Oleksandr Drozd
YOU?
Author Swipe
View article: Analyze, monitoring and testing of computer information systems
Analyze, monitoring and testing of computer information systems Open
The high importance and criticality of the efficiency and reliability of the functioning of modern computer information systems require efforts to ensure them, which are no less, than the efforts to develop the systems themselves. Offline …
View article: A model and method for enhancing the efficiency of processing operation queues at maximum server equipment load
A model and method for enhancing the efficiency of processing operation queues at maximum server equipment load Open
Existing solutions aimed at preventing excessive parallelization, reducing processingtimes, and forecasting load accuracy in operation queues were analyzed.Subsequently, a new model and method designed to enhance the efficiency of processi…
View article: SPECIAL SERVICES OF UKRAINE IN CONDITIONS OF CURRENT AND FUTURE CHALLENGES
SPECIAL SERVICES OF UKRAINE IN CONDITIONS OF CURRENT AND FUTURE CHALLENGES Open
The article analyzes the optimal directions and ways of development of international cooperation, capacity building and reform of Ukrainian special services in the view of the current geopolitical situation, as well as current and future c…
View article: AN APPROACH TO NON-EQUIVALENT STEGANOGRAPHIC EMBEDDING OF ADDITIONAL DATA INTO THE PROGRAM CODE OF FPGA LUT UNITS
AN APPROACH TO NON-EQUIVALENT STEGANOGRAPHIC EMBEDDING OF ADDITIONAL DATA INTO THE PROGRAM CODE OF FPGA LUT UNITS Open
Purpose. To increase the effective volume of stego containers in the FPGA program code. To achieve this purpose, an additional procedure of non-equivalent transformations of FPGA program code is added. Non-equivalent transfor-mations compl…
View article: BEHAVIORAL HIDDENTESTING OF DISTRIBUTED INFORMATION SYSTEMSTAKING INTO ACCOUNTOF ENERGY
BEHAVIORAL HIDDENTESTING OF DISTRIBUTED INFORMATION SYSTEMSTAKING INTO ACCOUNTOF ENERGY Open
The introduction of new energy-consuming properties for positions and transitions into the checked properties of the extended reference Petri net, for which the deviations of the tested Petri net are determined and a testing model is devel…
View article: Improving FPGA components of critical systems based on natural version redundancy
Improving FPGA components of critical systems based on natural version redundancy Open
The article is devoted to the problem of improving FPGA (Field Programmable Gate Array) components developed for safety-related systems. FPGA components are improved in the checkability of their circuits and the trustworthiness of the resu…
View article: Power-Oriented Monitoring of Clock Signals in FPGA Systems for Critical Application
Power-Oriented Monitoring of Clock Signals in FPGA Systems for Critical Application Open
This paper presents a power-oriented monitoring of clock signals that is designed to avoid synchronization failure in computer systems such as FPGAs. The proposed design reduces power consumption and increases the power-oriented checkabili…
View article: Steganographic Resources of FPGA-based Systems for Approximate Data Processing
Steganographic Resources of FPGA-based Systems for Approximate Data Processing Open
The program code controls the operation of FPGA (Field Programmable Gate Arrays) chips.Through the use of program code it is possible to interfere with the operation of these chips.Operational monitoring (integrity, authenticity, distribut…
View article: Development of computer system components in critical applications: problems, their origins and solutions
Development of computer system components in critical applications: problems, their origins and solutions Open
The article is devoted to analysis of problems of the computer system development in the domain of critical applications. The main trends of this development were highlighted, which consisted in increased demands for performance based on p…
View article: DETECTION METHOD OF THE PROBABLE INTEGRITY VIOLATION AREAS IN FPGA-BASED SAFETY-CRITICAL SYSTEMS
DETECTION METHOD OF THE PROBABLE INTEGRITY VIOLATION AREAS IN FPGA-BASED SAFETY-CRITICAL SYSTEMS Open
The features of integrity monitoring of FPGA-based safety-critical systems are considered. Hardware Trojans are distinguished as one of the most dangerous types of malicious integrity violation of FPGA-based systems. The study has proved t…
View article: A method of hidden faults opposition for FPGA-based components of safety-related systems
A method of hidden faults opposition for FPGA-based components of safety-related systems Open
The paper is devoted to the problem of hidden faults, which is inherent in safety-related systems aimed at ensuring the functional safety of high-risk facilities to counter accidents.The problem of hidden faults is considered from the pers…
View article: MULTILEVEL BEHAVIORAL TESTING OF DISTRIBUTED INFORMATION SYSTEMS
MULTILEVEL BEHAVIORAL TESTING OF DISTRIBUTED INFORMATION SYSTEMS Open
Operational features of modern distributed information systems significantly increase the requirements for the reliability of their functioning and tighten the time limits for its restoration. High reliability of work is provided by variou…
View article: POWER-CONSUMPTION-ORIENTED CHECKABILITY FOR FPGA-BASED COMPONENTS OF SAFETY-RELATED SYSTEMS
POWER-CONSUMPTION-ORIENTED CHECKABILITY FOR FPGA-BASED COMPONENTS OF SAFETY-RELATED SYSTEMS Open
This paper is dedicated to the problem of the circuit checkability of components in the safety-related systems, which operate objects of the increased risk and are aimed at ensuring safety of both a system and a control object for accident…
View article: Checkability of the circuits in FPGA designs according to power dissipation
Checkability of the circuits in FPGA designs according to power dissipation Open
The authors consider the checkability issues of FPGA designs and analyze the logical (structural and structurally functional) checkability. The paper describes the features of safety-related systems that can operate in normal and emergency…
View article: SINGLE-LEVEL METHOD OF BEHAVIORAL ONLINE TESTING OF DISTRIBUTED INFORMATION SYSTEMS
SINGLE-LEVEL METHOD OF BEHAVIORAL ONLINE TESTING OF DISTRIBUTED INFORMATION SYSTEMS Open
The article considers a single-level method of behavioral online testing with recognition of the reference behavior of DIS. The method features are the evolu-tionary search for reference behavior in the flow of DIS functioning, paralleliza…
View article: A Method of Common Signal Monitoring in FPGA-Based Components of Safety-Related Systems
A Method of Common Signal Monitoring in FPGA-Based Components of Safety-Related Systems Open
Traditional solutions in ensuring the functional safety of safetyrelated systems and their digital components based on methods and means of testing and on-line testing, as well as fault-tolerant structures, including majority schemes using…
View article: Checkability of hierarchical transmitions for behavioral check
Checkability of hierarchical transmitions for behavioral check Open
The means of on-line testing of complex distributed information systems (DIS), often possessing criticality properties, must ensure their complete verifica-tion in real time. The high structural-functional and combinatorial complexity of m…
View article: Efficiency of the computation bitwise pipelining in FPGA-based components of safety-related systems
Efficiency of the computation bitwise pipelining in FPGA-based components of safety-related systems Open
The use of computer systems like safety-related systems to ensure the functional safety of high-risk objects has raised them in the development of resources to the level of diversification. At the same time, the digital components, traditi…
View article: Checkability of FPGA projects by power-dissipation
Checkability of FPGA projects by power-dissipation Open
The issue is devoted to development of a checkability of the circuits for digital components of instrumentation and control safety-related systems, which operate ob-jects of the increased risk, such as power grids and power plants, high-sp…
View article: THE HYBRID AGENT MODEL OF BEHAVIORAL TESTING
THE HYBRID AGENT MODEL OF BEHAVIORAL TESTING Open
Operation testing and diagnostic tests, applied for distributed information systems, inherit and employ the properties of distribution, autonomy, goal formation and cooperation, natural for the multi-agent systems. This paper presents the …