Ком'пютерні науки та інженерія
Permanent URI for this communityhttps://ena.lpnu.ua/handle/ntb/23689
Browse
Item A two player network differential game with window-based control and losses(Видавництво Львівської політехніки, 2013) Ignatenko, OleksiiThis paper deals with a network game with one server and two players with windows-based system dynamic and losses. We consider an integral constraint – special type of constraint on control function. It is shown an existence of optimal solution in the optimal control problem and found Nash equilibrium point in correspondent game. Theoretical results are illustrated by simulations in NS-3 environment.Item Abstraction of synchronous computational model for parallel graph processing(Видавництво Львівської політехніки, 2013) Romaniuk, Oleksandr; Koroteeva, TetyanaThe analysis of current approaches to the development of algorithms for parallel and distributed computing on data graphs. The proposed technique facilitates the writing of parallel algorithms based on graphs by usage of the Actor and the Valiant's Bulk-Synchronous Parallel models. This approach differs by determinism of algorithms, by resilience to different faults and by higher level of abstraction that makes a developer free from implementation details introduced by parallel and concurrent programming primitives.Item Aggregating of information for the support system of making decision for the choice of air routes(Видавництво Львівської політехніки, 2013) Kovalskiy, YevgenThe process of aggregating of information is in-process considered from a web-resource Wikipedia for the support system of making decision for the choice of air routes.Item An approach for software protection in cloud computing environment based on watermarking technique(Видавництво Львівської політехніки, 2013) Storozhenko, AnnaA descriptive survey for software security threats in the cloud computing environment is presented in this paper. As a solution for that applying watermarking technology for a generic copyright protection is proposed.Item Analysis of university entrants forum information content(Видавництво Львівської політехніки, 2013) Shilinh, Anna; Zhezhnych, PavloThis article dwells upon the fact that in the result of transition to information society Web 2.0 became popular and developped in WWW extending into all life areas and human activity. Among one of the popular services Web 2.0 are educational web-community, studies of which nowadays are topical.Item Anti-Forensic Tool Using Double Encryption Scheme(Видавництво Національного університету «Львівська політехніка», 2009) Singh, Avtar; Singh, KuldipIn this paper we are implementing an Anti- Forensic tool that is used in data hiding approaches of the Anti-Forensic technology. This tool will encrypt a secret file twice: firstly it is encrypted with the XOR and then by the powerful AES (Advance Encryption Standard). To make XOR strong we have used three files that are selected by user. These files will create a mess with the plain text before encryption making the cipher text more secure and harder to break.Item Apnea detection system(Видавництво Львівської політехніки, 2013) Sysenko, MaksymIn this article was developed algorithm that can give an accurate result of having apnea, a disease that causes breathing st\op for short interval at night. Together with a device that consists of an accelerometer and a control mechanism, the algorithm makes it possible to diagnose apnea yourself at home.Item Application of logic-probability approach for survivability analysis of security system(Видавництво Львівської політехніки, 2013) Rodin, SergeyThe article is dedicated to analysys of the survivability of security systems using logical-probability approach. In this paper is described the analysis application and its purpose. The methods and their analogues are noted. The analysis procedure and problems of method were described. The advantages and disadvantages were analyzed.Item Application of mashup technology for dynamic integration of semi-structured data(Видавництво Львівської політехніки, 2013) Kushniretska, Irina; Berko, AndriyThe usage mashup-technology for the dynamic integration of semi-structured data has been considered in this paper. Architecture of web-mashup, which consists of the three parts has been described. The process of the creation the mashup-service on data level, on process level and on presentation level has been presented. Four specific search strategies that use different kinds of information for query ranking and selection have been proposed.Item Assistive communication device for individuals with paralysis(Видавництво Національного університету «Львівська політехніка», 2009) Gupta, Akshima; Aggarwal, Ankita; Krishnan, MeethaPatients suffering from diseases like paralysis, ALS are very dependant upon attendants, even for the simplest of everyday acts. However, suitable assistive texnology can give suh individuals improved independence. The present project is very unique collection in the field of Component based assistive technology and systems. This system provides a possible new solution for a human-computer interaction system that can be used for highly disabled people. Such patients are not able to move their limb unable to speak; henceforth we have fabricated a system such that patient can communicate with the outside worl with the help of eye blinkto fulfill their basic needs. The patient can liste and understand everything. Therefore we can teach him directions for using the system. After learning the directions, he can convery a message in the form of eye flickering. The flickering of eye gives a signal to the sensor while the open eye gives no signal and for every signal there is a message at the computer screen. Whilst such a system does not represent the best interactive approach for all users in all situations, it does represent an important and useful option for individuals with movement restrictions.Item Authenticity of digital images(Видавництво Львівської політехніки, 2013) Hanzlik, Lucjan; Wodo, WojciechCopyrights are a big issue these days, it is extremely easy to loose our intellectual property (in sense of digital images) and thus money, moreover it is hard to proof our rights in the court. Our digital pictures must be protected in such a manner that it should be easy to proof we are the legitimate owner of the image and it should be computationally hard to forge such proof. We present a sketch of a new solution for copyright protection of digital images using chameleon hash functions, signatures and steganography. It is an extension of previous work in this field. We introduce a probabilistic similarity method into our scheme, which convince the verifier at certain level about the owner of the picture.Item Automatic paralleling of tasks in reconfigurable multiprocessor systems(Видавництво Львівської політехніки, 2013) Zhabin, Valeriy; Liashchun, ІhorA method of automatic paralleling of tasks that accelerates computing in reconfigurable multiprocessors systems based on the dataflow model is given.Item Basic operations of modern hashing algorithms(Видавництво Львівської політехніки, 2013) Melnyk, Viktor A.; Kit, Andriy Y.In this paper we performed a comparative analysis of hashing algorithms SHA-1, SHA-2, MD-5, RIPEMD, Keccak respecting a set of their basic operations. As an outcome of this analysis a qualitative and quantitative composition of elements of the multifunctional highperformance hashing processor for execution any of these algorithms is defined.Item Broadcast video streaming in Internet(Видавництво Львівської політехніки, 2013) Shylovskyi, Dmytrothe paper is dedicated to optimization quality of video streaming in network with low bandwidth which isn't insufficiently to broadcast video stream in real time. To improve method Forward Error Correction (FEC) through introducing varying redundancy ratio for each data element.Item Building a smart news annotation system for further evaluation of news validity and reliability of their sources(Видавництво Львівської політехніки, 2013) Shakhovska, Natalia; Berbelyuk, VolodymyrThe article describes the elements of news annotating information systems to further assess the news validity and reliability of their sources. Considers the process of system operation and algorithms that can be used in the implementation of such a system.Item Building wireless mesh sensor networks using xbee and arduino(Видавництво Львівської політехніки, 2013) Güner, Hüseyin Emre; Ambarkütük, MuratWireless Sensor Networks(WSNs) have used for many applications. Mesh networks are one of the wireless communication process for long indoor and outdoor areas. The goal of this study is to use advantages of the mesh networks in long areas and to observe instant sensor data via the Internet. Arduino and DigiMesh 868 MHz transceivers were used for this experiment. Finally, the results of the each sensor values were viewed from the webpage.Item Client-Server Interaction on the WWW(Видавництво Львівської політехніки, 2013) Pasternak, Iryna; Morozov, YuriyShows the client interaction with the server in WAN. As well the realization of this interaction using the WWW. The model object client interaction with the server for more efficient operation of global network. We consider the software implementation of the web server and client.Item Color and shape based image retrieval(Видавництво Львівської політехніки, 2013) Kozubets, Alexander; Tushnytskyy, RuslanImage retrieval based on some good feature could be extremely inefficient in some cases. As there is no some allpurpose method to achieve suitable retrieval results, we forced to combine different image features to improve quality of image retrieval. Invariant moments and color autocorrelogram are considered in this paper.Item Comparative analysis of characteristics of special-purpose versus reconfigurable hardware accelerators(Видавництво Львівської політехніки, 2013) Melnyk, Viktor A.; Brodi, Oleksandr V.; Baran, Roman D.Present paper deals with a review of specific features of special-purpose and reconfigurable hardware accelerators, the criteria of their comparison have been specified, and a comparative analysis of the characteristics according to the above criteria has been carried out.Item Comparative research of the color brightness distortion of the image compressed by DHT(Видавництво Львівської політехніки, 2013) Dorensky, OleksandrThe review examines the usage of discrete Hartley transformation (DHT) for the digital image compression. The results of the comparative research of the impact of usage DHT compression on the brightness of the color digital image are provided.