Зміст
Добірка наукової літератури з теми "+004.414.3"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "+004.414.3".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Дисертації з теми "+004.414.3"
Бутенко, Юлія Іванівна. "Онтологічні моделі та методи формування нормативного профілю при сертифікації програмного забезпечення". Thesis, Національний аерокосмічний університет ім. М. Є. Жуковського "Харківський авіаційний інститут", 2015. http://repository.kpi.kharkov.ua/handle/KhPI-Press/17407.
Повний текст джерелаThe thesis on competition of an academic degree of Candidate of Technical Sciences in the specialty 05.13.06 – information technologies. – National Polytechnical University "Kharkiv Technical Institute", Kharkiv, 2015. Dissertation work is devoted to efficiency improvement of software development by means of automation of normative profile forming of requirements to software. It is developed formal model of standard, which, in contrast to the known models, is based on ontology representation of linguistic objects that provides the sufficiency of the normative profile. It is improved the model of semantic integrity core for language of standards by giving it in the form ontology that ensure the fulfillment of semantic analysis. It is improved the method of development of linguistic models by taking into accout the compositional structure of standards that provides the structured process of information retrieval in texts of standards. It is further developed of a method of forming an ontological system by its implementation as an intellectual core in the dialogue decision-making support system for auditor of certification centre. The practical significance of the obtained results is in the creation of scientific-methodical bases in the form of specific engineering techniques, methods and software tools for decision support in the certification of critical systems applications.
Бутенко, Юлія Іванівна. "Онтологічні моделі та методи формування нормативного профілю при сертифікації програмного забезпечення". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2015. http://repository.kpi.kharkov.ua/handle/KhPI-Press/17404.
Повний текст джерелаThe thesis on competition of an academic degree of Candidate of Technical Sciences in the specialty 05.13.06 – information technologies. – National Polytechnical University "Kharkiv Technical Institute", Kharkiv, 2015. Dissertation work is devoted to efficiency improvement of software development by means of automation of normative profile forming of requirements to software. It is developed formal model of standard, which, in contrast to the known models, is based on ontology representation of linguistic objects that provides the sufficiency of the normative profile. It is improved the model of semantic integrity core for language of standards by giving it in the form ontology that ensure the fulfillment of semantic analysis. It is improved the method of development of linguistic models by taking into accout the compositional structure of standards that provides the structured process of information retrieval in texts of standards. It is further developed of a method of forming an ontological system by its implementation as an intellectual core in the dialogue decision-making support system for auditor of certification centre. The practical significance of the obtained results is in the creation of scientific-methodical bases in the form of specific engineering techniques, methods and software tools for decision support in the certification of critical systems applications.
Миколюк, Юрій Миронович. "Розробка інформаційно-електронної системи для контролю відвідуваності та успішності студентів «iJournal» на основі технології JavaFX". Master's thesis, ТНТУ ім. І Пулюя, 2019. http://elartu.tntu.edu.ua/handle/lib/30667.
Повний текст джерелаТопоровський, Віталій Васильович, та Vitalii Toporovskyi. "Розробка програмної системи для діагностики автомобілів на основі протоколу OBD-II". Master's thesis, ТНТУ ім. І Пулюя, 2019. http://elartu.tntu.edu.ua/handle/lib/30672.
Повний текст джерелаСковпень, Д. В. "Інформаційний пошук в мережі інтернет". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/54414.
Повний текст джерелаПерехід до інформаційного суспільства XXI століття породив безпрецедентне зростання обсягів і концентрації інформації в глобальних комп'ютерних мережах. Це різко загострило проблему створення інформаційно-пошукових систем (ІПС) і їх ефективного використання. Історія автоматизованих інформаційно-пошукових систем обчислюється півстоліття. Типова ІПС перших років - це людиномашинна система, де аналіз і опис змісту документів (індексування) виконується вручну, а пошуки проводяться машиною.
Кучук, Ніна Георгіївна. "Моделі та методи синтезу інформаційних структур для комп’ютерних систем на інтегрованих програмних платформах". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2020. http://repository.kpi.kharkov.ua/handle/KhPI-Press/49174.
Повний текст джерелаDissertation for the degree of Doctor of Technical Sciences in the specialty of 05.13.05 – ComputerSystems and Components (123 – Computerengineering). – National Technical University "Kharkiv Polytechnic Institute", Ministry of Education and Science of Ukraine, Kharkiv, 2020. The thesis is devoted to solving actual scientific and technical problem of increasing the efficiency of the information transfer process in computer systems on integrated software platforms. It is based on the development of a mathematical apparatus (mathematical models and methods) for the synthesis of information structures. The analysis of the problem state was carried out. It was revealed that, simultaneously with the increase in the volume of transmitted information in the computer system and the increased requirements for the speed of information transmission, integrated software platforms are increasingly used. As a result, the structure and nature of information flows change qualitatively and quantitatively. This significantly affects the information structures of computer systems and leads to a decrease in efficiency indicators. An analysis of the existing requirements for modern software platforms of computer systems has been carried out. Advantages and disadvantages of centralized, distributed and combined software platforms are highlighted. Based on the analysis, general requirements for the necessary composition of platform software products are formulated. The requirements for the hardware of the core network of the computer system supporting them are also formulated. The analysis showed the feasibility of using integrated software platforms for departmental computer systems. The necessity of increasing the efficiency of transaction processing in the basic networks of computer systems has been proven. Those that use integrated software platforms can be done by using the specific properties of such platforms. This is due to the synthesis of the information structure of the computer system. A complex of interrelated models of the information structure of the computer system and the technical structure of the basic network has been developed. It takes into account the peculiarities of the integrated software platform. The complex is based on a stratified representation of the main constituents of the models. This allows you to take into account the informational relationships between the components of the computer system. It also allows increasing the degree of model adequacy. A set of methods foroperational redistribution of information flows in the basic network of a computer system on an integrated software platform has been developed. This complex takes into account the dynamics of the development of a computer system and the characteristic features of the underlying network. It is based on the operational reconfiguration of the virtual communication channel system. This helps to reduce the average packet delay. A set of methods for synchronizing the information structure of a computer system with the computing resources of the nodes of the basic network has been developed. The complex, which has been developed, takes into account information links between the tasks of a computer system and the possibility of using composite applications. This complex is based on an adaptive approach to finding a rational distribution of tasks between network nodes. The complex allows you to quickly synchronize. Synchronization is focused on reducing the cost of computing resources and increasing the efficiency of information transfer. The method of distribution of information flows along routes in the basic network of a computer system on an integrated software platform has been improved. The method differs from the known ones by using iterative load balancing of hosts. This is what makes it possible to reduce the cost of computing resources. The method of forming an information structure of increased reliability in a computer system on an integrated software platform has been improved. This method differs from the known ones by the simultaneous distribution of information flows along all the main and alternative routes of the core network. This allows, in the event of a failure of any network node, to continue processing transactions of the computer system. The computer system will operate without a significant decrease in service quality indicators and without changing the information structure. The method of optimizing the information structure of a computer system on an integrated software platform has been further developed. The method is based on the use of the mathematical apparatus of genetic algorithms. This device is used at the stage of load distribution of information nodes. This makes it possible to reduce the time spent on synthesizing the information structure and to form a balanced load on the nodes of the core network. The method of selecting an optimal plan for executing transactions of a computer system on an integrated software platform was further developed. A dynamic penalty function was introduced for exceeding time indicators. It is focused on the specifics of the integrated software platform and time scaling. This allows you to reduce the time spent on operational changes to the transaction execution plan. The complex of methods for processing requests to the data storage of a computer system on an integrated software platform has been further developed. A single disk pool was created. The peculiarities of access to the cloud components of the data warehouse were taken into account. This allows distributed heterogeneous components to be included in repositories. It also reduces the execution time of applications that access data warehouse components. The engineering methods and algorithms which has been developed on the basis of the offered models and methods allow: - simulate the information structure of the computer system on an integrated software platform and its basic computer network; - optimize the information structure of the computer system on an integrated software platform and the distribution of information flows along routes in the core network; - increase the operational efficiencyof computer system tasks on an integrated software platform by up to 10%; - reduce the costs of the computing resource of the basic network of a computer system on an integrated software platform up to 5%; - reduce the exploitational cost of a computer system on an integrated software platform by up to 10%; - expand the useful capacity of the data storage by including heterogeneous components and cloud components. Comparative assessment of developed and existing models and methods of synthesis information structures of computer systems on an integrated software platforms was carriedout. Based on the results that were obtained, the effectiveness of the proposed methods was proved. In particular, an assessment of the effectiveness of the subsystem for providing distance learning of the computer system in a technical university was carried out. The results of the integrated application of the proposed methods in the formation to the project of a computer system managing for the production structures of the airport are also presented. Where by increasing the transaction efficiency of information, the customer's requirements were achieved. They were executed relative to the limit of the probability of time bounds.This was done for operational transactions of the computer system with an increase in the load of the basic network.
Кучук, Ніна Георгіївна. "Моделі та методи синтезу інформаційних структур для комп’ютерних систем на інтегрованих програмних платформах". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2020. http://repository.kpi.kharkov.ua/handle/KhPI-Press/49170.
Повний текст джерелаDissertation for the degree of Doctor of Technical Sciences in the specialty of 05.13.05 – Computer Systems and Components. – National Technical University "Kharkiv Polytechnic Institute", Ministry of Education and Science of Ukraine, Kharkiv, 2020. The thesis is devoted to solving actual scientific and technical problem of increasing the efficiency of the information transfer process in computer systems on integrated software platforms. It is based on the development of a mathematical apparatus (mathematical models and methods) for the synthesis of information structures. The analysis of the problem state was carried out. It was revealed that, simultaneously with the increase in the volume of transmitted information in the computer system and the increased requirements for the speed of information transmission, integrated software platforms are increasingly used. As a result, the structure and nature of information flows change qualitatively and quantitatively. This significantly affects the information structur es of computer systems and leads to a decrease in efficiency indicators. A complex of interrelated models of the information structure of the computer system and the technical structure of the basic network has been developed. It takes into account the peculiarities of the integrated software platform. The complex is based on a stratified representation of the main constituents of the models. This allows you to take into account the informational relationships between the components of the computer system. It also allows increasing the degree of model adequacy. A set of methods for operational redistribution of information flows in the basic network of a computer system on an integrated software platform has been developed. This complex takes into account the dynamics of the development of a computer system and the characteristic features of the underlying network. It is based on the operational reconfiguration of the virtual communication channel system. This helps to reduce the average packet delay. A set of methods for synchronizing the information structure of a computer system with the computing resources of the nodes of the basic network has been developed. The complex, which has been developed, takes into account information links between the tasks of a computer system and the possibility of using composite applications. This complex is based on an adaptive approach to finding a rational distribution of tasks between network nodes. The complex allows you to quickly synchronize. Synchronization is focused on reducing the cost of computing resources and increasing the efficiency of information transfer. The method of distribution of information flows along routes in the basic network of a computer system on an integrated software platform has been improved. The method differs from the known ones by using iterative load balancing of hosts. This is what makes it possible to reduce the cost of computing resources. The method of forming an information structure of increased reliability in a computer system on an integrated software platform has been improved. This method differs from the known ones by the simultaneous distribution of information flows along all the main and alternative routes of the core network. This allows, in the event of a failure of any network node, to continue processing transactions of the computer system. The computer system will operate without a significant decrease in service quality indicators and without changing the information structure. The method of optimizing the information structure of a computer system on an integrated software platform has been further developed. The method is based on the use of the mathematical apparatus of genetic algorithms. This device is used at the stage of load distribution of information nodes. This makes it possible to reduce the time spent on synthesizing the information structure and to form a balanced load on the nodes of the core network.The method of selecting an optimal plan for executing transactions of a computer system on an integrated software platform was further developed. A dynamic penalty function was introduced for exceeding time indicators. It is focused on the specifics of the integrated software platform and time scaling. This allows you to reduce the time spent on operational chang es to the transaction execution plan. The complex of methods for processing requests to the data storage of a computer system on an integrated software platform has been further developed. A single disk pool was created. The peculiarities of access to the cloud components of the data warehouse were taken into account. This allows distributed heterogeneous components to be included in repositories. It also reduces the execution time of applications that access data warehouse components.
Гавриленко, Світлана Юріївна. "Методи та засоби ідентифікації стану комп'ютерних систем критичного застосування для захисту інформації". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42612.
Повний текст джерелаThe thesis for the academic degree of Doctor of technical sciences on the speciality 05.13.05 – computer systems and components (123 – Computer engineering). – National technical university "Kharkiv polytechnic institute", The Ministry of science and education of Ukraine, Kharkiv, 2019. The thesis is dedicated to the enhancement of efficiency and reliability of the identification of the computer systems of critical application state by means of development and improvement of methods and means of recognition of anomalies and abuses. The analysis of the scientific and technical problem of the indication of CSCA for data protection was carried out. The examination of main dangers and factors affecting the state of the information protection in the computer systems of critical application was done. The requirements of efficiency and reliability of the identification of the CSCA state, data safety under external influence, functional criteria of information protection were studied. It was shown that the system of indication of the CSCA state was one of the multilevel tools for information protection and consist of two classes of methods: the anomaly identification methods and the abuse identification methods. It was found that the main disadvantages of the anomaly and abuse identification methods were a neglect of fuzzy set factors and low adaptation to dynamic changes of the initial dataset structures and external effects that leads to the decrease of efficiency and reliability of the CSCA identification. The conclusion of perspective of the direction of development and investigation of complex methods of the identification of the CSCA state was drawn. A scheme of the identification of the CSCA state that includes the subsystem of the anomaly and abuse identification was proposed. The basis of performance of the abuse identification subsystem is complex use of intelligent classification methods that includes the neural network ART-1, the improved models of fuzzy output and the probabilistic automaton. Complex use of the statistical methods of classification and the decision support systems based on discriminant, cluster, Bayes classifiers adapted for the evaluation of performance parameters of the CSCA with fuzzy signs serves as a basis for performance of the anomaly identification subsystem. Enhancement of the discriminant analysis method under the condition of fuzzy input data was performed for the two-alternative classification. It was based on the analogies of theoretic and probabilistic characteristics of fuzzy numbers, particularly, the expected value, the dispersion of correlation coefficients, used for the standard calculation scheme by means of the solution of the linear equation system and the classification of the object state. In the present work the enhancement of the cluster analysis under condition of fuzzy specification of the point coordinates (the results of measurements of controlled parameters) and the centers of cluster groups, defined by membership functions, was done for the multi-alternative diagnostic. The procedure of the comparison of fuzzy distances between the objects of clustering and the group centers, based on the comparison of fuzzy function of distance difference with zero was proposed. The rules for the result treatment of the comparison of fuzzy number with zero were developed. A criterium of self-descriptiveness estimation of the performance parameters of CSCA under fuzzy input data, the value of which belongs to the final range, does not depend on the parameter membership function type and on the rules of inclusion of the function into evaluation expression, was found. The self-descriptiveness rate of the controlled fuzzy parameters, described by gaussian and exponential function of membership, was obtained. The criterium of self-descriptiveness of fuzzy parameters based on the surface evaluation of the area of intersection of the state membership functions was developed. An expert system with non-productional mechanism of logic inference based on modified Bayes classifier was created for identification of the CSCA state with infinite numbers of controlled parameters. An express method of identification of the CSCA state relied on complex use of statistic methods of classification including BDS test, the evaluation of Hurst exponent and Shewhart charts, CUSUM and EWMA, as components of the subsystem on anomaly recognition, was worked out. A new parameter of normal performance of CSCA based on the jitter value of the system was synthesized and a template of normal behavior of CSC A arising from BDS test and Hurst exponent values was proposed. The templates of the normal system state of CSCA relying on Shewhart charts, CUSUM and EWMA were built. A classification method of CSCA state based on the neuron network ART-1 that included complex use of ART-1 blocks was developed. A program model developed to imitate intrusions into CSCA allowed to analyze the prototypes of malware, to distinguish the most informative descriptors and to use them as masks to obtain binary signatures of malware. The obtained binary vectors were used as examples in system training and in similarity measure search. The use of the proposed method improved the efficiency of identification of the CSCA state. A method of identification of the CSCA state relying on the system of fuzzy output, which differs from the well-known by the use of minimization procedure of number of rules linking input and output fuzzy variables, was suggested. It allowed to improve efficiency of the identification of CSCA state. An identification method of computer system of critical application state was proposed on the basis of the probabilistic automaton. The method consists of the model of generation of an automaton structure and the procedure of its modification. The main feature of the method is an adaptation of the generation procedure of the automaton structure to the situation of recognition of identical scripts by means of the automaton structure rebuilding upon coincidence detection and recalculation of the probability of transfer between states. The improved method allows to accelerate the process of revelation of anomaly behavior of the CSCA as well as to detect the abuse of computer system, signature scenarios of which only partially match the examples used for the generation of the automaton structure. On the basis of ROC-analysis a comparative study and an estimation of reliability and efficiency of developed methods and means of anomaly and abuse identification in CSCA was performed. Practical recommendations on the use of the methods and means of the anomaly and abuse identification of the CSCA were proposed and corresponding recommendations on operation of sensitivity level and classifier specification to regulate the level of false-positive and false-negative identification were suggested.
Гавриленко, Світлана Юріївна. "Методи та засоби ідентифікації стану комп'ютерних систем критичного застосування для захисту інформації". Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42609.
Повний текст джерелаThe thesis for the academic degree of Doctor of technical sciences on the speciality 05.13.05 – computer systems and components. – National technical university "Kharkiv polytechnic institute", Kharkiv, 2019. The thesis is dedicated to the enhancement of efficiency and reliability of the identification of the computer systems of critical application state by means of development and improvement of methods and means of recognition of anomalies and abuses. The analysis of the scientific and technical problem of the indication of CSCA for data protection was carried out. It was shown that the system of indication of the CSCA state consist of two classes of methods: the anomaly identification methods and the abuse identification methods. It was found that the main disadvantages of the anomaly and abuse identification methods were a neglect of fuzzy set factors and low adaptation to dynamic changes of the initial dataset structures and external effects that leads to the decrease of efficiency and reliability of the CSCA identification. The conclusion of perspective of the direction of development and investigation of complex methods of the identification of the CSCA state was drawn. A scheme of the identification of the CSCA state that includes the subsystem of the anomaly and abuse identification was proposed. The basis of performance of the abuse identification subsystem is complex use of intelligent classification methods that includes the neural network ART-1, the improved models of fuzzy output and the probabilistic automaton. Complex use of the statistical methods of classification and the decision support systems based on discriminant, cluster and Bayes classifiers. Enhancement of the discriminant analysis method under the condition of fuzzy input data was performed for the two-alternative classification. It was based on the analogies of theoretic and probabilistic characteristics of fuzzy numbers, particularly, the expected value, the dispersion of correlation coefficients, used for the standard calculation scheme by means of the solution of the linear equation system and the classification of the object state. In the present work the enhancement of the cluster analysis under condition of fuzzy specification of the point coordinates (the results of measurements of controlled parameters) and the centers of cluster groups, defined by membership functions, was done for the multi-alternative diagnostic. The procedure of the comparison of fuzzy distances between the objects of clustering and the group centers, based on the comparison of fuzzy function of distance difference with zero was proposed. The rules for the result treatment of the comparison of fuzzy number with zero were developed. A criterium of self-descriptiveness estimation of the performance parameters of CSCA under fuzzy input data, the value of which belongs to the final range, does not depend on the parameter membership function type and on the rules of inclusion of the function into evaluation expression, was found. The self-descriptiveness rate of the controlled fuzzy parameters, described by gaussian, exponential functions of membership and the criterium based on the surface evaluation of the area of intersection of the state membership functions was developed. An expert system with non-productional mechanism of logic inference based on modified Bayes classifier was created for identification of the CSCA state with infinite numbers of controlled parameters. An express method of identification of the CSCA state relied on complex use of statistic methods of classification including BDS test, the evaluation of Hurst exponent and Shewhart charts, CUSUM and EWMA, as components of the subsystem on anomaly recognition, was worked out. A new parameter of normal performance of CSCA based on the jitter value of the system was synthesized and a template of normal behavior of CSCA arising from BDS test and Hurst exponent values was proposed. The templates of the normal system state of CSCA relying on Shewhart charts, CUSUM and EWMA were built. A classification method of CSCA state based on the neuron network ART-1 that included complex use of ART-1 blocks was developed. The use of the proposed method improved the efficiency of identification of the CSCA state. A method of identification of the CSCA state relying on the system of fuzzy output, which differs from the well-known by the use of minimization procedure of number of rules linking input and output fuzzy variables, was suggested. It allowed to improve efficiency of the identification of CSCA state. An identification method of computer system of critical application state was proposed on the basis of the probabilistic automaton. The main feature of the method is an adaptation of the generation procedure of the automaton structure to the situation of recognition of identical scripts by means of the automaton structure rebuilding upon coincidence detection and recalculation of the probability of transfer between states. The improved method allows to accelerate the process of revelation of anomaly behavior of the CSCA as well as to detect the abuse of computer system, signature scenarios of which only partially match the examples used for the generation of the automaton structure. On the basis of ROC-analysis a comparative study and an estimation of reliability and efficiency of developed methods and means of anomaly and abuse identification in CSCA was performed. Practical recommendations on the use of the methods and means of the anomaly and abuse identification of the CSCA were proposed.