108 results on '"Kharchenko Vyacheslav S"'
Search Results
2. A Method to Enhance the Bandwidth and Noise Immunity of IIoT When Exposed to Natural and Intentional Electromagnetic Interference
- Author
-
Volodymyr Pevnev, Kharchenko Vyacheslav S, Volodymyr Tkachenko, Karyna Trubchaninova, and Aleksandr Serkov
- Subjects
business.industry ,Wireless network ,Computer science ,Bandwidth (signal processing) ,Body area network ,Electronic engineering ,Wireless ,The Internet ,business ,Electromagnetic interference ,Data transmission ,Information protection policy - Abstract
The rapidly developing ultra-wideband (UWB) radio technology is very promising for use in infocommunication systems and networks, in particular in wireless, personal (WPAN) and local (WLAN) IoT / IIoT (Internet of Things / Industrial Internet of Things) networks, including and in wearable networks (Wireless Body Area Network, WBAN) for IoMT (Internet of Medical Things). Ensuring high reliability, increasing noise immunity and the degree of information protection from interception in IIoT is due to the use of UWS technology based on ultrashort pulses with a duration of the order of units and fractions of a nanosecond, time pulse modulation and flickering polarization of the emitted signal. The use of UWS technology in a wireless IIoT network provides a number of advantages that cannot be achieved with existing methods. UWS technologies make it possible to provide high speed data transmission, low power consumption of communication facilities, solution of the problem of determining the location of objects with an accuracy of several centimeters, high penetrating power of the radio signal, an almost unlimited number of communication channels and low cost of communication facilities. The aim of the work is to ensure high reliability, noise immunity and the degree of information protection against interception in IIoT critical in speed, reliability and safety under the influence of natural and deliberate electromagnetic interference. The results obtained and the directions for further research are discussed in the conclusions.
- Published
- 2020
3. Availability Models of Industrial Internet of Things Wired System Considering Cyberattacks
- Author
-
Maryna Kolisnyk, Kharchenko Vyacheslav S, and Iryna Piskachova
- Subjects
Event (computing) ,Computer science ,Reliability (computer networking) ,media_common.quotation_subject ,Industrial Internet ,Dependability ,Computer security ,computer.software_genre ,Function (engineering) ,computer ,media_common - Abstract
A promising direction for the development of industrial enterprises is the Industrial Internet of Things (IIoT) technologies introduction. The paper presents the features of such systems organization and assesses the reliability of the functioning of the wired IIoT system. investigation of an important reliability indicator of a reconstructed wired IIoT system was provided, the availability function (AC), were carried out, which showed that it is necessary to increase the reliability of the server and the system power cables. The paper also assesses the dependability of the IIoT wired system using the mathematical apparatus of Markov models in the event of cyberattacks on the IIoT subsystems. A research of this system’s AC showed, that cyberattacks decreases mostly the AC value of IIoT wired system.
- Published
- 2020
4. Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case
- Author
-
Valentin Moiseenko, Liudmyla Yermolenko, Sergiy Dotsenko, Herman Fesenko, Oleg Illiashenko, and Kharchenko Vyacheslav S
- Subjects
Structure (mathematical logic) ,Functional safety ,Risk analysis (engineering) ,Computer science ,business.industry ,Management system ,Business intelligence ,Security management ,Enterprise information security architecture ,Safety management systems ,business ,Physical security - Abstract
The purpose of the article is to substantiate the method of integration of the environmental management system in the enterprise management system. In order to meet the requirements of ISO 7498-2-99, the structure of a multilevel integrated enterprise security management system has been developed. The system provides security management for physical, information, signaling and environmental spaces. An additional environmental management layer was introduced in comparison with the security management system proposed in [12]. The integration of environmental management meets the requirements of IEC 62264-1-2014. This allows us to form inter-layers connections and coordinate the operation of individual subsystems at the physical security, information (cyber) security, functional and ecological security layers. The implementation of this approach enhances enterprise security and environment security as a whole.
- Published
- 2020
5. Assessing the Perception of Abstract Paintings with Elements of Augmented Reality
- Author
-
Kharchenko Vyacheslav S, Mariia Danova, Igor Shostak, Elena Golembovska, and Olena Feoktystova
- Subjects
Computer science ,media_common.quotation_subject ,Agency (philosophy) ,Object (philosophy) ,Variety (cybernetics) ,Modern art ,Human–computer interaction ,Visual Objects ,Perception ,Augmented reality ,Consciousness ,computer ,media_common ,computer.programming_language - Abstract
The materials of this research are devoted to implementation of the main aspects of the problem, in particular, the analysis of the perception by visitors group of abstract visual objects of modern art with elements of augmented reality. This aspect is associated with the need to take into account the perception of the artefact by a group of visitors with a view to its subsequent transformation in new paintings or understanding of visitors. The approach to assessing the perception of abstract paintings with elements of augmented reality is described. The application of a special clustering method within the framework of the approach is substantiated, which allows reducing the variety of estimates in the formation of the initial data for the verbal semantic differential method (MSD). Application of the approach will make it possible to implement the triad "MSD — technology of collective expert assessment — ontological engineering" will serve as a methodological basis for developing an IoT-system in the form of an intellectual agency, for automatically changing the digital visual object of modern art with augmented reality, in accordance with its reflection in the mass consciousness of the visitors.
- Published
- 2020
6. Routing an Unmanned Aerial Vehicle During NPP Monitoring in the Presence of an Automatic Battery Replacement Aerial System
- Author
-
Herman Fesenko, Kharchenko Vyacheslav S, Elena Odarushchenko, Ihor Kliushnikov, and Serhii Rudakov
- Subjects
Battery (electricity) ,Quadcopter ,Computer science ,Real-time computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Travelling salesman problem ,law.invention ,Software deployment ,law ,Nuclear power plant ,Flight schedule ,Radiation monitoring ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Routing (electronic design automation) - Abstract
The paper is devoted to routing an unmanned aerial vehicle (UAV) during the Zaporizhzhia nuclear power plant monitoring without returning to the depot due to the deployment of an automatic battery replacement aerial system in specified places. The monitoring includes the overflight of the 11 monitoring stations to collect radiation monitoring data from them in case of damage of wired networks between the monitoring stations and the crisis centre. The shortest possible UAV route that visits every monitoring station (route point) exactly once and returns to the UAV depot is found by solving the Travelling Salesman Problem. An algorithm for determining the places for deployment of the automatic battery replacement aerial system is presented. A flight schedule both for the UAV and the automatic battery replacement aerial system is developed. The DJI Mavic 2 Enterprise Dual quadcopter is considered as a UAV for monitoring missions. The SL-231 Scout helicopter capable to operate in an unmanned mode is considered as a platform for the automatic battery replacement system.
- Published
- 2020
7. Availability Model of Two-Zone Physical Security System considering Cyber Attacks and Software Update
- Author
-
Al-Khafaji Ahmed Waleed, Oleg Ivanchenko, Dmytro Uzun, Larysa Degtyareva, Yuriy Ponochovnyi, and Kharchenko Vyacheslav S
- Subjects
business.industry ,Computer science ,Distributed computing ,media_common.quotation_subject ,Process (computing) ,Motion detection ,Access control ,Software ,Component (UML) ,business ,Function (engineering) ,MATLAB ,computer ,Physical security ,media_common ,computer.programming_language - Abstract
The article analyzes the process of functioning of physical security systems in the conditions of component failures, cyberattacks and software updates. A zonal model of physical security systems, which includes motion detection and access control subsystems, have been built. Updating the software functions of each zone, attacks on the physical component of the motion detection subsystem, and cyber attacks on the access control system have been investigated. To model software updates, a multi-fragment model, including 9 states of each fragment and program update states has been created. To study the behavior of the model while changing the input parameters, Matlab scripts have been developed. Simulation results allow to evaluate the availability function minimum value, availability function value in stationary mode, time interval for the transition of the availability function to the stationary mode.
- Published
- 2020
8. Assumption Modes and Effect Analysis of XMECA: Expert based safety assessment
- Author
-
Kostiantyn Leontiiev, Kharchenko Vyacheslav S, and Ievgen Babeshko
- Subjects
Effect analysis ,Failure mode, effects, and criticality analysis ,Computer science ,Extension (predicate logic) ,Product (category theory) ,Risk assessment ,Reliability engineering - Abstract
Failure modes, effects and criticality analysis (FMECA) is a well-known risk assessment method used to diagnose potential failure modes of a product or system being designed. This method is much based on expert experience and aims to develop improvement strategies so as to reduce the risk of failures. XMECA is a generic extension of this approach that can be applied to analysis not only failures, but other aspects related to safety analysis like intrusions (IMECA) etc. Assumption modes and effect analysis refers to a suggested technique used to minimize risks involved in making assumptions done by expert during performance of XMECA. Possible assessment scenario are described.
- Published
- 2020
9. Combination of Digital Twin and Artificial Intelligence in Manufacturing Using Industrial IoT
- Author
-
Olga Morozova, Sergii Sokolov, Kharchenko Vyacheslav S, and Oleg Illiashenko
- Subjects
Broad spectrum ,Decision support system ,Industry 4.0 ,Process (engineering) ,Computer science ,business.industry ,State (computer science) ,Applications of artificial intelligence ,Artificial intelligence ,Business model ,Internet of Things ,business - Abstract
The paper focuses on Digital Twin (DT) in Manufacturing using Artificial Intelligence (AI) and Industrial IoT. According to the concept, the manufacturing includes three main units: equipment, personnel and processes. All data from these units are inherited to manufacture model (DT) and decision support system with the use of AI. DT data technology allows finding the required knowledge that can be interpreted and used to support the process of decision-making in the management of the enterprise. AI applications open up a broad spectrum of opportunities in manufacturing to add value by optimizing processes and generating new business models. The Landscape was described by a formal model to assure the possibility to analyze the state and development of landscape in detail considering DT and other technologies. DT and IIoT implementation for the simulation of real enterprise manufacturing were considered.
- Published
- 2020
10. The Minimizating of Hardware for Implementation of Pseudo LRU Algorithm for Cache Memory
- Author
-
Kharchenko Vyacheslav S and Vadym Puidenko
- Subjects
Hardware_MEMORYSTRUCTURES ,Computer science ,CPU cache ,business.industry ,Simple (abstract algebra) ,Reliability (computer networking) ,Substitution (logic) ,State (computer science) ,business ,Realization (systems) ,Cache algorithms ,Computer hardware ,Automaton - Abstract
the synthesis of the synchronous digital automaton with the logic of the pseudo LRU algorithm is carried out taking into the account events of hits or misses inside the associative cache memory. The synchronous digital automaton's model with the controlling logic for management substitution of data elements at the full reliability of the selected data's multitude is described. The minimizating for the switching functions that are simple completely defined and composite not completely defined are carried out. They are switched as: L = λ(B) by selecting multiple among reliable values and B+ = f(B, λ(B)) forming the values of bits for unit LRU considering the previous state. As a result the minimum discrete realization has been obtained by suggested hardware solutions substitution policy for the algorithm of pseudo LRU of internal associative cache memory.
- Published
- 2020
11. Dependability Assessment for SCADA System Considering Usage of Cloud Resources
- Author
-
Borys Moroz, Oleg Ivanchenko, Leonid Kabak, Eugene Brezhnev, Yuriy Ponochovnyi, and Kharchenko Vyacheslav S
- Subjects
SCADA ,Risk analysis (engineering) ,Stochastic modelling ,Computer science ,Order (business) ,business.industry ,Disaster recovery ,Dependability ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Functional requirement ,Reliability block diagram ,Cloud computing ,business - Abstract
Supervisory Control and Data Acquisition (SCADA) system is one the most significant cyber-oriented components of management circuit for any complex hierarchical infrastructure. The effectiveness and performance of the SCADA system depends on a number of relevant factors including a possibility to utilize additional cloud resources. Of particular note, the cloud services can apply in order to create concurrent redundant system for implementation of disaster recovery feature of SCADA information resources during different deliberate malicious impacts and intrusions. However, in spite of the fact that usage of the cloud services allow to enhance functionality of SCADA system, there are dependability and cybersecurity aspects for their joint utilization hat keep to remain a serious challenge for service personnel and users. In this paper, authors propose to employ analytical and stochastic modelling in order to get a numerical dependability assessment for SCADA system with realization of the cloud resourcing support considering influence of diverse negative factors. Furthermore, developers can utilize these modelling results in order to perform justification of overall functional requirements of the SCADA system.
- Published
- 2020
12. Structured Argumentation for Assurance Case of Monitoring System based on UAVs
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Structured text ,Structured argumentation ,business.industry ,Computer science ,Graph (abstract data type) ,Monitoring system ,Security critical systems ,Software engineering ,business ,Argumentation framework - Abstract
In this paper we propose to apply structured argumentation for Assurance Case methodology to continue developing a concept of licensing for Nuclear Power Plants PostAccident Monitoring System (PAMS) based on Unmanned Aircraft Vehicles (UAVs). We obtained the structured argumentation method including the following: the new overall algorithm of the Assurance Case development; the new proposed structure of the Assurance Case graph, which is based on the typical structure of the arguments and is developed in connection with the structured text of the description of these arguments; the improved structured text templates for arguments description. The obtained method can be used as the basis of the appropriated argumentation framework supported with a set of formal operations performed with the Assurance Case graph and supported structural text. The obtained practical and theoretical results may be used for any kinds of safety and security critical systems and applications.
- Published
- 2020
13. Augmented Reality for the Abstract Paintings: Application Scenarios, Semantic Similarity Analysis and Case Study
- Author
-
Olena Feoktystova, Mariia Danova, Igor Shostak, Vladyslav Plietnov, Kharchenko Vyacheslav S, and Olena Golembovska
- Subjects
Computer science ,media_common.quotation_subject ,Object (computer science) ,Semantic similarity ,Modern art ,Human–computer interaction ,Perception ,Visual Objects ,Augmented reality ,Semantic differential ,Set (psychology) ,computer ,media_common ,computer.programming_language - Abstract
The approach to the analysis of the perception by visitors of abstract visual objects of modern art with elements of augmented reality is presented. The methodological basis of the approach are: a set of private scenarios of interaction between individual visitors and their groups with the objects exhibited; generalized scenario of lexico-semantic analysis of the proximity of the visitors verbal assessments to the name of the object; method of verbal semantic differential. Is considered an example of a quantitative assessment obtaining of the semantic proximity verbal assessments of visitors to the name of a visual object. The application of the discussed approach will provide the possibility of automatic adjustment (based on the technology of the Internet of Things) of augmented reality elements in abstract visual objects of art, with a view to a deeper understanding of their audience.
- Published
- 2019
14. AvTA Based Assessment of Dependability Considering Recovery After Failures and Attacks on Vulnerabilities
- Author
-
Yuriy Ponochovniy, Al-Sudani Mustafa Qahtan Abdulmunem, Iryna Shulga, and Kharchenko Vyacheslav S
- Subjects
Computer science ,business.industry ,Reliability (computer networking) ,020208 electrical & electronic engineering ,05 social sciences ,Attack tree ,02 engineering and technology ,Reliability engineering ,Tree (data structure) ,Failure mode, effects, and criticality analysis ,Component (UML) ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,Instrumentation (computer programming) ,business ,050203 business & management ,Building automation - Abstract
The paper describes modification of the ATA (Attack Tree Analysis) technique for assessment of instrumentation and control systems (ICS) dependability (reliability, availability and cyber security) called AvTA (Availability Tree Analysis). The techniques FMEA, FMECA and IMECA applied to carry out preliminary semi-formal and criticality oriented analysis before AvTA based assessment are described. AvTA models combine reliability and cyber security subtrees considering probabilities of ICS recovery in case of hardware (physical) and software (design) failures and attacks on components casing failures. Successful recovery events (SREs) avoid corresponding failures in tree using OR gates if probabilities of SRE for assumed time are more than required. Case for dependability AvTA based assessment (model, availability function and technology of decision-making for choice of component and system parameters) for smart building ICS (Building Automation Systems, BAS) is discussed.
- Published
- 2019
15. ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Security framework ,Industry 4.0 ,business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,Information security ,Computer security ,computer.software_genre ,Asset (computer security) ,Agency (sociology) ,0202 electrical engineering, electronic engineering, information engineering ,media_common.cataloged_instance ,020201 artificial intelligence & image processing ,European union ,Internet of Things ,business ,computer ,media_common - Abstract
The paper is devoted to analysis of a set of the European Union Agency for Network and Information Security (ENISA) documents in area of IoT security. Industrial IoT (IIoT) characteristics are studied for differences between IIoT and IoT, IIoT asset taxonomy and IIoT security challenges. After that ENISA IoT/IIoT Security Framework has been formed on the base of semantic details of the six studied ENISA documents. Additional attention is paid to IIoT treats taxonomy and attacks scenarios.
- Published
- 2019
16. Reliability Assessment of Heterogeneous Drone Fleet With Sliding Redundancy
- Author
-
Elena Zaitseva, Miroslav Kvassay, Herman Fesenko, Kharchenko Vyacheslav S, and Patrik Rusnak
- Subjects
Computer science ,Structure function ,Redundancy (engineering) ,Representation (mathematics) ,Maintenance engineering ,Drone ,Reliability engineering - Abstract
Reliability analysis of system is a complex problem. One important step is reliability analysis is development of mathematical representation of the investigated system. Modern system is composed by many components with different attributes and properties that should be taken into account in his reliability analysis. Therefore, it is important to choose suitable approach for representation of the system behavior. One such approach is known as structure function. In this paper we will show how the structure function of the system can be used to acquire the reliability function. The specific aspect of this approach is the possibility to use for system with homogenous and heterogeneous components. This will be shown on the reliability analysis of the drone fleet.
- Published
- 2019
17. Development of Models in Resilient Computing
- Author
-
Oleksandr Drozd, Dmitry A. Maevsky, Raymond Garbos, Thaddeus Kochanski, Kharchenko Vyacheslav S, and Andrzej Rucinski
- Subjects
Digital electronics ,Resource (project management) ,Relation (database) ,Computer science ,business.industry ,Process (engineering) ,Path (graph theory) ,Natural order ,Resilience (network) ,business ,Structuring ,Industrial engineering - Abstract
The article analyzes the concept of "Resilience" in relation to the development of computing. The strategy for reacting to perturbations in this process can be based either on "harsh Resistance" or "smarter Elasticity." Our "Models" are descriptive in defining the path of evolutionary development as structuring under the perturbations of the natural order and enable the analysis of the relationship among models, structures and factors of evolution. Among those, two features are critical: parallelism and "fuzziness", which to a large extent determine the rate of change of computing development, especially in critical applications. Both reversible and irreversible development processes related to elastic and resistant methods of problem solving are discussed. The sources of perturbations are located in vicinity of the resource boundaries, related to growing problem size with progress combined with the lack of computational "checkability" of resources i.e. data with inadequate models, methodologies and means. As a case study, the problem of hidden faults caused by the growth, the deficit of resources, and the checkability of digital circuits in critical applications is analyzed.
- Published
- 2019
18. Structure Function Based Methods in Evaluation of Availability of Healthcare system
- Author
-
Peter Sedlacek, Oleg Illiashenko, Patrik Rusnak, Andrej Forgac, and Kharchenko Vyacheslav S
- Subjects
Quantitative analysis (finance) ,Computer science ,Factor (programming language) ,Influence diagram ,Dimension (data warehouse) ,Representation (mathematics) ,computer ,Reliability (statistics) ,Healthcare system ,computer.programming_language ,Reliability engineering ,Human reliability - Abstract
Reliability analysis is important properties of any system and healthcare system too. The healthcare system has some specifics in reliability analysis. One of them is the heterogeneity, because this system includes components with different background, kind and properties (for example, equipment and human factor). Other specific of healthcare system is great influence of human factor. Typically, the influence of human factor is evaluated by special methods from special part of reliability engineering that is known as Human Reliability Analysis (HRA). But these methods can not be used for evaluation of technical part (components) of healthcare system. In this paper new method for healthcare system evaluation is developed. This method is proposed for the quantitative analysis of healthcare system and, in particular, for Importance Analysis of this system. It is based on the application of mathematical representation that is named Multi-State System (MSS) to indicate some (more than only two) performance levels in investigated system for more details analysis. In this paper the representation of healthcare system in form of Multi-Valued Decision Diagram is used, that typically used for the system of large dimension.
- Published
- 2019
19. Model of Functional Behavior of Healthcare Internet of Things Device
- Author
-
Bohdan Volochiy, Kharchenko Vyacheslav S, and Anastasiia Strielkina
- Subjects
Structure (mathematical logic) ,Human–computer interaction ,business.industry ,Computer science ,Stochastic modelling ,Process (engineering) ,Health care ,State vector ,Relevance (information retrieval) ,Internet of Things ,business ,Automaton - Abstract
The possibilities of Internet of Things in healthcare area are aimed at better health monitoring and preventive care. The aim of the paper is to develop and research a discrete-continuous stochastic model (DCSM) of a functional behavior of a networked healthcare device in a form of a structural automaton model (SAM). The brief analysis of the device behavior with description of functional procedures, indicators and parameters of functionality is given. Much attention is given to development process of DCSM, description of basic events and structure of a state vector, development of a SAM. The procedure of validation of the developed model is presented and includes three researches to check the relevance of the obtained results.
- Published
- 2019
20. Assurance Case Based Licensing for Nuclear Power Plant Post-Accident Monitoring System Based on Unmanned Aircraft Vehicles
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Software ,law ,business.industry ,Computer science ,Nuclear power plant ,Systems engineering ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Monitoring system ,Nuclear power ,business ,law.invention - Abstract
In this paper we propose to apply Assurance Case methodology to develop a concept of licensing for Nuclear Power Plants Post-Accident Monitoring System (PAMS) based on Unmanned Aircraft Vehicles (UAVs).
- Published
- 2019
21. Evaluating Reliability of a Multi-fleet with a Reserve Drone Fleet: : an Approach and Basic Model
- Author
-
Herman Fesenko, Elena Zaitseva, and Kharchenko Vyacheslav S
- Subjects
Operations research ,Computer science ,Reliability block diagram ,Drone ,Reliability (statistics) ,Reliability model - Abstract
A matrix of drone fleet reliability assessment attributes is presented. Policies of failed drone recovery by redundant drones are formulated. A structure of a multi-fleet, consisting of main drone fleets and a reserve drone fleet, is suggested and described by means of the matrix attributes. A reliability block diagram for the multi-fleet is built. Based on the diagram, equations for probability of the multi-fleet failure-free operation, taking into account the reserve drone fleet structure, is obtained. Using the obtained recurrent equations, reliability models for the multi-fleet with the reserve drone fleet are developed and examined
- Published
- 2019
22. IoT Server Availability Considering DDoS-attacks: Analysis of Prevention Methods and Markov Model
- Author
-
Maryna Kolisnyk, Kharchenko Vyacheslav S, and Piskachova Iryna
- Subjects
Authentication ,Software ,business.industry ,Computer science ,Interface (computing) ,Server ,Denial-of-service attack ,business ,Markov model ,Encryption ,Networking hardware ,Computer network - Abstract
The server is an important for storing data, collected during the diagnostics of Smart Business Center (SBC) as a subsystem of Industrial Internet of Things including sensors, network equipment, components for start and storage of monitoring programs and technical diagnostics. The server is exposed most often to various kind of attacks, in particular, aimed at processor, interface system, random access memory. The goal of the paper is analyzing the methods of the SBC server protection from malicious actions, as well as the development and investigation of the Markov model of the server's functioning in the SBC network, taking into account the impact of DDoS-attacks.
- Published
- 2019
23. Integrated Cyber Safety & Security Management System: Industry 4.0 Issue
- Author
-
Sergiy Kamenskyi, Sergiy Dotsenko, Kharchenko Vyacheslav S, and Oleg Illiashenko
- Subjects
Functional safety ,Risk analysis (engineering) ,Industry 4.0 ,Control (management) ,Developing country ,Cybernetics ,Security management ,System safety ,Business ,Architecture - Abstract
The aim of the article is to enhance the conventional concepts of enterprise safety and security management by combining this two interrelated features in one philosophical and managerial conception. Overall protection of the enterprise, where critical data assets are stored, processed and transmitted is impossible without uniting security and safety systems properties. It is especially essential nowadays with intensively evolving Industry 4.0 in developing countries like Ukraine and rapidly developing Industry 5.0 in developed countries with digitalized societies. A three-level hierarchical integrated model of the architecture of a functional safety and security management system that meets the requirements of international standards is shown. It includes principles of the control law and cybernetic control.
- Published
- 2019
24. Determining the Optimum Number of Single Operator Controlled Unmanned Aerial Vehicles for NPP Monitoring Missions: Human Error Issues
- Author
-
Herman Fesenko and Kharchenko Vyacheslav S
- Subjects
030110 physiology ,0301 basic medicine ,03 medical and health sciences ,Operator (computer programming) ,Queue management system ,business.industry ,Computer science ,Reliability (computer networking) ,Real-time computing ,Human error ,Wireless ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,business - Abstract
An approach to determining the optimum number of single operator controlled unmanned aerial vehicles for NPP monitoring missions are suggested. The approach takes into account operator errors and wireless links equipment failures. In the approach, Human–machine system Operator – Fleet of unmanned aerial vehicles is considered as a queuing system. An example of using the approach to determining the optimum number of single operator controlled Spectator-M unmanned aerial vehicles for Zaporizhzhia NPP monitoring missions is presented. The results obtained are analysed and discussed.
- Published
- 2018
25. Flexible Fractal Network as a Foundation for Enhanced Wellness
- Author
-
Raymond Garbos, Jason Jeffords, Tomasz Centala, Andrzej Rucinski, Alexander Drozd, Thaddeus Kochanski, Kharchenko Vyacheslav S, Robert Zanghi, and Jerzy Zurek
- Subjects
Service (systems architecture) ,Need to know ,business.industry ,Computer science ,Wireless ad hoc network ,Node (networking) ,Scalability ,Key (cryptography) ,Disruptive innovation ,business ,Wireless sensor network ,Computer network - Abstract
Rapid developments in Communications and Computation will lead new disruptive innovation resulting in a better way to deliver healthcare and education to all - i.e. “e-Wellness.” The Flexible Fractal Network (FFN), an architecture for a scalable network with distributed processing, storage and control, presented in this paper, has the potential to play the role of the IBM-PC as the disruptive innovation to transform insurance-based, institutional health care into personalize, patient centered e-Wellness. With the rapidly growing demand for more home-based-care, especially for the aging population, and adaptive education, a new delivery system that leverages advances in Communications and Computation will benefit the patient/caregiver and student/parent/teacher. The Flexible Fractal Network, a new innovative perspective on Communications and Computation, with a core of a permanent, high-capacity, high-reliability, low-latency network (“5G-like”) is composed of scaled similar (fractal) networks. At each level, there are computational/storage / decision resources, which can provide services throughout the network. The key to the FFN is that all Network Resources [Transport, Storage, Computation, or Decision] are accessed as a Service and delivered “as needed.” The Node doesn't need to know where the actual hardware/algorithms are located. All Services are “paid for” through the aid of a Service Broker. The FFN provides rapid, reliable and secure transport, storage, processing and actuating as needed. With 5G at the “Local Level” [i.e. the “Edge”], the FFN backbone makes possible the integration of e-Health and e-Education [Health as a Service “HaaS,” Education as a Service “EaaS”]. The goal is to make the FFN the “IBM PC for HaaS & EaaS sparking the e-Wellness Revolution. Several FFN application examples are provided.
- Published
- 2018
26. Risk Assessment of Critical Energy Infrastructure Considering Physical and Cyber Assets: Methodology and Models
- Author
-
Leonid Kabak, Serhii Konovalenko, Borys Moroz, Oleg Ivanchenko, and Kharchenko Vyacheslav S
- Subjects
Identification (information) ,Risk analysis (engineering) ,Process (engineering) ,business.industry ,Computer science ,Business intelligence ,Cloud computing ,Resilience (network) ,business ,Risk assessment ,Critical infrastructure ,Risk management - Abstract
This paper considers a serious issue pertaining to determine a combined risk assessment of the Critical Energy Infrastructure (CEI) based on using of overall analytical and stochastic methodology, which gives a possibility to consider both behavior, causes and effects for different negative events of critical energy infrastructure components. Authors offer to employ Semi-Markov Modeling Process in order to determine stochastic availability level of the CEI and the method of cause-and-effect decomposition to determine a deterministic assessment of consequences from the negative impacts. In addition, authors tried to solve this complex task considering physical and cyber assets, including possible usage of cloud services. Overall risk assessment can be used for optimization infrastructure by identification of impacts levels on different infrastructure objects, as well as enhance resilience property and improvement of operational CEI performance.
- Published
- 2018
27. Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities
- Author
-
Anastasiia Strielkina, Dmytro Uzun, and Kharchenko Vyacheslav S
- Subjects
business.industry ,Computer science ,Emerging technologies ,Markov process ,Markov model ,Outcome (game theory) ,symbols.namesake ,Risk analysis (engineering) ,Health care ,symbols ,The Internet ,business ,Internet of Things ,Set (psychology) - Abstract
Networked medical and healthcare devices and their applications are already creating an Internet of Medical Things which is aimed at better health monitoring and preventive care. But the new concepts and applying of new technologies bring certain risks including failures of devices, infrastructure which may lead to the worst outcome. This paper presents an approach to develop a Markov models set for a healthcare IoT infrastructure that allows taking into account safety and security issues. In addition, it is presented a case study with a Markov model considering attacks on vulnerabilities of the healthcare IoT system.
- Published
- 2018
28. Employers' requirements-oriented assessment of IoT curriculum: The projects CABRIOLET and ALIOT
- Author
-
L. Vystorobska, Kharchenko Vyacheslav S, Elena Maevskaya, Chris Phillips, and Dmitry A. Maevsky
- Subjects
Academic education ,Engineering management ,business.industry ,Internet of Things ,business ,Curriculum ,Field (computer science) ,Professional skills - Abstract
This article is devoted to the analysis of the current state of university educational programs in the field of IoT, its generalization based on the requirements of employers and development of approaches to the creation of such programs that would most fully cover the needs of industry. An analysis of the requirements of employers' companies in the field of IoT was carried out and a generalization was carried out. Educational programs of 12 leading universities of Europe and the USA are analyzed. It is shown that none of the existing programs cover all the requirements set by employers. At the same time, there was an imbalance in University-Industries cooperation. Universities prefer traditional academic education and do not attract IoT companies to the formation of professional skills among students. The approaches to the development of educational programs based on a broad University — Industries cooperation is outlined.
- Published
- 2018
29. The scheme of paths method based technique for evaluating of the behavior algorithms efficiency
- Author
-
Kharchenko Vyacheslav S, Oleksandr Shkiliuk, Leonid Ozirkovskyy, and Bohdan Volochiy
- Subjects
Parametric synthesis ,Scheme (programming language) ,Quantitative Biology::Biomolecules ,Software ,business.industry ,Computer science ,Complex system ,business ,Algorithm ,computer ,Automation ,Hardware_LOGICDESIGN ,computer.programming_language - Abstract
The paper presents the approach to automation of the searching the scheme of paths (SoP) as a model for evaluation the efficiency indexes of behavior algorithms of radio electronic complex systems (RECS). Radio electronic complex systems are analyzed as structural-algorithmic systems. The software prototype based on SoP method can be applied for the research of efficiency indexes of such systems. This software prototype provides quick solution for multivariate analysis and parametric synthesis of behavior algorithms of RECSs. Case study of SoP method and software prototype application is discussed.
- Published
- 2018
30. Semi-Markov's models for availability assessment of an Infrastructure as a Service Cloud with multiple pools of physical and virtual machines
- Author
-
Kharchenko Vyacheslav S, Borys Moroz, Oleg Ivanchenko, Kyrylo Smoktii, and Leonid Kabak
- Subjects
business.industry ,Computer science ,Process (engineering) ,Data_MISCELLANEOUS ,Control (management) ,Cloud computing ,Service provider ,computer.software_genre ,Computer security ,Maintenance engineering ,Virtual machine ,business ,Programmer ,computer ,Hacker - Abstract
It is well known, that different types of physical (PMs) and virtual (VMs) machines failures and as well deliberate malicious impacts on information resources of cloud infrastructure are serious obstacles to development of whole cloud ecosystem. What is more, in the current environment of fast growing number of cloud subsystems and supporting devices, the cloud service providers need to analyze and control overall availability level of cloud infrastructure. In this paper we summarized the basic provisions of approach to assess availability of an Infrastructure as a Service (IaaS) Cloud that is implemented based on Semi-Markov modeling process (SMP). This paper is our real attempt to improve the modeling process of availability for IaaS Cloud considering different negative impacts on resources of PMs and VMs, namely sudden failures, hacker's attacks, operator's and programmer's mistakes.
- Published
- 2018
31. Neural networks based choice of tools for penetration testing of web applications
- Author
-
Dmytro Uzun, Artem Tetskyi, and Kharchenko Vyacheslav S
- Subjects
Tree (data structure) ,Mode (computer interface) ,Artificial neural network ,SIMPLE (military communications protocol) ,business.industry ,Computer science ,Process (engineering) ,Penetration (warfare) ,Web application ,Software engineering ,business - Abstract
Possibilities of neural networks usage for solving the problem of selecting tools for penetration testing of web applications are considered. Initial data for the creation of a website that will help to form a vector of requirements using a questionnaire mechanism and to select tools that will fully satisfy user's requirements have been described. The construction process of a question tree for a simple questionnaire mode, which will reduce the number of questions the user should answer, is described. Expert mode differs in containing more questions, but it allows forming a vector of requirements more accurately.
- Published
- 2018
32. Diversity metric evaluation considering extended NUREG-7007 diversity classification
- Author
-
Kharchenko Vyacheslav S, Dmytro O. Rusin, Artem Panarin, and Vyacheslav Duzhyi
- Subjects
Statistical classification ,Computer science ,Encoding (memory) ,Metric (mathematics) ,Diversity assessment ,Data mining ,computer.software_genre ,Field-programmable gate array ,computer ,Diversity (business) - Abstract
This paper describes some limitations of NUREG-7007 based technique of diversity assessment. Possible errors of the assessment and the consequences of these errors in case of extending the NUREG-7007 diversity classification by new subtypes are considered. Two approaches to improve the diversity assessment are proposed taking into account new diversity subtypes. The modernized technique and tool considering the extending NUREG-7007 diversity classification with the third and fourth levels to minimize or exclude risk of assessment errors is suggested in this paper.
- Published
- 2018
33. Cybersecurity of the Internet of Drones: Vulnerabilities analysis and IMECA based assessment
- Author
-
Kharchenko Vyacheslav S and Volodymyr Torianyk
- Subjects
Intrusion ,Failure mode, effects, and criticality analysis ,Computer science ,business.industry ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cloud computing ,The Internet ,Computer security ,computer.software_genre ,business ,Network topology ,computer ,Drone - Abstract
The tasks and problems of monitoring the state of critical infrastructures (CI) by means of groups of unmanned aerial vehicles (UAV) are considered. The advantages and limitations of using the fleet of drones are revealed. Network and cloud technologies for organization and management of Multi-UAV systems are analyzed. Cloud services for forming a new architecture — Internet of Drones (IoD) are allocated. Probable network cyber vulnerabilities of IoD during monitoring CI are categorized. IoD network cybersecurity analysis (estimation) was performed using Intrusion Modes and Effects Criticality Analysis (IMECA technique).
- Published
- 2018
34. Reliability assessment of safety critical system considering different communication architectures
- Author
-
Vladimir Sklyar, Eugene Ruchkov, Kostiantyn Leontiiev, Eugene Babeshko, and Kharchenko Vyacheslav S
- Subjects
Risk analysis (engineering) ,Life-critical system ,Work (electrical) ,Computer science ,business.industry ,Control system ,Normative ,Instrumentation (computer programming) ,Nuclear power ,business ,Reliability (statistics) ,Task (project management) - Abstract
Safety and reliability assessment of instrumentation and control systems used in different safety critical industries is a responsible and challenging task. Different assessment models recommended by international and national normative documents and used by experts worldwide still have disadvantages and limitations. Therefore, studies of assessment model improvements and refinements are essential. In this work we suggest assessment model improvement by taking into account different architectures of communications both between different systems and within one particular system. In most models communication lines are being considered absolutely reliable, but our experience shows that addressing communications should be done. A few analytical models are described to assess reliability of safety critical systems for nuclear power plants such as rod control system with different communication options.
- Published
- 2018
35. V-models of safety critical system life cycle: Classification and application
- Author
-
Olexandr Siora, Kharchenko Vyacheslav S, Anton Andrashov, and Andriy Kovalenko
- Subjects
Life-critical system ,Computer science ,Control system ,Completeness (order theory) ,Decomposition (computer science) ,Audit ,Certification ,Solid modeling ,Field-programmable gate array ,Reliability engineering - Abstract
The paper proposes description and classification of life cycle models for safety critical systems. Such description is based on V-models, as a result of analysis of products, processes and attributes of the systems. This allows for the decomposition, verification and management of non-functional requirements to systems, ensuring the completeness of audits and minimizing subsequent costs for their creation and implementation.
- Published
- 2018
36. Fault insertion software and hardware testing for safety PLC-based system SIL certification
- Author
-
Oleksiy Strjuk, Yevhen Bulba, Kostiantyn Leontiiev, Alexandr Ivasyuk, Oleg Odarushchenko, and Kharchenko Vyacheslav S
- Subjects
Computer science ,business.industry ,Programmable logic controller ,IEC 61508 ,Software ,Control system ,VHDL ,Instrumentation (computer programming) ,Software verification and validation ,business ,Field-programmable gate array ,computer ,Computer hardware ,computer.programming_language - Abstract
Challenges and solutions related to Programmable Logic Controller (PLC) and PLC based Instrumentation and Control systems (PICS) verification and validation (V&V) are discussed. A particular case of safety critical PICS developed using FPGA (FPICS) is analyzed. Fault insertion testing (FIT) is one of the V&V techniques and FIT is applied to meet the IEC 61508 standard requirements and to be certified and confirm safety integrity level (SIL3). The concept of ability of SW and HW (as components of FPICS) to FIT (FIT-ability), some theoretical issues and procedures, specific features of FPICS SIL-certiflcation techniques are discussed. The suggested FIT techniques and tools are described basing on experience of SIL-certificating some modules of FPGA-based platform RadICS for NPP FPICS. Particularity of the technique is joint application of FIT for hardware (FPGA design) and software (VHDL code) considering FIT-ability issue.
- Published
- 2018
37. IT-oriented software quality models and evolution of the prevailing characteristics
- Author
-
Kharchenko Vyacheslav S and Oleksandr Gordieiev
- Subjects
Software ,business.industry ,Computer science ,Information technology ,Cloud computing ,Solid modeling ,business ,Software engineering ,Software quality - Abstract
Necessity of a creation technology-oriented software quality models is substantiated in the article. Features of information technologies, which must be taken into account in software quality models, are defined. Expert assessment results of prevailing software characteristics for software quality models of modern information technologies and paradigms of their evolution are represented. Dependence between an appearance of information technologies and an evolution of software quality standards (models) is analysed.
- Published
- 2018
38. Expert assessment of post accidence monitoring systems with multi-version structures
- Author
-
Mykola Fedorenko, Kharchenko Vyacheslav S, R. Fedorenko, and Liudmyla Lutai
- Subjects
business.industry ,Computer science ,Detector ,Real-time computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Cloud computing ,Monitoring system ,Drone ,law.invention ,Data acquisition ,law ,Nuclear power plant ,Wireless ,business ,Internet of Things - Abstract
Various models of data acquisition and processing systems for post-accident monitoring of nuclear power plant units have been presented. System models assume the use of different types of detectors, uncrewed aerial vehicles, as well as various means of communication, including wire communication channels, Wi-Fi, Li-Fi, and IoT facilities.
- Published
- 2018
39. Models and cases for sustainable university-industry cooperation in IT sector
- Author
-
Kharchenko Vyacheslav S, Artem Boyarchuk, and Volodymyr Sklyar
- Subjects
Engineering management ,business.industry ,Information technology ,Business ,State (computer science) - Abstract
This paper provides a comprehensive analysis of the current state of university-industry cooperation in IT sector, analyzes the components of cooperation, describes the advantages, barriers and drivers for them. The methods and tools of cooperation between universities and industry are investigated, the classification of four models of cooperation between the university and the IT Company and a pattern of analysis of cases are presented.
- Published
- 2018
40. Green economics: A roadmap to sustainable ICT development
- Author
-
Olga Tarasyuk, Kharchenko Vyacheslav S, Anatoliy Gorbenko, and Ah-Lian Kor
- Subjects
Sustainable development ,Green computing ,Risk analysis (engineering) ,Computer science ,Sustainability ,Carbon footprint ,Energy consumption ,Product (category theory) ,Efficient energy use ,Green economy - Abstract
The paper discusses a systematic approach to sustainable development. It puts forward an idea of analysing energy efficiency and sustainability of a particular product, service or even a process during the whole life-cycle. Minor carbon footprint or low energy consumption of a product during its operation or exploitation does not necessary mean that the product manufacturing, decommissioning and disposal are also sustainable. In this paper, we discuss a set of sustainable principles and propose a graphical notion describing key factors of product/process sustainability. We also consider information and communication technologies (ICT) as essential tools of sustainable development in various application domains. On the other hand, ICT themselves should be considered as an object of energy efficiency improvement. The paper discusses ICT impact on the environment and identifies the fundamental green ICT trade-off between dependability, performance and energy consumption. Finally, we consider problems and propose approaches to building green clouds and datacenters.
- Published
- 2018
41. Big data and similarity-based software reliability assessment: The technique and applied tools
- Author
-
Svitlana Yaremchuk and Kharchenko Vyacheslav S
- Subjects
Software ,Data collection ,Similarity (network science) ,business.industry ,Computer science ,Big data ,Experimental data ,Software system ,business ,Reliability (statistics) ,Software quality ,Reliability engineering - Abstract
The concept of Big Data of Software Reliability (BDSWR) is discussed. According with publication overview it's concluded that BDSWR are not systematically analyzed and used for the reliability assessment of the software systems (SWS). It restricts the potential opportunities of the increase of the SWS reliability assessment accuracy. We offer to use big experimental data about the actual reliability of different SWS which are similar to assessed system. The approach is implemented by way of: 1) the search of BDSWR of the earlier developed similar systems; 2) data collection about of reliability indices of similar systems; 3) use of similar systems indices for reliability assessment and prediction of the evaluated system. Within the approach we offer the technique of big data and similarity-based reliability assessment. The offered technique is based on four principles of the SWS similarity and includes nine stages. The input data of the technique are artefacts of the evaluated system. The output data of the technique are reliability assessments of the evaluated system. The software tools of implementation of the technique are described such as: the agent for search and assessment of data size; the agent of similarity assessment; the agent of reliability assessment; the agent of the verification efficiency improving.
- Published
- 2018
42. Model and software for tracking and content analysis of media information in the internet
- Author
-
Olena Golembovska, Oleksii Chmara, and Kharchenko Vyacheslav S
- Subjects
Service (systems architecture) ,Correctness ,Information retrieval ,business.industry ,Computer science ,computer.software_genre ,Software ,Mobile phone ,Task analysis ,The Internet ,Information flow (information theory) ,Web service ,business ,computer - Abstract
This paper deals with development of a tracking and information flow monitoring service based on the use of graph theory. The use of such a model will help to solve a number of tasks which are follows: information flow processing according to a given criterion, search for information, compare it with the source, show all the resources where this information is located, determination the correctness of the content of the information on the relevant webs, definition the time and date of publication, identify copyright infringements, provide a report on the performed work to the user in the specified format. We show results using the example of tracking and analyzing the distribution of news about the participation and victory of KhAI students in the NASA hackathon in 2017. The tracking and information flow monitoring service can be an application for a mobile phone or a module for an Internet platform.
- Published
- 2018
43. Semi-Markov availability model considering deliberate malicious impacts on an Infrastructure-as-a-Service Cloud
- Author
-
Kyrylo Smoktii, Borys Moroz, Oleg Ivanchenko, Leonid Kabak, and Kharchenko Vyacheslav S
- Subjects
Markov chain ,Scope (project management) ,Order (exchange) ,Computer science ,business.industry ,Distributed computing ,Data_MISCELLANEOUS ,Cloud computing ,computer.software_genre ,business ,computer ,Computer virus ,Task (project management) - Abstract
This paper describes availability model for an Infrastructure-as-a-Service (IaaS) Cloud with multiple pools of physical machines (PMs). Indeed, we build monolithic mathematical model considering sudden failures of the PMs and deliberate malicious impacts on information resources of the IaaS Cloud, using stochastic Semi-Markov approach. In the model, we apply technical subsystem for monitoring states in order to solve task of determining and analysis of overall availability level for the IaaS Cloud during scope of the failures and negative impact of the malicious computer viruses. As characteristics steady state availability for the IaaS Cloud, failure rates and repair rates of the PMs were leveraged by us, too.
- Published
- 2018
44. Challenges in assurance case application for industrial IoT
- Author
-
Vladimir Sklyar and Kharchenko Vyacheslav S
- Subjects
Focus (computing) ,business.industry ,Computer science ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Engineering management ,Software ,Software security assurance ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Internet of Things ,computer - Abstract
The purpose of this paper is to develop a framework to use Assurance Case methodology for Industrial IoT systems (IIoT). To achieve a general goal we discuss the three following issues. Firstly, a brief analysis of state-of-the-art researches and resources in area of Assurance Case is done. Secondly, we discuss specific components for IIoT Assurance Case with focus on Security Assurance. Thirdly, a learning course is developed to fulfill gap in security and safety demonstration of IIoT.
- Published
- 2017
45. Modelling of healthcare IoT using the queueing theory
- Author
-
Dmytro Uzun, Anastasiia Strielkina, and Kharchenko Vyacheslav S
- Subjects
Structure (mathematical logic) ,Queueing theory ,SIMPLE (military communications protocol) ,Computer science ,business.industry ,Markov process ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Field (computer science) ,symbols.namesake ,Component (UML) ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,020201 artificial intelligence & image processing ,business ,computer ,Computer network - Abstract
In the field of health, networked medical devices are closely intertwined in the structure of the Internet of things. A healthcare IoT infrastructure with a brief description of each component is presented. These components are a device with a reader, Cloud, healthcare provider and communication channel. As the title implies the paper presents simple cases with a few models of healthcare IoT system based on the queueing theory. The models describe streams of the requests and attacks on vulnerabilities and procedure of recovery by restart and eliminating of ones.
- Published
- 2017
46. Emerging curriculum for industry and human applications in Internet of Things
- Author
-
Vladimir Sklyar, Artem Boyarchuk, Oleg Illiashenko, Chris Phillips, and Kharchenko Vyacheslav S
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,Frame (networking) ,Capacity building ,02 engineering and technology ,Engineering management ,Smart grid ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Adaptation (computer science) ,business ,Telecommunications ,Erasmus+ ,Curriculum ,Building automation ,Diversity (politics) ,media_common - Abstract
The need of new curricula in the Internet of things (IoT) for MSc, PhD and engineering levels of education is described. The joint project on curricula development ALIOT, financed in the frame of Erasmus+ program, is discussed. The project ensures adaptation of academic programs in Ukraine and other countries to the needs of the labor market in the EU, thus influencing on the expansion of the opportunities for economic and labor diversity. The ALIOT covers hot domains of IoT applications such as health systems, intellectual transport systems, ecology and industry 4.0 systems, smart grid, smart buildings and city. The description of interdisciplinary multi-domain and transnational program of MSc and PhD levels is introduced with the mechanisms of intensive capacity building measures as well as the establishment of multi-domain IoT cluster network (MDICN) in Ukraine is given.
- Published
- 2017
47. Reliability issues for a multi-version post-severe NPP accident monitoring system
- Author
-
Kharchenko Vyacheslav S, Robert E. Hiromoto, Volodymyr Kochan, Herman Fesenko, and Anatoliy Sachenko
- Subjects
Structure (mathematical logic) ,020203 distributed computing ,010504 meteorology & atmospheric sciences ,business.industry ,Computer science ,Wireless network ,Monitoring system ,Reliability block diagram ,02 engineering and technology ,01 natural sciences ,Drone ,Reliability engineering ,Accident (fallacy) ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,business ,Wireless sensor network ,Reliability (statistics) ,0105 earth and related environmental sciences - Abstract
The general structure and main principles of creating a multi-version post-severe NPP accident monitoring system, which consists of one wired and three drone-based wireless network subsystems, are proposed. Reliability block diagrams for the system are built. On the basis of the reliability block diagrams, reliability models of the system are developed. The dependence on probability of failure-free operation for different structures of the system on number of the redundant drones for the Wi-Fi drone-based communication section is obtained and analysed.
- Published
- 2017
48. Hardware diversity and modified NUREG/CR-7007 based assessment of NPP I&C safety
- Author
-
Vladimir Sklyar, Artem Panarin, Oleg Illiashenko, Kharchenko Vyacheslav S, and Ah-Lian Kor
- Subjects
021103 operations research ,business.industry ,Computer science ,010102 general mathematics ,0211 other engineering and technologies ,Classification scheme ,02 engineering and technology ,01 natural sciences ,Embedded system ,Control system ,Instrumentation (computer programming) ,0101 mathematics ,business ,Field-programmable gate array ,Computer hardware ,Diversity (business) - Abstract
Diversity and subdiversity-oriented systems applied in safety critical industry systems are analyzed through the use of the classification scheme described in standard NUREG7007. This classification is specified considering diversity of hardware and FPGA designs. In particular, diversity of hard logic and soft processors, interfaces and buses, self-diagnostics means, etc… are described. Impact of hardware/FPGA diversity on safety of Instrumentation and Control systems (I&Cs) are analyzed. The technique for selecting such diversity is presented.
- Published
- 2017
49. IoT-based physical security systems: Structures and PSMECA analysis
- Author
-
Al-Khafaji Ahmed Waleed, Dmytro Uzun, Kharchenko Vyacheslav S, and Oleksandr Solovyov
- Subjects
business.industry ,Computer science ,Context (language use) ,Computer security model ,Computer security ,computer.software_genre ,Functional decomposition ,Software ,Security service ,Software security assurance ,Systems engineering ,Table (database) ,business ,computer ,Physical security - Abstract
The article presents the results of studies of the physical security system in the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the physical security system for the regional infrastructure has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have been developed; a set-theoretic model of the failure occurrence in the context of the study of the physical security system has been developed. An example of PSMECA table is suggested.
- Published
- 2017
50. McEliece and Niederreiter Cryptosystems Analysis in the Context of Post-Quantum Network Security
- Author
-
Nikolaos G. Bardis, Kharchenko Vyacheslav S, Aleksei Vambol, and Olexandr Potii
- Subjects
Theoretical computer science ,Network security ,business.industry ,Computer science ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,Information security ,Encryption ,01 natural sciences ,Public-key cryptography ,010201 computation theory & mathematics ,Ciphertext ,McEliece cryptosystem ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,020201 artificial intelligence & image processing ,business - Abstract
In this paper a consideration of the McEliece and Niederreiter cryptosystems as tools for providing the postquantum information security in networks, is proposed. Theoretical foundation and the characteristics of these crypto ciphers and other asymmetric once are analyzed. The considered metrics of cryptographic schemes include cryptographic strength, performance, public key size and length of ciphertext. The binary Goppa codes and their role in ensuring the cryptanalytic resistance of these systems are described. The main advantages and drawbacks of these cryptosystems are analyzed. Outlines the possible application of these ciphers to the network security protocols are discussed including the search for ways to reduce the public key sizes of these cryptographic schemes and improve their energy efficiency.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.