Dissertations / Theses on the topic 'Експертна інформація'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 22 dissertations / theses for your research on the topic 'Експертна інформація.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Гончаренко, Тетяна Євгенівна. "Методологія колективного експертного оцінювання і ранжування педагогічних умов професійної підготовки інженерів-програмістів." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/46480.
Full textГладенко, Іван Васильович, and Петро Григорович Перерва. "Інтерпретація результатів моніторингу інноваційної діяльності." Thesis, Сумський державний університет, 2010. http://repository.kpi.kharkov.ua/handle/KhPI-Press/26851.
Full textДрейс, Юрій Олександрович, Юрий Александрович Дрейс, Юлія Володимирівна Івановська, and Юлия Владимировна Ивановская. "Практична реалізація експертної моделі оцінювання важливості інформації з обмеженим доступом." Thesis, Національний авіаційний університет, Київ, 2012, 2012. http://er.nau.edu.ua/handle/NAU/33853.
Full textВ, Грінченко Д. "СТРУКТУРА ЕКСПЕРТНОЇ СИСТЕМИ ДЛЯ ВИЗНАЧЕННЯ ШЛЯХІВ ВИТОКУ ІНФОРМАЦІЇ." Thesis, Київ, Національний авіаційний університет, 2015. http://er.nau.edu.ua/handle/NAU/19743.
Full textКорченко, Олександр Григорович, Александр Григорьевич Корченко, Юрій Олександрович Дрейс, and Юрий Александрович Дрейс. "Нечітке моделювання вхідної інформації АРМ державного експерта з питань таємниць." Thesis, Навчально-видавничий відділ Національної академії СБ україни, Київ, 2009. http://er.nau.edu.ua/handle/NAU/30699.
Full textКорченко, Олександр Григорович, Александр Григорьевич Корченко, Юрій Олександрович Дрейс, and Юрий Александрович Дрейс. "Модель оцінювання шкоди національній безпеці в інформаційній сфері." Thesis, Національний університет "Львівська політехніка", м. Львів, 2013, 2013. http://er.nau.edu.ua/handle/NAU/33609.
Full textВ, Павлюк Т. "ЗАСТОСУВАННЯ ТЕХНОЛОГІЇ ЕКСПЕРТНИХ СИСТЕМ ДЛЯ ВИЗНАЧЕННЯ ШЛЯХІВ ВИТОКУ ІНФОРМАЦІЇ." Thesis, Київ, Національний авіаційний університет, 2015. http://er.nau.edu.ua/handle/NAU/19744.
Full textГнатієнко, Григорій Миколайович. "Алгоритми обробки експертної інформації в задачах ранжування та іх застосування." Diss. of Candidate of Technical Sciences, МО України, КУ ім. Т.Шевченка, 1994.
Find full textЗінченко, Наталія Олегівна, Наталия Олеговна Зинченко, Nataliia Olehivna Zinchenko, Роман Ігорович Сілка, Роман Игоревич Силка, and Roman Ihorovych Silka. "Подолання дефіциту інформації для навчання експертної системи підтримки прийняття проектних рішень." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/10412.
Full textШабан, Максим Радуйович, and Maksym Shaban. "Моделі підтримки прийняття рішень для проведення експертиз систем технічного захисту інформації." Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/48823.
Full textThe dissertation is devoted to the decision of an actual scientific and applied problem of creation of models of decision support for examinations of systems of technical protection of the information which will provide reduction of time and errors at drawing up of documents of the state examination of complex information protection system. The paper analyzes the existing decision support systems. The models have been analized which has allowed automating the process of identification of the functional protection profile. The developed model of parameters for identification of functional protection profiles in computer systems which due to theoretical and multiple representation of certain sets of criteria of information security, their elements and corresponding levels will formally form the necessary set of values for realization of process of functional protection profiles identification in computer systems. The actual scientific and applied problem of automation of the process of examinations of complex information protection systems and detection of discrepancies in the formation of functional protection profiles is solved in the work. In the dissertation work the analysis of existing models, methods and means of decision support is carried out. It was found that the existing models, methods and tools do not meet the requirements for decision support systems that could be used in conducting state examinations of integrated information security systems. A decomposition model of representation of semantic constants and variables was developed which allowed to form basic templates of source documents. model of parameters which allowed to formally form the necessary set of values for the implementation of the process of identification of the functional profile of protection in computer systems. The method of identification of the functional protection profile, which allowed to implement the process of generating the functional protection profile and verification of its requirements for protection functions (security services) and guarantees. A structural model of the decision support system is proposed which allowed to automate the process of compiling source documents according to their templates. Algorithmic and software have been developed which allowed to automate the process of examination of the complex system of information protection and detection of inconsistencies in the formation of the functional profile of protection. The conducted experimental researches of software application, introduction and successful practical use of the specified developments have confirmed reliability of theoretical hypotheses and conclusions of dissertation work
Г, Масловський Б. "Технології інформаційного пошуку в навчальному процесі." Thesis, Київ, Національний авіаційний університет, 2008. http://er.nau.edu.ua/handle/NAU/14948.
Full textКорченко, Олександр Григорович, Александр Григорьевич Корченко, Alexandr Korchenko, Юрій Олександрович Дрейс, Юрий Александрович Дрейс, and Yurii Dreis. "Модель складної орієнтованої інформаційної мережі службової інформації у сфері оборони – Переліку службової інформації Збройних Сил України." Thesis, Національний університет “Львівська політехніка”, 2012. http://er.nau.edu.ua/handle/NAU/30635.
Full textДрейс, Юрій Олександрович, and Юрий Александрович Дрейс. "Передумови створення системи експертного оцінювання шкоди національній безпеці України у разі витоку інформації з обмеженим доступом." Thesis, Кіровоградський національний технічний університет, Кіровоград, 2016, 2016. http://er.nau.edu.ua/handle/NAU/32538.
Full textРозроблено науково-методологічну основу, яка дозволяє створити систему оцінювання шкоди національній безпеці України у разі розголошення таких видів ІзОД як: державна таємниця, службова інформація та конфіденційна інформація (зокрема, персональних даних).
Дрейс, Юрій Олександрович, and Юрий Александрович Дрейс. "Основа розробки моделі експертного оцінювання інформації з обмеженим доступом, що є власністю держави." Thesis, Житомирський військовий інститут імені С. П. Корольова Національного авіаційного університету, 2012. http://er.nau.edu.ua/handle/NAU/30991.
Full textГуцан, Олександр Миколайович. "Наукометрична систематизація існуючих методів обробки експертних думок." Thesis, ФОП Томенко Ю. І, 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/44179.
Full textПогорєлова, Тетяна Олексіївна. "Проблеми при оцінюванні інноваційного потенціалу підприємства." Thesis, Херсонський державний аграрний університет, 2020. http://repository.kpi.kharkov.ua/handle/KhPI-Press/47322.
Full textГавриленко, Світлана Юріївна. "Методи та засоби ідентифікації стану комп'ютерних систем критичного застосування для захисту інформації." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42612.
Full textThe thesis for the academic degree of Doctor of technical sciences on the speciality 05.13.05 – computer systems and components (123 – Computer engineering). – National technical university "Kharkiv polytechnic institute", The Ministry of science and education of Ukraine, Kharkiv, 2019. The thesis is dedicated to the enhancement of efficiency and reliability of the identification of the computer systems of critical application state by means of development and improvement of methods and means of recognition of anomalies and abuses. The analysis of the scientific and technical problem of the indication of CSCA for data protection was carried out. The examination of main dangers and factors affecting the state of the information protection in the computer systems of critical application was done. The requirements of efficiency and reliability of the identification of the CSCA state, data safety under external influence, functional criteria of information protection were studied. It was shown that the system of indication of the CSCA state was one of the multilevel tools for information protection and consist of two classes of methods: the anomaly identification methods and the abuse identification methods. It was found that the main disadvantages of the anomaly and abuse identification methods were a neglect of fuzzy set factors and low adaptation to dynamic changes of the initial dataset structures and external effects that leads to the decrease of efficiency and reliability of the CSCA identification. The conclusion of perspective of the direction of development and investigation of complex methods of the identification of the CSCA state was drawn. A scheme of the identification of the CSCA state that includes the subsystem of the anomaly and abuse identification was proposed. The basis of performance of the abuse identification subsystem is complex use of intelligent classification methods that includes the neural network ART-1, the improved models of fuzzy output and the probabilistic automaton. Complex use of the statistical methods of classification and the decision support systems based on discriminant, cluster, Bayes classifiers adapted for the evaluation of performance parameters of the CSCA with fuzzy signs serves as a basis for performance of the anomaly identification subsystem. Enhancement of the discriminant analysis method under the condition of fuzzy input data was performed for the two-alternative classification. It was based on the analogies of theoretic and probabilistic characteristics of fuzzy numbers, particularly, the expected value, the dispersion of correlation coefficients, used for the standard calculation scheme by means of the solution of the linear equation system and the classification of the object state. In the present work the enhancement of the cluster analysis under condition of fuzzy specification of the point coordinates (the results of measurements of controlled parameters) and the centers of cluster groups, defined by membership functions, was done for the multi-alternative diagnostic. The procedure of the comparison of fuzzy distances between the objects of clustering and the group centers, based on the comparison of fuzzy function of distance difference with zero was proposed. The rules for the result treatment of the comparison of fuzzy number with zero were developed. A criterium of self-descriptiveness estimation of the performance parameters of CSCA under fuzzy input data, the value of which belongs to the final range, does not depend on the parameter membership function type and on the rules of inclusion of the function into evaluation expression, was found. The self-descriptiveness rate of the controlled fuzzy parameters, described by gaussian and exponential function of membership, was obtained. The criterium of self-descriptiveness of fuzzy parameters based on the surface evaluation of the area of intersection of the state membership functions was developed. An expert system with non-productional mechanism of logic inference based on modified Bayes classifier was created for identification of the CSCA state with infinite numbers of controlled parameters. An express method of identification of the CSCA state relied on complex use of statistic methods of classification including BDS test, the evaluation of Hurst exponent and Shewhart charts, CUSUM and EWMA, as components of the subsystem on anomaly recognition, was worked out. A new parameter of normal performance of CSCA based on the jitter value of the system was synthesized and a template of normal behavior of CSC A arising from BDS test and Hurst exponent values was proposed. The templates of the normal system state of CSCA relying on Shewhart charts, CUSUM and EWMA were built. A classification method of CSCA state based on the neuron network ART-1 that included complex use of ART-1 blocks was developed. A program model developed to imitate intrusions into CSCA allowed to analyze the prototypes of malware, to distinguish the most informative descriptors and to use them as masks to obtain binary signatures of malware. The obtained binary vectors were used as examples in system training and in similarity measure search. The use of the proposed method improved the efficiency of identification of the CSCA state. A method of identification of the CSCA state relying on the system of fuzzy output, which differs from the well-known by the use of minimization procedure of number of rules linking input and output fuzzy variables, was suggested. It allowed to improve efficiency of the identification of CSCA state. An identification method of computer system of critical application state was proposed on the basis of the probabilistic automaton. The method consists of the model of generation of an automaton structure and the procedure of its modification. The main feature of the method is an adaptation of the generation procedure of the automaton structure to the situation of recognition of identical scripts by means of the automaton structure rebuilding upon coincidence detection and recalculation of the probability of transfer between states. The improved method allows to accelerate the process of revelation of anomaly behavior of the CSCA as well as to detect the abuse of computer system, signature scenarios of which only partially match the examples used for the generation of the automaton structure. On the basis of ROC-analysis a comparative study and an estimation of reliability and efficiency of developed methods and means of anomaly and abuse identification in CSCA was performed. Practical recommendations on the use of the methods and means of the anomaly and abuse identification of the CSCA were proposed and corresponding recommendations on operation of sensitivity level and classifier specification to regulate the level of false-positive and false-negative identification were suggested.
Гавриленко, Світлана Юріївна. "Методи та засоби ідентифікації стану комп'ютерних систем критичного застосування для захисту інформації." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42609.
Full textThe thesis for the academic degree of Doctor of technical sciences on the speciality 05.13.05 – computer systems and components. – National technical university "Kharkiv polytechnic institute", Kharkiv, 2019. The thesis is dedicated to the enhancement of efficiency and reliability of the identification of the computer systems of critical application state by means of development and improvement of methods and means of recognition of anomalies and abuses. The analysis of the scientific and technical problem of the indication of CSCA for data protection was carried out. It was shown that the system of indication of the CSCA state consist of two classes of methods: the anomaly identification methods and the abuse identification methods. It was found that the main disadvantages of the anomaly and abuse identification methods were a neglect of fuzzy set factors and low adaptation to dynamic changes of the initial dataset structures and external effects that leads to the decrease of efficiency and reliability of the CSCA identification. The conclusion of perspective of the direction of development and investigation of complex methods of the identification of the CSCA state was drawn. A scheme of the identification of the CSCA state that includes the subsystem of the anomaly and abuse identification was proposed. The basis of performance of the abuse identification subsystem is complex use of intelligent classification methods that includes the neural network ART-1, the improved models of fuzzy output and the probabilistic automaton. Complex use of the statistical methods of classification and the decision support systems based on discriminant, cluster and Bayes classifiers. Enhancement of the discriminant analysis method under the condition of fuzzy input data was performed for the two-alternative classification. It was based on the analogies of theoretic and probabilistic characteristics of fuzzy numbers, particularly, the expected value, the dispersion of correlation coefficients, used for the standard calculation scheme by means of the solution of the linear equation system and the classification of the object state. In the present work the enhancement of the cluster analysis under condition of fuzzy specification of the point coordinates (the results of measurements of controlled parameters) and the centers of cluster groups, defined by membership functions, was done for the multi-alternative diagnostic. The procedure of the comparison of fuzzy distances between the objects of clustering and the group centers, based on the comparison of fuzzy function of distance difference with zero was proposed. The rules for the result treatment of the comparison of fuzzy number with zero were developed. A criterium of self-descriptiveness estimation of the performance parameters of CSCA under fuzzy input data, the value of which belongs to the final range, does not depend on the parameter membership function type and on the rules of inclusion of the function into evaluation expression, was found. The self-descriptiveness rate of the controlled fuzzy parameters, described by gaussian, exponential functions of membership and the criterium based on the surface evaluation of the area of intersection of the state membership functions was developed. An expert system with non-productional mechanism of logic inference based on modified Bayes classifier was created for identification of the CSCA state with infinite numbers of controlled parameters. An express method of identification of the CSCA state relied on complex use of statistic methods of classification including BDS test, the evaluation of Hurst exponent and Shewhart charts, CUSUM and EWMA, as components of the subsystem on anomaly recognition, was worked out. A new parameter of normal performance of CSCA based on the jitter value of the system was synthesized and a template of normal behavior of CSCA arising from BDS test and Hurst exponent values was proposed. The templates of the normal system state of CSCA relying on Shewhart charts, CUSUM and EWMA were built. A classification method of CSCA state based on the neuron network ART-1 that included complex use of ART-1 blocks was developed. The use of the proposed method improved the efficiency of identification of the CSCA state. A method of identification of the CSCA state relying on the system of fuzzy output, which differs from the well-known by the use of minimization procedure of number of rules linking input and output fuzzy variables, was suggested. It allowed to improve efficiency of the identification of CSCA state. An identification method of computer system of critical application state was proposed on the basis of the probabilistic automaton. The main feature of the method is an adaptation of the generation procedure of the automaton structure to the situation of recognition of identical scripts by means of the automaton structure rebuilding upon coincidence detection and recalculation of the probability of transfer between states. The improved method allows to accelerate the process of revelation of anomaly behavior of the CSCA as well as to detect the abuse of computer system, signature scenarios of which only partially match the examples used for the generation of the automaton structure. On the basis of ROC-analysis a comparative study and an estimation of reliability and efficiency of developed methods and means of anomaly and abuse identification in CSCA was performed. Practical recommendations on the use of the methods and means of the anomaly and abuse identification of the CSCA were proposed.
Головко, Віталій Олексійович. "Моделі, методи та інформаційні технології розробки нечіткої експертної системи діагностики фінансового стану підприємства." Thesis, НТУ "ХПІ", 2016. http://repository.kpi.kharkov.ua/handle/KhPI-Press/21976.
Full textThesis for scientific degree of candidate of technical sciences, specialty 05.13.06 – information technologies. – National Technical University "Kharkiv Polytechnic Institute", Kharkov, 2016. The most important scientific and practical problem of identification of the financial condition of the company in terms of fuzzy data values controlled by financial indicators is considered in the thesis. Based on the analysis of traditional methods of solving this problem are identified the lack of them: insufficient consideration of the uncertainty of input data. In this regard, improved methods of multivariate discriminant analysis, cluster analysis and regression analysis for the case when the initial data – fuzzy numbers. For small sample output data suggested the procedure for building diagnostic information processing expert system that combines regression approach and Bayesian inference mechanism. The calculation of the regression coefficients method used pairwise comparisons. The method of predicting the time series correlated to the small sample of the original data, as well as a method of forecasting the series, given its wavelet model. On the basis of the developed methods based information technology diagnosis financial condition of the company. The proposed technology is integrated into the software package for the credit assessment of the bank borrowers showed more early detection of deterioration in the financial condition of borrowers compared to the old technology. The results obtained allowed to take timely management decisions and prevent increase of bad debts in the loan portfolio of the bank.
Дрейс, Юрій Олександрович, and Юрий Александрович Дрейс. "Врахування інтересів держави в методиці оцінювання шкоди у сфері охорони державної таємниці." Thesis, Національний авіаційний університет, Київ, 2012, 2012. http://er.nau.edu.ua/handle/NAU/33868.
Full textІ, Вавіленкова А. "СИСТЕМА АВТОМАТИЗОВАНОГО ФОРМУВАННЯ ЛОГІКО-ЛІНГВІСТИЧНИХ МОДЕЛЕЙ ТЕКСТОВОЇ ІНФОРМАЦІЇ." Thesis, 2009. http://er.nau.edu.ua/handle/NAU/20793.
Full textВасильєва, Ірина Володимирівна. "Експертний підхід до розв’язання задач прийняття рішень." Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/5114.
Full textUA : Робота викладена на 86 сторінках друкованого тексту, містить 5 рисунків, 4 таблиці, 28 джерел, 1 додаток. Об’єкт дослідження: методи оцінювання та обробки експертної інформації. Мета роботи: проаналізувати експертний підхід до розв’язання задач прийняття рішень. Автоматизувати процес прийняття рішень на основі застосування експертних методів. Метод дослідження – аналітичний. У кваліфікаційній роботі розглядаються задачі прийняття рішень та їх класифікація, проблеми експертного оцінювання та методи обробки експертної інформації. Наведено історію розвитку теорії прийняття рішень та надано загальну характеристику проблеми прийняття рішень на основі застосування експертних методів. Описані метод ранжування, голосування та метод аналізу ієрархії. Розроблено програмний продукт, який дозволяє автоматизувати процес прийняття рішень на основі застосування методів парних порівнянь та безпосереднього ранжування.
EN : The work is presented on 86 pages of printed text, 5 figures, 4 tables, 28 sources, 1 supplements. The object of research in methods of evaluation and processing of expert information. Purpose: to consider and analyze the expert approach to decision-making. The research method is analytical. The qualification work considers the tasks of decision-making and their classification, problems of expert evaluation and methods of processing expert information. The history of development and the general characteristic of a problem are studied. The method of voting and the method of hierarchy analysis are described.