{"title":"The Method of Adaptive Control of the Process of Human-Machine Interaction to Ensure the Reliability and Efficiency of Automated Control Systems","authors":"E. Lavrov, O. Siryk, B. Rybalov, D. Velykodnyi","doi":"10.1109/PICST54195.2021.9772126","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772126","url":null,"abstract":"The necessity of new approaches to the search for ergonomic reserves of increasing the efficiency of dialogue automated systems focused on adapting the dialogue to the characteristics of human operators has been substantiated. The problems of designing adaptive interfaces are characterized. The expediency of including a model of the “functional network” type with the dialogue control system, which allows modeling alternative options for organizing a dialogue, is shown. The nomenclature of dialogue management procedures has been substantiated, which ensures the required reliability and compliance with ergonomic norms and requirements. The proposed models are convenient for embedding into control systems for dialogue interaction and provide reliability, flexibility and convenience of automated systems for various purposes.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Starkova, Kyryl Nikolchev, K. Herasymenko, Yurii Ahafonov, Mykola Yastrebov
{"title":"Virtualization of Network Functions for the Implementation of Modern Routing Methods","authors":"O. Starkova, Kyryl Nikolchev, K. Herasymenko, Yurii Ahafonov, Mykola Yastrebov","doi":"10.1109/PICST54195.2021.9772222","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772222","url":null,"abstract":"The article discusses the existing routing methods, their advantages and disadvantages. It was discovered that to solve the routing methods disadvantages it is necessary to use the concept of Network Functions Virtualization (ETSI ISG NFV). There were also showed the capabilities of future routing methods programming.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing Approaches of IT Infrastructure Audit","authors":"F. Kipchuk, V. Sokolov, P. Skladannyi, D. Ageyev","doi":"10.1109/PICST54195.2021.9772181","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772181","url":null,"abstract":"The paper presents a brief overview of information security components criteria. Further analysis of common schemas in financial and commerce sectors determining common items as IT security subjects. Lead and general security standards are analyzed for the approach of determining the scope for auditing IT infrastructure. Schemes typical for financial and commerce sectors are analyzed for identifying typical and individual IT subjects. A new approach for determining scope is purposed. Comparison of new and general approaches is shown on examples of basic schemas of companies. Testing of the approach described.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vedernikov, Natalia Bazaliyska, Maria Zelena, L. Volianska-Savchuk, I. Shelest, Olena Mantur-Chubata
{"title":"Innovative HR-Engineering Personnel Management to Ensure the Security of Economic Structures","authors":"M. Vedernikov, Natalia Bazaliyska, Maria Zelena, L. Volianska-Savchuk, I. Shelest, Olena Mantur-Chubata","doi":"10.1109/PICST54195.2021.9772125","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772125","url":null,"abstract":"In this work, a fundamentally new innovative HR-technology of headhunting is justified and formulated as an element of improving the business process of personnel selection at the enterprise. An algorithm for making decisions using innovative HR-technology of headhunting at the enterprise has been improved. The types of candidates in the negotiations during the implementation of HR-headhunting technology have been established. The validity of staff selection methods in the process of implementing the headhunting business procedure has been determined. A headhunting procedure has been developed using the mathematical method of solving multi-criterion optimization problems based on an additive criterion. The algorithm of business process of headhunting with use of mathematical methods is constructed. A clear rating of HR candidates has been formed using innovative headhunting technology, which will allow the selection of the best specialists for professional business activities.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121288410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Krasnobayev, A. Kuznetsov, K. Kuznetsova, T. Ivko
{"title":"Implementation of Arithmetic Operations in the Residue Numeral System","authors":"V. Krasnobayev, A. Kuznetsov, K. Kuznetsova, T. Ivko","doi":"10.1109/PICST54195.2021.9772148","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772148","url":null,"abstract":"To improve the performance of computer systems, special number systems can be used, for example, the residue numeral system (RNS). Replacing integers with their values modulo several pairwise coprime integers (called the moduli) can significantly reduce the complexity of arithmetic operations. However, the different way of representing numbers makes it difficult to use RNS in practice. For example, integers represented in a positional numeral system need to be quickly converted to RNS and vice versa. In addition, the implementation of computing devices operating in the RNS must also take into account the peculiarities of representing numbers as residuals on coprime bases. In this article, we look at the various structures of computing devices in RNS. In particular, we present the arithmetic operations of addition modulo and give examples of adders.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Approches to Solving Problems of Information Security for a Small Enterprise","authors":"A. Zhuravka, D. Ageyev, A. Chugay","doi":"10.1109/picst54195.2021.9772112","DOIUrl":"https://doi.org/10.1109/picst54195.2021.9772112","url":null,"abstract":"the research presents the approach to solving the problems of choosing tools and methods of ensuring information security in conditions of a limited budget and to justify a set of measures, aimed at ensuring information security for a small enterprise","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bohdan Kovalskyi, Myroslava Dubnevych, Z. Selmenska, T. Holubnyk, Nataliya Zanko, N. Snihur
{"title":"Information Technology of Forming a 3D Object","authors":"Bohdan Kovalskyi, Myroslava Dubnevych, Z. Selmenska, T. Holubnyk, Nataliya Zanko, N. Snihur","doi":"10.1109/PICST54195.2021.9772167","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772167","url":null,"abstract":"Over the past decade, the demand for a profession in the field of 3D modeling has grown exponentially. The article discusses the advantages and disadvantages of selected modern additive technologies, as well as their classification. By the method of approximating the geometric figure of a point type of object - the Eiffel Tower, which is printed on the output devices of 3D printing. Important problems in the formation of a 3D product are listed. An algorithm for creating any printed object in a format understandable by 3D equipment has been built.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov
{"title":"Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks","authors":"T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov","doi":"10.1109/PICST54195.2021.9772226","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772226","url":null,"abstract":"Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuliia Ulianovska, Serhii Florov, A. Hrebeniuk, T. Katkova, D. Prokopovich-Tkachenko, R.Y. Gvozdov
{"title":"Formalized Designing Methodology of ISMS for Critical Infrastructure","authors":"Yuliia Ulianovska, Serhii Florov, A. Hrebeniuk, T. Katkova, D. Prokopovich-Tkachenko, R.Y. Gvozdov","doi":"10.1109/PICST54195.2021.9772182","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772182","url":null,"abstract":"Today, the functioning of the state is impossible without a developed information infrastructure. Such systems are already considered as critical infrastructure. The architecture of information systems is growing along with the number of services they provide. Designing flaws of such systems can critically affect the safety of their operation. As information and telecommunication systems become more complex, security is becoming an important issue, where a formal approach to the design of security features will help to avoid mistakes in integrating an information security management system. This paper proposes new requirements for the ISMS project for critical infrastructure, in particular a formal design approach.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128516763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Two Implementation Methods of the Equivalents Generator in the Code Converters","authors":"Anna Makarenko, D. Rakhlis, S. Kavun","doi":"10.1109/PICST54195.2021.9772118","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772118","url":null,"abstract":"The algorithm of functioning tables' formation of the basic non-standard node (equivalents generator) by the method of equivalents accumulation was been considered in the code converters. Formulas for lines amount in the functioning table of the equivalent's generator were been obtained. In comparison with the serial strategy, the proposed author's method allows to reduce the amount of the conversion cycles of the two-steps parallel code converters from 7 to 5 steps (increase the performance at 28,57%), and for the three-step parallel code converters - from 4 to 3 steps (increase the performance at 25%). The conducted researches allow accelerating a stage of a system design of the code converters with the parallel strategy of the step usage, increasing code converters performance and reducing hardware expenses of the construction of the main non-standard node of the equivalents generator and code converters in generally. An advantage by the method of equivalents accumulation of code converters in comparison with other methods is a high calculation performance and the possibility of changing in the wide boundaries of the ratio between speed and hardware expenses.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}