛІЗАЦІЇ ОПЕРАТИВНИХ ДАНИХ СИСТЕМИ ПІДТРИМКИ ПРИЙНЯТТЯ РІШЕНЬ ДЛЯ УПРАВЛІННЯ МІКРОГІД","authors":"Віра Шендрик, Юлія Парфененко, Валентин Майковський, Денис Юрченко, Сергій Шендрик","doi":"10.31891/csit-2022-2-8","DOIUrl":"https://doi.org/10.31891/csit-2022-2-8","url":null,"abstract":"У статті визначено, що впровадження до енергосистем різного роду відновлюваних джерел енергії перетворюють їх на складні кібертехнічні системами, які потребують інтегрованого інтелектуального управління. Зростання складності процесів взаємодії у таких технічних енергетичних системах підвищує складність процесу управління ними. Особливо збільшується складність управління, коли така енергетична система експлуатується як мікрогрід, оскільки вона у цьому випадку має певну автономію у функціонуванні, і досягти ефективного управління нею можливо лише, якщо особа, яка приймає рішення буде мати якісну інформаційну підтримку, та мати змогу повністю відслідковувати всі інформаційні потоки. Для забезпечення ефективного функціонування мікрогрід необхідно збирати та використовувати у процесі аналізу дані про поточний стан енергосистеми, про параметри оточуючого середовища. Процес моніторингу необхідно виконувати у реальному часі. Це дозволяє відслідковувати різного роду зміни, та вчасно на них реагувати, змінюючи параметри мікрогрід. Складність збору даних полягає у тому, що дані надходять з різних джерел та у різні часові інтервали. Для забезпечення процесу збору даних запропоновано функціональну та математичну модель, які описують процес попередньої обробки великого обсягу зібраних даних, їх верифікацію та зберігання. Обмін даними та їх зберігання для процесу моніторингу забезпечується оперативною базою даних, логічна схема, якої також запропонована у цій статті. Для успішного формування рішення великий обсяг контрольованих даних та результати прогнозування виробництва та споживання електричної енергії запропоновано реалізувати як підсистему візуалізації. Саме поєднання оперативного моніторингу поточного стану енергосистеми з рішеннями інтелектуальних служб системи підтримки прийняття рішень через оперативну базу даних надають особі, що приймає рішення, у зручній візуалізованій формі інформацію про поточний стан системи та оптимальну конфігурацію планування ресурсів і план використання, який орієнтується на підвищення рівня електричних послуг.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Vechirska, O. Kobylin, Stepan Prokopiev, Anna Vechirska, Maksym Kucherenko
{"title":"BUILDING A LOGICAL NETWORK FOR SOLVING THE PROBLEM OF CAR RENTAL BY MEANS ALGEBRA OF FINITE PREDICATES","authors":"I. Vechirska, O. Kobylin, Stepan Prokopiev, Anna Vechirska, Maksym Kucherenko","doi":"10.31891/csit-2022-2-9","DOIUrl":"https://doi.org/10.31891/csit-2022-2-9","url":null,"abstract":"The article is devoted to the research of the tools of algebra of finite predicates for the system analysis and formalization of the task of automating car rental according to the selected parameters. In particular, the process of optimal car selection depends on the following parameters: car class, brand, availability of driver, type of trip and its duration, fuel type, tariff type, as well as season and weather conditions. Each of these criteria has its own area of definition, where you need to take into account all the relationships and influences between the values of the entered variables (criteria). The aim of the work is to increase the speed of data processing in the problem of car rental by dividing the input multi-place ratio into a binary composition. The technique is based on the means and methods of algebra of finite predicates. Introduction of the predicate of object recognition in the specified subject area allowed to formally describe data of any type, and the applied method of construction of logical networks provides increase in speed of information processing due to parallelization of processing processes. Thus, a complex multi-place relation was divided into a composition of binary relations described in the language of predicate algebra, taking into account the detailed system analysis of the subject area. A scientific novelty is the constructed mathematical model of the car rental problem, which is represented by a predicate that depends on thirteen variables. This predicate is characterized by a system of twelve binary relations, which are represented in the article by dual graphs and formulas of the corresponding predicates. The model predicate is a composition of all constructed binary predicates. The practical significance is due to the logical network built on the basis of a mathematical model, which allows from the relationship \"many to many\" to move to the relationship \"to each other\" and parallelize the process of information processing. The result is a logical network of car rental problems, which works iteratively until it receives stable results in two consecutive steps and allows you to solve problems of analysis and synthesis for car rental according to selected parameters.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124326749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPROVEMENT OF DIGITAL DEVICE FOR SUPPRESSION OF ERRONEOUS REQUEST BY LATERAL PETALS OF THE ANTENNA OF AIR TRAFFIC CONTROL SYSTEMS","authors":"T. Hovorushchenko, Alexander Yanovitskiy","doi":"10.31891/csit-2022-1-4","DOIUrl":"https://doi.org/10.31891/csit-2022-1-4","url":null,"abstract":"This article considers the expansion of the capabilities of digital devices of three-pulse suppression of the request ofaircraft responders with side petals in terms of increasing the accuracy of measuring the azimuth of flight of aircraft. In existingdevices, the response of aircraft responders is carried out at the time of the boundary crossing by the aircraft of the frequencypattern of the antenna. The directional pattern of the radar systems of the main petal has an angle of 2o-4o in the horizontal planedepending on the type of radar system and the request period of terrestrial radar stations is 500 Hz, and the antenna rotationspeed is 10 rpm and the distance between pulses P1 and P3 is 14 μs. The time the aircraft is within the directional pattern of themain petal will be requested 17 times and the same number of responses, which in turn leads to ambiguity in fixing the definition ofthe aircraft in azimuth, especially over long distances. The response of the aircraft respondent to the request will be answeredwhen approaching the middle of the directional pattern of the antenna of the main lobe, where the highest power of the emittedsignal, which will significantly reduce the error of determining the aircraft by azimuth","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NOVEL METHOD OF MEDICAL CLASSIFICATION USING PARALLELIZATION ALGORITHMS","authors":"L. Mochurad, Andrii Ilkiv","doi":"10.31891/csit-2022-1-3","DOIUrl":"https://doi.org/10.31891/csit-2022-1-3","url":null,"abstract":"Methods of machine learning in the medical field are the subject of significant ongoing research, which mainly focuses on modeling certain human actions, thought processes or disease recognition. Other applications include biomedical systems, which include genetics and DNA analysis. The purpose of this paper is the implementation of machine learning methods – Random Forest and Decision Tree, further parallelization of these algorithms to achieve greater accuracy of classification and reduce the time of training of these classifiers in the field of medical data processing, determining the presence of human cardiovascular disease. The paper conducts research using machine learning methods for data processing in medicine in order to improve the accuracy and execution time using parallelization algorithms. Classification is an important tool in today's world, where big data is used to make various decisions in government, economics, medicine, and so on. Researchers have access to vast amounts of data, and classification is one of the tools that helps them understand data and find certain patterns in it. The paper used a dataset consisting of records of 70000 patients and containing 12 attributes. Analysis and preliminary data preparation were performed. The Random Forest algorithm is parallelized using the sklearn library functional. The time required to train the model was reduced by 4.4 times when using 8 parallel streams, compared with sequential training. This algorithm is also parallelized based on CUDA. As a result, the time required to train the model was reduced by 83.4 times when using this technology on the GPU. The paper calculates the acceleration and efficiency coefficients, as well as provides a detailed comparison with a sequential algorithm.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APPROACH AND METHOD OF EVALUATION OF THE GENERAL RELIABILITY INDICATOR OF COMPUTER SYSTEMS","authors":"Ievgeniia Tysh","doi":"10.31891/csit-2021-5-10","DOIUrl":"https://doi.org/10.31891/csit-2021-5-10","url":null,"abstract":"Research into the reliability of computer systems is important at all stages of their life cycle. Such studies are conducted to ensure the required level of reliability in the development, to ensure the level of reliability during operation and to assess the reliable operation in the process of modernization of such systems. Reliability research is carried out on the basis of the indicators received in the course of modeling. \u0000The main reliability models that have found their practical use are considered in the paper: structural-logical schemes, fault trees and Markov processes, as well as the main indicators that characterize them are determined. Since the above calculation methods do not take into account the factors that affect the overall reliability of computer systems, namely the reliability of software and databases, the human factor, the paper propose an approach and method for evaluating a general reliability indicator of computer systems.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Balovsyak, Svitlana Voropaieva, Valentyna Horditsa, K. Odaiska, Yu. V. Tanasyuk
{"title":"SOFTWARE AND HARDWARE FOR DETERMINING GAUSSIAN NOISE LEVEL IN IMAGES","authors":"S. Balovsyak, Svitlana Voropaieva, Valentyna Horditsa, K. Odaiska, Yu. V. Tanasyuk","doi":"10.31891/csit-2022-1-6","DOIUrl":"https://doi.org/10.31891/csit-2022-1-6","url":null,"abstract":"Accurate determination of the noise level in digital images is required to obtain their maximum signal-to-noise ratio, which is a necessary condition for the effective performance of the following stages of image processing: visualization, segmentation, recognition, etc. The task of calculating the Gaussian noise level is quite common, because such noise appears in most experimental images taken by video cameras. However, existing high-speed noise detection methods have a significant error, and the fairly accurate LLROI method has a low speed. The LLROI method is based on Low-frequency filtering of the noise component and Low-frequency filtering when selecting the Region Of Interest (ROI). Therefore, it is proposed to determine the level of Gaussian noise by the exact LLROI method and to increase its speed by appropriate hardware and software. Based on the LLROI method, a program in the MATLAB system was created, the structure and Simulink-model of a computer system for determining of Gaussian noise level on digital images were synthesized. Hardware implementation of image filtering units is made by FPGA Artix-7, which allowed us to increase the speed of the system. The results of calculating the Gaussian noise level for test images by the LLROI method using the developed hardware and software proved the errors not to exceed those provided by analogous methods. \u0000The scientific novelty of the paper is to improve the LLROI method, namely to refine the threshold coefficient, which reduces the errors of calculating the noise level, even for images with clear contours and pronounced textures. \u0000The practical significance of the developed tools is that they can be used to build high-speed computer systems (or subsystems) designed to increase the signal-to-noise ratio on digital images.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Morozova, A. Tetskyi, A. Nicheporuk, Denus Kruvak, Vitalii Tkachov
{"title":"SMART HOME SYSTEM SECURITY RISK ASSESSMENT","authors":"O. Morozova, A. Tetskyi, A. Nicheporuk, Denus Kruvak, Vitalii Tkachov","doi":"10.31891/csit-2021-5-11","DOIUrl":"https://doi.org/10.31891/csit-2021-5-11","url":null,"abstract":"The concept of the Internet of Things became the basis of the fourth industrial revolution, which allowed to transfer the processes of automation to a new saber. As a result, automation systems, such as smart homes, healthcare systems and car control systems, have become widespread. The developers of such systems primarily focus their efforts on the functional component, leaving safety issues in the background. However, when designing and operating IoT systems, it is equally important to assess potential bottlenecks and develop complete and comprehensive strategies to mitigate and eliminate the negative effects of cyberattacks. \u0000The purpose of this study is to identify possible cyber threats and assess their impact on critical information objects in the smart home system. To achieve this goal, the three-level architecture of the smart home system is considered and a review of known cyber threats for each level is conducted. The critical information objects in the smart home system are the containers in which the information objects are stored, the risk assessment criteria and the cyber threat scenarios. The information security risks of the smart home system were assessed using the OCTAVE Allegro methodology for the information object that presents the information collected by the smart home sensors.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART","authors":"S. Lysenko, Dmytro Sokalskyi, Iiana Mykhasko","doi":"10.31891/csit-2021-5-4","DOIUrl":"https://doi.org/10.31891/csit-2021-5-4","url":null,"abstract":"The paper presents a state-of-art of the methods for cyberattacks detection in the computer networks. The main accent was made on the concept of the resilience for the IT infrastructure. The concept of cyber resilience in the terms of cybersecurity was presented. The survey includes the set of approaches devoted to the problem of construction resilient infrastructures. All investigated approaches are aimed to construct and maintain infrastructure’s resilience for cyberattacks resistance. Mentioned techniques and frameworks keep the main principles to assure resilience. To do this there exists some requirements to construct such infrastructure: IT infrastructure has to include the set ready to use measures of preparation concerning the possible cyber threats; it must include the set of special measures for the protection, as well as for cyberattacks detection; important issue and required is the possibility to respond the attack and to be able to absorb the negative attacks’ impact; IT infrastructure must be as adaptive as it is possible, because today the dynamic of the attacks mutation is very high; IT infrastructure must be recoverable after the attacks were performed. In addition, the state-of-art found out that known approaches have domain-specific usage and it is important to develop new approaches and frameworks for the cyberattacks detection in the computer networks as a means of resilient IT-infrastructure construction.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127935685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INFORMATION TECHNOLOGY OF FACIAL EMOTION RECOGNITION FOR VISUAL SAFETY SURVEILLANCE","authors":"O. Kalyta","doi":"10.31891/csit-2022-1-7","DOIUrl":"https://doi.org/10.31891/csit-2022-1-7","url":null,"abstract":"Emotional expressions serve a crucial role in interpersonal communication between people while improving social life. In particular, information safety systems for visual surveillance that aim to recognize human emotional facial states are highly relevant today. In this regard, this study is devoted to the problem of identifying the main criteria for expressing the face of emotional manifestations for the possibility of recognizing without the use of specialized equipment, for example, security surveillance cameras with low resolution. In this work, we propose informational technology to define the face’s areas that reproduce the face’s emotional look. The input data from the proposed information technology is a set of videos with detected faces with the primary emotional states reproduced on them. At first, normalization of the faces of images is conducted to compare them in one base. It is executed by centering the face area and normalizing the distance between the eyes. Based on the analysis of point features moving in the set of input images, information points are then allocated (i.e., those points whose movement in the person’s emotional expression is the most significant). At the final stage, the areas of the face (with different bias thresholds) are determined, the changes of which form a visual perception of emotions. For each selected region, a set of possible states is formed. In conclusion, the behavior of point-specific features of a person under the manifestation of specific emotions is explored experimentally, and high-quality indicators for these emotions are highlighted. According to the study results, it is preferable to create a software product based on qualitative criteria for assessing the main areas of the face to determine the mimic expression of emotions.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}