Advances In Cyber-Physical Systems. – 2019. – Vol. 4, No. 1

Permanent URI for this collection

Науковий журнал

Засновник і видавець Національний університет «Львівська політехніка». Виходить двічі на рік з 2016 року.

Advances in Cyber-Physical Systems / Lviv Polytechnic National University ; editor-in-chief A. Melnyk. – Lviv : Lviv Politechnic Publishing House, 2019. – Volume 4, number 1. – 64 p. : il.

Зміст (том 4, № 1)


1
7
15
25
31
36
42
55

Content (Vol. 4, No 1)


1
7
15
25
31
36
42
55

Browse

Recent Submissions

Now showing 1 - 8 of 8
  • Item
    Research and design of the multifunctional cyber-physical system of testing computer performance in WAN
    (Lviv Politechnic Publishing House, 2019-02-26) Pasternak, Iryna; Lviv Polytechnic National University
    A multifunctional cyber-physical system for monitoring and testing remote computers in the WAN has been developed. This cyber-physical system has been built using microservice architecture. The system has used a website as a graphical interface, which in turn communicates with the main query separator, namely a web server. In addition, the database and the AES-256 encryption algorithm has been used to simplify data work, and to increase system security from external interventions. The algorithms of processing requests, algorithms of checking the efficiency of different modules of the computing node have been developed. A system of internal communication has been designed. The links between database tables have been designed. The utilities for various custom actions have been developed. The user has also provided the ability to group users and computing nodes to simplify the process of analyzing data on the performance check.
  • Item
    Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem
    (Lviv Politechnic Publishing House, 2019-02-26) Melnyk, Viktor; Lviv Polytechnic National University
    The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.
  • Item
    Master of computer engineering program with specialization in Cyber-Physical Systems
    (Lviv Politechnic Publishing House, 2019-02-26) Melnyk, Anatoliy; Botchkaryov, Alexey; Lviv Polytechnic National University
    The problem of designing a master of computer engineering program with a specialization in cyber-physical systems has been considered. The concept of cyber-physical systems has been analyzed from the perspective of generalization and formalization for educational purposes. The need for designing a master program in cyber-physical systems has been justified. Program competencies and learning outcomes have been defined. The structure of the master of computer engineering program with a specialization in cyber-physical systems and the corresponding structural-logical scheme of master's training have been regarded.
  • Item
    Logical algorithms of the accelerated multiplication with minimum quantity of nonzero digits of the converted multipliers
    (Lviv Politechnic Publishing House, 2019-02-26) Korol, Ihor; Korol, Ivan; Uzhhorod National University
    The article presents a new algorithm of accelerated multiplication, in which the time of multiplication has been reduced through the decrease in the number of nonzero digits of the multiplier. In this case, the multiplier has been presented in the form of the extended binary code. The article proves the algorithm's efficiency in comparison to previously known methods. The developed algorithm has been implemented using the hardware description language AHDL (Altera Hardware Description Language) in the Logic Development System MAX+PLUS II.
  • Item
    Finding the global minimum of the general quadratic problems during deterministic global optimization in Cyber-Physical Systems
    (Lviv Politechnic Publishing House, 2019-02-26) Kosolap, Anatolii; University of Chemical Engineering, Dnipro
    Cyber-Physical Systems (CPS) are integrations of computation and physical processes. We consider effective computations for designing difficult systems. In this paper, we propose new method of exact quadratic regularization for deterministic global optimization (EQR). This method can be used for the solution of a wide class of multiextreme problems, in particular, general quadratic problems. These problems will be transformed to maximization of norm a vector on convex set. The convex set is approximated by a polyhedron or intersection of balls. We offer the modified dual problem for maximization of norm a vector on intersection of balls. It allows to receive the solution of a primal problem. We use only local search (primal-dual interior point method) and a dichotomy method for search of a global extremum in the general quadratic problems.
  • Item
    A representative fragment method of analyzing complex systems of smart contracts
    (Lviv Politechnic Publishing House, 2019-02-26) Horodelski, Michal; Filipkowski, Piotr; The John Paul II Catholic University of Lublin; The Collegium of Economic Analysis of Warsaw School of Economics
    : The paper presents the use of states of explosion-proof method for analyzing the behavior of systems that provide smart contract technology. The selected example system is ShadowEth, whose main task is to ensure sufficient confidentiality of information stored in the Ethereum blockchain currency. The Petri network model for the ShadowEth system has been presented. The system properties according to the specifications have been defined. Properties described in a certain extension of the TCTL logic and verification have been carried out.
  • Item
    Implementing quantum Fourier transform in a digital quantum coprocessor
    (Lviv Politechnic Publishing House, 2019-02-26) Hlukhov, Valerii; Lviv Polytechnic National University
    In this paper, the digital quantum coprocessor has been checked for the possibility of quantum Fourier transform, which is the main quantum operation of the Shor's algorithm. To do this, the model of the 4-qubit coprocessor has been created, its work has been simulated and it has been implemented in FPGA.
  • Item
    The methods of protection and hacking of modern WI-FI networks
    (Lviv Politechnic Publishing House, 2019-02-26) Boretskyy, Taras; Lviv Polytechnic National University
    In this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.