Information, Computing and Intelligent systems
Постійне посилання на фонд
ISSN: 2708-4930
Рік заснування: 1964
Тематика: Висвітлення результатів досліджень із створення компонентів обчислювальних й інформаційних систем і комплексів, пристроїв автоматики та передавання даних, систем автоматизації програмування, контролю й діагностики, штучного інтелекту тощо.
Попередня назва: Журнал «Information, Computing and Intelligent systems» є правонаступником збірника “Вісник національного технічного університету України «Київський політехнічний інститут». Інформатика, управління та обчислювальна техніка”, який припинив своє існування.
Офіційний сайт: http://itvisnyk.kpi.ua/
Тематика: Висвітлення результатів досліджень із створення компонентів обчислювальних й інформаційних систем і комплексів, пристроїв автоматики та передавання даних, систем автоматизації програмування, контролю й діагностики, штучного інтелекту тощо.
Попередня назва: Журнал «Information, Computing and Intelligent systems» є правонаступником збірника “Вісник національного технічного університету України «Київський політехнічний інститут». Інформатика, управління та обчислювальна техніка”, який припинив своє існування.
Офіційний сайт: http://itvisnyk.kpi.ua/
Переглянути
Перегляд Information, Computing and Intelligent systems за Назва
Зараз показуємо 1 - 20 з 25
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Architectural review and conceptual development of faculty information system “KPI-Connect”(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2021) Klymenko, Iryna Anatoliivna; Butskyi, Yurii Petrovych; Hryshchenko, Kostiantyn Mykolayovych; Sivachenko, Maryna Hennadiivna; Kryvets, Vadim Volodymyrovych; Kryvoshei, Denys Anatoliiovych; Thin, Nguen DuсThis paper is dedicated to development model of information system to automate educational process based on the Faculty of Informatics and Computer Science at NTUU “Igor Sikorsky Kyiv Polytechnic Institute”. Existing educational systems of different higher education institutions had been studied; main realized functions of similar platforms were defined. As a result of research model, that enables insertion of students, teachers and other university personnel data, storing personal data and information about users’ scientific works, and also is able to be integrated into existing university information space, has been obtained.Документ Відкритий доступ Design of data buffers in field programmablr gate arrays(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Sergiyenko, Anatoliy; Serhiienko, Pavlo; Mozghovyi, Ivan; Molchanova, AnastasiiaThe design of the data buffers for the field programable gate array (FPGA) projects is considered. A new method of buffer design is proposed, which is based on the representation of the synchronous dataflow graph in the three-dimensional space, optimization of them, and description in VHDL. The method gives the optimized buffers which are based either on RAM or on the register pipeline. The derived pipeline buffer can be mapped into the shift register primitive of FPGA. The method is built in the experimental SDFCAD framework intended for the pipelined datapath synthesis.Документ Відкритий доступ Fast secure calculation of the open key cryptography procedures for IoT in clouds(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Mirataei, Alireza; Markovskyi, Oleksandr; Haidukevych, MariaThe article proposes a method for accelerating the implementation of cryptographic data protection mechanisms on embedded IoT terminal microcontrollers, the basic operation of which is the modular exponentiation of high-capacity numbers. The method is based on the use of remote computer systems to speed up calculations and provides protection against the reconstruction of the secret keys of cryptosystems from data transmitted to the cloud. It has been theoretically and experimentally proven that the method allows, on average, 50 times, to speed up the implementation of cryptographic data protection protocols in IoT while providing a level of security sufficient for most practical applications.Документ Відкритий доступ GIF image hardware compressors(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2021) Mozghovyi, Ivan; Sergiyenko, Anatoliy; Yershov, RomanIncreasing requirements for data transfer and storage is one of the crucial questions now. There are several ways of high-speed data transmission, but they meet limited requirements applied to their narrowly focused specific target. The data compression approach gives the solution to the problems of high-speed transfer and low-volume data storage. This paper is devoted to the compression of GIF images, using a modified LZW algorithm with a tree-based dictionary. It has led to a decrease in lookup time and an increase in the speed of data compression, and in turn, allows developing the method of constructing a hardware compression accelerator during the future research.Документ Відкритий доступ Hash search organization in e-dictionaries using block ciphers(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2020) Markovskyi, Olexander; Humeniuk, Inna; Shevchenko, OlhaThe article is devoted to the problem of developing high-speed electronic dictionaries for systems computer translation. The method of organizing a high-speed electronic dictionary based on an ideal hash addressing, where the cryptographic cipher block acts as a hash transformation is proposed. This method was developed taking into account the multilevel memory structure of modern computer systems. It was testified theoretically and experimentally that the proposed organization of electronic dictionaries guarantees at least twice higher search rate compared to known technologies.Документ Відкритий доступ Local feature extraction in images(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2021) Sergiyenko, Anatoliy; Serhiienko, Pavlo; Orlova, MariiaThe methods of the local feature point extraction are analyzed. The analysis shows that the most effective detectors are based on the brightness gradient determination. They usually use the Harris angle detector, which is complex in calculations. The algorithm complexity minimization contradicts both the detector effectiveness and to the high dynamic range of the analyzed image. As a result, the high-speed methods could not recognize the feature points in the heavy luminance conditions. The modification of the high dynamic range (HDR) image compression algorithm based on the Retinex method is proposed. It contains an adaptive filter, which preserves the image edges. The filter is based on a set of feature detectors performing the Harris-Laplace transform which is much simpler than the Harris angle detector. A prototype of the HDR video camera is designed which provides sharp images. Its structure simplifies the design of the artificial intelligence engine, which is implemented in FPGA of medium or large size.Документ Відкритий доступ Loop parallelization automation for graphics processing units(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2020) Doroshenko, Anatoliy; Beketov, Olexii; Yatsenko, OlenaA technology that allows extending GPU capabilities to deal with data volumes that outfit internal GPU’s memory capacity is proposed. It involves loop tiling and data serialization and can be applied to utilize clusters consisting of several GPUs. Applicability criterion is specified and a semi-automatic proof-of-concept software tool is implemented. The experiment to demonstrate the feasibility of the proposed technology is described.Документ Відкритий доступ Making an iot development platform from a simple microcontroller demonstration board(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2020) Muraviov, Ihor; Taraniuk, Viktoriia; Klymenko, IrynaThe IOT is now in trend. Because of its huge popularity and business interest to it, IOT is only now coming massively to universities worldwide as a separate study. This article provides an IOT solution based on embedded technologies that were not specifically designed for IOT. The core of this solution - board is developed for studying peripherals of a particular general-purpose MCU. But we successfully adapted it to use in IOT and for study of IOT systems.Документ Відкритий доступ Methodology of network environment testing for IoT devices(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2021) Her, Vladyslav; Taraniuk, Viktoriia; Tkachenko, Valentyna; Nikolskiy, Serhiy; Klymenko, IrynaThe article describes the basics of testing: writing test documentation (an example based on a report defect was proposed) and some testing methods. A performance test was also developed to test the load. Received basic knowledge of testing theory, as well as skills of writing and using bash scripts for performance tests.Документ Відкритий доступ Methods of effectivization of scalable systems: rewiew(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Honcharenko, Oleksandr; Loutskii, HeorhiiThe article discusses the problem of inefficiency of modern systems and horizontal scaling as a method of increasing productivity. The main issues that make up the mentioned problem are highlighted. A classification for possible solutions was proposed, according to which they were divided into architectural and network, and an overview was carried out. As part of the architectural class, such approaches as quantum computing and the dataflow paradigm were reviewed, the most promising solutions were analyzed. The comparative analysis shows that by their nature dataflow and quantum computing do not contradict each other, moreover, they complement each other in the context of the problem. At the same time, both types of processors require a certain network for communication, which makes the issue of topology relevant. At the network level, 2 topologies - Fat Tree and Dragonfly - were considered, and their main properties were highlighted. The analysis showed that in the context of the problem Dragonfly is slightly better due to decentralization and smaller diameter. In the conclusions, the main aspects of problem formulation and review are indicated, further prospects and possible methods are considered.Документ Відкритий доступ Microcontroller for the logic tasks(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2021) Sergiyenko, Anatoliy; Molchanov, Oleksii; Orlova, MariaA new SM16 microcontroller architecture is proposed which is intended for the logic-intensive applications in the field-programmable gate array (FPGA). The microcontroller has the stack architecture which provides the implementation of the most of instructions for a single clock cycle. The short but fast programs are derived due to the 16-bit instructions, which code up to three independent operations, and intensive use of the threaded code style. The framework is developed which compiles the program, simulates it, and translates to the ROM. The developed SM16 core with additional three-stack blocks, hash-table, and instructions that accelerate the execution of parsing operations is used for efficient XML-document processing and can be frequently reconfigured to the given document grammar set. The parsing speed equals to one byte per 24 clock cycles.Документ Відкритий доступ Modern information systems security means(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Klymenko, Iryna Anatoliivna; Verner, A. I.The article provides a thorough review of current research on information security means available for the endpoint protection. In the first chapter, categories and features of types of threats to information security are considered. The second chapter provides a general description of threat analysis methods, compares static, dynamic, hybrid malware analysis methods and highlights the advantages and disadvantages of each of them. The third chapter considers the modern methods of detecting and mitigating threats to information systems, as well as the peculiarities of their implementation. The purpose of this article is to provide a general overview of the current state of information security and existing modern methods of protecting information systems from possible threats.Документ Відкритий доступ Optimal construction of the pattern matrix for probabilistic neural networks in technical diagnostics based on expert estimations(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2021) Romanuke, VadimIn the field of technical diagnostics, many tasks are solved by using automated classification. For this, such classifiers like probabilistic neural networks fit best owing to their simplicity. To obtain a probabilistic neural network pattern matrix for technical diagnostics, expert estimations or measurements are commonly involved. The pattern matrix can be deduced straightforwardly by just averaging over those estimations. However, averages are not always the best way to process expert estimations. The goal is to suggest a method of optimally deducing the pattern matrix for technical diagnostics based on expert estimations. The main criterion of the optimality is maximization of the performance, in which the subcriterion of maximization of the operation speed is included. First of all, the maximal width of the pattern matrix is determined. The width does not exceed the number of experts. Then, for every state of an object, the expert estimations are clustered. The clustering can be done by using the k-means method or similar. The centroids of these clusters successively form the pattern matrix. The optimal number of clusters determines the probabilistic neural network optimality by its performance maximization. In general, most results of the error rate percentage of probabilistic neural networks appear to be near-exponentially decreasing as the number of clustered expert estimations is increased. Therefore, if the optimal number of clusters defines a too “wide” pattern matrix whose operation speed is intolerably slow, the performance maximization implies a tradeoff between the error rate percentage minimum and maximally tolerable slowness in the probabilistic neural network operation speed. The optimal number of clusters is found at an asymptotically minimal error rate percentage, or at an acceptable error rate percentage which corresponds to maximally tolerable slowness in operation speed. The optimality is practically referred to the simultaneous acceptability of error rate and operation speed.Документ Відкритий доступ Organization of fast exponentiation on galois fields for cryptographic data protection systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Halil, Al-Mrayt Ghassan Abdel Jalil; Markovskiy, Oleksandr; Stupak, AlonaThe article proposes the organization of accelerated execution of the basic operation of a wide range of cryptographic algorithms with a public key - exponentiation on finite Galois fields GF(2n ). Acceleration of the computational implementation of this operation is achieved by organizing the processing of several bits of the code at once during squaring on Galois fields. This organization is based on the use of polynomial squared properties, Montgomery group reduction, and extensive use of previous calculations. Procedures for performing basic operations of exponentiation on Galois fields are developed in detail, the work of which is illustrated by numerical examples. It has been proved that the proposed organization can increase the computational speed of this operation by 2.4 times, which is significant for cryptographic applications.Документ Відкритий доступ Organization of parallel execution of modular multiplication to speed up the computational implementation of public-key cryptography(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Boyarshin, Igor; Markovskyi, Oleksandr; Ostrovska, BogdanaThe article theoretically substantiates, investigates and develops a method for parallel execution of the basic operation of public key cryptography - modular multiplication of numbers with high bit count. It is based on a special organization of the division of the components of modular multiplication into independent computational processes. To implement this, it is proposed to use the Montgomery modular reduction. The described solution is illustrated with numerical examples. It has been theoretically and experimentally proven that the proposed approach to parallelization of the arithmetical process of modular multiplication makes it possible to speed up this important for cryptographic tasks operation by 5-6 times.Документ Відкритий доступ Organization of protected filtering of images in clouds(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Mirataei, Alireza; Rusanova, Olga; Tribynska, Karolina; Markovskyi, OleksandrThe article proposes an approach to using cloud technologies to accelerate the filtering of image streams while ensuring their protection during processing on remote computer systems. Homomorphic encryption of images during their remote filtering is proposed to be carried out by shuffling rows of pixel matrices. This provides a high level of protection against attempts to illegally restore images on computer systems that filter them. The developed approach makes it possible to speed up the performance of this important image processing operation by 1-2 orders of magnitude.Документ Відкритий доступ Overview of ocr tools for the task of recognizing tables and graphs in documents(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Yaroshenko, O.This study describes OCR tools for recognizing tables and graphs. There is a great demand for solutions that can effectively automate the processing of an extensive array of documents. Existing OCR solutions can efficiently recognize text, but recognizing graphical elements, such as charts and tables, is still in the making. Solutions that can increase the accuracy of visual data recognition can be valuable for technical document processing, such as scientific, financial, and analytical documents.Документ Відкритий доступ Petri-object simulation: technique and software(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2020) Stetsenko, Inna; Dyfuchyn, AntonNowadays information systems tend to be including components for transforming data into information applying modelling and simulation. Combined with real-time data, discrete event simulation could create powerful making decision and control systems. For these purposes, simulation software should be concentrated on creation the model as a code which can be easy integrated with other components of software. In this regard, Petri-object simulation technique, the main concept of which is to compose the code of model of complicated discrete event system in a fast and flexible way, simultaneously providing fast running the simulation, is requisite. The behaviour description of the model based on stochastic multichannel Petri net while the model composition is grounded on object-oriented technology. The Petri-object simulation software provides scalable simulation algorithm, graphical editor, correct transformation graphical images into model, correct simulation results. Graphical editor helps to cope with error-prone process of linking elements with each other. For better understanding the technique, the Petri-object model of web information system has been developed. Investigation of the response time has been conducted. The experiment has revealed system parameters impact on the value of response time. Thus, the model can be useful to avoid long-running request.Документ Відкритий доступ Protected discrete Fourier transform implementation on remote computer systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2020) Mirataei, Alireza; Khalil, Hana; Markovskyi, OlexanderEffective method of the discrete Fourier transform acceleration with the use of cloud computing is theoretically substantiated and developed. The reigning feature of the suggested method is homomorphic encryption of the input signals, which provides efficient protection during the remote calculation. It has been shown theoretically and experimentally that the proposed method allows one to 1-2 orders of magnitude to speed up the processing of signals while maintaining their confidentiality. The proposed method can be applied for effective signal stream processing in clouds.Документ Відкритий доступ Road monitoring system based on iot technology for SmartCity(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2020) Кopiika, Anton; Piskun, Roman; Tkachenko, Valentyna; Klymenko, IrynaThis work is devoted to the problem of automatic road quality control, which can be used by both road repair services and common drivers. This paper provides a survey of different known techniques and algorithms of finding potholes on the road and describe our own method, using accelerometer. It will be shown our device for detecting potholes on the road, which can be used, as a part of the IoT system of SmartCity. It uses data from an accelerometer for finding road bumps.