Academic Journal of Lviv Polytechnic. Series of Computer Systems and Networks №905, 2018

УДК 621.3 (681,519,536,62,50,003,004)

Bachynskyy R. Secret keys protection method for microcontrollers, based on special hardware blocks using

The proposed article demonstrates how to protect some memory areas in STM microcontrollers, what could be used for secret cypher keys storing, by using special hardware block "Firewall". This method provides access to predefined microcontroller’s memory areas form configured in "Firewall" address space and blocks access from another program memory space. Since, STM microcontrollers provides connection to external Flash and SRAM for address space expanding, memory protection with "Firewall" was investigated when unauthorized code from external memory tries to get access to protected memory areas.

Keywords: microcontrollers, cyphering, secret keys.

References. 1. RM0351 Reference manual, STM32L4x5 and STM32L4x6 advanced Arm-based 32-bit MCUs ./ https://www.st.com/content/ccc/resource/technical/document/reference_manual/02/35/09/0c/4f/f7/40/03/ DM00083560.pdf/files/DM00083560.pdf/jcr:content/translations/en.DM00083560.pdf 2. AN4729 Application note, STM32L0/L4 FIREWALL overview./ https://www.st.com/content/ccc/resource/technical/document /application_note/43/66/7c/63/87/9f/4c/b2/DM00209768.pdf/files/DM00209768.pdf/jcr:content/translation s/en.DM00209768.pdf 3. AN4758: Proprietary code read-out protection on microcontrollers of the STM32L4 Series./ https://www.st.com/content/ccc/resource/technical/document/application_note/group0/1f/99/ef/d6/ 24/8d/44/08/DM00226247/files/DM00226247.pdf/jcr:content/translations/en.DM00226247.pdf

L. Berezko, S. Sokolov. Peculiarities of instrumental means biomedic cyberphysic system

The paper presents research materials related to the construction of biotechnical systems as components of cyberphysical systems of biomedical purposes. The proposed generalized structures of biomedical biotechnical systems allow us to formulate and solve the problems of designing such biotechnical systems as a component of cyberphysical systems. Considered, analyzed and proposed a number of practical measures for the creation of instrumental biotechnical systems. Features of the interaction between the biological and technical components of the list of experimental and theoretical studies, which are parallel to the technical stages of implementation. The peculiarities of constructing a biotechnical system based on bioelectroimpedance metry in terms of metrology is the impossibility of having an exemplary biological object. Errors in bioelectroimpedance measurement arise as a result of the interaction of instrumental means and biological object and the conversion of biophysical parameters into physiological characteristics. The experimental results that accompanied the development and gave the opportunity to construct a biotechnical system for determining the level of blood loss were considered in detail.

Keywords: cyberphysical systems, biotechnical systems, biomedical electroimpedance, instrumental means.

References. 1. Anatoliy Melnik. Cyber-Physical Systems Multilayer Platform and research Framework. Advances in Cyber-Physical Systems, 2016, vol. 1, No 1, pp. 1–6. 2. Leonid Berezko, Serhii Sokolov. Biotechnical components of cyber-physical systems. // Advances in cyber-physical systems, Lviv Polytechnic National University, 2017, vol. 2, No 1, p. 1–5. 3. Ahutin V. M. Bionic aspects of the synthesis of biotechnical systems. Information materials: Cybernetics. M.: Sov. Radio, 1976, No. 4 (82), pp. 3–26. 4. Fletcher R., Fletcher S., Wagner E. Clinical epidemiology. Fundamentals of Evidence-Based Medicine. / Translation from English, M.: Media Sphere, 1998, 351 pp. 5. Berezko L. O., Smerdov A. A, Sokolov S. E. Possibilities of application of bioelectroimpedance measurement for investigation of microcirculation state. // Electronics and Communications, 2011, No. 2 (61), c. 101–105. 6. Schwan H. P. Alternating Current Electrode Polarization. Biophysic, 1966, bd. 3, No 5, pp. 181–201. 7. Geddes L. A., Da Costa C. P., Wise D. The impedance of stainless-steel electrodes. Med. Biol. Eng., 1971, vol. 9, No 3, pp. 511–521. 8. Sun H. H., Onaral R. A Unified Approach to Represent Metal Electrode Polarization/ Iree Transactions on Biomedical Engineering, 1983, v. BME-30, No 7, pp. 399–405. 9. Grigorchak I. I., Ponedilok G. V. Impedance Spectroscopy: Textbook. Lviv: Publishing House of Lviv Polytechnic, 2011, p. 352. 10. Egorov Yu. P., Kuznetsov G. D. The brain as a volumetric conductor. M.: Nauka, 1980, p. 160. 11. Grechin V. B., Kropotov Yu. D. Slow non-electric rhythms of the human brain. L .: Nauka, 1979, p. 128. 12. Olson W. H., Schmincke D. R., Bradley L., Henley B. S. Time and frequency dependence of disposable ECG electrode-skin impedance. Medical Instrumentation, 1979, vol. 13, No 5, pp. 269–272. 13. Kachalov Yu. P., Gnotov A. V., Nozdrachev A. D. The metallic microelectrode. L.: Nauka, 1980, p.159. 14. Andreev V. S. Conductometric methods and devices in biology and medicine Moscow: Medicine, 1973. 334 p. 15. Berezko L. O., Smerdov A. A, Sokolov S. E. Possibilities of application of bioelectroimpedance measurement for investigation of microcirculation state. Electronics and Communications, 2011, No. 2, c. 101–105. 16. Bryusov P. G. Extra determination of blood loss by nomograms. / / Military Medical Journal, 1986, No. 9, p. 61–62. 17. Berezovsky V. A , Kolotyolov N. N. Biophysical characteristics of human tissues.– K.: Naukova dumka,1990, 224 p. 18. Sherman D. M., Bordyuzhenko I. I., Rodionov V. I, Pokrovsky M. M., Sidakova G. A. The dependence of the values of the inter electrode impedance on the localization and area of the electrodes, the frequency and the force of the measuring current. News of medical equipment, Moscow: Scientific works VNIIMP, 1976, No. 4, pp. 8–12.

O. Bomchyk, Y. Paramud. Computer system management by multiple channel lighting equipment

The problem of controlling the computer control system of multichannel lighting devices is considered. Basic means of lighting control systems are determited. Generalised structure system for controlling of multichannel lighting devices is developed. Expediency of use of trunk serial interfaces in such systems is substantiated. Efficiency of use of DMX protocol is subsnantiated and analysed. The structural scheme of multichannel lighting devices control system according to such a protocol and the general algorithm of system operation are considered.

The analysis and justification of the choice of application of the protocol dmx 512 was made. The structural scheme of the system and the general algorithm of the system work are considered.

Keywords: computer system, multichannel illuminating devices, protocol.

References. 1. Kavun S. V. Sorbat I. V. Arkhitektura kompiuteriv. osoblyvosti vykorystannia kompiuteriv v IS. Kharkivskyi Natsionalnyi Ekonomichnyi Universytet. Vypusk KhNEU – Kharkiv, 2010. 2. Huk M. Apparatyie interfeisy PK. Entsyclopediya. – SPb: Piter, 2002–528 p. 3. Diuran P. H. Vidkryti i funktsionalno sumisni zasoby upravlinnia komertsiinym osvitlenniam. 2014. – 132 p. 4. Fedorov Yu. N. Dovidnyk inzhenera po ASUTP. Proektuvannnia i razrabotka. – K. : Infra-Inzheneriia, 2014. – 423 p. 5. Morton, Dzhon. Mikrokontrolery AVR. Vstupnyi kurs / Dzhon Morton. – M.: Dodэka XXI, DMK Pres, 2015–272 p. 6. Yatsenkov, V. S. Mikrokontrolery Microchip z aparatnoiu pidtrymkoiu USB / V. S. Yatsenkov. – M.: Hariacha liniia – Telekom, 2008. – 402 p., 7. Bobalo Yu. Ia. Matematychni modeli ta metody analizu nadiinosti radioelektronnykh, elektrotekhnichnykh ta prohramnykh system: monohrafiia / Yu. Ia. Bobalo, B. Iu. Volochii, O. Iu. Lozynskyi, B. A. Mandzii, L. D. Ozirkovskyi, D. V. Fedasiuk, S. V. Shcherbovskykh, V. S. Yakovyna. – Lviv: Vydavnytstvo Lvivskoi politekhniky, 2013. – 300 p., 8. Paramud Ya. S. Interfeisy peryferiinykh prystroiv EOM – K., ISDO, 1995. – 74 p., 9. Torianyk K. I., Lysov P. I., Karpov M. A., Popov Yu. O. Syhnaly z shyrotno-impulsnoiu moduliatsiieiu v systemakh zviazku. – Moskovskyi derzhavnyi instytut radiotezhniky, elektroniky i avtomatyky, 2010.

I. Borodii, Y. Paramud, V. Savyak. Principles of constructing a software system of the aggregated data formation

This paper is devoted to the principles of constructing a software system of the aggregated data formation. The main principles of constructing a software system of the aggregated data formation are considered and their comparative analysis are carried out. An alternative principle of constructing a software system is proposed. This principle of constructing allows to eliminate the problems of fast and reliable data processing, scaling, automation of the software system components, improve data quality and security.

Keywords: principles of constructing, software system, data analysis, data aggregation, business intelligence, relational database, data warehouse, data mart, OLAP-cube.

References. 1. Kornilov Y. G. Sovremennoye primeneniye OLAP i OLTP tekhnologiy v ekonomike / Kornilov Y. G., Dolgova T. G. – Krasnoyarsk: Siberian State Aerospace University, Sektsiya "Informatsionno-ekonomicheskiye sistemy", 2010. – P. 419–420. 2. Marie-Aude Aufaure – Business Intelligence // Marie-Aude Aufaure, Esteban Zimanyi (Eds.): Second European Summer School, eBISS 2012, Brussels, Belgium, July 2012. – 234 p. 3. Bat'kov V. O. – Analiz problem sovremennykh khranilishch dannykh / Bat'kov V. O. –Moscow: Moscow State University of Economics, Statistics, and Informatics, 2013. – 3 p. 4. Data aggregation [Electronic resource] / ibm – Access mode: https://www.ibm.com/support/knowledgecenter/en/SSBNJ7_1.4.4/dataView/Concepts/ctnpm_dv_use_data_aggr eg.html. 5. M. A. Poltavtseva – Bezopasnost' baz dannykh: problemy i perspektivy / M. A. Poltavtseva, A. R Khabarov – Tver: Nauchno-issledovatel'skiy institut «Tsentrprogrammsistem», Programnyye produkty I sistemy No3 tom 29, 2016. – P. 36–41. 6. Aarthi Raman –Conceptual Data Vault Modeling and its Opportunities for the Future // Aarthi Raman, Teuta Cata – Dallas, TX: Decision Sciences Institute, 2017 – 10 p. 7. Data Warehouse: The Choice of Inmon versus Kimball [Electronic resource] / Ian Abramson. – Access mode: https://www.ismll.uni-hildesheim.de/lehre/bi-10s/script/Inmon-vs-Kimball.pdf. 8. Data Source [Electronic resource] / techopedia. – Access mode: https://www.techopedia.com/definition/30323/data-source. 9. DBMS Database Models [Electronic resource] / studytonight. – Access mode: https://www.studytonight.com/dbms/database-model.php. 10. The Advantages of a Relational Database Management System [Electronic resource] / techwalla. – Access mode: https://www.techwalla.com/articles/theadvantages-of-a-relational-database-management-system 11. Database [Electronic resource] / Margaret Rouse. – Access mode: https://searchsqlserver.techtarget.com/definition/database. 12. Dusan Petkovic. Microsoft SQL Server 2012. A beginner’s guide // Dusan Petkovic – New York: The McGraw-Hill Companies, 2012. – 833 p.

E. Vavruk, D. Kushnir. Mobile system for text recognition and translation with using microsoft cognitive ocr

The solution of handwritten and printed text processing problem with subsequent translation in such mobile platforms like Android and IOS is proposed. It was demonstrated method of fully cross-platform solutions development for large mobile systems. It was implemented system with the base on general algorithm of text recognition and processing using Microsoft Cognitive OCR, and illustrated main system modules communication with basics on machine learning, using class diagram. Cross-platform solution for Android and IOS mobile systems was provided. It was investigated different font types, which were used in recognized text. Also set of different language texts was investigated and probability of correct recognition was calculated.

Keywords: image process library, cross-platform solutions, program interfaces, REST technologies, machine learning.

References. 1. Anyline. Anyline SDK documentationfElektronnyj resurs] / New York 2018 — Rezhym dostupu: https://documentation.anyline.com/ 2. Microsoft. Microsoft Cognitive Services documentation [Elelctronnyj resurs] /Redmont 2018 Rezhym dostupu: https://azure.microsoft.eom/enus/services/c ognitive-semices 3. Google. Tesseract documentation [El'ektronnyj resurs] / Mountain View2018— Rezhym dostupu: https://github.com/tesseract-ocr/tesseract/wiki/Documentation 4. Olekseev. O What Xamarin developers should know at the beginning of 2017 ]Elektronnyj resurs] / Kyiv 2017 — Rezhym dostupu: http://it-ua. info/news/2017/02/03/scho-rozrobniki-xamarin-povinn-znati-na-pochatok2017-rokti 5. Appcelerator. Appcelerator Titanium documentation [Elektronnyj resurs] / San Jose 2018 — Rezhym dostupu: https://www.appcelerator.com/Titamum 6. Adobe. PhoneGap documentation [Elektronnyj resurs] / San Jose 2018 — Rezhym dostupu:https://build.phonegap.com/ 7.Microsoft. Xamarin documentation [Elektronnyj resurs] /Redmont 2018 —Rezhym dostupu:https://docs.microsoft.com/en-us/xamarin/ 8. Google. Google translate OCR API documentation[Elektronnyj resurs] / Mountain View 2018 Rezhym dostupu:https://cloud. google.com/functions/docs/tutorials/ocr 9.Microsoft. Machine Learning documentation [Elektronnyj resurs]/Redmont 2018 — Rezhym dostupu:https://docs.microsoft. com/ru-ru/azure/machine-learning/machine-leaming-what-is-machine-learning

E. Vavruk, Z. Mozil. Selection of optimal path finding algorithm for data transmition in distributed systems

Considered typical structure of the multilevel distributed system, the data transmission problems are analyzed and the graphs can be used for their solution. The criteria for choosing the optimal path search algorithm are chosen. Based on the proposed criteria, the Bellman-Ford algorithm is chosen to find the optimal path in the graph. Used principles of Dirty Flag, CSR (Compressed Sparse Row) and defined time-memory relationship parameters to increase the speed of the algorithm.

Keywords: search of the optimal path, distributed system, Bellman-Ford algorithm, Dirty Flag, CSR.

References. 1. Dolinskaya I. Optimal Path Finding in Direction, Location and Time Dependent Environments / Irina Dolinskaya. – Evanston, 2012. – 33 с. – (Northwestern University). 2. Pradesh M. Modified Dijkstra’s Algorithm for Dense Graphs / Madhua Pradesh. – Bhopal, India, 2016. – 9 с. – (Maulana Ajad National Institute of Technology). 3. Krianto S. Bellman Ford algorithm in Routing Information Protocol / Sulaiman Krianto. – Indonesia, 2018. – 10 с. – (Universitas Prima Indonesia). 4. Aksak N. Vykorystannia alhorytmiv poshuku naikorotshoho shliakhu na hrafakh (Using algorithms to find the shortest path on the graphs) / Nikolay Aksak. – Kharkiv, 2004. – 10 с. 5. Dunets R. Topolohiia kompiuternykh system (Topology of computer systems) / Roman Dunets. – Lviv, 2007. – 48 с. – (Lviv Polytechnic National University).

B. І. Havano. Problems of privacy and security in cyber physical systems of intellectual houses

Smart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders’ awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny. In current paper, is presented an overview of challenges related to the privacy and security in the smart house cyber physical systems. Also, were realized constraints, evaluated solutions, and a several challenges and research issues where further investigation is strongly required. I have identified issues that need to be solved: risk assessment methods, information flow control accesses, identity management, and security management methods.

Keywords: smart house, cyber physical system, IoT, privacy, security.

References. 1. D. J. Cook et al., "MavHome: An agent-based smart home", IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003. 2. N. King, "Smart home – A Definition", Milton Keynes: Intertek Research and Testing Centre, 2003. 3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa. 4. August and Xfinity, "The Safe and Smart Home: Security in the Smart Home Era," 2016 [Online]. Available: http://goo.gl/UGWb5Z. 5. V. Srinivasan et al., "Protecting your daily in-home activity information from a wireless snooping attack," 10th international conference on Ubiquitous computing, pp. 202–211, 2008. 6. B. Ur et al., "The current state of access control for smart devices in homes," Workshop on Home Usable Privacy and Security, 2013. 7. S. Notra et al., "An experimental study of security and privacy risks with emerging household appliances", IEEE Conference on Communications and Network Security, pp. 79–84, 2014. 8. V. Sivaraman et al., "Networklevel security and privacy control for smart-home IoT devices," Wireless and Mobile Computing, 55 Networking and Communications, pp. 163–167, 2015. 9. T. D. P. Mendes et al., "Smart home communication technologies and applications: Wireless protocol assessment for home area network resources", Energies, vol. 8, no. 7, pp. 7279–7311, 2015. 10. C. Debes et al., "Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior", IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016. 11. C. Lee et al., "Securing smart home: Technologies, security challenges, and security requirements", IEEE Conference on Communications and Network Security, pp. 67–72, 2014. 12. K. Islam et al., "Security and privacy considerations for wireless sensor networks in smart home environments", Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012. 13. H. Chan and A. Perrig, "Security and privacy in sensor networks", Computer, vol. 36, no. 10, pp. 103–105, 2003 14. M. M. Hossain et al., "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", Services, pp. 2128, 2015. 15. M. Anwar et al., "Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges", Health Policy and Technology, vol. 4, pp. 299–311, 2015. 16. S. L. Keoh et al., "Securing the internet of things: A standardization perspective", Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265– 275, 2014. 17. D. Altolini et al., "Low power link layer security for IoT: Implementation and performance analysis", Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013. 18. H. C. Pohls et al., "RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects", Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014. 19. G. Mantas et al., "Security in smart home environment", Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010 20. N. P. Hoang and D. Pishva, "A TOR-based anonymous communication approach to secure smart home appliances", Advanced Communication Technology, pp. 517–525, 2015. 21. A. Riahi et al., "A systemic approach for IoT security", Distributed Computing in Sensor Systems, pp. 351–355, 2013. 22. A. Jacobsson and P. Davidsson, "Towards a Model of Privacy and Security for Smart Homes," IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015 23. M. Henze et al., "A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation Computer Systems, vol. 56, pp. 701–718, 2016. 24. D. Barnard-Wills et al., "ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media", ENISA (The European Network and Information Security Agency), 2014.

V. Golembo, R. Melnikov. Organization of work for a group of drones

Presented the basic theories and algorithms with the help of which common coordinated actions of a group of objects are achieved. To research the joint work of a group of drones (UAVs) capable of self-organization, using the theory of swarm intelligence. The method of organizing the interaction of a group of UAVs in the environment, by dividing the group into local subgroups, is considered. The proposed algorithm to prevent possible collisions of neighboring UAVs by recalculating the flight trajectory.

Keywords: drone, self-organization, swarm intelligence, group interaction, collision avoidance.

References. 1. A. Korchenko, O. Illyash Generalized classifications of unmanned air vehicles // Scientific Works of Kharkiv National Air Force University, No. 4, 2012. – P. 27–36. 2. A. Botchkaryov, V. Golembo Autonomous distributed system with elements of self-organization: problems and directions for development // Lviv Polytechnic National University Press, No. 745. 2012. – P.26–32. 3. I. Kalyaev, A. Gaiduk, S. Kapustian Collective control models and algorithms in groups of robots М. : FIZMATLIT, 2009, – 280 P. 4. Intelligent embedded systems and multi-agent control. [Electronic resource]. – Access mode: http://roboschool.org/docs/robo15/Materials/Day-4/Day-4-intelligent-embedded-systems-and multiagent-control.pdf. 5. I. Kalyaev, A. Gaiduk, S. Kapustian Distributed planning systems for actions teams of robots. M .: Janus-K, 2002. 292 P. 6. Implementation of the local voting algorithm for multi-agent control under stochastic uncertainties. [Electronic resource]. – Access mode: http://www.math.spbu.ru/user/gran/students/presentation_Ekaterina_Khrabrykh.pdf. 7. Hypothesis of simplicity. [Electronic resource]. – Access mode: http://studopedia.org/3-67094.html. 8. A. Botchkaryov, V. Golembo Self-organization of autonomous distributed systems in the tasks of decision-making in understanding conditions // Lviv Polytechnic National University Press, No. 688. 2010. – P. 23–30. 9. D. Ivanov Information Exchange in a Large Group Robots // National academy of Ukraine/Artificial Intelligence, No. 4. 2010. – P. 513–521. 10. S. Kapustian Multi-level organization of collective interaction in groups of intelligent robots // News of the Southern Federal Universit/Technical science, No. 9. 2004. – P. 149–158. 11. S. Kapustian, Bondarev Y. Methods of organizing local coordination of actions in large groups of microrobots // News of the Southern Federal Universit/Technical science, No. 9. 2004. – P. 158–167. 12. V. Erofeeva, Y. Ivanskiy, V. Kiyaev Swarm control of dynamic objects based on multi-agent technologies// Computer tools in education, No. 6. 2105. – P. 34–42.

Rodrigue Elias, Valerii Hlukhov, Mohammed Rahma, Ivan Zholubak. Concurrent error detaction of devices for extended Galois fields elements processing

Abstract. Binary codes of extended Galois fields elements are redundant, some of them never appear at the normal operation of the devices for processing of such field elements. Unused (forbidden) code combinations can be used to organize on-line testing (concurrent error detection) of the specified devices. The appearance of any forbidden combination will be a sign of error. The paper compares the various extended Galois fields with the possibility of on-line testing organization, the fields that best ensure its holding are determined. It is noted that there are no bits for the codes of the Galois field elements that have strictly different values in the allowed and prohibited codes. It is suggested to evaluate the possibility of realizing the testing by the ratio of the number of forbidden combinations to the total number of combinations or to the number of permitted combinations. To achieve the greatest diagnostic effect, it is recommended to use fields with characteristics that are the first prime number greater than degree of 2. In terms of testing price, the best is the GF(3m) field, for which it is necessary to define only one forbidden code combination, which provides detection of all forbidden codes. When using the Galois GF(dm) fields under consideration, the minimum coding distance for the codes of each digit of the code is 1. This indicates that it is impossible to detect 100 % of all even single errors in the work of the considered devices in the proposed way. Searching for a logical expression for an error sign is based on the division of groups of consecutive forbidden codes into subgroups. For each subgroup, the bits of its codes are divided into 2 parts, so that the senior bits of each subgroup code remain unchanged, and the younger ones acquire all possible values from 0...0 to 1...1. Then, to the minimized logical error expressions in this subgroup of codes, only the unchanged top bits will enter. Then only the immutable older bits will enter the minimized error expression in this subgroup of codes. The hardware complexity of the proposed method quadratically depends on the number of bits, which encodes one section of the extended Galois fields elements code.

Keywords: extended Galois fields, capacitive complexity, built-in testing

References. 1. IEEE 1363–2000 (2000). Standard Specifications for Public-Key Cryptography. Copyright © 2000 IEEE. All rights reserved. 2. DSTU 4145–2002. Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. ETsP, shcho gruntuietsia na eliptychnykh kryvykh. Formuvannia ta pereviriannia. Kyiv. 2003. 3. DSTU ISO/IEC 15946–1:2015 Informatsiini tekhnolohii. Metody zakhystu. Kryptohrafichni metody, shcho gruntuiutsia na eliptychnykh kryvykh. Chastyna 1. Zahalni polozhennia. 4. De Feo, L. Towards quantum– resistant cryptosystems from supersingular elliptic curve isogenies / L. De Feo, D. Jao, J. Plut // PQCrypto. – 2011.–24 p. 5. Cherkaskyi M. V. SH–model alhorytmu // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" No 433. Vydavnytstvo Natsionalnoho universytetu "Lvivska politekhnika". 2001. S. 127–134. 6. Cherkaskyi M. V., Khusein Khalid Murad. Universalna SH-model // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" No 523 "Kompiuterni systemy ta merezhi". Lviv. Vydavnytstvo Natsionalnoho universytetu "Lvivska politekhnika". 2004. S. 150–154. 7. Hlukhov V. S., Hlukhova O. V. Rezultaty otsiniuvannia strukturnoi skladnosti pomnozhuvachiv elementiv poliv Halua [Tekst] / V. S. Hlukhov, O. V. Hlukhova // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Kompiuterni systemy ta merezhi". – Lviv: – 2013. – Vyp. 773.– S. 27–32. 8. Hlukhov V. S., Trishch H. M. Otsinka strukturnoi skladnosti bahatosektsiinykh pomnozhuvachiv elementiv poliv Halua [Tekst] / V. S. Hlukhov, H. M. Trishch // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Kompiuterni systemy ta merezhi". – Lviv: – 2014. – Vyp. 806. – S. 27–33. 9. Hlukhova, O. V., Lozynskyi, A. Ya., Yaremkevych, R. I., Ihnatovych, A. O. Analitychna otsinka strukturnoi skladnosti pomnozhuvachiv elementiv poliv Halua [Tekst]. / O. V. Hlukhova, A. Ya. Lozynskyi, R. I. Yaremkevych, A. O. Ihnatovych // Materialy V Vseukrainskoi shkoly-seminaru molodykh vchenykh i studentiv. Suchasni kompiuterni informatsiini tekhnolohii. ACIT2015. 22–23 travnia 2015 roku. Ternopil. TNEU. 2015. S. 166–167. 10. R. Elias, M. Rakhma, V. Hlukhov. Strukturna skladnist pomnozhuvachiv elementiv poliv Halua u normalnomu ta polinomialnomu bazysakh. Elektrotekhnichni ta kompiuterni cystemy. – Odesa: – 2017. Vyd-vo Nauka i tekhnika. – No 25 (101). – S. 324–331. 11. Sholohon O.Z. Obchyslennia strukturnoi skladnosti pomnozhuvachiv u polinomialnomu bazysi elementiv poliv Halua GF(2m) [Tekst] / O. Z. Sholohon // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Kompiuterni systemy ta merezhi". – Lviv: – 2014. – Vyp. 806. – S. 284–289. 12. Sholohon Yu. Z. Otsiniuvannia strukturnoi skladnosti pomnozhuvachiv poliv Halua na osnovi elementarnykh peretvoriuvachiv [Tekst] / Yu. Z. Sholohon // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Kompiuterni systemy ta merezhi". – Lviv: – 2014. – Vyp. 806. – S. 290–295. 13. Hlukhov V. S. Porivniannia polinomialnoho ta normalnoho bazysiv predstavlennia elementiv poliv Halua // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Kompiuterni systemy proektuvannia. Teoriia i praktyka". No591, s. 22–27. Lviv, 2007. 14. V. S. Hlukhov. Otsinka aparatnykh vytrat na realizatsiiu bahatorivnevoi kompiuternoi systemy // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Kompiuterni nauky ta informatsiini tekhnolohii" No 629. Lviv, 2008. S. 13–20. 15. 72 Zholubak, I. M., Hlukhov, V. S. Vyznachennia rozshyrenoho polia Halua GF(dm) z naimenshoiu aparatnoiu skladnistiu pomnozhuvacha [Tekst] / I. M. Zholubak, V. S. Hlukhov // Visnyk Natsionalnoho universytetu "Lvivska politekhnika" "Informatsiini systemy ta merezhi", No 854. Lviv, 2016. S. 63 – 69. 16. Hlukhov V. S., Elias R. M., Rakhma M. K. R. Chasova skladnist oriientovanykh na vykonannia kryptohrafichnykh peretvoren v skladi kiberfizychnykh system pomnozhuvachiv na osnovi modyfikovanykh komirok Hilda. Materialy druhoho naukovoho seminaru Kiber-fizychni systemy: dosiahnennia ta vyklyky, Lviv, Natsionalnyi universytet "Lvivska politekhnika", 21–22 chervnia 2016 r. S. 36–42. 17. R. Elias, M. Rakhma, V. S. Hlukhov. Chasova skladnist pomnozhuvachiv dlia poliv Halua. Elektrotekhnichni ta kompiuterni cystemy. – Odesa: – 2016. Vyd-vo Nauka I tekhnika. – No 22 (98). – S. 323–327. 18. Mohammed Kadhim Rahma, Valeriy S. Hlukhov. Time complexity of multipliers for Galois fields. INTERNATIONAL YOUTH SCIENCE FORUM "LITTERIS ET ARTIBUS", 24–26 NOVEMBER 2016, LVIV, UKRAINE. Proceedings, pp. 52–53. 19. R. Elias, V. Hlukhov, M. Rakhma, I. Zholubak. Yemnisna skladnist prystroiv dlia opratsiuvannia elementiv rozshyrenykh poliv Halua. Elektrotekhnichni ta kompiuterni cystemy. – Odesa: – 2018. Vyd-vo Nauka i tekhnika. – No 29 (105) (drukuietsia). 20. Rabochee dyahnostyrovanye bezopasnыkh ynformatsyonno-upravliaiushchykh system / A. B. Drozd, B. C. Kharchenko, S. H Antoshchuk y dr. / Pod red A. B. Drozda, B. C. Kharchenko – Kh. Nats. aerokosmycheskyi un-t ym. N. E. Zhukovskoho "KhAY", 2012–614 s. 21. Metodychni vkazivky do kursovoi roboty "Aryfmetychni ta lohichni osnovy kompiuternykh tekhnolohii" z dystsypliny "Kompiuterna lohika" bazovoho napriamku 6.050102 "Kompiuterna inzheneriia" / Ukl. V. S. Hlukhov, V. A. Holembo. Lviv: NU"LP", 2014. – 96 s.

Y. Klushyn. Software implementation of mathematical models, methods and algorithms for estimating the time of execution of complex software complexes in multiprocessor computer systems

To solve the forecasting problem, a software package has been developed in full, which is based on mathematical models, methods and algorithms of direct stochastic modeling and tiered stochastic modeling, which are used to estimate the execution time of folding software systems in multiprocessor computer systems. The given software package calculates the average value and the distribution function of the execution time of a set of interrelated tasks on homogeneous resources of a parallel computing system.

Keywords: parallel computing systems, complex of interconnected works, direct stochastic modeling, Markov process, function of distribution of random variable.

References. 1. Chu W. W., Leung K.K. Module replication and assignment for real-time distributed processing system. // "Proc IEEE". 1987. 75. N5. pp. 547–562. 2. Khritankov A. S. Mathematical model of performance characteristics of distributed computing systems. Computer science, management, economics. WORKS OF MIPT. – 2010. – Volume 2, No. 1 (5), p. 110–115. 3. Ivutin A. N., Larkin E. V. Prediction of the execution time of the algorithm. Magazine. News of TSU. Technical science. Issue number 3/2013 C. 301–315. 4. Bocharov P. L., Ignatushchenko V. V. Mathematical models and methods for evaluating the effectiveness of parallel computing systems on complexes of interrelated works // Tez. report international conf, "HighPerformance Computing Systems in Management and Scientific Research," Alma-Ata, 1991, p. 6. 5. Margalitashvili, A. L., Ambartsumian, A. L., Teplyakov, A. V., Preidunov, Yu, V., Graph models of complexes of interrelated works, M *, 1990, – Dep. in VINITI 31,01,90, No. 587–B90. 6. Margalitashvili A. L, Investigation of the effectiveness of the functioning of parallel computing resources on given complexes of interrelated works, Abstract of Cand. dis. M .: In-t prbblem management, 1990. 7. Bocharov P. L., Preydunov Yu. V., Estimation of the execution time of a complex of works on a parallel computational system // System analysis and computer science. Sat scientific papers, M.: Publishing house DN, 1991. C 29–41. 8. Ingatushchenko V. V. Organization of structures for controlling multiprocessor computing systems. Moscow: Energoatomizdat, 1984. 9. Ivanov N.N. Mathematical prediction of reliable execution of sets of tasks with symmetric runtime distributions. Journal of Open Education, Issue No. 2–2 / 2011, p. 52–55. 10. Ignatushchenko V. V., Klushin Y. S. Prediction of the implementation of complex software systems on parallel computers: direct stochastic modeling // Automation and Remote Control. 1994. N12, p. 142–157. 11. Klushin, Y. S. Prediction of the implementation of complex software systems on parallel computers // Proc. Report Second Ukrainian Conference on Automatic Control "Automation – 95", Lviv, 1995, vol. 2, p. 100. 12. Ignatushchenko V. V., Klushin Yu. S. Forecasting the implementation of complex software systems on control parallel computers: exact methods // Scientific works of the International Symposium "Automated Control Systems", Tbilisi: ed. Intellect, 1996, p. 23–28. 13. N. N. Ivanov, V. V. Ignatushchenko, A. Y. Mikhailov, Static prediction of the execution time of complexes of interrelated works in multiprocessor computing systems, Avtomat. and Telemekh., 2005, issue 6, 89–103. 14. Klushin Y. S. Evaluation of the effectiveness of various dispatching disciplines for reducing the time to perform complex software systems on parallel computing systems / Bulletin of National University "Lviv Polytechnic" No413. Computer engineering and information technology. – Lviv: NU "LP", 2000. – p. 19–23. 15. Gross, D., Miller, D., Transition Markov processes // Operations Research. 1984. Vol. 32. No 4. P. 334–361. 16. Reibman A. L., Trivedi K. S. Numerical transient analysis of Markov models // Computers and Operations Research. 1988. V. 15. No. 1. P. 19–36. 17. Klushin, Y. S. Improving the accuracy of estimating the execution time of folding software systems in multiprocessor computer systems for belt stochastic modeling. Bulletin of NU "Lviv Polytechnic" No881. Computer systems and networks. – Lviv: NU "LP", 2017. 18. Preidunov Y. V. Development of mathematical models and methods for predicting the implementation of complex software systems on parallel computing systems. Cand. course work. M .: Inst. Of Problems of Management RAS, 1992. 19. Klushin Y. S. Reducing the number of states of the Markov process when executing complex software systems on parallel computers. Scientific Bulletin of Chernivtsi University. Computer systems and components. 2016. T. 7. Vol. 2, pp. 53–62.

А. Kovalchuk, N. Lotoshynska. Encryption and decryption of grayscale and color images

Images used as a stochastic signal are among the most commonly used types of information. Accordingly, the actual task is to protect such images from unauthorized access and use. This leads to the use of known classic encryption methods in the case of image encryption. Offered algorithms of encryption-decryption are intended for the use of images in grayscale and are based on using the ideas of basic RSA algorithm. Encryption – decryption can be carried out with extra noising and without too. A combination of elements of the RSA algorithm and binary operations is also described for co-use in encryption – decryption of color images.

Keywords: encryption, decryption, image, edge, cryptographic stability, affine transformation, binary operation.

References. 1. Kovalchuk A., Peleshko D., Navytka M. and Sviridova T., Using of affine transformations for the encryption and decryption of two images, 2011 11th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Polyana-Svalyava, 2011, pp. 348–349. 2. Rashkevych Y., Kovalchuk A., Peleshko D. and Kupchak M., Stream modification of RSA algorithm for image coding with precize contoure extraction, 2009 10th International Conference – The Experience of Designing and Application of CAD Systems in Microelectronics, Lviv-Polyana, 2009, pp. 469–473. 3. Peleshko D., Ivanov Y., Sharov B., Izonin I. and Borzov Y., "Design and implementation of visitors queue density analysis and registration method for retail videosurveillance purposes", 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2016, pp. 159–162. doi: 10.1109/DSMP.2016.7583531. 4. Peleshko D., Rak T., Peleshko M., Izonin I. and Batyuk D., Two-frames image superresolution based on the aggregate divergence matrix, 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2016, pp. 235–238. doi: 10.1109/DSMP.2016.7583548. 5. Van den Braden Lambrecht C.J. and Farrell J.E. "Perceptual Quality Metric for Digitally Coded Color Images". In: Proceeding of EUSIPCO, pp. 1175–1178, Trieste, Italy, September 1996. 6. Majid Rabbani, Rajan Joshi. "An overview of the JPEG2000 still image compression standard" // Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication. – 2002. – Vol. 17. – P. 3–48. 7. Girod B. "The information theoretical significance of spatial and temporal masking in video signals" // Proc. of the SPIE Symposium on Electronic Imaging. 1989. – Vol. 1077.– P. 178–187. 8. A. Kovalchuk and N. Lotoshynska, "Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images", 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 2018, pp. 542– 544. doi: 10.1109/DSMP.2018.8478471. 9. Gonzalez, Rafael C., Woods, Richard E., "Digital Image Processing", published by Pearson Education, Inc, Publishing as Prentice Hall, 2002.

А. Melnyk. Combining the models of computation by the multitype identifiers of the computer facilities components

The models of computation realized in modern computers and corresponding types of computer architecture are shortly considered, including the model of computation with parallel ordered access to the data and instructions. The statement that the identification of components of a computer system and a computer program, as well as data items is the basis of the computational model implemented in the computer is justified. The problem of expansion and classification of methods for the computer tool components identification, as well as the problem of analysis and development of methods for combining the models of computation through the sharing of methods inherent to different models are formulated. The list of actions to be performed in order to set the algorithm's step-by-step procedure in the computer program is provided, and it is proved that the identifiers of computer components are used to organize their execution. The functions of the identifiers of computer components are described and their types are defined. The classification features by which the identifiers of the computer facilities are distinguished, and on their basis their classification was made by their dividing into the following types: constant or variables; individual or group; single or plural. The principles of identification of the computer facilities components by the named types of identifiers are developed and examples of uses and combination of the models of computation with different types of the computer facilities components identifiers are given.

Keywords: model of computation, components of computer facilities, identifiers.

References. 1. Https://en.wikipedia.org/wiki/Turing_machine. 2. Burks, Arthur W., Herman H. Goldstine, and John von Neumann. Preliminary Discussion of the Logical Design of an Electronic Computing Instrument. [Princeton: Institute for Advanced Studies, September 1947.] 3. Batcher, K., Staran Parallel Processor System Hardware, Proc. National Computer Cont. AFIPS., 1974, pp. 405–410. 4. Stormon, C. e. a., A General-purpose CMOS Associative Processor IC and System. IEEE Micro, Vol. 12, No. 6, Dec, 1992, pp. 68–78. 5. Potter, J., Associative Computing – A Programming Paradigm for Massively Parallel Computers, N.Y.: Plenum Publishing, 1992. 6. Schoeberl, M., Design and Implementation of an Efficient Stack Machine, In: In Proceedings of the 12th IEEE Reconfigurable Architecture Workshop, RAW 2005, Denver, Colorado, USA, April, 2005. 7. Koopman, P. J., Stack computers: the new wave, Halsted Press, 1989. 8. Agervala, T. And Arvind, Data Flow Systems, Computer, Vol. 15, No. 2, Feb, 1982, pp. 10–13. 9. Gajski, D. D., Padua, D. A., Kuck, D. J., and Kuhn, R., A Second Opinion on Data Flow Machines and Languages, Computer, Vol. 15, No. 2, Feb, 1982, pp. 58–69. 10. Gurd, J. andWatson, I., A Practical Data Flow Computer, Computer, Vol. 15, No. 2, Feb, 1982, pp. 51–57. 11. Melnyk A.O. Computer Memory with Parallel Conflict-Free Sorting NetworkBased Ordered Data Access. Recent Patents on Computer Science, 2015, Volume 8(1), pp. 67–77. 12. Melnyk A. Parallel ordered-access machine computational model and architecture / Anatoliy Melnyk // Advances in Cyber-Physical Systems. – 2016. – Volume 1, number 2. – P. 93–101. 13. Melnyk A. Ordered access memory and its application in parallel processors architecture / Anatoliy Melnyk // Advances in CyberPhysical Systems. – 2017. – Volume 2, number 2. – P. 54–62. 14. Stallings, W., Computer Organization and Architecture, Pearson, 10th ed., 2016. Melnyk A. Computer Architecture. Scientific publication. – Lutsk: Volyn Regional Publishing House, 2008. – 470 p.

Y. Paramud, V. Yarkun. Method of image symbol recognition on the basis of convolutional neural network

In this article, a system of handwritten or printed text recognition in the image has been developed. Empirical methods of image processing and statistical models of machine learning and simulation are being developed in two directions: the detection of text on the image and the recognition of the text. Thus, in this paper, algorithmic software tools that combine these two areas in the software created for the operating system iOS 11.0 or later for devices of the company Apple – iPhone, iPad that support this operating system are developed.

Keywords: character recognition, image, convolutional neural network, machine learning.

References. 1. Paramud Y., Yarkun V. Algorithmic and software means of handwritten symbol recognition // Bulletin of the National University "Lviv Polytechnic" "Computer Systems and Networks" No 881, Lviv, Ukraine. 2017. – P. 98–106. 2. Yarkun V., Paramud Y. Algorithmic and software synchronization of information exchange // Bulletin of the National University "Lviv Polytechnic" "Computer Systems and Networks" No 857, Lviv, Ukraine. 2016. – P.111–118. 3. Datong Chen, Jean-Marc Odobez, Herve Bourlard. Text detection and recognition in images and video frames // Pattern Recognition journal, 2003. – P. 595–608. 4. Convolutional Neural Network [Electronic resource]/ Stanford. – Access mode: http://ufldl.stanford.edu/tutorial /supervised/ConvolutionalNeuralNetwork/. 5. Convolutional networks [Electronic resource]/ Stanford. – Access mode: http://cs231n.github.io/convolutionalnetworks/#overview. 6. Сoreml [Electronic resource]/ Apple. – Access mode: https://developer.apple.com/documentation/coreml. 7. Bachelor’s degree dissertation [Electronic resource]/ Github. – Access mode: https://github.com/VitaliyYarkun/Bachelor-s-degree-dissertation. 8. NIST. American national standard for information systems – data format for the interchange of fingerprint, facial, and, scar mark and tattoo (smt) information, ansi-itl 1-2000 (nist special publication 500–245), September 2000.

B. Popovych. Computer verification of gao assumption, related with obtaining of high order elements in finite fields

We have performed computer calculations in Maple environment for verification of Gao assumption for finite fields of characteristic 2, 3, 5 and presented correspondent results. If the assumption is true, then it is possible to construct explicitly in these fields in polynomial time elements of high multiplicative order that are used in cryptography (Diffie-Hellman protocol, El-Gamal public key cryptosystem, El-Gamal digital signature).

Keywords: cryptographic information protection, finite field, multiplicative order

References. 1. Agrawal M., Kayal N., Saxena N. PRIMES is in P // Annals of Mathematics, vol. 160, no. 2, 2004, p. 781–793. 2. Ahmadi O., Shparlinski I. E., Voloch J. F.Multiplicative order of Gauss periods // International Journal of Number Theory, vol. 6, no. 4, 2010, p. 877 – 882. 3. Conflitti A. On elements of high order in finite fields // in Cryptography and Computational Number Theory, vol. 20 of Progr. Comput. Sci. Appl. Logic, Birkhauser, Basel, 2001, p. 11–14. 4. Gao S. Elements of provable high orders in finite fields // Proceeding of American Math. Soc., vol. 127, no. 6, 1999, p. 1615–1623. 5. Lidl R., Niederreiter H. Finite Fields. – Cambridge: Cambridge University Press, 1997. – 755 P. 6. Mullen G. L., Panario D. Handbook of finite fields. – Boca Raton: CRC Press, 2013. – 1068 P. 7. Lambe T. A. Bounds on the Number of Feasible Solutions to a Knapsack Problem // SIAM Journal of Applied Mathematics, vol. 26, no. 2, 1974, p. 302–305. 8. Popovych R. Elements of high order in finite fields of the form Fq[x]/Φr(x) // Finite Fields and Their Applications, vol. 18, no. 4, 2012, p. 700–710. 9. Popovych R. Elements of high order in finite fields of the form Fq[x]/(x m -a) // Finite Fields and Their Applications, vol. 19, no. 1, 2013, p. 86–92. 10. Popovych R. On elements of high order in general finite fields // Algebra and Discrete Mathematics, vol. 18, no. 2, 2014, p.295–300.

V. Puyda. Special processor for operative control of parameters in real time

Modern technical systems can solve various problems in the automated mode with or without human interactions. They use algorithms that require certain physical parameters of the environment and the system itself as the input data. The success of solving such problems heavily depends on precision and reliability of such parameters that must reflect the most recent state of the system. The information about parameters of the environment and the current state of the system itself like pressure, temperature of the environment or specific elements of the system, mechanical deformations, presence of certain gases, smoke or fire detection, monitoring of electricity parameters to avoid overvoltage or short circuits etc. are passed to the system using the sensors. Analog or digital sensors can be used depending on types of the parameters, the required precision and the maximum measurement time. Digital sensors produce the digital signal reflecting the parameter values and pass this signal to the telemetric network of the system. Usage of analog sensors requires the precise transformation of the analog signal, which is proportional to the parameter values, to the digital signal that must be formed according to the standards of the telemetric network of the system. To increase the precision of measurements, individual characteristics of analog sensors must be taken into account.

In this paper, a special processor for automated monitoring of parameter values obtained from analog and digital sensors for real-time usage by a technical system is presented.

Keywords: special processor, temperature sensors, pressure sensors, screens, digital interfaces.

References. 1. V. Babak. Theoretical Fundamentals of information measurement systems. Second edition, revised and supplemented. Textbook. Edited by Member of the National Academy of science of Ukraine. Кyiv, 2017, 293–325. 2. Applied Measurement System / Edited by Md. Zachurul Had. – In Tech,USA, 2012. 3. A. Gulin, T. Mamedova, V. Rishkin, Y. Shamaev . Principles intellectualization informatively of measurings systems. Kharkiv National Air Force University, Collection of scientific works, 2017, 3(52),102–106. 4. ARM Cortex-M [Electronic resource] / wiki. – Access mode: https://en.wikipedia.org/wiki/ARM_Cortex-M.

A. Salo, V. Zahorniak. Means of vending cyber physical system administration module optimization

Features of vending cyber physical systems performance after durable exploitation have been examined. Ready-made means of cyber physical systems scaling have been analyzed. Main advantages and disadvantages of a ready system switchover to a third-party developer’s platform have been defined. Means of large databases optimization have been offered. Analytical data that led to the decision to optimize the existing database have been produced. The elements of vending cyber physical system and possible changes in its structure due to the switchover to different platforms have been covered. Processing modules and analytical system functions have been described. Two ways of administration module optimization have been offered. The efficiency of the proposed solutions has been proved with analytical data.

Keywords: vending, cyber physical system, vending cyber physical systems, database, optimization, replication, processing.

References. 1. Salo A. M. Pryntsyp pobudova vendinhovoyi merezhi z monitorinhom // Visnyk Nats. un-tu "Lʹvivsʹka politekhnika" "Komp'yuterni systemy ta merezhi". - 2013. - No 773, С. 112-118. 2. Lee E. A. and Seshia S. A.. Introduction to Embedded Systems – A Cyber-Physical Systems Approach, Second Edition, MIT Press, – 2017. – p. 9–16. 3. Glavnyye trendy mirovogo rynka torgovykh avtomatov [Elektronnyy resurs]: / Rezhim dostupa: http://www.vendoved.ru/glavnye-trendy-mirovogo-rynka-torgovyh-avtomatov/. - Nazvaniye s ekrana. 4. Prilozheniya i resheniya dlya IoT [Elektronnyy resurs]: / Rezhim dostupa: https://aws.amazon.com/ru/iot/. - Nazvaniye s ekrana.5. E. A. Lee and S. A. Seshia, Introduction to Embedded Systems: A Cyber-Physical Systems Approach, Second Edition. http://leeseshia.org, 2015. 6. A. Salo. Simulation of water purification machine for vending cyber physical systems. Technology audit and production reserves – No 2/2(40), 2018. – p. 16 – 21.

P. Tymoshchuk. Work modes of impulse K-winners-take-all neural network

A continuous-time network of K-winners-take-all (KWTA) neural circuit (NC) which is capable of identifying the largest K of N inputs, where a command signal is described. The network is described by a state equation with a discontinuous right-hand side and by an output equation. The state equation contains an impulse train defined by a sum of Dirac delta functions. Existence and uniqueness of the network work modes is analyzed. The main advantage of the network comparatively to other close analogs is widening convergence speed limitations to working modes. Theoretical results are derived and illustrated with computer simulation examples that demonstrate the network’s performance.

Keywords: Continuous-time network, K-winners-take-all (KWTA) neural circuit (NC), state equation with a discontinuous right-hand side, impulse train, Dirac delta function, existence and uniqueness.

References. 1. E. Majani, R. Erlanson, and Y. Abu-Mostafa, "On the k-winners-take-all network," in Advances in Neural Information Processing Systems 1, R. P. Lippmann, J. E. Moody, and D. S. Touretzky, Eds. San Mateo, CA: Morgan Kaufmann, 1989, pp. 634–642. 2. J. Wang, "Analysis and design of a k-winners-takeall network with a single state variable and the Heaviside step activation function," IEEE Trans. Neural Netw., vol. 21, no. 9, pp. 1496–1506, Sept. 2010. 3. P. V. Tymoshchuk, "A simplified continuous-time model of analogue K-winners-take-all neural circuit", in Proc. XI Int. Conf. "The Experience of Designing and Application of CAD Systems in Microelectronics", Polyana-Svalyava, Ukraine, February 23–25, 2011, pp. 121–125. 4. R. P. Lippmann, "An introduction to computing with neural nets," IEEE Acoustics, Speech and Signal Processing Magazine, vol. 3, no. 4, pp. 4–22, Apr. 1987. 5. P. Tymoshchuk and E. Kaszkurewicz, "A winner-take all circuit using neural networks as building blocks," Neurocomputing, vol. 64, pp. 375–396, Mar. 2005. 6. P. Tymoshchuk, "Parallel rank-order filtering based on impulse Kwinners-take-all neural network," Computer Systems and Networks, No 881, pp. 160–165, 2017. 7. J. Lazzaro, S. Ryckebusch, M. A. Mahowald, and C. A. Mead, "Winner-take-all networks of O(N) complexity," in Advances in Neural Information Processing Systems 1, R. P. Lippmann, J. E. Moody, and D. S. Touretzky, Eds. San Mateo, CA: Morgan Kaufmann, 1989, pp. 703–711. 8. B. Sekerkiran and U. Cilingiroglu, "A CMOS K-winners-take-all circuits with 0(N) complexity," IEEE Trans. Circuits Syst. II, vol. 46, no. 1, pp. 1–5, Jan. 1999. 9. A. Cichocki and R. Unbehauen, Neural Networks for Optimization and Signal Processing. New York, NY, USA: Wiley, 1993. 10. R. C. O’Reilly and Y. Munakata, Computational Explorations in Cognitive Neuroscience: Understanding the Mind by Simulating the Brain. Cambridge, MA: MIT Press, 2000. 11. W. Maass, "Neural computation with winner-take-all as the only nonlinear operation," in Advances in Information Processing Systems, vol. 12. S. A. Solla, T. K. Leen, and K.-R. Mueller, Eds. Cambridge, MA: MIT Press, 2000, pp. 293–299.

V. Khomits, V. Hlukhov. Tools for micro-satellite video stream lossless compression

Features of construction of devices for compression of lossless images are considered. The study of the features of the construction allows you to fully understand the principles of these devices and the methods of compression, which underlie their work. JPEG-LS method and CCSDS121.0-B-2 standard are chosen as ways of compression of lossless images. The implementation of these methods with different types of architectures on modern FPGAs is considered. A comparison of the results of the implemented nodes on the FPGA. Various parameters of the device's operation are taken into account – clock frequency, FPGA crystal filling, number of bits per pixel of image and compression speed. The analysis of results allows to determine the most optimal organization of the device for the implementation of such a compression node intended for use in the system of collecting and accumulation of scientific information of the microsatellite.

Keywords: lossless compression, FPGA, JPEG-LS, CCSDS121.0-B-2, software implementation, hardware implementation

References. 1. M. Vaynberher, H. Seroussi, H. Sapiro, "The Loco-I stysnennya zobrazhen bez vtrat Alhorytm: Pryntsypy i standartyzatsiyi v JPEG-LS", Hewlett-Packard Laboratories Technical Report No. HPL-98-193R1, lystopad 1998 pereroblene zhovtnya +1999 . IEEE Trans. Obrobka zobrazhen, Vol. 9 serpnya 2000 roku, pp. 1309–1324. 2. M. Vaynberher, H. Seroussi, H. Shapiro, "LOKO-I: Nyzka skladnist, zasnovana na konteksti, stysnennya zobrazhen bez vtrat Alhorytm" Proc. Konferentsiya IEEE Data Compression, Snowbird, shtat Yuta, berezen-kviten 1996 roku. 3. Dyskretnaya matematyka: alhorytmy. Jpeg, jpeg2000, jpeg-ls. Szhatye yzobrazhenyy s poteryamy y bez [Elektronnyy resurs] : [Veb-sayt]. – Elektronni dani. – Rezhym dostupu http://rain.ifmo.ru/cat/view.php/theory/data-compression/jpeg-2006 4. Hlukhov V. S., Khomits V. M "Stysnennya zobrazhen bez vtrat metodom jpeg-ls na PLIS", Visnyk Natsionalnoho universytetu "Lvivska politekhnika" Kompyuterni systemy ta merezhi 2017r., 32–41 st. 5. JPEG-LS Encoder Core (Numerically and Near Lossless Compression) Design Specification. 2007 – 2013 ALMA Technologies. 6. CCSDS 121.0-B-2 "RECOMMENDED STANDARD FOR LOSSLESS DATA COMPRESSION" Blue Book, May 2012 7. CAST XILINX "JPEG-LS-E Lossless & Near-Lossless JPEG-LS Encoder", May 2018. 8. Anwar S. Dawood, John A. Williams and Stephen J. Visser "On-board Satellite Image Compression Using Reconfigurable FPGAs" The Cooperative Research Centre for Satellite System Queensland University of Technology, Brisbane, QLD 4001, Australia. 9. Yakup Murat MERT "FPGA Based JPEG-LS Encoder for Onboard Real-time Lossless Image Compression" TBİTAK-İLTAREN, Şehit İlhan TAN kıЭlası, 06800 mitktsy, Ankara, TURKEY Conference Paper. April 2015. 10. Spacecraft Onboard Interface Services Area [Elektronnyy resurs]: [Veb-sayt]. – Elektronni dani. – Rezhym dostupu https://public.ccsds.org/Publications/default.aspx

М. Khomuliak, А. Pylhun. Control system for positioning of solar panel

The problem of tracking the direction of the sun for the photovoltaic panel is considered. The types of solar power plants are analyzed and requirements for their control systems are formulated. The method and technical solution for managing the positioning of the solar panel are proposed. The accuracy of the photovoltaic panel guidance to the sun, as well as its protection against the destructive wind load, is provided by an efficient operational algorithm and using of step electric motors for building executive nodes.

Keywords: electric power plant, solar panel, photoelectric converter.

References. 1. Vambol S. O. Enerhoefektyvnist fotoelektrychnykh peretvoriuvachiv dlia zabezpechennia ekolohichno chystoi enerhetyky: [monohrafiia] / S. O. Vambol, Ya. O. Sychikova, N. V. Deineko. – Berdiansk: Vydavets Tkachuk O. V., 2016. – 256 s. 2. MPPT kontrolliery dlia solniechnykh batarei [Electronic resource]. – Available from: http://www.solarhome.ru/control/mppt/. 3. Kharchenko V. V, Vliianiie oriientatsii luchievosprinimaiushchiei povierkhnosti na effiektivnost solniechnykh moduliei / V. V Kharchenko, B. A. Nikitin, V. A. Maiorov [i dr.] // Naukovyi visnyk Natsionalnoho Universytetu bioresursiv I pryrodokorystuvannia Ukrainy. – 2015. – Vyp. 224. – S. 20–25. 4. Arzhanov K. V. Sistema navedeniia solniechnykh batariei na solntse / K. V. Arzhanov // Matierialy XIX Miezhdunarodnoi nauchnotiekhnichieskoi konfierientsii "Silovaia eliektronika I eniergoeffiektivnost". T. 2. – Alushta, 2013. – S. 152–155. 5. Technology – DEGERenergie [Electronic resource]. – Available from: https://www.degerenergie.de/en/technology.html. 6. Effiektivnost ispolzovaniia sistiem oriientatsii solniechnykh batariei [Electronic resource]. – Available from: http://ust.su/solar/media/section-inner79/11275/. 7. Solar photovoltaic output depends on orientation, tilt, and tracking [Electronic resource]. – Available from: https://www.eia.gov/todayinenergy/detail.php?id=18871. 8. Bachynskyi R. V. Kontroler keruvannia krokovymy dvyhunamy / R. V. Bachynskyi // Visnyk Natsionalnoho universytetu "Lvivska politekhnika". Kompiuterni systemy ta merezhi. – 2013. – No 773. – S. 3–7. 9. Amerkhanov R. A. Solniechnyie fotoeliektrichieskiie stantsii: monografiia / R. A. Amerkhanov [i dr.]. – Krasnodar: KubGAU, 2017. – 206 s. 10. Danilin O. V. Dvokoordynatna systema navedennia fotoelektrychnykh panelei na sontse / O. V. Danilin, О. О. Buria, O. M. Sharyi // Enerhetyka. Ekolohiia. Liudyna. Naukovi pratsi KPI im. Ihoria Sikorskoho, IEE. – Kyiv: KPI im. Ihoria Sikorskoho, IEE, 2017. – S. 138–146.

I. Yurchak, P. Vyshynskyi. Applying of algorithms of fuzzy logic in systems of a smart house

There was considered the methods and approaches to the construction of "smart house" systems. Reviewed the level of intellectualization of modern buildings, which depending on the equipment of engineering systems. Conducted an analysis of requirements for "smart house" systems and determined the main expectations of owners of dwellings from the introduction of these systems, in particular, energy saving, level of comfort and safety.

There was conducted the research on the main technologies and methods of control of "smart house" systems. An approach based on a mathematical apparatus of fuzzy logic is proposed to develop an effective system of temperature control. Developed the architecture of the system, defined the main modules and their functions. Implemented an algorithm for determining the comfort of the room. Defined the basic term sets are formed, linguistic variables and membership functions, compiled the table of fuzzy rules. Developed the method of combining cut off functions and estimating fuzzy rules based on Mamdani algorithm. This technique allows using the evaluation of the internal and external air temperature using the rules of fuzzy logic to determine how to adjust the temperature to comfortable values.

Keywords: smart house, fuzzy algorithms, intellectualization of buildings.

References. 1. Systemy "Umnyi dom" [Elektronnyi resurs]. Rezhym dostupu: http://www.vashdom.ru/articles/research_2.htm. 2. Euronews. Novitni tekhnolohii. Maibutnie – za holosovymy tekhnolohiiamy [Elektronnyi resurs]. 3. Hololobov V. N. "Umnyi dom" svoymy rukamy / V. N. Hololobov. – Moskva : NT Press, 2007. – 416 s. 4. Elsenpyter R. Umnyi Dom stroym samy / Robert K. Elsenpyter, Toby Dzh. Velt. – M.: Kudyts – Obraz, 2005. – 384 c. 5. Voloshyn O. "Home Smart Home" zhurnal Kompiuterra No 18 13.05.2008 / O. Voloshyn. 6. Zaborskyi H. "Umnyi dom" y problemы razvytyia / H. Zaborskyi // Arkhytektura y stroytelstvo : No 7 (206). – 2009. 7. Mann W. The state of the science / Mann William C // Smart technology for aging, disability and independence. – John Wiley and Sons, 2005. 8. "Rozumnyi budynok" z intelektualnoiu nachynkoiu [Elektronnyi resurs]. Rezhym dostupu: http://alls.in.ua/12199-rozumnijj-budinok-z-intelektualnoyunachinkoyu.html. 9. "Rozumnyi budynok" – ekonomiia chy doroha ihrashka [Elektronnyi resurs]. Rezhym dostupu: http://sofit.com.ua/articles/rozumnij_budinok_ekonom_ya_chi_doroga_grashka. 10. Derzhavna arkhitekturno-budivelna inspektsiia Ukrainy. Hirnyk M. A.: Intelektualna sporuda – intehrovana informatsiina systema [Elektronnyi resurs]. Rezhym dostupu: http://www.dabi.gov.ua. 11. «Pobudova modeli otsiniuvannia parametriv teplovoho komfortu na osnovi nechitkoi lohiky 2010./ Mashevska M., Tkachenko P. Rezhym dostupu: http://ena.lp.edu.ua:8080/bitstream/ntb/8270/1/141pdf.

I. Yurchak, T. Moskovych. Applying of genetic algorithms in the automated workload distribution system for teachers and students

There was determined the relevance of the automated formation of the education schedule, which is the key to effective organization of the educational process, distribution of workload for teachers, accounting for various types of classes and relevant rooms. Analyzed the features of existing scheduling systems, their specifics. Considered the methods and approaches to solving the problem of automated distribution capacity.

Investigated features of genetic algorithms, their advantages for solving optimization problems and a possibility of using for the implementation of an automated system of distribution capacity in an academy. Proposed the modified genetic algorithm that implements the best qualities of the classical algorithm and lacks some of its limitations. Determined main parameters of the genetic algorithm and taken into account their influence on the speed and quality of the final result is. Submitted a mathematical formulation of the general distribution problem and developed the model of an automated system of distribution capacity, which implements a method for compiling a schedule focused on the organization of the educational process. The final application is implemented in Java and is provided for use as a web service. This view provides the possibility of remote access users to information resources. Managing the parameters of the algorithm made in the configuration files, allows for more efficient use and making optimization changes to its work.

Keywords: automated workload distribution system, schedule of classes, mathematical models of class schedules, model of genetic algorithms.

References. 1. Budilovskyi D. M. Optymizatsiia vyrishennia zavdan teorii rozkladiv na osnovi evoliutsiinohenetychnoi modeli rozpodilu zavdan. – Rostov-na-Donu, 2007. – 200 s. 2. Lopateeva O. M. Systema avtomatyzovanoho formuvannia navchalnoho rozkladu u vyshchomu navchalnomu zakladi na osnovi evrystychnykh alhorytmiv. Dysertatsiina robota. – Krasnoiarsk, 2006. 3. Sekirin A. I. Prohramnyi kompleks dlia modeliuvannia, analizu ta optymizatsii roboty avtomatyzovanykh tekhnolohichnykh kompleksiv obrobky. Naukovi pratsi Donetskoho natsionalnoho tekhnichnoho universytetu. Obchysliuvalna tekhnika ta avtomatyzatsiia. Vypusk 90 – Donetsk, 2010. 4. Nizamova H. F. Matematychne i prohramne zabezpechennia skladannia rozkladu navchalnykh zaniat na osnovi ahrehatnykh henetychnykh alhorytmiv. Referat – Kharkiv, 2012. 5. Prohrama "Rektor–VNZ". [Elektronnyi resurs]. – Rezhym dostupu: http://rector.spb.ru/raspisanie–vuz–4u. 6. Prohrama "Avtomatyzovane skladannia rozkladiv. Universytet". [Elektronnyi resurs].–Rezhym dostupu: http://www.bgs–solutions.com.ua/prices/price. 7. Prohrama "Halaktyka – Rozklad zaniat". [Elektronnyi resurs]. – Rezhym dostupu: http://galaktika.ua. 8. Bezuhlyi M. O., Sekirin O. I. Metody pidvyshchennia efektyvnosti skladannia rozkladu v umovakh navchalnoho zakladu. Mizhnarodna naukovo–tekhnichna konferentsiia studentiv, aspirantiv ta molodykh vchenykh "Kompiuterna ta prohramna inzheneriia". – Donetskyi natsionalnyi tekhnichnyi universytet, 2015. 9. Bevz S. V. Rozrobka avtomatyzovanoi systemy formuvannia rozkladu mahistratury. Informatsiini tekhnolohii ta kompiuterna tekhnika No 4, 2009. – 30–65 s. 10. Babkina T. S. Zadacha skladannia rozkladu: rishennia na osnovi bahatoahentnoho pidkhodu. Biznes-informatyka. – 2008. – No 1. – S. 23–28. 11. Snytiuk V. Ie. Pro osoblyvosti formuvannia tsilovoi funktsii ta obmezhen v zadachi skladannia rozkladu zaniat. Snytiuk V. Ie., Sipko Ye. N. // Matematychni mashyny i systemy – 2014. 12. Dэvyd Kheffelfynher. Razrabotka prylozhenyi Java EE 6 v NetBeans 7. DMK Press, 2013. – 330 s. 13. Konkova I.S. Henetychni alhorytmy v rishenni zavdannia skladannia rozkladu v vuzi. // Problemy informatyky v osviti, upravlinni, ekonomitsi i tekhnitsi: Zb. statei XII Mizhnar. Naukovo–tekhn. Konf. – Penza: PDZ, 2012. – S. 26–29.

Title pages

Editorial board of Academic Journal "Computer Systems and Networks"

Editor-in-chief: Dr., Professor, Anatoliy Melnyk

Deputy editor: Dr., Professor, Roman Dunets

Executive secretary: PhD., Docent, Jaroslav Paramud

Editorial team

  • Prof., PhD., D.Sc. V.Hlukhov
  • Prof., PhD., D.Sc. O.Drozd
  • Prof., PhD., D.Sc. O.Ivakhiv
  • Prof., PhD., D.Sc. S.Lupenko
  • Prof., PhD., D.Sc. V.Melnyk
  • Prof., PhD., D.Sc. A.Nakonechny
  • Prof., PhD., D.Sc. J.Nikolaichuk
  • Prof., PhD., D.Sc. V.Opanasenko
  • Prof., PhD., D.Sc. O.Pomorovа
  • Prof., PhD., D.Sc. V.Tarasenko
  • Prof., PhD., D.Sc. Zdenek Pliva
  • Prof., PhD. Vedat Coskun
  • Prof., PhD. Jesus Ceretero
  • Prof., PhD. Tanya Vladimirova
  • Prof., PhD. Jiafu Wan
  • Doc, PhD., D.Sc. R.Kochan