Summary: Proposed a new generation mechanism and the establishment of a private key pair in the cloud without private key transfer. Improved implementation of user authentication algorithm in the cloud using OAuth, by applying the algorithm of digital signature DSTU 4145-2012 and hardware protection.
Key words: key management, the OAuth, hardware protection, cloud.
Abstract: Every days thousands of new malware signatures are detected and this number is only growing. Intrusion based security products have become ineffective. This paper talks about new micro-virtualization technology which aimed to secure computers from undefeateble attacks and stop the malware.
Keywords: security, microvisor, micro-virtualization, malware.
Summary: The paper considers a variety of approaches to the adaptive testing. It points out the criteria of adaptive testing, then develops model of complex adaptive testing based on those criteria.
Keywords: adaptive testing, the criteria of adaptive testing, complex adaptive testing, model of complex adaptive testing.
Summary: The article studies a Systems Dynamics model for capturing the main interactions involved in the subprime mortgage crisis. The model provides two subsystems interconnection that related to each other relatively banking asset flow and house market. The differential equations are analyzed and simulated using Vensim PLE simulation software, which brings to the discussion of results.
Key words: system dynamics, financial crisis, subprime mortgage crisis.
Summary: This work describes the problem of map contraction and a robot localization using sensor data and data from a group of other robots. This methodology is called SLAM or CML, Simultaneous Localization and Mapping or Concurrent Mapping and Localization, respectively.
SLAM solves problems connected with building a map of an unknown environment by a mobile robot while at the same time navigating the environment using the map.
SLAM comprises of multiple parts: landmark extraction, data association, state estimation, state update and landmark update. Each part can be performed in different ways. As the robot has sensors on one height from the ground, we will get 2D map [1].
Key words: SLAM, computer simulation, robot.
Abstract: The basic condition for obtaining granular product with layered structure is the active involvement of the entire surface of the granular material located in the fluidized bed with dehydration composite liquid systems containing more than 50% of the solvent, which can not be achieved with traditional bubbling mode can not effectively solve this problem. Therefore, the use of spray and pulsating regime fluidization of granular material circulation directed to intensify the process by creating three dimensional mixing and prevent the formation of dead zones is relevant.
Keywords: fluidized bed, hydrodynamics, jet-pulsating mode, granulation.
Summary. In article, on the basis of the analysis of the existing light sources used in industrial, civil and in household rooms, characteristics of modern luminescent lamps of low pressure with electronic input-regulate devices are investigated.
Key words: light, illumination, fluorescent lamps, man, ultrasound.
Summary: This article is dedicated to the development of the method for creating summarization of the text document. Approaches were taking into account such as the generation of summarization.
Key words: summarization, abstract-based summarization, abstract summary.
Summary: The paper applies information technology and mathematical modeling to examine the epidemiological characteristics of a large-scale problem, known as antimicrobial resistance. It describes a mathematical model constructed to emulate the process of spread of resistant bacteria in a hospital environment using system dynamics. The model includes several key parameters such as the contact rate between the members of different observed groups, the rate of treatment with antibiotic drugs and others.
Key words: system dynamics, computer simulation, antimicrobial resistance, antibiotic resistance.
Summary: In the short-wave area of a spectral characteristic of solar cells (SС) where the frontal layer of structure is responsible, sharper recession of sensitivity is observed. In article results of research of process of diffusion of impurity are given to single-crystal silicon through oxide coverings of SiOx and their influence on transformation of characteristics of structures of SС.
Key words: solar cells, short-wave part, protecting cover, effective thickness, spectral characteristic.
Summary: In this article analyze the basic methods of MetidaBSE technology transfer media data and then splitting to the video and audio streams. Conducted subjective experts and made physical simulation system using the above technologies. Based on the research of two variants development of the system was shown which option is better.
Tags: Expert opinion, WebRTC, RTSP, MetidaBSE.
Abstract: A physical model and mathematical description drying of paste titanium dioxide. The solution of the mathematical description of a dependency of moisture content and temperature of TiO2 particles from the drying time and the main process parameters, which are necessary for further experimental studies and design of industrial drying equipment.
Keywords: model, drying, physical, mathematical, fine, paste, powder.
Summary: This article analyzes the main methods for evaluating the quality of voice traffic in the network, the quality of the evaluation criteria of network traffic according to QoS and E-model. Comparison of subjective and objective methods of assessing the quality of the voice traffic. The research results were modeled and are illustrated in the example of the multi-network models. The influence of the technical characteristics of the network on the subjective assessment of the quality of voice traffic in the network. Based on studies conducted by the authors have shown that the QoS parameters have a significant influence on the quality of the voice traffic in the network
Key words: QoS, MOS, E-model, R-factor, Quality, network.
Annotation: The analysis of forming trains of wagons loaded dangerous goods at railway stations of Ukraine. Determined that dangerous goods constitute the largest share of the total volume of goods transported by rail. Considered regulations governing the procedure for the formation of dangerous goods trains.
Keywords: dangerous goods, forming trains.
Summary: The operating system takes one of two variants when solving any memory management problem. The first variant is dividing things into variable-sized pieces and it is called segmentation. It has inherent difficulties, when dividing a space into different-size chunks. The second variant to divide space into fixed-sized pieces and it is called paging. It may be worth considering the second variant and system that uses this variant called paged systems. The choice of the data structure for paged systems significantly effects on the performance of paged systems. In this paper, as a data structure we take Inverted Page Table (IPT), which optimizes parameters as a size of memory occupied by the page table and the time to transformation virtual address into physical address.
Key words: Inverted Page Table (IPT), virtual memory.
Abstract. The article conceptually describes the main tasks aimed at transport safety advancement and strengthening of national interests of Ukraine in the transport sector. It is noted herein, that the national interests in the transport sector are provided by governmental authorities, which perform their functions based on Ukrainian legislation in the field of transport safety. At the same time, they realize transport safety through implementation of the unified state policy in the field of transport safety, the system of economic, political, organizational and other measures that are adequate to the threats to vital interests of individuals, society and the State in the transport sector.
Key words: transport safety, transport sector, national interests.
Summary: This paper describes the method of bankruptcy risk analysis using fuzzy-set approach and counterpropagation neural network.
Key words: bankruptcy, fuzzy logic, counterpropagation neural network.
Summary: This paper investigates logistic regression and scorecards usage for creation of the behavioral model for the bank’s customers.
Key words: logistic regression, scoring, marketing proposal.