Персона:
Вавренюк, Александр Борисович

Загружается...
Profile Picture
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Вавренюк
Имя
Александр Борисович
Имя

Результаты поиска

Теперь показываю 1 - 10 из 14
  • Публикация
    Только метаданные
    Automated Flow Meter for LPG Cylinders
    (2022) Shurygin, V. A.; Yadykin, I. M.; Vavrenyuk, A. B.; Шурыгин, Виктор Александрович; Ядыкин, Игорь Михайлович; Вавренюк, Александр Борисович
    © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.The article discusses the stages of practical implementation of measuring the flow of liquefied gas from a cylinder. The gas flow rate is determined based on the revealed dependence of the inductance of the gas cylinder on the mass of the gas and the ambient temperature. Devices for carrying out reference measurements and stages of calibration of flow meters and requirements for the design of the measuring system are given. An example of the implementation of an automated measuring system for calibration is considered.
  • Публикация
    Только метаданные
    Performance Evaluation of a Cluster Computing System Running OpenBSD Based on Single-Board Computers
    (2020) Vavrenyuk, A. B.; Makarov, V. V.; Pryakhin, V. S.; Pavlov, M. P.; Vasileva, A. A.; Вавренюк, Александр Борисович
    © 2020, Springer Nature Switzerland AG.This report discusses the principles of the development of cluster computing systems based on single-board computers. It reviews main software and hardware used for this purpose and compares them. The analysis is carried out and the most effective and suitable solutions are selected, as well as the rationale for their choice to solve the problem. It was reviewed three variants of single-board computers, operating system choice and different message passing interfaces that can to be used for this cluster computing system. In the practical part of this article a working cluster construction algorithm is presented and the features of the operating system (OS) are described. Cluster performance is also assessed depending on the number of nodes and OS being used. The report materials can be used as a guide for creating a cluster computing system that is not inferior to its counterparts in speed and to a large extent surpasses them in security.
  • Публикация
    Только метаданные
    Flash Memory—Formation, Development and Prospects
    (2020) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович
    © 2020, Springer Nature Switzerland AG.The history of the emergence, the current state, as well as prospects for the development of flash memory is presented. The physical processes underlying the operation of flash memory, the varieties of its architecture are shown, the modern element base of flash memory is given. The main points are presented, such as the concept of flash memory, floating gate transistors, quantum mechanical Fowler—Nordheim effect (FN—tunneling), hot electron injection, a combination of these recording methods, their advantages and disadvantages, various NOR and NAND flash memory architectures and their combinations, cell varieties and bad block culling. Prospects of further development of flash memory are considered. Currently, attempts are being made to move from two-dimensional topology to three-dimensional. These developments allow the use of metal nanocrystals in the production of memory chips, without making almost any changes in the technological process. A material capable of doubling the capacity of conventional flash memory chips by adding self-forming metal nanocrystals to the production stage of chips by introducing a third dimension into the memory matrix has been developed. At this stage of development continues to dominate flash memory, the prospects of which is devoted to the article is given.
  • Публикация
    Только метаданные
    Encrypted Data Transmission Over an Open Channel
    (2019) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Tcibisov, D. V.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович
    © 2019, Springer Nature Switzerland AG. This paper discusses methods for transmitting cipher messages over an open communication channel using an additional channel for transmitting a secret key. Set of the possible one-time keys are contained in the table on the sending and receiving side. The key to encrypt and decrypt a message is selected based on a signal that can be transmitted over an additional channel at a specified time or a timestamp in the cipher message itself. The proposed method also allows the use of a truly random number generator to obtain secret keys, which provides an absolutely strong cipher. Two variants of forming and using tables with secret keys are proposed. Estimations of the required time for encryption and decryption of data, as well as the necessary amount of memory for storing tables are given.
  • Публикация
    Только метаданные
    Implementation of the DOZEN cryptoalgorithm on the cluster of single-board computers
    (2019) Vavrenyuk, A. B.; Rusakova, A. S.; Radiskhlebova, A. A.; Ivanov, M. A.; Makarov, V. V.; Вавренюк, Александр Борисович; Иванов, Михаил Александрович
    © 2019 IEEE The article considers features of the DOZEN cryptoalgorithm which is based on nonlinear three-dimensional multi-round data transformation. The cryptoalgorithm is designed to solve problems of information security. Existing implementations of the DOZEN cryptoalgorithm are being reviewed. Features of the implementation of the DOZEN cryptoalgorithm on the cluster of single-board computers with usage of parallel computing are considered.
  • Публикация
    Только метаданные
    Study of the possibilities of using virtualization tools to optimize the cluster resources management
    (2019) Radiskhlebova, A. A.; Vavrenyuk, A. B.; Rusakova, A. S.; Makarov, V. V.; Вавренюк, Александр Борисович
    © 2019 IEEE A cluster is a combination of a set of separate computing resources to use them as a single system. Cluster management is related to the distribution of resources between tasks. In most cases, the cluster management system provides resources without taking into account the features of the started tasks, which can result in slower performance of the programs executed on the cluster. Virtualization tools provide more options for flexible management of running applications, which allows you to gain an advantage optimizing the allocation of tasks to cluster nodes in comparison with the classic scheduler. The article reviews various methods and tools of virtualization, discusses their use for solving the problem of optimizing the cluster resources management.
  • Публикация
    Только метаданные
    Hadron Collider and Quantum Computer
    (2020) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович
    © 2020, Springer Nature Switzerland AG.The article deals with the problems of creating a quantum computer based on the Hadron Collider. The main factors hindering the implementation of the quantum computer are analyzed. The main difficulty in practical implementation is fixing the result. Because the observer affects the object of observation, the result is always probabilistic. The article gives a brief overview of the activities of various scientific groups on the way to create a quantum computer. Different groups of scientists are trying to use the following physical approaches to fix the result: heavy duty magnetic fields; ultralow temperature; special material. It is obvious that the creation of facilities to create the above conditions require huge financial, energy and other costs. At the same time, there is an operating device where all of the above physical conditions are implemented in practice. The possibility of practical implementation of a quantum computer based on the existing hadron Collider is substantiated.
  • Публикация
    Только метаданные
    Multi-User System for Remote Access to the Resources of the Educational Computer Cluster Based on Single Board Diskless Computer Raspberry PI 3 Model B as a Service
    (2021) Vavrenyuk, A. B.; Shishov-Turchin, D. B.; Alexeev, A. N.; Makarov, V. V.; Вавренюк, Александр Борисович
    © 2021 IEEE.For teaching students in the course on "Parallel Computing", the idea of building an educational computing cluster based on single-board computers is relevant. This cluster should provide multi-user remote access for the simultaneous interaction of a group of students with it in order to carry out a laboratory practice in the above discipline. The paper presents the general structure of a cluster based on 64 single-board computers Raspberry Pi 3 Model B with an individual power module for rebooting each cluster node separately. Provided remote access to the cluster with LDAP authorization and authentication, as well as diskless boot of the operating system. This article describes the organization of a network with a division into a cluster management network and a data network. Due to the easy scalability of the considered configuration, this cluster has great prospects for daily use and subsequent modernization.
  • Публикация
    Только метаданные
    Development of automated robot to human dialogue system
    (2019) Kolosov, R. V.; Vavrenyuk, A. B.; Zareshin, S. V.; Makarov, V. V.; Shaymardanov, T. A.; Вавренюк, Александр Борисович
    © 2019 IEEE The article observes the algorithm of creating an automated dialogue human with robot. Also, it describes the way of searching answer from robot to human using full-text search by preliminary specified keys. There are analyzed cases when robot was able to conduct a full-fledged dialogue with human. The identified problems of finding the necessary key with this approach of creating an automated dialogue are described.
  • Публикация
    Открытый доступ
    Synchronous Stream Encryption Using an Additional Channel to Set the Key
    (2021) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович
    © 2020 Elsevier B.V.. All rights reserved.The article describes the possibility to refuse the direct transfer of the key from the sender to the recipient in the synchronous stream encryption scheme. We suggest creating a table of correspondence between the key information K, and the time of sending an email or phone call. The sender will have one instance of such a table, and the recipient will have another. The format of the key information in the simplest case includes the PRNG key itself, which determines the logic of operation of the PRNG nonlinear function, the code of the type of the used PRNG nonlinear function, and the PRNG design code. We offer 2 ways of interaction between the sender and the recipient of messages. Consider two possible options for encryption schemes: when the superposition of a sequence from the output of the PRNG on the input sequence is performed by the XOR operation, and when the encryption process is performed with a stochastic transformation of R, and the operation decryption operation backward stochastic transformation R-1. We present the scheme of one of the simplest possible variants for constructing the block R of the stochastic transformation.