https://journals.uran.ua/eejet/issue/feedEastern-European Journal of Enterprise Technologies2024-08-30T22:58:42+03:00Frolova Liliiaeejet@entc.com.uaOpen Journal Systems<p><span lang="EN-US">Terminology used in the title of the «Eastern-European Journal of Enterprise Technologies» - «enterprise technologies» should be read as «industrial technologies». <strong>«Eastern-European Journal of Enterprise Technologies»</strong> publishes all those best ideas from the science, which can be introduced in the industry. Since, obtaining the high-quality, competitive industrial products is based on introducing high technologies from various independent spheres of scientific researches, but united by a common end result - a finished high-technology product. </span>Among these scientific spheres, there are information technologies and control systems, engineering, energy and energy saving. Publishing scientific papers in these directions are the main development «vectors» of the «Eastern-European Journal of Enterprise Technologies». Since, these are those directions of scientific researches, the results of which can be directly used in modern industrial production: space and aircraft industry, instrument-making industry, mechanical engineering, power engineering, chemical industry and metallurgy.</p> <p><span lang="EN-US">Therefore, the scientists, associated with modern production, have the opportunity to participate in <strong>technology transfer to industry</strong>, publishing the results of their applied scientific researches. Industrialists, in turn, can draw scientific and practical information from the journal - each in their direction:</span></p> <ul> <li>specialists in management and computer science - from volumes «Applied Information Technologies and Control Systems», «Mathematics and Cybernetics - Applied Aspects»;</li> <li>mechanical and design engineers - from the volume «Applied Mechanics»;</li> <li>production engineers - from volumes «Mechanical Engineering Technology», «Applied Physics», «Materials Science», «Technology of organic and inorganic substances and the Ecology»;</li> <li>production and power engineers - from the volume «Energy-saving technology and equipment».</li> </ul> <p><span lang="EN-US"><strong>The goal of the journal</strong> is to eliminate the gap, which occurs between the rapidly emerging new scientific knowledge and their introduction in the industry, which requires much more time. Industrial enterprises are active subscribers to the «Eastern-European Journal of Enterprise Technologies», and production engineers check the practical value of those scientific and technological ideas, which are recommended for implementation by scientists-authors of the ''Eastern-European Journal of Enterprise Technologies».</span></p> <p><span lang="EN-US"><strong>The objective of the journal</strong> in achieving the goal is <strong>forming a «scientific component» of modern technologies transfer</strong> from science to industry. Therefore, in the papers, published in the journal, the emphasis is placed on both scientific novelty, and practical value.</span></p>https://journals.uran.ua/eejet/article/view/310521Improving protection of falcon electronic signature software implementations against attacks based on floating point noise2024-08-26T21:27:41+03:00Olena Kachkoiit@iit.kharkov.uaYurii Gorbenkojsciitua@gmail.comSerhii Kandiisergeykandy@gmail.comYevhenii Kaptolkaptevg@gmail.com<p>The object of this study is digital signatures. The Falcon digital signature scheme is one of the finalists in the NIST post-quantum cryptography competition. Its distinctive feature is the use of floating-point arithmetic, which leads to the possibility of a key recovery attack with two non-matching signatures formed under special conditions. The work considers the task to improve the Falcon in order to prevent such attacks, as well as the use of fixed-point calculations instead of floating-point calculations in the Falcon scheme. The main results of the work are proposals for methods on improving Falcon's security against attacks based on the use of floating-point calculations. These methods for improving security differ from others in the use of fixed-point calculations with specific experimentally determined orders of magnitude in one case and proposals for modifying procedures during the execution of which the conditions for performing an attack on implementation level arise in the second case. As a result of the analysis, the probability of a successful attack on the recovery of the secret key for the reference implementation of the Falcon was clarified. Specific places in the code that make the attack possible have been localized and code modifications have been suggested that make the attack impossible. In addition, the necessary scale for fixed-point calculations was determined, at which it is possible to completely get rid of floating-point calculations. The results could be used to qualitatively improve the security of existing digital signatures. This will make it possible to design more reliable and secure information systems using digital signatures. In addition, the results could be implemented in existing systems to ensure their resistance to modern threats</p>2024-08-30T00:00:00+03:00Copyright (c) 2024 Olena Kachko, Yurii Gorbenko, Serhii Kandii, Yevhenii Kaptolhttps://journals.uran.ua/eejet/article/view/310547Development of functionality principles for the automated data transmission system through wireless communication channels to ensure information protection 2024-08-27T21:46:16+03:00Serhii YevseievSerhii.Yevseiev@gmail.comStanislav Milevskyimilevskiysv@gmail.comVladyslav SokolVladyslav.sokol@gmail.comVladyslav Yemanovmail@nangu.edu.uaAnatolii Volobuievanvolobuiev@gmail.comLarysa DakovaDacova@ukr.netMykola Brailovskyibk1972@ukr.netIrada Rahimovaika1402@icloud.comVladyslav Kravchenkovladkr58@gmail.comOleg Cherniavskiyoleg.combat74@gmail.com<p>The development of data transmission systems based on wireless radio communication channels allowed the construction of fundamentally new networks – mesh networks, which are used not only in smart technologies, but are the basis for the construction of cyber-physical and socio-cyber-physical systems (objects of critical infrastructure). The object is the process of ensuring reliable and secure data transmission based on the use of wireless radio communication channels. A mathematical model of information resources protection system functioning is proposed to ensure the signs of immunity and security of the automated data transmission system. To identify threats, a unified classifier and flow state estimation technique are used, which take into account the hybridity and synergy of targeted (mixed) attacks on communication channels. The critical points of the infrastructure elements, as well as the information that circulates and/or is stored, are determined. The assessment of compliance with the regulators’ requirements, both international and state regulatory acts, and the presence and ability of the security system elements to ensure the required level of infrastructure elements protection is taken into account. The proposed approach allows to determine: coefficients of information and internal availability of a wireless radio communication channel, the vector potential of the lagging magnetic field as a result of data transmission work. When evaluating the coefficient of a wireless radio communication channel internal availability, it is proposed to take into account coherent reception of the signal. At the same time, the immunity factor of the wireless radio communication channel is much higher than 1, which provides sufficient protection of information. A technical solution is proposed that will allow the level of confidentiality, integrity, authenticity and reliability of a wireless radio communication channel to approach 100 %The development of data transmission systems based on wireless radio communication channels allowed the construction of fundamentally new networks – mesh networks, which are used not only in smart technologies, but are the basis for the construction of cyber-physical and socio-cyber-physical systems (objects of critical infrastructure). The object is the process of ensuring reliable and secure data transmission based on the use of wireless radio communication channels. A mathematical model of information resources protection system functioning is proposed to ensure the signs of immunity and security of the automated data transmission system. To identify threats, a unified classifier and flow state estimation technique are used, which take into account the hybridity and synergy of targeted (mixed) attacks on communication channels. The critical points of the infrastructure elements, as well as the information that circulates and/or is stored, are determined. The assessment of compliance with the regulators’ requirements, both international and state regulatory acts, and the presence and ability of the security system elements to ensure the required level of infrastructure elements protection is taken into account. The proposed approach allows to determine: coefficients of information and internal availability of a wireless radio communication channel, the vector potential of the lagging magnetic field as a result of data transmission work. When evaluating the coefficient of a wireless radio communication channel internal availability, it is proposed to take into account coherent reception of the signal. At the same time, the immunity factor of the wireless radio communication channel is much higher than 1, which provides sufficient protection of information. A technical solution is proposed that will allow the level of confidentiality, integrity, authenticity and reliability of a wireless radio communication channel to approach 100 %</p>2024-08-30T00:00:00+03:00Copyright (c) 2024 Serhii Yevseiev, Stanislav Milevskyi, Vladyslav Sokol, Vladyslav Yemanov, Anatolii Volobuiev, Larysa Dakova, Mykola Brailovskyi, Irada Rahimova, Vladyslav Kravchenko, Oleg Cherniavskiyhttps://journals.uran.ua/eejet/article/view/309387Hardware-software implementation of a local Wi-Fi network for the transmission of biomedical signals2024-07-31T19:19:22+03:00Yuliya Gerasimovayugerasimova@ku.edu.kzVictor Ivelvivel@ku.edu.kzSayat Moldakhmetovssmoldahmetov@ku.edu.kzPavel Petrovpapetrov@ku.edu.kz<p>The object of this study is a wireless local Wi-Fi network for broadcasting biomedical signals, its structure, and principles of construction. The task of minimizing the power consumption of a Wi-Fi transmitter has been addressed, which provides the possibility of building a wireless system for long-term monitoring of biomedical signals. As a result, a functional diagram of a wireless Holter monitoring system based on an ESP32 microcontroller was constructed, which includes a subsystem for setting up and diagnosing system units using MATLAB software packages, an ECG signal generator, and a multifunctional PCIe board from National Instruments. Evaluation criteria and methods for minimizing power consumption by an autonomous Wi-Fi transmitter have been proposed. Methods for synchronizing the working cycles of the transmitter and receiver of the Holter monitoring system were determined. A procedure for determining the optimal biosignal measurement frequency is presented, at which the distortion of ECG signals would be minimal, which means that the signal could be transmitted without losses. The concept of constructing an algorithm for implementing a program for a Wi-Fi transmitter has been developed, ensuring parallel execution of ECG signal measurement operations and their transmission over a local network. The data from semi-naturalistic tests with an experimental Holter monitoring system with a pre-setup subsystem and using external measuring devices, a computer, and the MATLAB software environment are presented. A comparative analysis of the experimental data with primary ECG signals and ECG signals at the receiver output showed a fairly stable correspondence between the input and output ECG signals. The proposed algorithms make it possible to reduce the average current consumption of the ESP32 microcontroller to 50.5 mA. The results of the study demonstrate the possibility of constructing an energy-efficient wireless system for long-term monitoring of biomedical signals based on the Wi-Fi interface</p>2024-08-30T00:00:00+03:00Copyright (c) 2024 Yuliya Gerasimova, Victor Ivel, Sayat Moldakhmetov, Pavel Petrovhttps://journals.uran.ua/eejet/article/view/310372Segmentation of image from a first-person-view unmanned aerial vehicle based on a simple ant algorithm2024-08-22T19:47:55+03:00Hennadii Khudov2345kh_hg@ukr.netIllia Hridasovil_hridas_1991@ukr.netIrina Khizhnyakkhizh_ia_80@ukr.netIryna Yuzovauzik25@ukr.netYuriy Solomonenkosolom_169@ukr.net<p>The object of this study is the process of image segmentation from the First Person View (FPV) of an unmanned aerial vehicle (UAV). The main hypothesis of the study assumes that the use of a simple ant algorithm could ensure the necessary quality of the segmented image.</p> <p>The segmentation method, unlike the known ones, takes into account the number of ants in the image, weight, initial amount and evaporation rate of the pheromone, the "greediness" of the algorithm and provides:</p> <p>– preliminary selection of individual channels of the Red-Green-Blue (RGB) color space;</p> <p>– preliminary placement of ants according to the uniform law;</p> <p>– determining the routes of ants;</p> <p>– taking into account the attractiveness of the route for each ant;</p> <p>– change (adjustment) in the concentration of ant pheromones;</p> <p>– calculation of the probability of movement (transition) of the ant on the movement route;</p> <p>– determination of the objective function at the j-th iteration and its minimization;</p> <p>– determining the coordinates of the route of movement (movement) of ants;</p> <p>– verification of the fulfillment of the stop condition;</p> <p>– determination of the best routes found by ants;</p> <p>– calculation of the brightness of the pixels of the segmented image in each channel of the RGB color space;</p> <p>– further combining the results of channel segmentation.</p> <p>An experimental study of image segmentation from UAV FPV based on a simple ant algorithm was conducted. The specified object of interest on the segmented image has a certain structure, unevenness of the contours, and can be further used for decoding, categorization, etc. Unlike the object of interest, the background ("garbage" objects) in the segmented image do not have a stable structure and can be further filtered out.</p> <p>It has been established that the segmented image by the known method based on the gradient module has a low contrast value, there are gaps in the segmented pixels of the object of interest. A segmented image using a method based on a simple ant algorithm is free from that drawback.</p>2024-08-30T00:00:00+03:00Copyright (c) 2024 Hennadii Khudov, Illia Hridasov, Irina Khizhnyak, Iryna Yuzova, Yuriy Solomonenko