Volume 4, Number 1 (2019)

FINDING THE GLOBAL MINIMUM OF THE GENERAL QUADRATIC PROBLEMS DURING DETERMINISTIC GLOBAL OPTIMIZATION
IN CYBER-PHYSICAL SYSTEMS
Anatolii Kosolap
University of Chemical Engineering, 8, Gagarina av., Dnipro, 49005, Ukraine
e-mail: anivkos@ua.fm
Submitted on 15.05.2019
© Kosolap A., 2019
Abstract: Cyber-Physical Systems (CPS) are integrations of computation and physical processes. We consider effective computations for designing difficult systems. In this paper, we propose new method of exact quadratic regularization for deterministic global optimization (EQR). This method can be used for the solution of a wide class of multiextreme problems, in particular, general quadratic problems. These problems will be transformed to maximization of norm a vector on convex set. The convex set is approximated by a polyhedron or intersection of balls. We offer the modified dual problem for maximization of norm a vector on intersection of balls. It allows to receive the solution of a primal problem. We use only local search (primal-dual interior point method) and a dichotomy method for search of a global extremum in the general quadratic problems.
Index Terms: global optimization, exact quadratic regularization, general quadratic problems, intersection of balls, modified dual theory, test problems.

Література – 8.

SPECIALIZATION IN CYBER-PHYSICAL SYSTEMS
Anatoliy Melnyk, Alexey Botchkaryov
Lviv Polytechnic National University, 12, Bandera Str, Lviv, 79013, Ukraine.
Authors’ e-mail: aomelnyk@lp.edu.ua, alb@lp.edu.ua
Submitted on 01.05.2019
© Melnyk A., Botchkaryov A., 2019
Abstract: The problem of designing a master of computer engineering program with a specialization in cyber-physical systems has been considered. The concept of cyber-physical systems has been analyzed from the perspective of generalization and formalization for educational purposes. The need for designing a master program in cyber-physical systems has been justified. Program competencies and learning outcomes have been defined. The structure of the master of computer engineering program with a spe¬cialization in cyber-physical systems and the corresponding structural-logical scheme of master's training have been regarded.

Index Terms: computer
Література – 12.

RESEARCH AND DESIGN OF THE MULTIFUNCTIONAL
CYBER-PHYSICAL SYSTEM OF TESTING COMPUTER PERFORMANCE IN WAN
Iryna Pasternak
Lviv Polytechnic National University, 12, Bandera Str, Lviv, 79013, Ukraine.
Author’s e-mail: pas_irusj@ukr.net
Submitted in 2019
© Pasternak I., 2019
Abstract: A multifunctional cyber-physical system for monitoring and testing remote computers in the WAN has been developed. This cyber-physical system has been built using microservice architecture. The system has used a website as a graphical interface, which in turn commu¬nicates with the main query separator, namely a web server. In addition, the database and the AES-256 encryption algorithm has been used to simplify data work, and to increase system security from external interventions. The algorithms of processing requests, algorithms of checking the efficiency of different modules of the com¬puting node have been developed. A system of internal communication has been designed. The links between database tables have been designed. The utilities for various custom actions have been developed. The user has also provided the ability to group users and computing nodes to simplify the process of analyzing data on the performance check.
Index Terms: module, computer network, global network, web-service, cyber-physical system.

Література – 11.

LOGICAL ALGORITHMS OF THE ACCELERATED MULTIPLICATION WITH MINIMUM QUANTITY OF NONZERO DIGITS OF THE CONVERTED MULTIPLIERS
Ihor Korol, Ivan Korol
Uzhhorod National University, 46 Pidhirna St, Uzhhorod, Transcarpathia, Ukraine, 88000.
Author’s e-mail: ivan.korol@uzhnu.edu.ua
Uzhhorod National University, 46, Pidhirna Str., Uzhhorod, Transcarpathia, Ukraine, 88000,
John Paul II Catholic University of Lublin, 14 Al. Racławickie, Lublin, Poland, 20-950.
Author’s e-mail: ihor.korol@uzhnu.edu.ua, ihorkorol@kul.lublin.pl
Submitted on 30.06.2019
© Korol Ihor, Korol Ivan, 2019
Abstract: The article presents a new algorithm of acce¬lerated multiplication, in which the time of multiplication has been reduced through the decrease in the number of nonzero digits of the multiplier. In this case, the multiplier has been presented in the form of the extended binary code. The article proves the algorithm's efficiency in comparison to previously known methods. The developed algorithm has been implemented using the hardware description language AHDL (Altera Hardware Description Language) in the Logic Development System MAX+PLUS II.
Index Terms: extended binary code, accelerated multiplication device, AHDL, MAX+plus.

Література – 5.

A REPRESENTATIVE FRAGMENT METHOD OF ANALYZING COMPLEX SYSTEMS OF SMART CONTRACTS
Michal Horodelski1 and Piotr Filipkowski1
1Institute of Mathematics and Computer Science,
Faculty of Mathematics Informatics
and Landscape Architecture, The John Paul II Catholic University of Lublin, Poland
Author's e-mail: michal.horodelski@kul.pl
2Institute of Information Systems and Digital Economy,
The Collegium of Economic Analysis of Warsaw School of Economics, Poland
Author's e-mail: pfilip@sgh.waw.pl
Submitted on 24.06.2019
© Horodelski M., Filipkowski P., 2019
Abstract: The paper presents the use of states of explosion-proof method for analyzing the behavior of systems that provide smart contract technology. The selected example system is ShadowEth, whose main task is to ensure sufficient confidentiality of information stored in the Ethereum blockchain currency. The Petri network model for the ShadowEth system has been presented. The system properties according to the specifications have been defined. Properties described in a certain extension of the TCTL logic and verification have been carried out.
Index Terms: petri net, time, smart-contract, shadoweth, Ethereum.

Література – 15.

THE METHODS OF PROTECTION AND HACKING
OF MODERN WI-FI NETWORKS
Taras Boretskyy
Lviv Polytechnic National University, 12, Bandera Str., Lviv, 79013, Ukraine.
Author's e-mail: Taras.R.Boretskyi@lpnu.ua
Submitted on 24.06.2019
© Boretskyi T., 2019

Abstract: In this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.
Index Terms: Wi-Fi security, WPA2-PSK, dictionary attack, hacking, 4-way handshake, PBKDF2 authentication protocol.
Література – 8.

IMPLEMENTING QUANTUM FOURIER TRANSFORM IN A DIGITAL QUANTUM COPROCESSOR
Valerii Hlukhov
Lviv Polytechnic National University, 12, Bandera Str, Lviv, 79013, Ukraine.
Author’s e-mail: glukhov@polynet.lviv.ua
Submitted on 24.06.2019
© Hlukhov V., 2019
Abstract: In this paper, the digital quantum coprocessor has been checked for the possibility of quantum Fourier transform, which is the main quantum operation of the Shor's algorithm. To do this, the model of the 4-qubit coprocessor has been created, its work has been simulated and it has been implemented in FPGA.
Index Terms: digital quantum coprocessor, digital qubit, quantum Fourier transform

Література – 22.

IMPLEMENTATION OPTIONS OF KEY RETRIEVAL PROCEDURES FOR THE IEEE 802.15.4 WIRELESS PERSONAL AREA NETWORKS SECURITY SUBSYSTEM
Viktor Melnyk
Lviv Polytechnic National University, 12, Bandera Str., Lviv, 79013, Ukraine.
Author's e-mail: viktor.a.melnyk@lpnu.ua
Submitted on 24.06.2019
© Melnyk V., 2019
Abstract: The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implemen¬tation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.
Index Terms: Wireless Personal Area Networks, IEEE 802.15.4, key retrieval, wireless security.

Література – 11.

Syndicate content