No 1 (2020)
3-10 238
Abstract
As part of this this research a method for reading a digital watermark is suggested for executable files. The watermark in question belongs to the category of semi-fragile, which is destroyed at a given percentage of changes in the program. Specified method can be used to control software integrity. The developed algorithm has a number of properties that make it possible to counteract code analysis. The program protected in this way reads the stored watermark by bytes in a pseudorandom order making it difficult to detect and destroy the integrity control mechanism. The proposed algorithm is an extension of the opaque predicate approach. The high complexity of attacking this method based on breakpoints with conditions and tracing is presented.
11-19 258
Abstract
The paper proposes a mathematical model for constructing a linear-quadratic smooth interpolation function, an iterative method for constructing an interpolation curve, and a comparative analysis with the spline interpolation method is also presented.
20-29 215
Abstract
The process of external modulation of the optical carrier by a multichannel frequency-separated signal formed in the radio frequency band is considered. The output spectrum of the optical signal is investigated using the fast Fourier transform. It is shown that if the operating point of the modulator is selected in the middle of the linear portion of the transfer characteristic, then the output spectrum will not have even-order intermodulation distortion and the third and fifth order intermodulation distortions will be decisive. Based on the results of external modulation process simulation of radiation, approximating formulas are proposed for determining signal-to-noise ratio, which can be used in engineering calculations of the noise immunity of fiber-optical transmission systems.
30-41 199
Abstract
The article studies the regularization of educational activity carried out via hybrid mathematical simulation. The study is conducted on the example of the main professional educational program organization. Formal models for educational activity organization in the context of managing its life cycle and taking into account the hybridization of its mathematical tools have been developed. The proposed regularization criteria, based on probabilistic and fuzzy generalized entropy, managed to substantiate the composition of the model-instrumental complex for regularization.
42-59 262
Abstract
Broadcast collective communication operation is used by many scientific applications and tend to limit overall parallel application scalability. As the number of cores per computer node keeps increasing, it becomes important for MPI to leverage shared memory for intranode communication. This paper investigates the design and optimization of Bcast operation for SMPlNUMA nodes. We describe an algorithm for Bcast that takes advantage of NUMA-specific placement of queues in memory for message transferring. On a Xeon Nehalem and Xeon Broadwell NUMA nodes, our implementation achieves on average 20-60 % speedup over Open MPI and MVAPICH.
60-72 194
Abstract
The paper considers three criteria to identify a space character in English-language texts with unknown character encoding. Two criteria are based on estimating the deviation of the word length distribution from the Poisson distribution, and the third considers the frequency of spaces in a text. The paper provides the criteria’s statistics for English-language texts varied in size. The critical values of the suggested criteria are determined, and the number of type I and type II errors is obtained experimentally. Based on the findings, the terms of the considered criteria sharing are determined. The accuracy of the space character identification in English-language texts employing the suggested criteria is proved on the validation sample.
73-88 239
Abstract
The article introduces file identifying characteristics, describes file operation examples, offers file operation identification algorithm, presents developed file impact identification process model. There is a possibility to create system based on developed model that allows to automate file impact identification process to determine impact on stored information during information security incident response. Information impact determination makes incident result removing process easier. The system used allows to verify information sources that contain file identifying characteristics and file operations data
89-99 5217
Abstract
The advantages and limitations of the phased arrays antenna multifunctional airborne radar systems of short- and medium-range aircraft for solving defense and national economic problems are considered.
ISSN 1998-6920 (Print)