Реферати
Gespeichert in:
Datum: | 2018 |
---|---|
Format: | Artikel |
Sprache: | Ukrainian |
Veröffentlicht: |
Інститут проблем реєстрації інформації НАН України
2018
|
Schriftenreihe: | Реєстрація, зберігання і обробка даних |
Online Zugang: | http://dspace.nbuv.gov.ua/handle/123456789/169077 |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Назва журналу: | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
Zitieren: | Реферати // Реєстрація, зберігання і обробка даних. — 2018. — Т. 20, № 4. — С. 111–117. — укр. |
Institution
Digital Library of Periodicals of National Academy of Sciences of Ukraineid |
irk-123456789-169077 |
---|---|
record_format |
dspace |
spelling |
irk-123456789-1690772020-06-05T01:26:17Z Реферати 2018 Article Реферати // Реєстрація, зберігання і обробка даних. — 2018. — Т. 20, № 4. — С. 111–117. — укр. 1560-9189 http://dspace.nbuv.gov.ua/handle/123456789/169077 uk Реєстрація, зберігання і обробка даних Інститут проблем реєстрації інформації НАН України |
institution |
Digital Library of Periodicals of National Academy of Sciences of Ukraine |
collection |
DSpace DC |
language |
Ukrainian |
format |
Article |
title |
Реферати |
spellingShingle |
Реферати Реєстрація, зберігання і обробка даних |
title_short |
Реферати |
title_full |
Реферати |
title_fullStr |
Реферати |
title_full_unstemmed |
Реферати |
title_sort |
реферати |
publisher |
Інститут проблем реєстрації інформації НАН України |
publishDate |
2018 |
url |
http://dspace.nbuv.gov.ua/handle/123456789/169077 |
citation_txt |
Реферати // Реєстрація, зберігання і обробка даних. — 2018. — Т. 20, № 4. — С. 111–117. — укр. |
series |
Реєстрація, зберігання і обробка даних |
first_indexed |
2025-07-15T03:49:00Z |
last_indexed |
2025-07-15T03:49:00Z |
_version_ |
1837683275163762688 |
fulltext |
ISSN 1560-9189 , , 2018, . 20, 4 111
535.394
. ., . ., . ., . ., . ., -
. . -
. , . . 2018. . 20. 4. . 3–20. — .
-
As2S3, ( ) ( )
(Ag, Au)
( ) - -
. As2S3 -
.
,
(9,3–300 / ), - DD-
- . .: 10. .:
58 .
: , ,
, , , .
UDC 535.394
Kostyukevych S.O., Khrystosenko R.V., Kostyukevych K.V., Koptyukh A.A., Surovtseva O.R.,
Kryuchyn A.A. Molecular analysis based on surface plasmon spectroscopy for different nature thin films.
Data Rec., Storage & Processing. 2018. Vol. 20. N 4. P. 3–20. — Ukr.
Photodoping process in the thin film structures metal/chalcogenide vitreous semiconductor (Ag-
As2S3), electro-polymerization mechanism of the polyaniline (PANI) films and formation mechanism of
the fibrinogen (FB) molecular films on gold film surfaces were investigated by means of the surface
plasmon resonance (SPR) technique based on prism excitation and mechanical scanning of incidence light
angle in aggregate with atomic force microscopy (Nanoscope IIIa Dimension 3000).
Optical parameters (refractive index, extinction coefficient, thickness) for multilayer systems Ag-
As2S3 and Au-PANI were determined from the SPR resonance curve analysis based on Fresnel formulas
with mathematical formalism Jones scattering matrix as well as special fitting procedure for the experi-
mental and calculated curves with use of the objective function minimization method. For mathematical
description of process in the composite material Bruggeman relation was applied. Established is the for-
mation of Ag2S thin intermediate layer (about 0,7–1 nm) during the fabrication of Ag-As2S3 structure
which remain invariable their thickness and optical constant under the ultraviolet radiation influence.
Suggested is the model of formation of electro-polymerized poly-aniline films — sensitive elements for
gas sensors in which the fracture of the main substance is decreased with the thickness growth, which can
be explained by the alternating process of fastening free ends of polymer chains together with increasing
their length.
Features of the FB molecular films formation, at the different concentration (9,3–300 g/ml) of the
protein in phosphate buffer ( 7,4), were studied based on SPR kinetic curve, when the adsorption of
three proteins, FB, its DD- and E-fragments and subsequent their adlayers interactions with monoclonal
antibodies against different epitops in native molecules, that were going on the gold film surfaces. Dis-
played is the formation of the continuous film at the 73 g/ml concentration in buffer is visualized, during
irreversible adsorption the alteration of the FB molecule structure in the sphere of its D-fragment take
place, and the local self-assembling process leads to formation of the special molecular arrangement in
biofilm, consist of three overlap FB molecules, where approximately 50 of total adsorbed molecules
which retain their biofunctional properties. Fig.: 10. Refs: 58 titles.
Key words: surface plasmon resonance, thin films, chalcogenide vitreous semiconductor, poly-
aniline, fibrinogen, monoclonal antibodies.
004.085
. ., . .
. , . . 2018. . 20. 4.
. 21–29. — .
-
. -
112
.
.
. .: 2. .: 2. .:
10 .
: ,
, , , , -
, .
UDC 004.085
Anikin P.S., Beliak Ie.V.Methodology of application of nanostructured luminophores in volumet-
ric optical recording systems. Data Rec., Storage & Processing. 2018. Vol. 20. N 4. P. 21–29. — Ukr.
The principles of the organization of volume optical recording systems and synthesis of recording
medum based on nanostructured pyrazoline luminophores were analyzed. Multi-layer photoluminescent
media architecture with sandwich-structure of information and intermediate layers, information coding
with lands’ length and peripheral areas was proposed. It was shown that thickness of the information
layers depends on the on the information elements depth, while thickness of the intermediate layers de-
pends on optical system objective lens numerical aperture and must be chosen big enough to divide read-
out signal from different layers. While all the structure of the disc is transparent and homogeneous the
parasitic signal will be caused mostly by photoluminescece and absorption of pits areas where laser light
is unfocused. For big quantity of layers the level noise will got significant value, so it was suggested to
distinguish readout signal as a variable one. A mathematical model for reading data from a multi-layer
photoluminescent media is proposed. To make a proper analysis of multi-layer photoluminescent media
optimal characteristics it was developed computer simulation of the readout laser beam propagation pro-
cess. There was built digital interference pattern using input parameters of the multi-layer photolumines-
cent drive and then calculated the path of the every single light point up to the objective lens. A methodo-
logy for estimating the parameters of a storage media based on volumetric optical recording systems
which uses comparing of the system architecture parameters and the characteristics of the read-out signal
has been developed. The algorithm for determining the optimal architecture of the storage device through
the solution of the problem of finding an extremum is proposed. Tabl.: 2. Fig.: 2. Refs: 10 titles.
Key words: optical information recording, multilayer photoluminescent carrier, readout signal,
parasitic signal, nanostructured luminophores, pyrazoline dyes, extremum of function.
621.791
. .
. , . . 2018. . 20. 4. . 30–39. — .
-
. , -
’
, ( ) .
, -
, ( ) ,
,
, -
. .: 3. .: 13 .
: , , ’ -
, .
UDC621.791
Tokalin O.A. Influence of internal stresses on wave processes and ultrasound absorption in wel-
ding. Data Rec., Storage & Processing. 2018. Vol. 20. N 4. P. 30–39. — Rus.
Using the bilinear approximation of the total strain tensor for an elastic wave process in the pre-
sence of internal static stresses and deformations in welded optical polymeric materials, their influence on
the process characteristics and ultrasound absorption has been theoretically investigated. For the case of a
plane elastic wave and axially symmetric static stresses, a two-dimensional system of wave equations for
the longitudinal and transverse wave components is obtained. It has been established that only inhomoge-
neous internal stresses and deformations lead to the appearance of a weak coupling between the compo-
ISSN 1560-9189 , , 2018, . 20, 4 113
nents of the wave and a change in their amplitudes, as well as to the weakening of the longitudinal
(acoustic) component of the elastic wave. For a simple example of a point force action on the surface,
calculations are made of the decrements of ultrasound attenuation by amplitude in the meridian planes. It
is shown that for sufficiently large gradients of static deformations near the pressing region of the welded
parts, a region of maximum (resonance) absorption of ultrasound may be formed, whose dimensions are
comparable to the effective length, which depends on the square root of the ratio of the applied pressing
force to the modulus of elasticity of the material. This contributes to the localization of the ultrasound
absorption region. Fig.: 3. Refs: 13 titles.
Key words: elastic wave, stress and strain gradients, weak coupling between longitudinal and
transverse components, localization of ultrasound absorption.
004.942
. ., . ., . ., . .
.
, . . 2018. . 20. 4. . 40–52. — .
-
. , , ,
. -
)( 2nO , -
« » . -
’ ( ) ))log(( nnO .
. .
, , 2nN -
1 n2dim 1 .
, , -
. ’ , -
.
-
, . -
« » , -
. ,
, -
. , -
2n ( 30 %). .: 1. .: 5. .: 13 .
: , , , ,
, .
UDC 004.942
Kalinovsky Ya.A, Boyarinova Yu.E., Sukalo A.S., Khitsko Ya.V. Recursive method for construct-
ing linear convolution algorithms of various lengths using hypercomplex number systems. Data Rec.,
Storage & Processing. 2018. Vol. 20. N 4. P. 40–52. — Rus.
Linear convolution of discrete signals with a certain core is the most common and important com-
putational task in the field of digital signal processing. Since this operation, as a rule, is performed many
times, the problem of synthesizing fast algorithms for performing linear convolution is very actual, which
is the main subject of this work. Since the complexity of calculating the linear convolution of sequences
having length N is )( 2nO , and rapidly increases with growth N, then the methods of «fast» computations
are used. One of the most common methods is convolution using Fast Fourier Transform (FFT) with
complexity of ))log(( nnO . At the heart of numerous FFT algorithms is the decomposition of the original
large-dimensional problem into a large number of low-dimensional problems. Therefore, it is very impor-
tant to develop such methods for solving problems of small dimension.
The terms of convolutional numerical sequences are considered as components of hypercomplex
numbers belonging to some FPS dimension. The product of these hypercomplex numbers will contain
paired products of components of convolutional numerical sequences. However, they will be combined in
amounts not in the same composition as necessary to organize the convolution components.
114
The possibility of constructing algorithms for calculating the linear convolution of numerical se-
quences whose lengths differ from integral powers of two is shown. Algorithms are a recurrent «fringing»
of convolution components of the previous length of a convolution sequence. The beginning of the recur-
sion is a convolution constructed on the basis of the decomposition algorithm with the use of the FPS for
the sequence length equal to the nearest lower degree of the deuce relative to the given length. Algorithms
of this type are most effective for lengths of sequences being close to 2n from upward (the number of
multiplications is reduced by 30 %). Tabl.: 1. Fig.: 5. Refs: 13 titles.
Key words: hypercomplex number system, linear convolution, isomorphism, multiplication, bi-
complex numbers, quadriclex numbers.
004.421
. ., . ., . . -
. , . . 2018. . 20. 4.
. 53–63. — .
( ) -
( ).
, , -
, .
-
(Text Mining), (Information
Extraction), . , -
( )
’ ,
.
: ; ;
.
, -
,
. , :
«One Belt, One Road», «Nord Stream», « ».
-
. .: 3. .: 5. .: 12 .
: , , ,
, - , .
UDC 004.421
Dodonov A.G., Lande D.V., Berezin B.O. A method of semantic models for constructing and us-
ing for the public opinion monitoring. Data Rec., Storage & Processing. 2018. Vol. 20. N 4. P. 53–63. —
Rus.
It is proposed a method for constructing and using semantic models (SM) for the purpose of con-
tinuous monitoring of public opinion, opinion mining (OM). Under the semantic model in the framework
of this work, it is implied the subject domain model, which has the form of a directed graph, the vertices
of which correspond to the concepts of the domain, and the arcs define the relations between them. Se-
mantic models make it possible to use the results of linguistic statistical analysis of texts (Text Mining)
and the use of Information Extraction methods contained in texts from the Internet for opinion mining.
While the existing public opinion analysis projects are more focused on one-time (static) public opinion
research on objects and phenomena, it is proposed a method for automated construction and use of SM
based on continuous monitoring of public opinion on the Internet. The OM procedure consists of three
steps: the construction and clustering of the SM; selection of documents and the sentiment definition of
topics; visualization of results. The SM construction using the compactified horizontal visibility graph
algorithm, the use of cluster analysis methods for determining relevant topics, estimating the proportion
and tonality of individual sub-themes in the overall thematic information flow is shown. As examples, the
models of subject areas corresponding to the topics: «One Belt, One Road», «Nord Stream», «Genetically
Modified Organisms» are examined. The obtained results confirm the possibility of using the proposed
method of opinion monitoring in various subject areas. Tabl.: 3. Fig.: 5. Refs: 12 titles.
Key words: subject domain model, semantic model, cluster analysis, sentiment analysis, content-
monitoring, opinion monitoring.
ISSN 1560-9189 , , 2018, . 20, 4 115
004.83
. ., . . . -
, . . 2018. . 20. 4. . 64–75. — .
,
, , .
-
, -
. -
, -
, . -
: -
. -
, . .: 1. .: 5. .: 15 .
: , , -
, , Doc2Vec, .
UDC 004.83
Pogorilyy S.D., Kramov A.A. Method of the coherence evaluation of Ukrainian text. Data Rec.,
Storage & Processing. 2018. Vol. 20. N 4. P. 64–75. — Ukr.
Due to the growing role of the SEO technologies, it is necessary to perform an automated analysis
of the article’s quality. Such an approach helps both to return the most intelligible pages for the user’s
query and to raise the web-sites positions to the top of query results. An automated assessment of a cohe-
rence is a part of the complex analysis of the text. In this article, main methods for text coherence meas-
urements for Ukrainian languageare analyzed. Expediency of using the semantic similarity graph method
in comparison with other methods is explained. It is suggested the improvement of that method by the
pre-training of the neural network for vector representations of sentences. Experimental examination of
the original method and its modifications is made. Training and examination procedures are made on the
corpus of Ukrainian texts, which were previously retrieved from abstracts and full texts of Ukrainian
scientific articles. The testing procedure is implemented by performing of two typical tasks for the text
coherence assessment: document discrimination task and insertion task. Accordingly to the analysis it is
defined the most effective combination of method’s modification and its parameter for the measurement
of the text coherence. Tabl.: 1. Fig.: 5. Refs: 15 titles.
Key words: natural language processing, text coherence, semantic similarity graph, neural net-
work, Doc2Vec model, semantic similarity value of sentences.
004.056.55
. ., . . RSA -
. , . . 2018. . 20.
4. . 76–84. — .
. -
. RSA -
.
.
, ,
1–3 %. .: 3. .: 5. .: 8 .
: , RSA, , .
UDC 004.056.55
Pryimak A.V., Yaremchuk Yu.E. Increasing the stability of RSA cryptoalgorithm by using genetic
optimization of input message. Data Rec., Storage & Processing. 2018. Vol. 20. N 4. P. 76–84. — Ukr.
Due to the large amount of data that is transmitted every day via computer networks and stored in
cloud environments, network security has become one of the most important aspects of network opera-
tion. Cryptography is used to protect information on the network. One of the most popular cryptographic
algorithms used in various standards and protocols is RSA, the main drawbacks of which are the crypto-
graphic determinism and vulnerability to attack based on selected ciphertext, so the increase of its crypto
stability is still actual issue.
116
The research of the cryptographic algorithm RSA with regard to the possibility of increasing its
stability by using genetic algorithm was made. The method of optimization of input message consisting of
8 main steps, with the help of genetic algorithm is proposed. Using the three main properties of the ge-
netic algorithm (selection, crossover and mutation), the input message is randomizing, which as a result
of RSA encryption is transformed into a stochastic ciphertext, which is no longer deterministic and weak
to attack based on selected ciphertext, and thus increases the cryptostability of this algorithm. The statisti-
cal testing of the proposed improvement of the algorithm, using the NIST STS test package, showed a
high statistical reliability of this method, as the results of tests were inside 0,9–1 range. Comparison of the
results of testing of the original RSA and the modified showed that the original algorithm shows worse
performance compared to the proposed its modification. Ten of the fifteen tests showed that the modified
RSA algorithm with the built-in proposed method for optimizing the input message has higher rates by
1–3 %, which shows an increase of its cryptostability. Tabl.: 3. Fig.: 5. Refs: 8 titles.
Key words: cryptostability, RSA, determinism, genetic algorithm.
621.384.3
. ., . ., . ., . . -
-
. , . . 2018. . 20. 4. . 85–99. —
.
-
. ,
. -
-
.
- . , , -
,
. .: 1. .: 6. .: 13 .
: , , , -
, - - , , -
.
UDC 621.384.3
Pavlenko B.V., Prysiazhnyi D.P., Karpinets V.V., Yaremchuk Y.Y. Increasing the resilience of the
method of protection to ensure the authenticity of raster images of the evidence base from unauthorized
access. Data Rec., Storage & Processing. 2018. Vol. 20. N 4. P. 85–99. — Ukr.
A method of authentication of digital images for the evidence base of the judicial system and de-
veloped the appropriate software has been proposed. The stability of existing steganographic methods for
ensuring the authenticity of images is analyzed and the possibility of modifying the method is examined.
As a result, the method of embedding CEH based on the Koch-Zhao method is chosen for modification.
After analysing the proposed method to the set of attacks, it can be noted that the method has a high resis-
tance to passive attacks and, unlike most methods, has high resistance to active attacks by the attacker,
which is shown in the results of filter testing, cropping, rotation of the image.The obtained improved
method of embedding a CEH allowed to significantly increase the resistance to unauthorized modifica-
tions, the results indicate a high level of resistance. An algorithm for the implementation of an improved
method has been developed, and its software implementation has been implemented. A study of the sta-
bility of the proposed method to unauthorized modifications of digital images has been conducted. Over-
all, the results indicate a high level of stability, the modified method of embedding generates high-quality
images with a high PSNR of 39 to 47,7 decibels when testing conventional images, and 40,6 to 51 deci-
bels when using document shots. The worst results have been obtained by using the «salt and pepper»
noise attack, which led to 14,28 % of mistakenly read bits. Tabl.: 1. Fig.: 4. Refs: 13 titles.
Key words: information security, steganography, digital watermarks, the least significant bit rep-
lacement method, Kutter-Jordan-Bossen method, Lengelaar method, Koch-Zhao method.
008/094(069+02+930.25)/778.14
. ., . ., . ., . . -
-
. , . -
. 2018. . 20. 4. . 100–109. — .
ISSN 1560-9189 , , 2018, . 20, 4 117
, -
, , -
( -
). .: 1. .: 20 .
: , , ,
.
UDC 008/094(069+02+930.25)/778.14
Babenko V.V., Nadtochiy I.I., Savich A.V., Timrov O.O. Some issues of registration and repro-
duction of information touching upon objects of material and spiritual culture using technologies of the
state insurance documentation fund of Ukraine. Data Rec., Storage & Processing. 2018. Vol. 20. N 4.
P. 100–109. — Ukr.
A methodology of creating images in digital form, containing information about cultural values,
for the formation, management and use of the insurance fund of documentation (IFD) of Ukraine on the
basis of the creation and registration of their information meanings (complex digital images) is presented.
Under the information content of the material results of human creation is understood the result of the
allocation of human context of knowledge about them, which should be understood as an organized, inte-
grated collection of facts and generalizations.
Solving the problem of storing the informational content of the material results of human creation
is the complex solution of the following tasks: 1) allocation of human context of knowledge about the
material results of human creation, that is, the creation of a very specific information; 2) presentation of
this information to data; 3) determination of the type of data representation and the medium correspond-
ing to such representation.
For this purpose, a method of creating images in digital form containing information about cultural
values is proposed, the essence of which is to reduce such actions into a single technological process:
conducting scientific attribution and determining the attributes to be visualized and their digitization; pro-
duction and storage of microfilms IFD with information about cultural values; restoring information about
cultural values from IFD microfilms specified quality. Fig.: 1. Refs: 20 titles.
Key words: cultural value, scientific attribution, digitization, insurance fund of documentation.
|