243 results on '"Kharchenko Vyacheslav S"'
Search Results
2. Safety and Security Management for NPP I&C Systems
- Author
-
Sklyar, Vladimir, primary and Kharchenko, Vyacheslav S., additional
- Published
- 2020
- Full Text
- View/download PDF
3. Assurance Case for I&C Systems Safety and Security Assessment
- Author
-
Sklyar, Vladimir, primary and Kharchenko, Vyacheslav S., additional
- Published
- 2020
- Full Text
- View/download PDF
4. UAV Fleet Based Accident Monitoring Systems with Automatic Battery Replacement Systems: Algorithms for Justifying Composition and Use Planning
- Author
-
Olga Morozova, Ihor Kliushnikov, Kharchenko Vyacheslav S, Herman Fesenko, and Oleg Illiashenko
- Subjects
Battery (electricity) ,Accident (fallacy) ,Computer science ,Monitoring system ,Safety, Risk, Reliability and Quality ,Composition (language) ,General Environmental Science ,Reliability engineering - Published
- 2021
5. Concept of Using Eye Tracking Technology to Assess and Ensure Cybersecurity, Functional Safety and Usability
- Author
-
Magomediemin Gasanov, Kharchenko Vyacheslav S, Oleg Illiashenko, Olga Morozova, and Oleksandr Gordieiev
- Subjects
Functional safety ,Computer science ,Human–computer interaction ,business.industry ,Eye tracking ,Usability ,Safety, Risk, Reliability and Quality ,business ,General Environmental Science - Abstract
Eye tracking technology is based on tracking the trajectory of human eye movement. As a rule, it is implemented in the form of an additional device attached under the monitor or in the form of glasses. On the basis of a mathematical model, the focus of a person's attention is calculated and, accordingly, the user's visual route is built. Eye tracking technology is used to solve various problems, e.g. for marketing research, assessing the quality of user interfaces, developing simulators for operators, etc. The article discusses the concept of using eye tracking technology to assess and ensure cyber security, functional safety and usability. The possibility of using eye tracking technology (ETT) to solve the problem of identifying a person's personality is considered separately. The solution is achieved by reproducing a certain trajectory by a person's vision. This technique can be used as a basic or additional technique for identifying a person's personality. It also analyzes the results of using eye tracking to study the interface of an automated information system for operator support based on algorithms for symptom-oriented emergency instructions (ASOEI), which is used at nuclear power plants (NPP).
- Published
- 2021
6. RESEARCH OF THE ATTACKS SPREAD MODEL ON THE SMART OFFICE'S ROUTER
- Author
-
Kharchenko Vyacheslav S, Iryna Piskachova, and Maryna Kolisnyk
- Subjects
Router ,021110 strategic, defence & security studies ,Computer Networks and Communications ,business.industry ,Computer science ,Reliability (computer networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,0211 other engineering and technologies ,020206 networking & telecommunications ,Denial-of-service attack ,Graph theory ,02 engineering and technology ,Hardware and Architecture ,Smart office ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Internet of Things ,business ,Software ,Information Systems ,Computer network - Abstract
Currently, the number of DDoS attacks on various institutions has increased, so research on this issue is necessary and relevant. One of the devices that is targeted first is the router. This paper is devoted to the study of the spread of DDoS attacks on the router's subsystems of the Smart Office system. This paper analyzes and solves the problem of optimizing the search for the minimum propagation path of an attack on router subsystems using a mathematical tool – graph theory. The goal of this paper is to determine the most vulnerable router's subsystems to the effects of DDoS attacks.
- Published
- 2020
7. PROFILE-ORIENTED ASSESSMENT OF SOFTWARE REQUIREMENTS QUALITY: MODELS, METRICS, CASE STUDY
- Author
-
Oleksandr Gordieiev and Kharchenko Vyacheslav S
- Subjects
Structure (mathematical logic) ,Syntax (programming languages) ,Computer Networks and Communications ,Process (engineering) ,business.industry ,Computer science ,media_common.quotation_subject ,Software quality ,Set (abstract data type) ,Hardware and Architecture ,Computer Science (miscellaneous) ,Quality (business) ,Software requirements ,Instrumentation (computer programming) ,Software engineering ,business ,Software ,Information Systems ,media_common - Abstract
The article is devoted to profile-oriented approach to assessing the software requirements profile quality. The process of assessment is implemented in accordance with software requirements profile quality model for external quality of software requirements profile and internal quality of software requirements profile. For assessment of quality of each element of such model (characteristics and attributes of software requirements and their classification features; characteristics and attributes of software requirements profile and their classification features; structure of software requirements profile; semantics and syntax of software requirements) taxonomy of metrics and indicators are introduced, which is a part of software requirements profile quality assessment model. All metrics are divided into qualitative and quantitative groups. Additive convolution method is used to go from the multi-vector values of set of connected indicators or metrics to the single scalar value. Received values of metrics and indicators are visualized by radial-metrics diagrams. An example is discussed, which represents the assessment of external quality of software requirements profile for requirements profile from new standard “Requirements to computer security of NPP Instrumentation and Control Systems (NPP I&C)” developed by Ukrainian state regulatory body.
- Published
- 2020
8. ASSURANCE CASE FOR SAFETY AND SECURITY IMPLEMENTATION: A SURVEY OF APPLICATIONS
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Computer Networks and Communications ,Computer science ,media_common.quotation_subject ,Certification ,Eu countries ,Argumentation theory ,Engineering management ,Hardware and Architecture ,Computer Science (miscellaneous) ,Dependability ,Quality (business) ,Software ,Information Systems ,media_common - Abstract
This paper presents a survey of Assurance Case implementation for applications which are not directly related to the usual for Assurance Case regulatory regime. The UK is the country which first developed the theory of Assurance Case as a response to big catastrophes, and most applies Assurance Case regime for many industrial domains. USA, Australia and EU countries apply Assurance Case approach for safety and security regulation and licensing. For the last two decades Assurance Case has been used mostly for confirmation analysis of critical systems with established set of regulatory requirements. There are proven standards of use, notations and tools to support Assurance Case methodology. However, many researchers have tried to find approach to expand Assurance Case application to communicating domains. We group the following directions of Assurance Case applications as the following ones: Assurance Case for attributes assessment such as quality, dependability and, first of all, safety and security, Assurance Case based certification, improvement of argumentation, assurance based development, and Assurance Case for knowledge management. The main challenges and solutions of development and application of Assurance Case methodology, techniques and tools have been analyzed.
- Published
- 2020
9. Reliability assessment of '2oo3' and '1oo2' redundant structures taking into account the means of information processing and communications
- Author
-
Eugene Ruchkov, Anton Poroshenko, Andriy Kovalenko, Ievgen Babeshko, and Kharchenko Vyacheslav S
- Subjects
Computer science ,General Engineering ,Information processing ,Reliability (statistics) ,Reliability engineering - Published
- 2020
10. АВТОМАТНІ МОДЕЛІ ТА СИНТЕЗ ЗАСОБІВ КОНТРОЛЮ АПАРАТНОЇ РЕАЛІЗАЦІЇ АЛГОРИТМІВ ЗАМІЩЕННЯ КЕШ-ПАМ’ЯТІ
- Author
-
Kharchenko Vyacheslav S and V. Puidenko
- Published
- 2020
11. The Equipment Qualification Testing Framework: Model Driven Development for Design and Model-Based Testing for Verification
- Author
-
Kharchenko Vyacheslav S and Vladimir Sklyar
- Subjects
Model-based testing ,Model driven development ,Artificial Intelligence ,Control and Systems Engineering ,Computer science ,General Mathematics ,020208 electrical & electronic engineering ,Equipment Qualification ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,020201 artificial intelligence & image processing ,02 engineering and technology - Abstract
Computer control systems (CCS) are an important for operation and maintenance of safety- critical infrastructures. A challenge in such systems implementation is certification and licensing against national and international regulatory requirements. Environmental tests are applied to check that equipment of the CCS can withstand the rigors of harsh environments, for example high and low temperature and humidity, water drops and dust, seismic vibration and acceleration, electromagnetic interference, radiation, etc. It can happen that environmental tests emphasis is methods, level and types of environmental impacts, but there is a question about functions which shall perform a system under test before, during and after test impact application. Equipment Qualification Testing Framework is proposed. The requirements to system operation under test is described in view of a model. Model Driven Development methodology is applied for design and Model-based Testing methodology is applied for verification
- Published
- 2020
12. Post-Quantum Network Security:McEliece and Niederreiter Cryptosystems Analysis and Education Issues
- Author
-
Olexandr Potii, Nikos Bardis, Aleksei Vambol, and Kharchenko Vyacheslav S
- Subjects
Quantum network ,Theoretical computer science ,Artificial Intelligence ,Control and Systems Engineering ,Computer science ,General Mathematics ,021105 building & construction ,McEliece cryptosystem ,0211 other engineering and technologies ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,020206 networking & telecommunications ,02 engineering and technology - Abstract
The paper is aimed at analyzing of the classical McEliece and Niederreiter cryptosystems as well as theQuasi-Cyclic MDPC McEliece cipher in a context of the post-quantum network security. Theoretical foundations ofthe aforesaid cryptographic schemes are considered. The characteristics of the given cryptosystems and otherasymmetric encryption schemes are analyzed. The cipher metrics, which are considered in the paper, includecryptographic strength, performance, public key size and length of ciphertext. The binary Goppa codes are describedin the context of their role for the cryptanalytic resistance of the classic McEliece and Niederreiter schemes. Thecrucial advantages and drawbacks of the aforementioned cryptosystems are analyzed. The prospects for applicationof these ciphers to the network security protocols are outlined. The investigations, which are aimed at finding waysto reduce the public key sizes and improve the energy efficiency of the given ciphers, are briefly described. A neweducational module “Introduction to Post-Quantum Cryptography” is presented
- Published
- 2020
13. The Neural Modules Network with Collective Relearning for the Recognition of Diseases: Fault- Tolerant Structures and Reliability Assessment
- Author
-
Yevhenia Yehorova, Iraj Elyasi Komari, Nikolaos G. Bardis, Liudmyla Lutai, Kharchenko Vyacheslav S, and Mykola Fedorenko
- Subjects
03 medical and health sciences ,0302 clinical medicine ,Computer science ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,Fault tolerance ,030212 general & internal medicine ,02 engineering and technology ,Electrical and Electronic Engineering ,Reliability (statistics) ,Reliability engineering - Abstract
The article presents the architecture of multi-level information-analytical system (IAS) based on the neural modules network (NMN). This network consists of neural modules which are placed at the three levels (local, region and nation geographically distributed medical centers). Procedures of learning and collectiverelearning of neural modules consider region particularities and are based on analysis, generalization and exchange of experience related to diagnosis of diseases. These procedures provide modification and filtering parameters used as input for the further learning of local and regional neural modules.A few fault-tolerant structures of NMN-based IAS are researched taking into account different options of server and communication redundancy. Reliability block diagrams for redundant IAS structures are developed and formulas for calculation of probability of upstate are analyzed.
- Published
- 2020
14. PRACTICAL ASPECTS OF OPERATING AND ANALYTICAL RELIABILITY ASSESSMENT OF FPGA-BASED I&C SYSTEMS
- Author
-
Kostiantyn Leontiiev, Kharchenko Vyacheslav S, Eugene Ruchkov, and Eugene Babeshko
- Subjects
lcsh:Computer engineering. Computer hardware ,Computer Networks and Communications ,Computer science ,lcsh:TK7885-7895 ,Computer Graphics and Computer-Aided Design ,failure modes, effects, and diagnostics analysis ,lcsh:QA75.5-76.95 ,Reliability engineering ,reliability block diagrams ,Hardware and Architecture ,reliability analysis ,lcsh:Electronic computers. Computer science ,Electrical and Electronic Engineering ,Field-programmable gate array ,Software ,Reliability (statistics) ,Information Systems - Abstract
Operating reliability assessment of instrumentation and control systems (I&Cs) is always one of the most important activities, especially for critical domains such as nuclear power plants (NPPs). It is an important source of I&C reliability information preferable to lab testing data because it provides information on I&C reliability under real use conditions. That is the reason that now it is a common practice for companies to have an established process of collecting operating reliability data on a large variety of used components on regular basis, maintaining a database with failure information, total operation time, typical failure modes, etc. The intensive use of complicated components like field-programmable gate arrays (FPGAs) in I&C which appear in upgrades and newly-built nuclear power plants makes the task to develop and validate advanced operating reliability assessment methods that consider specific technology features very topical. Increased integration densities make the reliability of integrated circuits the most crucial point in modern NPP I&Cs. Moreover, FPGAs differ in some significant ways from other integrated circuits: they are shipped as blanks and are very dependent on the design configured into them. Furthermore, FPGA design could be changed during planned NPP outage for different reasons. Considering all possible failure modes of FPGA-based NPP instrumentation and control systems at the design stage is a quite challenging task. Therefore, operating reliability assessment is one of the most preferable ways to perform a comprehensive analysis of FPGA-based NPP I&Cs. Based on information in the literature and own experience, operational vs analytical reliability could be pretty far apart. For that reason, analytical reliability assessment using reliability block diagrams (RBD), failure modes, effects and diagnostics analysis (FMEDA), fault tree analysis (FTA), fault insertion testing (FIT), and other techniques and their combinations are important to meet requirements for such systems. The paper summarizes our experience in operating and analytical reliability assessment of FPGA based NPP I&Cs.
- Published
- 2020
15. MARKOV MODEL OF WIRELESS SENSOR NETWORK AVAILABILITY
- Author
-
Dmytro Kochkar, Maryna Kolisnyk, and Kharchenko Vyacheslav S
- Subjects
Markov chain ,Computer Networks and Communications ,Fire detection ,Computer science ,media_common.quotation_subject ,Failure rate ,Availability factor ,Markov model ,Reliability engineering ,Hardware and Architecture ,High availability ,Computer Science (miscellaneous) ,Function (engineering) ,Wireless sensor network ,Software ,Information Systems ,media_common - Abstract
The use of wireless sensor networks (WSN) in industry and for forest fire detection has recently become increasingly popular. Assessment of the availability of such networks is an important task, since they perform essential functions in critical situations. Sensor networks can be used to prevent and detect forest fires, and they must meet high availability requirements. Various options for organizing the WSN system are considered - with and without recovery. For such systems, the paper evaluates the probability of no-failure operation, as well as the readiness function, taking into account the network coverage ratio. In the paper the Markov WSN model for evaluating its availability function is developed taking into account the network coverage area. The obtained graphical dependencies allow us to evaluate how a change in the failure rate of sensors or system equipment affects the availability function value. The goal of this paper is to obtain metrics to assess the availability of system for monitoring forest by WSN and the availability function of a network using the Markov models. A special metric, so-called coverage availability factor is suggested in this paper taking into account different combinations of sensor failures which influence on completeness of monitoring forest fires.
- Published
- 2020
16. Safety and Reliability Assessment of NPP Instrumentation and Control Systems Considering Different Communication Architectures
- Author
-
Kharchenko Vyacheslav S, Oleg Illiashenko, E. Babeshko, and E. Ruchkov
- Subjects
Nuclear Energy and Engineering ,Computer science ,business.industry ,Control system ,Control (management) ,Instrumentation (computer programming) ,Nuclear power ,Safety, Risk, Reliability and Quality ,business ,Reliability (statistics) ,Reliability engineering ,Task (project management) - Abstract
Safety and reliability assessment of instrumentation and control (I&C) systems used in different safety-critical industries is a responsible and challenging task. Different assessment models recommended by international and national regulatory documents and used by experts worldwide still have disadvantages and limitations. Therefore, studies of assessment model improvements and refinements are essential. This paper proposes that the assessment models be improved by taking into account different architectures of communications both between different systems and within one particular system. In most models, communication lines are considered absolutely reliable, but the analysis performed shows that the communications should be necessarily addressed. Several analytical models are described to assess the reliability of safety-critical systems for nuclear power plants with different communication options.
- Published
- 2020
17. Application of the FPGA Technology for the Development of Multi-Version Safety-Critical NPP Instrumentation and Control Systems
- Author
-
Oleg Illiashenko, Kharchenko Vyacheslav S, V. Duzhyi, and Artem Perepelitsyn
- Subjects
Nuclear Energy and Engineering ,business.industry ,Computer science ,Embedded system ,Control system ,Diversity assessment ,Redundancy (engineering) ,Fault tolerance ,Static random-access memory ,Safety, Risk, Reliability and Quality ,Field-programmable gate array ,business ,Chip - Abstract
The paper overviews the requirements of international standards on application of diversity in safety-critical NPP instrumentation and control (I&C) systems. The NUREG7007 classification of version redundancy and the method for diversity assessment are described. The paper presents results from the analysis of instruments and design tools for FPGA-based embedded digital devices from leading manufacturers of programmable logics using the Xilinx and Altera (Intel) chips, which are used in NPP I&C systems, as an example. The most effective integrated development environments are analyzed and the results of comparing the functions and capabilities of using the Xilinx and Altera (Intel) tools are described. The analysis of single failures and fault tolerance using diversity in chip designs based on the SRAM technology is presented. The results from assessment of diversity metrics for RadICS platform-based multi-version I&C systems are discussed.
- Published
- 2020
18. Agile Architectural Model for Development of Time-Series Forecasting as a Service Applications
- Author
-
Illia Uzun, Ivan Lobachev, Kharchenko Vyacheslav S, and Luke Gall
- Subjects
Workflow ,Computer science ,business.industry ,Data domain ,Big data ,Scalability ,Maintainability ,Microservices ,Software engineering ,business ,Software architecture ,Architectural model - Abstract
Time-series data analysis and forecasting have become increasingly important due to its massive application and production. Working with time series, preparing and manipulating data, predicting future values, and forecasting results analysis are becoming more natural tasks in people’s everyday lives. Modelling of an architectural design for convenient and user-friendly applications that provide a range of functionality for collection, management, processing, analysis, and forecasting time-series data establishes this article’s goal. The system’s technical requirements are maintainability and the ability to expand it with new data manipulation methods and predictive models in the future (scalability). As a result of this paper an architectural model was built, field-testing and profiling of which determined that applications developed on its basis allow users to get the desired results faster than using alternative solutions. The reduction of required level of user technical skills was achieved by the presence of the front-end component. Possibility of precise time-series predictions provision regardless of the data domain was accomplished by creation of dynamically extendable predictive model management service and tools. Improvement of system maintenance and extension time-costs was the result of microservices architecture pattern usage. As a result, this work demonstrates an informational system for end-to-end workflow on time-series forecasting. Application implementation prototype (proof of concept) that was built on the basis of the described architectural model demonstrated the advantages of this design over existing analogues. During testing, scalability improvements and overall efficiency increase in terms of time and resource costs were recorded.
- Published
- 2021
19. Multi-UAV Routing for Critical Iinfrastructure Monitoring Considering Failures of UAVs : Reliability Models, Rerouting Algorithms, Industrial Case
- Author
-
Kharchenko Vyacheslav S, Herman Fesenko, Elena Zaitseva, and Ihor Kliushnikov
- Subjects
Cover (telecommunications) ,law ,Computer science ,Reliability (computer networking) ,Nuclear power plant ,Routing (electronic design automation) ,Reliability model ,Critical infrastructure ,Reliability engineering ,law.invention - Abstract
Route-based reliability models of the unmanned aerial vehicle (UAV) fleet carrying out monitoring of critical infrastructure facilities and comprising main and redundant UAVs are developed. A nuclear power plant (NPP) and monitoring stations (MSs) are considered as a critical infrastructure and critical infrastructure facilities, respectively. These models are used when multi-UAV routing for NPP monitoring and allow calculating the probability of the successful fulfilment of the plan (SFP) for the UAV fleet to cover the whole target MSs of the NPP. The dependencies showing the relationship of the probability of the SFP to both the UAV reliability function and used route-based reliability models are obtained and explored. An example of the proposed models application for routing main and redundant UAVs of the fleet to cover the whole target MSs of the Zaporizhzhia NPP is given.
- Published
- 2021
20. ТЕХНОЛОГІЯ ПОБУДОВИ ПАРАЛЕЛЬНИХ АЛГОРИТМІВ ФАКТОРИЗАЦІЇ
- Author
-
Volodymyr Pevnev and Kharchenko Vyacheslav S
- Abstract
Розглядається технологія розпаралелювання процесу факторизації великих чисел, заснована на зміні відстані між співмножники на числової осі. Представлений і проаналізовано алгоритм факторизації, який аналізує не співмножники, а складові, що дозволяє швидко вирішувати завдання факторизації як при близьких співмножником, так і при значно відрізняються один від одного. Алгоритм факторизації, заснований на рішенні нерівності, дозволяє відсікати велику кількість варіантів співмножників, які не є рішенням поставленої задачі. Проведені експериментальні дослідження показали хороші результати вирішення завдання факторизації з використанням можливого розпаралелювання цього процесу.
- Published
- 2019
21. МЕТРИЧЕСКОЕ ОЦЕНИВАНИЕ УПРАВЛЕНИЯ ВЫПОЛНЕНИЕМ ТРЕБОВАНИЙ К ПРОГРАММНОМУ ОБЕСПЕЧЕНИЮ ИУС АЭС ДЛЯ V-ОБРАЗНОЙ МОДЕЛИ ЖИЗНЕННОГО ЦИКЛА
- Author
-
Andriy Kovalenko, A. Gordieiev, Anton Andrashov, and Kharchenko Vyacheslav S
- Abstract
Рассматривается подход к метрическому оцениванию управления выполнением требований к программному обеспечению (ПО) информационно-управляющих систем (ИУС) атомных электростанций (АЭС) в соответствии с Vобразной моделью жизненного цикла разработки ПО. Предлагается ряд метрик оценивания выполнения требований, которые могут быть использованы для управления требованиями. Приведен расчет предлагаемых метрик для реальных примеров оценивания управления требованиями к функциональной безопасности. Предложенный поход позволяет описать наилучшие варианты распределения требований по этапам модели ЖЦ, определить точки возврата в жизненном цикле для каждого из требований, а также вариантов его невыполнения. Это, в свою очередь, позволяет управлять выполнением требований, в частности, определять различные сценарии возврата (влияющие на полноту проверок) и виды соответствующих корректирующих воздействий с целью снижения проектных затрат. Предложенный набор метрик является частью инструментария для проверки выполнения требований к функциональной безопасности и был использован при выполнении проекта лицензирования платформы RadICS на соответствие требованиям стандарта IEC61508/SIL3.
- Published
- 2019
22. Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
- Author
-
Oleg Illiashenko, Sergiy Dotsenko, Kharchenko Vyacheslav S, and Sergii Kamenskyi
- Subjects
knowledge management, information security, information technologies, IT security, security standards ,Engineering management ,business.industry ,Computer science ,Business intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Process improvement ,Information technology ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,business - Abstract
The paper presents an analysis of existing knowledge management models and justification for introducing an integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security – common criteria and methodology for IT security evaluation. The model of knowledge management is elaborated by analyzing the content of the relevant elements of standards and establishing the knowledge content that determines the forms of relations between them. The authors propose the application of the architecture of four-factor models towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/ IEC 27000.
- Published
- 2019
23. Homo Digitus: Its Dependable and Resilient Smart Ecosystem
- Author
-
Andrzej Rucinski, Raymond Garbos, Kharchenko Vyacheslav S, Patrick Kane, Donald Bliss, and Thaddeus Kochanski
- Subjects
Status quo ,media_common.quotation_subject ,Homo Sapiens ,Context (language use) ,02 engineering and technology ,wellness ,dependability ,Political science ,Smart city ,Wellness Signature ,0202 electrical engineering, electronic engineering, information engineering ,resilience ,media_common ,Global Trusted Dependability ,Homo Digitus ,020206 networking & telecommunications ,Environmental ethics ,Common sense ,trust ,Root cause ,021001 nanoscience & nanotechnology ,Engineering (General). Civil engineering (General) ,Homo Digitalis ,Smart Cities ,Homo sapiens ,AI ,Psychological resilience ,TA1-2040 ,0210 nano-technology ,Social structure ,Homo Hominus - Abstract
This paper evaluates the status quo of modern society and identifies the neglect of humanism as the root cause of many of today’s global challenges. Note that “smart cities” are not excluded from this indictment. The “Ptolemaic Universe” offers a means to restore our symbiosis with the environment. The ReSeT model is proposed as a tool to analyze the Ptolemaic Universe. Using ReSeT: Homo Sapiens becomes dependent on AI resulting in Homo Digitalis, with further evolution in concert with AI resulting in Homo Digitus. All of these stages are then analyzed in the context of global trusted dependability (GTD). The wellness domain, provides the design specification framework for Homo Digitus’ human-centered and resilient “smart city” ecosystem. This ultimately leads to a better world of increased wellness for Homo Hominus, with better smart cities emphasizing education and science, promoting wisdom and common sense, and rejecting violence. In summary, humanity has generated diverse social structures with erratic outcomes. On the other hand, technology provides a successful foundation for modern society especially in the Pandemic Era. However, technology’s contributions are generally not publicly acknowledged. The paper concludes with several initiatives designed to establish a trusted and resilient society.
- Published
- 2021
- Full Text
- View/download PDF
24. Development of Structured Arguments for Assurance Case
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Functional safety ,Structured text ,Development (topology) ,Structured argumentation ,Computer science ,business.industry ,Graph (abstract data type) ,Safety case ,Software engineering ,business ,General algorithm ,Argumentation theory - Abstract
The paper describes an approach to improve Assurance Case applicability through structured argumentation. We started from approach based on use of twice argumentation step including reasoning step and evidential step with structured text support. After that, we improve the existing method with the following issues: (1) a general algorithm for the development of the Assurance Case is proposed; (2) relations between the argumentation graph and templates of structured text are explicitly explained; (3) structured text is supplied with clear templates. We implement a case study applying the obtained method for arguing functional safety compliance. A general conclusion is this method makes Assurance Case methodology more practical and understandable.
- Published
- 2021
25. Embedding an Integrated Security Management System into Industry 4.0 Enterprise Management: Cybernetic Approach
- Author
-
Sergiy Dotsenko, Oleg Illiashenko, Kharchenko Vyacheslav S, and Sergii Kamenskyi
- Subjects
Process management ,Industry 4.0 ,Computer science ,Component (UML) ,Management system ,Control (management) ,SIGNAL (programming language) ,Cybernetics ,Security management ,Context (language use) - Abstract
The paper contains the results of the analysis of methodologies and standards obtaining the requirements to security management systems of enterprises including modern enterprises implementing Industry 4.0 principles. Key standards ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analyzed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system is part of the enterprise management system and based on cybernetic principle of control. These subsystems check and control according with individual and general objectives for physical, information and signal spaces and requirements-based models. The goal of the paper is to analyze the methodologies for developing an integrated security management system structure as a component of enterprise management systems in the context of Industry 4.0. The obtained results and recommendations for enhancing and implementation these systems are discussed.
- Published
- 2021
26. Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
- Author
-
Ihor Kliushnikov, Kharchenko Vyacheslav S, Herman Fesenko, and Oleg Illiashenko
- Subjects
business.industry ,Computer science ,Business intelligence ,Process improvement ,Computer security ,computer.software_genre ,business ,computer - Published
- 2021
27. Knowledge Management Model Based Approach to Profiling of Requirements: Case for Information Technologies Security Standards
- Author
-
Sergiy Dotsenko, Oleg Illiashenko, Kharchenko Vyacheslav S, and Iegor Budnichenko
- Subjects
Knowledge management ,Computer science ,business.industry ,Information technology ,Profiling (information science) ,Information security ,Architecture ,business ,Information security management system - Abstract
The paper provides analysis of existing knowledge-management models. It justifies the need of integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security—Common criteria and methodology for IT security evaluation. The formation of a model of knowledge management is carried out by analyzing the content of the relevant elements of standards and establishing the content of knowledge that determines the forms of relations between them. The architecture of four-factor models is proposed for application towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/IEC 27000.
- Published
- 2021
28. Application of Assumption Modes and Effects Analysis to XMECA
- Author
-
Kostiantyn Leontiiev, Kharchenko Vyacheslav S, Eugene Brezhniev, Andriy Kovalenko, and Ievgen Babeshko
- Subjects
Security analysis ,Intrusion ,Failure mode, effects, and criticality analysis ,Effect analysis ,Risk analysis (engineering) ,business.industry ,Computer science ,Business intelligence ,Process improvement ,Product (category theory) ,business ,Risk assessment - Abstract
Failure modes, effects and criticality analysis (FMECA) is a well-known risk assessment method used to diagnose potential failure modes of a product or system being designed. This method is much based on expert experience and aims to develop improvement strategies so as to reduce the risk of possible failures. Expert decisions and assumptions affect analysis results significantly, and when several experts are involved into analysis, obtaining final results becomes even more complicated and expert-dependent. XMECA is a generic extension of FMECA that can be applied to analysis not only failures, but other aspects related to safety and security analysis like intrusions (intrusion modes, effects and criticality analysis, IMECA) etc. This paper suggests a novel approach to support XMECA called assumption modes and effect analysis. This approach refers to a technique used to minimize risks involved in making assumptions done by expert during performance of XMECA. Possible assessment scenario are described, case study is provided.
- Published
- 2021
29. Reliability Assessment of Multi-cascade Redundant Systems Considering Failures of Intermodular and Bridge Communications
- Author
-
Ievgen Babeshko, Eugene Ruchkov, Andriy Kovalenko, and Kharchenko Vyacheslav S
- Subjects
Set (abstract data type) ,Majority rule ,Computer science ,Redundancy (engineering) ,System safety ,Reliability block diagram ,Reliability (statistics) ,Bridge (nautical) ,Reliability engineering ,Variety (cybernetics) - Abstract
The paper is devoted to research of reliability aspects of complex safety-critical systems (CSs). Nowadays such CSs are used in variety of applications, including safety systems for nuclear power plants (NPPs), power grids industrial systems and others. In the paper, models of reliability for CSs are developed and studied, taking into account intermodular and bridge communications. The following problems are resolved: a set of CSs is created based on majority voting according to the “2oo3” logic and redundancy according to the “1oo2” logic considering intermodular and bridge communications; 2) reliability block diagrams (RBDs), analytical models of CS reliability with (multi)cascade redundancy of “2oo3” and “1oo2” principles are developed (including RBDs of reactor trip systems considering communications); 3) the models are studied, the dependencies for failure-free operation probabilities of various CSs, failure rates of intermodular and bridge communications and voting elements are determined; 4) recommendations for the selection of CS types are stated.
- Published
- 2021
30. Internet of Things for Human and Industry Application: ALIOT Project and R&D Issues
- Author
-
Kharchenko Vyacheslav S, Oleg Illiashenko, Olga Morozova, and Chris Phillips
- Subjects
Engineering management ,business.industry ,Computer science ,Frame (networking) ,ComputingMilieux_COMPUTERSANDEDUCATION ,Network clustering ,Support system ,Internet of Things ,business ,Curriculum ,Three level ,Domain (software engineering) - Abstract
The paper focuses on analysis of the project “ALIOT” Internet of Things for Human and Industry Application. It discusses the complex problem how to build a united system of educational processes management in IoT domain, taking into account the industrial requirements to modern specialists in IoT. The paper proposes the principles of developing support systems of processes for acquiring knowledge that ensure the integration of educational and production systems in the frame of ALIOT project. The ALIOT project results and related R&D issues are described. The ALIOT curriculum consists of fourteen courses for three level of education: master courses, doctoral courses and industrial trainings. The main results of the ALIOT project and their interrelation are described: specialties and courses, education and research laboratories, sectoral IoT cluster network, networks of labs and centers.
- Published
- 2020
31. A Method to Enhance the Bandwidth and Noise Immunity of IIoT When Exposed to Natural and Intentional Electromagnetic Interference
- Author
-
Volodymyr Pevnev, Kharchenko Vyacheslav S, Volodymyr Tkachenko, Karyna Trubchaninova, and Aleksandr Serkov
- Subjects
business.industry ,Wireless network ,Computer science ,Bandwidth (signal processing) ,Body area network ,Electronic engineering ,Wireless ,The Internet ,business ,Electromagnetic interference ,Data transmission ,Information protection policy - Abstract
The rapidly developing ultra-wideband (UWB) radio technology is very promising for use in infocommunication systems and networks, in particular in wireless, personal (WPAN) and local (WLAN) IoT / IIoT (Internet of Things / Industrial Internet of Things) networks, including and in wearable networks (Wireless Body Area Network, WBAN) for IoMT (Internet of Medical Things). Ensuring high reliability, increasing noise immunity and the degree of information protection from interception in IIoT is due to the use of UWS technology based on ultrashort pulses with a duration of the order of units and fractions of a nanosecond, time pulse modulation and flickering polarization of the emitted signal. The use of UWS technology in a wireless IIoT network provides a number of advantages that cannot be achieved with existing methods. UWS technologies make it possible to provide high speed data transmission, low power consumption of communication facilities, solution of the problem of determining the location of objects with an accuracy of several centimeters, high penetrating power of the radio signal, an almost unlimited number of communication channels and low cost of communication facilities. The aim of the work is to ensure high reliability, noise immunity and the degree of information protection against interception in IIoT critical in speed, reliability and safety under the influence of natural and deliberate electromagnetic interference. The results obtained and the directions for further research are discussed in the conclusions.
- Published
- 2020
32. Availability Models of Industrial Internet of Things Wired System Considering Cyberattacks
- Author
-
Maryna Kolisnyk, Kharchenko Vyacheslav S, and Iryna Piskachova
- Subjects
Event (computing) ,Computer science ,Reliability (computer networking) ,media_common.quotation_subject ,Industrial Internet ,Dependability ,Computer security ,computer.software_genre ,Function (engineering) ,computer ,media_common - Abstract
A promising direction for the development of industrial enterprises is the Industrial Internet of Things (IIoT) technologies introduction. The paper presents the features of such systems organization and assesses the reliability of the functioning of the wired IIoT system. investigation of an important reliability indicator of a reconstructed wired IIoT system was provided, the availability function (AC), were carried out, which showed that it is necessary to increase the reliability of the server and the system power cables. The paper also assesses the dependability of the IIoT wired system using the mathematical apparatus of Markov models in the event of cyberattacks on the IIoT subsystems. A research of this system’s AC showed, that cyberattacks decreases mostly the AC value of IIoT wired system.
- Published
- 2020
33. Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case
- Author
-
Valentin Moiseenko, Liudmyla Yermolenko, Sergiy Dotsenko, Herman Fesenko, Oleg Illiashenko, and Kharchenko Vyacheslav S
- Subjects
Structure (mathematical logic) ,Functional safety ,Risk analysis (engineering) ,Computer science ,business.industry ,Management system ,Business intelligence ,Security management ,Enterprise information security architecture ,Safety management systems ,business ,Physical security - Abstract
The purpose of the article is to substantiate the method of integration of the environmental management system in the enterprise management system. In order to meet the requirements of ISO 7498-2-99, the structure of a multilevel integrated enterprise security management system has been developed. The system provides security management for physical, information, signaling and environmental spaces. An additional environmental management layer was introduced in comparison with the security management system proposed in [12]. The integration of environmental management meets the requirements of IEC 62264-1-2014. This allows us to form inter-layers connections and coordinate the operation of individual subsystems at the physical security, information (cyber) security, functional and ecological security layers. The implementation of this approach enhances enterprise security and environment security as a whole.
- Published
- 2020
34. Assessing the Perception of Abstract Paintings with Elements of Augmented Reality
- Author
-
Kharchenko Vyacheslav S, Mariia Danova, Igor Shostak, Elena Golembovska, and Olena Feoktystova
- Subjects
Computer science ,media_common.quotation_subject ,Agency (philosophy) ,Object (philosophy) ,Variety (cybernetics) ,Modern art ,Human–computer interaction ,Visual Objects ,Perception ,Augmented reality ,Consciousness ,computer ,media_common ,computer.programming_language - Abstract
The materials of this research are devoted to implementation of the main aspects of the problem, in particular, the analysis of the perception by visitors group of abstract visual objects of modern art with elements of augmented reality. This aspect is associated with the need to take into account the perception of the artefact by a group of visitors with a view to its subsequent transformation in new paintings or understanding of visitors. The approach to assessing the perception of abstract paintings with elements of augmented reality is described. The application of a special clustering method within the framework of the approach is substantiated, which allows reducing the variety of estimates in the formation of the initial data for the verbal semantic differential method (MSD). Application of the approach will make it possible to implement the triad "MSD — technology of collective expert assessment — ontological engineering" will serve as a methodological basis for developing an IoT-system in the form of an intellectual agency, for automatically changing the digital visual object of modern art with augmented reality, in accordance with its reflection in the mass consciousness of the visitors.
- Published
- 2020
35. Routing an Unmanned Aerial Vehicle During NPP Monitoring in the Presence of an Automatic Battery Replacement Aerial System
- Author
-
Herman Fesenko, Kharchenko Vyacheslav S, Elena Odarushchenko, Ihor Kliushnikov, and Serhii Rudakov
- Subjects
Battery (electricity) ,Quadcopter ,Computer science ,Real-time computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Travelling salesman problem ,law.invention ,Software deployment ,law ,Nuclear power plant ,Flight schedule ,Radiation monitoring ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Routing (electronic design automation) - Abstract
The paper is devoted to routing an unmanned aerial vehicle (UAV) during the Zaporizhzhia nuclear power plant monitoring without returning to the depot due to the deployment of an automatic battery replacement aerial system in specified places. The monitoring includes the overflight of the 11 monitoring stations to collect radiation monitoring data from them in case of damage of wired networks between the monitoring stations and the crisis centre. The shortest possible UAV route that visits every monitoring station (route point) exactly once and returns to the UAV depot is found by solving the Travelling Salesman Problem. An algorithm for determining the places for deployment of the automatic battery replacement aerial system is presented. A flight schedule both for the UAV and the automatic battery replacement aerial system is developed. The DJI Mavic 2 Enterprise Dual quadcopter is considered as a UAV for monitoring missions. The SL-231 Scout helicopter capable to operate in an unmanned mode is considered as a platform for the automatic battery replacement system.
- Published
- 2020
36. Availability Model of Two-Zone Physical Security System considering Cyber Attacks and Software Update
- Author
-
Al-Khafaji Ahmed Waleed, Oleg Ivanchenko, Dmytro Uzun, Larysa Degtyareva, Yuriy Ponochovnyi, and Kharchenko Vyacheslav S
- Subjects
business.industry ,Computer science ,Distributed computing ,media_common.quotation_subject ,Process (computing) ,Motion detection ,Access control ,Software ,Component (UML) ,business ,Function (engineering) ,MATLAB ,computer ,Physical security ,media_common ,computer.programming_language - Abstract
The article analyzes the process of functioning of physical security systems in the conditions of component failures, cyberattacks and software updates. A zonal model of physical security systems, which includes motion detection and access control subsystems, have been built. Updating the software functions of each zone, attacks on the physical component of the motion detection subsystem, and cyber attacks on the access control system have been investigated. To model software updates, a multi-fragment model, including 9 states of each fragment and program update states has been created. To study the behavior of the model while changing the input parameters, Matlab scripts have been developed. Simulation results allow to evaluate the availability function minimum value, availability function value in stationary mode, time interval for the transition of the availability function to the stationary mode.
- Published
- 2020
37. Assumption Modes and Effect Analysis of XMECA: Expert based safety assessment
- Author
-
Kostiantyn Leontiiev, Kharchenko Vyacheslav S, and Ievgen Babeshko
- Subjects
Effect analysis ,Failure mode, effects, and criticality analysis ,Computer science ,Extension (predicate logic) ,Product (category theory) ,Risk assessment ,Reliability engineering - Abstract
Failure modes, effects and criticality analysis (FMECA) is a well-known risk assessment method used to diagnose potential failure modes of a product or system being designed. This method is much based on expert experience and aims to develop improvement strategies so as to reduce the risk of failures. XMECA is a generic extension of this approach that can be applied to analysis not only failures, but other aspects related to safety analysis like intrusions (IMECA) etc. Assumption modes and effect analysis refers to a suggested technique used to minimize risks involved in making assumptions done by expert during performance of XMECA. Possible assessment scenario are described.
- Published
- 2020
38. Combination of Digital Twin and Artificial Intelligence in Manufacturing Using Industrial IoT
- Author
-
Olga Morozova, Sergii Sokolov, Kharchenko Vyacheslav S, and Oleg Illiashenko
- Subjects
Broad spectrum ,Decision support system ,Industry 4.0 ,Process (engineering) ,Computer science ,business.industry ,State (computer science) ,Applications of artificial intelligence ,Artificial intelligence ,Business model ,Internet of Things ,business - Abstract
The paper focuses on Digital Twin (DT) in Manufacturing using Artificial Intelligence (AI) and Industrial IoT. According to the concept, the manufacturing includes three main units: equipment, personnel and processes. All data from these units are inherited to manufacture model (DT) and decision support system with the use of AI. DT data technology allows finding the required knowledge that can be interpreted and used to support the process of decision-making in the management of the enterprise. AI applications open up a broad spectrum of opportunities in manufacturing to add value by optimizing processes and generating new business models. The Landscape was described by a formal model to assure the possibility to analyze the state and development of landscape in detail considering DT and other technologies. DT and IIoT implementation for the simulation of real enterprise manufacturing were considered.
- Published
- 2020
39. The Minimizating of Hardware for Implementation of Pseudo LRU Algorithm for Cache Memory
- Author
-
Kharchenko Vyacheslav S and Vadym Puidenko
- Subjects
Hardware_MEMORYSTRUCTURES ,Computer science ,CPU cache ,business.industry ,Simple (abstract algebra) ,Reliability (computer networking) ,Substitution (logic) ,State (computer science) ,business ,Realization (systems) ,Cache algorithms ,Computer hardware ,Automaton - Abstract
the synthesis of the synchronous digital automaton with the logic of the pseudo LRU algorithm is carried out taking into the account events of hits or misses inside the associative cache memory. The synchronous digital automaton's model with the controlling logic for management substitution of data elements at the full reliability of the selected data's multitude is described. The minimizating for the switching functions that are simple completely defined and composite not completely defined are carried out. They are switched as: L = λ(B) by selecting multiple among reliable values and B+ = f(B, λ(B)) forming the values of bits for unit LRU considering the previous state. As a result the minimum discrete realization has been obtained by suggested hardware solutions substitution policy for the algorithm of pseudo LRU of internal associative cache memory.
- Published
- 2020
40. Dependability Assessment for SCADA System Considering Usage of Cloud Resources
- Author
-
Borys Moroz, Oleg Ivanchenko, Leonid Kabak, Eugene Brezhnev, Yuriy Ponochovnyi, and Kharchenko Vyacheslav S
- Subjects
SCADA ,Risk analysis (engineering) ,Stochastic modelling ,Computer science ,Order (business) ,business.industry ,Disaster recovery ,Dependability ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Functional requirement ,Reliability block diagram ,Cloud computing ,business - Abstract
Supervisory Control and Data Acquisition (SCADA) system is one the most significant cyber-oriented components of management circuit for any complex hierarchical infrastructure. The effectiveness and performance of the SCADA system depends on a number of relevant factors including a possibility to utilize additional cloud resources. Of particular note, the cloud services can apply in order to create concurrent redundant system for implementation of disaster recovery feature of SCADA information resources during different deliberate malicious impacts and intrusions. However, in spite of the fact that usage of the cloud services allow to enhance functionality of SCADA system, there are dependability and cybersecurity aspects for their joint utilization hat keep to remain a serious challenge for service personnel and users. In this paper, authors propose to employ analytical and stochastic modelling in order to get a numerical dependability assessment for SCADA system with realization of the cloud resourcing support considering influence of diverse negative factors. Furthermore, developers can utilize these modelling results in order to perform justification of overall functional requirements of the SCADA system.
- Published
- 2020
41. Structured Argumentation for Assurance Case of Monitoring System based on UAVs
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Structured text ,Structured argumentation ,business.industry ,Computer science ,Graph (abstract data type) ,Monitoring system ,Security critical systems ,Software engineering ,business ,Argumentation framework - Abstract
In this paper we propose to apply structured argumentation for Assurance Case methodology to continue developing a concept of licensing for Nuclear Power Plants PostAccident Monitoring System (PAMS) based on Unmanned Aircraft Vehicles (UAVs). We obtained the structured argumentation method including the following: the new overall algorithm of the Assurance Case development; the new proposed structure of the Assurance Case graph, which is based on the typical structure of the arguments and is developed in connection with the structured text of the description of these arguments; the improved structured text templates for arguments description. The obtained method can be used as the basis of the appropriated argumentation framework supported with a set of formal operations performed with the Assurance Case graph and supported structural text. The obtained practical and theoretical results may be used for any kinds of safety and security critical systems and applications.
- Published
- 2020
42. Prototyping and Rapid Development of IoT Systems in Context of Edge Computing
- Author
-
Plakhteyev Anatoly, Kharchenko Vyacheslav S, and Heorhii Zemlianko
- Subjects
business.industry ,Computer science ,Cloud computing ,law.invention ,law ,Internet Protocol ,Network level ,Virtual device ,Latency (engineering) ,Internet of Things ,business ,Wireless sensor network ,Edge computing ,Computer network - Abstract
Currently, Cloud, IoT, Dew, Edge and touch networks of “things” are allocated as part of the program system. Data at the touch network level is associated with physical objects. At the Edge level, data is separated from objects to form a Digital Twin representation of their state, properties, and behavior with minimal latency. Copies of Digital Twin “things” are stored and used at different levels, but must reflect their current state. Interaction with “things” in IoT, data transport between sensor networks through their boundary nodes is considered. For Edge computing research it is proposed to create physical and virtual models of fragments of touch networks, their boundary nodes, processing of data and organization of access of devices as part of “things” to remote IoT resources. The paper shows how to build a virtual device model in a Proteus environment and assess adequacy versus a physical model. Implemented a piece of wired sensor network with TCP/IP protocol based on open platforms.
- Published
- 2020
43. Safety and Security Management for NPP I&C Systems
- Author
-
Kharchenko Vyacheslav S and Vladimir Sklyar
- Subjects
Computer science ,Security management ,Computer security ,computer.software_genre ,computer - Abstract
The main contribution of this study comprises a set of detailed contents for safety and security management. The following aspects of safety and security management requirements for NPP I&C systems are considered: relation between safety and security management, safety and security management plan, human resource management, configuration management, computer tools selection and evaluation, documentation management, planning of safety and security assessment.
- Published
- 2020
44. Model of Functional Behavior of Healthcare Internet of Things Device Using Erlang Phase Method
- Author
-
Anastasiia Strielkina, Bohdan Volochiy, Serhiy Volochiy, and Kharchenko Vyacheslav S
- Subjects
020203 distributed computing ,021103 operations research ,business.industry ,Stochastic modelling ,Computer science ,0211 other engineering and technologies ,State vector ,02 engineering and technology ,Industrial engineering ,Erlang (unit) ,Automaton ,Exponential function ,Exponential growth ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,Internet of Things ,business - Abstract
The presented paper deals with exponentially growing technology – the Internet of Things (IoT) in the field of healthcare and medicine providing. The goal of the paper is to develop and research a discrete-continuous stochastic model (DCSM) of a functional behavior of a networked healthcare device (in the considered case – an insulin pump) in a form of a structural automaton model (SAM) using the Erlang phase method. It is spoken in the brief details about the healthcare IoT environment, networked insulin pump hazards and behavior with a description of the functional procedures, indicators and parameters of functionality and safety are given. Much attention is aimed at the development process of the DCSM using exponential and Erlang’s distribution laws, description of basic events and structure of a state vector, development of the SAMs. The procedures of validation of the developed models for the exponential and Erlang’s distribution laws are presented and include four research cases to check the relevance of the obtained results. The obtained results show the limit value of the task non-performing probability.
- Published
- 2020
45. Assurance Case for I&C Systems Safety and Security Assessment
- Author
-
Kharchenko Vyacheslav S and Vladimir Sklyar
- Subjects
Risk analysis (engineering) ,Computer science ,021105 building & construction ,05 social sciences ,0211 other engineering and technologies ,0501 psychology and cognitive sciences ,02 engineering and technology ,Security assessment ,050107 human factors - Abstract
Two existing notations for the assurance case (claim, argument and evidence [CAE] and goal structuring notation [GSN]) are considered. Supporting software tools for development of the assurance case are considered. Some ways for improvement and modification are proposed for both assurance case notations (CAE and GSN). For CAE, the authors obtained annex with acceptance and coverage criteria as well as an algorithm of the assurance case update through life cycle stages. For GSN, they improve structured argumentation with support of structured text using. Recommendations for using the assurance case notations and tools for I&C systems are formulated.
- Published
- 2020
46. Criticality Assessment of Critical Information Infrastructure Objects: A Category Based Methodology and Ukrainian Experience
- Author
-
Kharchenko Vyacheslav S, Oleg Illiashenko, Yurii Tsyplinskyi, and Oleksandr Potii
- Subjects
Process management ,Criticality ,Categorization ,Computer science ,Ukrainian ,Critical information infrastructure ,language ,Normative ,Object (computer science) ,Critical infrastructure ,Field (computer science) ,language.human_language - Abstract
The paper outlines the basic principles and assumptions used to assess the criticality of critical infrastructure object (CIO) and critical information infrastructure objects (CIIO). Methods for assigning critical information infrastructure objects to the criticality levels are described. The sequence of carrying out the criticality assessment of CIOs is provided. The recommendations concerning evolving regulation in the field of critical information infrastructure objects protection are given. According to the results of the research, several drafts of the Ukrainian state-level normative documents were developed such as “Classification of critical information infrastructure objects by severity (criticality)” and “Criteria and procedure for assigning critical information infrastructure objects to one of the significance (criticality)”. The implementation of the developed documents is an important step in the construction of the Ukrainian state system of protection of critical information infrastructure.
- Published
- 2020
47. The Availability Models of Two-Zone Physical Security System Considering Cyber Attacks
- Author
-
Ievgen Brezhniev, Yuriy Ponochovnyi, Al-Khafaji Ahmed Waleed, Artem Boyarchuk, and Kharchenko Vyacheslav S
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,Interval (mathematics) ,Markov model ,Reliability engineering ,Software ,State space ,State (computer science) ,Function (engineering) ,business ,Physical security ,Degradation (telecommunications) ,media_common - Abstract
Relevance of the paper is confirmed by the need to protect the security systems themselves, not only from physical damage, but also from cyber attacks by intruders. The paper explores the Markov model of the two-zone cyber-physical security system. Evaluation of the functioning of the multi-zone system was carried out taking into account two degrees of degradation (operative condition - the failure state of all zones). The state space of the model (or one fragment) has a dimension of 9 states. In the proposed model, hardware failures caused by vandal attacks on objects of the first zone and software failures due to cyber attacks on the functions of the second zone are considered. The simulation results illustrate different transition intervals of availability indicators of various levels of degradation to a stationary state. For different degrees of degradation, the minimum value of the availability function, the time interval of the transition of the availability function to the stationary mode, and the value of the availability function in the stationary mode are determined. When eliminating software defects and vulnerabilities, the increase in the availability function is 0.23% for a zero level of system degradation.
- Published
- 2020
48. A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT
- Author
-
Oleg Illiashenko, Olga Morozova, Sergii Sokolov, and Kharchenko Vyacheslav S
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Digital Twin, Internet of Things, Industry 4.0, manufacturing, logistics, Industrial IoT, DT coverage ,Process improvement ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020207 software engineering ,02 engineering and technology ,Engineering management ,020901 industrial engineering & automation ,Business intelligence ,0202 electrical engineering, electronic engineering, information engineering ,business ,Internet of Things - Abstract
This article presents a Digital Twin (DT) for the logistics system of a manufacturing enterprise using industrial IoT. DT data technology allows to find the required knowledge that can be interpreted and used to support the process of decision making in the management of the enterprise. The authors propose a classification of DTs for manufacturing and a systematic approach to DT application, as well as its use for simulation of real logistics systems.
- Published
- 2020
- Full Text
- View/download PDF
49. Reliability Evaluation of Heterogeneous Drone Fleet by Structure Function based Method
- Author
-
Miroslav Kvassay, Vitaly Levashenko, Elena Zaitseva, and Kharchenko Vyacheslav S
- Subjects
Computer science ,Structure function ,Drone ,Reliability (statistics) ,Reliability engineering - Published
- 2020
50. Multi-fragmental Markov’s Models for Safety Assessment of NPP I&C System Considering Migration of Hidden Failures
- Author
-
Artem Boyarchuk, Kharchenko Vyacheslav S, Ihor Rudenko, Yuriy Ponochovnyi, and Anton Andrashov
- Subjects
Decision support system ,Markov chain ,business.industry ,Computer science ,Information technology ,02 engineering and technology ,01 natural sciences ,law.invention ,Reliability engineering ,010104 statistics & probability ,Software ,Life-critical system ,law ,Control system ,Nuclear power plant ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0101 mathematics ,Unavailability ,business - Abstract
The information and control systems of Nuclear Power Plant and other safety critical systems are considered as a set of three independent hardware channels including online testing system. Nuclear Power Plant information and control systems design on programmable platforms is rigidly tied to the V-model of the life cycle. Safety and availability during its life cycle are assessed using Markov and multi-fragmental models. The multi-fragmental model MICS32 contains an absorbing state in case of hidden faults and allows evaluating risks of “hidden” unavailability. The MICS42 model simulates the “migration” of states with undetected failures into states with detected faults. These models describe the functioning of the system and the complete elimination of software faults. Results of multi-fragmental modeling are compared to evaluate proof test period taking into account requirements for SIL3 level and limiting values of hidden fault probabilities. Multi-fragment models are included in the assessing method of implementation safety requirements of ICS on programmable platforms. The information technology of decision support in assessing and managing the implementation of the requirements for ICS safety is also considered.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.