RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Contemporary Management of University's Strategic Development: the Case Study on Ukrainian Universities

        Kovtun, Olena,Lutsiak, Vitalii,Ostapchuk, Anatolii,Lavinska, Daria,Sieriebriak, Kseniia,Kononenko, Anna,Bebko, Svitlana International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        In the current conditions of world socio-economic development, the strategic support of the process of managing the development of universities has become a particularly important area. Strategic management requires reliable information and analytical support in the form of sound descriptions of strategic directions of development, assumptions, and forecasts. The purpose of the study is to substantiate and elaborate the crucial causes in the strategic management of university's development and to suggest the coherent prospects for advancements. The data analysis was performed using descriptive methods to identify the most significant causes that affect the university's strategic development; the expert assessment was used to rank the factors, ultimately to assess each factor that affects to some extent the university's strategic development; the abstract-logical method was used to ground the positive impact of computer technologies and e-learning on the strategic development of a university and to formulate proposals for its further progress. The main results provided in the given paper showed that significant and most important strategic cause of university's development lies in the field of improving the quality of education, expanding access to educational services based on computer technology and its functionality. In turn, its widespread use at all stages of the educational process allows providing a number of advancements for universities in strategic prospects.

      • KCI등재

        Crypto coding system based on the turbo codes with secret keys

        Kovtun Viacheslav,Ivanov Yuriy 한국통신학회 2024 ICT Express Vol.10 No.2

        In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent works in this area are connected with turbo codes, which have a special ability to provide error correction characteristics of the information transmission close to theoretically obtained values. Besides, they are used for television (DVB-RCS, DVB-RCT), wireless local networks (WiMAX), software-defined radio systems, mobile (3G, 4G, Inmarsat) and space (CCSDS) communications etc. In this article is presented the crypto coding system based on turbo codes with secret keys used by interleavers. All calculations are performed during data encoding, which reduces the computational complexity of data pre-encryption. The necessary mathematical apparatus was presented, the security level of the communication system was estimated, a simulation of the error correction characteristics was performed, and multimedia information was processed. The working characteristics of the classical and proposed turbo codecs do not differ statistically. The results can be used in communication systems for various functional purposes.

      • KCI등재

        Mathematical Models of the Information Interaction Process in 5G-IoT Ecosystem: Different Functional Scenarios

        Viacheslav Kovtun,Ivan Izonin,Michal Gregus 한국통신학회 2023 ICT Express Vol.9 No.2

        This paper proposes mathematical models of the process of information interaction between a set of subjects (IoT devices) and a base station in the 5G-IoT ecosystem. The researched process, in this case, is represented by a queuing system with a flow of new incoming requests with needs for the desired volumes of system resources and a flow of service signals, the receipt of which initiates redefinition of allocated for received incoming requests volumes of system resources. A controlled parameter in the created queuing system is the acceptance or rejection of new incoming requests. The priority is to support active sessions of subject-system interaction initiated for the received incoming requests. We consider two functional scenarios, which differ asynchronously or synchronously when a service signal comes to the base station’s front-end interface. The receipt marks a partial or complete redefinition of system resources involved in supporting active sessions of subject-system interaction. Formalized in the basis of a single queuing system, mathematical models of development of these functional scenarios allow calculating the probability of rejection of a new incoming request and the percentage of occupied system resources, combined in the metrics of quality indicators, in the conditions of asynchronous or synchronous change of the spatial location relative to the base station of the end IoT devices, the received input requests from which are active in the 5G-IoT ecosystem.

      • KCI등재

        Modeling of Operation of Information System for Critical Use in the Conditions of Influence of a Complex Certain Negative Factor

        Oleg Bisikalo,Oksana Danylchuk,Viacheslav Kovtun,Olena Nikitenko,Oksana Kovtun,Victoria Vysotska 제어·로봇·시스템학회 2022 International Journal of Control, Automation, and Vol.20 No.6

        The development of the infosphere is accompanied by a proportional increase in the amount of personalized information and the threats of unauthorized access to it. This confrontation is especially acute when it comes to the resources of information systems for critical use (ISCU), unauthorized access to which can cause significant material or human losses. The specificity of ISCU determines the only rational way of evolution of means of ensuring their dependability – the mathematical modeling of the process of operation of the studied systems under the influence of certain negative factors. When determining a certain negative factor, the authors rely on the hierarchical classification of modern cyber threats presented in the specialized database of the Open Web Application Security Project (OWASP). The article presents an improved Markov mathematical model of operation of ISCU in the conditions of aggressive cyberphysical space in which, in contrast to the existing ones, the process of confrontation of the information protection subsystem of the studied system and the complex certain negative factor is analytically formalized. The proposed model takes into account that the interdependent components of the complex negative factor were created by cyber-attackers with a focus on invulnerability to individual protection schemes. The authors consider a complex negative factor as an ordered interconnected sequence of certain negative factors. An applied result of mathematical modeling is analytical equations in the first approximation to calculate the time to failure of the studied system, which operates under the influence of complex negative factor, and stochastic description of the allowable states in which the studied system may be at any discrete time.

      • Method of Algorithm Building for Modular Reducing by Irreducible Polynomial

        Andrew Okhrimenko,Maria Kovtun,Tomasz Gancarczyk,Volodymyr Karpinskyi,Sergiy Gnatyuk 제어로봇시스템학회 2016 제어로봇시스템학회 국제학술대회 논문집 Vol.2016 No.10

        In modern cryptosystems, there are many well-proven often used constructions, such as operations in binary fields. In this paper method of algorithm construction for modular reduction by fixed irreducible polynomial (trinomial or pentanomial) was proposed. This method applying allows to get a high performance algorithm of modular reduction for specified fixed polynomial and target platform while cryptosystems develop, for example elliptic curve cryptosystem.

      • KCI등재

        Radiation-induced transformation of Hafnium composition

        Alexander Ulybkin,Alexander Rybka,Konstantin Kovtun,Vladimir Kutny,Victor Voyevodin,Alexey Pudov,Roman Azhazha 한국원자력학회 2019 Nuclear Engineering and Technology Vol.51 No.8

        The safety and efficiency of nuclear reactors largely depend on the monitoring and control of nuclear radiation. Due to the unique nuclear-physical characteristics, Hf is one of the most promising materials for the manufacturing of the control rods and the emitters of neutron detectors. It is proposed to use the Compton neutron detector with the emitter made of Hf in the In-core Instrumentation System (ICIS) for monitoring the neutron field. The main advantages of such a detector in comparison the conventional b-emission sensors are the possibility of reaching of a higher cumulative radiation dose and the absence of signal delays. The response time of the detection is extremely important when a nuclear reactor is operating near its critical operational parameters. Taking Hf as an example, the general principles for calculating the chains of materials transformation under neutron irradiation are reported. The influence of 179m1Hf on the Hf composition changing dynamics and the process of transmutants’ (Ta, W) generation were determined. The effect of these processes on the absorbing properties of Hf, which inevitably predetermine the lifetime of the detector and its ability to generate a signal, is estimated.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼