R. Korzh, A. Peleshchyshyn, Yuriy Syerov, S. Fedushko
{"title":"Principles of university's information image protection from aggression","authors":"R. Korzh, A. Peleshchyshyn, Yuriy Syerov, S. Fedushko","doi":"10.1109/STC-CSIT.2016.7589873","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589873","url":null,"abstract":"This paper presents the current problem of protection of information image of university in terms of its forming. The stages of university's information image protection from aggression are suggested in this paper.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical modeling of non-isothermal moisture transfer and visco-elastic deformation in the materials with fractal structure","authors":"Yaroslav Sokolovskyy, V. Shymanskyi, M. Levkovych","doi":"10.1109/STC-CSIT.2016.7589877","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589877","url":null,"abstract":"Two-dimensional mathematical model of non-isothermal moisture transfer and viscoelastic deformation in the environments with fractal structure considering the effects of memory and spatial correlation are synthesized. Explicit and implicit difference schemes for related equations of heat and mass transfer in two-dimensional domain with boundary conditions of the third kind are built. The algorithmic aspects for implementation of obtained difference equations with the use of predictor-corrector method are presented and the conditions of stability of these difference schemes are analyzed.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114722184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kudubayeva, D. Ryumin, Ainur Sndetbayeva, Y. Krak
{"title":"Computing of hands gestures' informative video features","authors":"S. Kudubayeva, D. Ryumin, Ainur Sndetbayeva, Y. Krak","doi":"10.1109/STC-CSIT.2016.7589867","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589867","url":null,"abstract":"The article deals with morphological values and methods necessary for recognition of features in an image. The simplest operations (dilation and erosion) serve the base for the majority of morphological algorithms. Descriptors necessary for presentation and depiction of boundaries and regions of objects obtained in the process of segmentation are singled out.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122378206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of mutual influences of software quality characteristics based ISO 25010:2011","authors":"T. Hovorushchenko, O. Pomorova","doi":"10.1109/STC-CSIT.2016.7589874","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589874","url":null,"abstract":"This work is devoted to determining the degree of cross-correlation of software quality subcharacteristics and characteristics for joint measures. In the paper the weights of measures are calculated. The weights of measures represent mutual influences of quality characteristics, subcharacteristics and their mutual correlation The weights of measures are necessary for further evaluation of current software quality characteristics (for ISO 25010).","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the temporal access control implementation at the logical level of relational databases","authors":"P. Zhezhnych, T. Burak, Oleg Chyrka","doi":"10.1109/STC-CSIT.2016.7589875","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589875","url":null,"abstract":"Any information system built on a database can not function without data access control component. Role-Based Access Control (RBAC) models are the most acceptable for large database operating. There are several approaches to implementation of modified RBAC models that support hierarchical and temporal access control. This paper considers an approach of the implementation at the logical level of a database with a set of user role permissions tables and a set of data access control views. The tables and views are created and used according to defined rules of temporal access permissions distribution.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128696474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Berezsky, Grygoriy Melnyk, Yuriy Batko, O. Pitsun
{"title":"Regions matching algorithms analysis to quantify the image segmentation results","authors":"O. Berezsky, Grygoriy Melnyk, Yuriy Batko, O. Pitsun","doi":"10.1109/STC-CSIT.2016.7589862","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589862","url":null,"abstract":"In the paper the matching algorithms of region images are analyzed. The work also presents their advantages and disadvantages. The comparing images algorithm of regions is developed on the basis of the measured chords. The comparison regions algorithms are used to evaluate segmentation algorithms in the Gromov-Hausdorff metric. The algorithm of metric evaluation is developed as an example of biomedical images segmentation.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123372339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nazarkevych, Roman Oliarnyk, O. Troyan, Hanna Nazarkevych
{"title":"Data protection based on encryption using Ateb-functions","authors":"M. Nazarkevych, Roman Oliarnyk, O. Troyan, Hanna Nazarkevych","doi":"10.1109/STC-CSIT.2016.7589861","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589861","url":null,"abstract":"A method of protecting information using poligraphy encryption tools based on Ateb-functions what was created as thin lines. The basic requirements for cryptosystems were showed. The main methods of encryption were analysed. The analysis of major attacks on protected information was realised. Encryption was carried out in stages. Aperiodic Ateb-function were used to create keys.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125637860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The problem-based learning in electrical engineering","authors":"V. Korud, S. Rendzinyak, O. Hamola","doi":"10.1109/STC-CSIT.2016.7589883","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589883","url":null,"abstract":"In the article the introduction of elements of problem-based learning during carrying out laboratory works at electrical engineering in the computerized laboratory. This approach increases the effectiveness of learning, promotes a deeper theoretical material study.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information support for brownfield revitalization projects","authors":"R. Danel, Z. Neustupa","doi":"10.1109/STC-CSIT.2016.7589882","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589882","url":null,"abstract":"This paper describes the solution of information support for brownfield revitalization projects. We created a methodology for the creation of digital landscape models for the purpose of visualization, which enables simulation of the appearance of the landscape after implementation of the selected reclamation process. We cite an overview of data sources publicly accessible in the Czech Republic for use in GIS systems in solving the issue of brownfields. A further section of this paper presents the results of the COBRAMAN international project, under which we, as the co-directors, proposed and implemented into operation a database of brownfield revitalization projects under solution in Central Europe. This database provides “best practices” from a whole spectrum of areas related to revitalization project of all types of brownfields.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133465788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The formalization of complex operations on the temporal characteristics of objects under uncertainty","authors":"V. Krisilov, Katherine Gorodnichaya","doi":"10.1109/STC-CSIT.2016.7589893","DOIUrl":"https://doi.org/10.1109/STC-CSIT.2016.7589893","url":null,"abstract":"In this work, formalized sorting, search and grouping of objects, which are specified using temporal characteristics. These operations are based on comparison operations of temporal characteristics of objects. Comparison operations differ depending on: type of the object: an event or process, type of a description of temporal characteristics of the object: point value, interval with determined boundaries, interval with fuzzy boundaries. Considered the results of sorting, searching and grouping of objects, which are described by means of temporal characteristics.","PeriodicalId":433594,"journal":{"name":"2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114359373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}