Персона: Вавренюк, Александр Борисович
Загружается...
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Вавренюк
Имя
Александр Борисович
Имя
14 results
Результаты поиска
Теперь показываю 1 - 10 из 14
- ПубликацияОткрытый доступSynchronous Stream Encryption Using an Additional Channel to Set the Key(2021) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович© 2020 Elsevier B.V.. All rights reserved.The article describes the possibility to refuse the direct transfer of the key from the sender to the recipient in the synchronous stream encryption scheme. We suggest creating a table of correspondence between the key information K, and the time of sending an email or phone call. The sender will have one instance of such a table, and the recipient will have another. The format of the key information in the simplest case includes the PRNG key itself, which determines the logic of operation of the PRNG nonlinear function, the code of the type of the used PRNG nonlinear function, and the PRNG design code. We offer 2 ways of interaction between the sender and the recipient of messages. Consider two possible options for encryption schemes: when the superposition of a sequence from the output of the PRNG on the input sequence is performed by the XOR operation, and when the encryption process is performed with a stochastic transformation of R, and the operation decryption operation backward stochastic transformation R-1. We present the scheme of one of the simplest possible variants for constructing the block R of the stochastic transformation.
- ПубликацияТолько метаданныеUsing a Neural Network to Convert a Radio Signal from an RTL-SDR Receiver to Text(2020) Vildyaeva, M. V.; Egorova, E. A.; Vavrenyuk, A. B.; Вавренюк, Александр Борисович© 2020 IEEE.Voice recognition technology is now becoming increasingly popular. By translating an oral speech into text, people receive information for study, presented in a convenient format for working with it. This article deals in detail with interaction with RTL-SDR to obtain a digital signal with recording radio conversations and further converting them into a text document. The aim of the study is to find and implement a method that effectively solves the above-mentioned tasks. The problems associated with a large amount of audio information, which takes up a lot of memory resources for processing, are analyzed. The use of a neural network as a means of recognizing audio information is considered: this method provides the optimal way to obtain a finished text document while minimizing the steps of work and its execution time. The results obtained are analysed and conclusions are drawn on the further development of the study.
- ПубликацияТолько метаданныеDevelopment of Analytical Module for Improving the Quality of the Automated Dialogue System(2020) Shaymardanov, T. A.; Kolosov, R. V.; Vavrenyuk, A. B.; Makarov, V. V.; Вавренюк, Александр Борисович© 2020 IEEE.We have developed a system of automated robot to human dialogs. The system allows you to automatically make hundreds of calls per minute. The core of our system uses a full-text search by preliminary specified keys. The developed system showed high work efficiency but required the development of new analytical methods to improve call quality. This paper describes the basis of system architecture and the development of a Hadoop-based analytic module to solve existing problems. It also describes the methods and solutions that we used. It discusses the system requirements for availability and scalability.
- ПубликацияТолько метаданныеPerformance Evaluation of a Cluster Computing System Running OpenBSD Based on Single-Board Computers(2020) Vavrenyuk, A. B.; Makarov, V. V.; Pryakhin, V. S.; Pavlov, M. P.; Vasileva, A. A.; Вавренюк, Александр Борисович© 2020, Springer Nature Switzerland AG.This report discusses the principles of the development of cluster computing systems based on single-board computers. It reviews main software and hardware used for this purpose and compares them. The analysis is carried out and the most effective and suitable solutions are selected, as well as the rationale for their choice to solve the problem. It was reviewed three variants of single-board computers, operating system choice and different message passing interfaces that can to be used for this cluster computing system. In the practical part of this article a working cluster construction algorithm is presented and the features of the operating system (OS) are described. Cluster performance is also assessed depending on the number of nodes and OS being used. The report materials can be used as a guide for creating a cluster computing system that is not inferior to its counterparts in speed and to a large extent surpasses them in security.
- ПубликацияТолько метаданныеHadron Collider and Quantum Computer(2020) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович© 2020, Springer Nature Switzerland AG.The article deals with the problems of creating a quantum computer based on the Hadron Collider. The main factors hindering the implementation of the quantum computer are analyzed. The main difficulty in practical implementation is fixing the result. Because the observer affects the object of observation, the result is always probabilistic. The article gives a brief overview of the activities of various scientific groups on the way to create a quantum computer. Different groups of scientists are trying to use the following physical approaches to fix the result: heavy duty magnetic fields; ultralow temperature; special material. It is obvious that the creation of facilities to create the above conditions require huge financial, energy and other costs. At the same time, there is an operating device where all of the above physical conditions are implemented in practice. The possibility of practical implementation of a quantum computer based on the existing hadron Collider is substantiated.
- ПубликацияТолько метаданныеFlash Memory—Formation, Development and Prospects(2020) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович© 2020, Springer Nature Switzerland AG.The history of the emergence, the current state, as well as prospects for the development of flash memory is presented. The physical processes underlying the operation of flash memory, the varieties of its architecture are shown, the modern element base of flash memory is given. The main points are presented, such as the concept of flash memory, floating gate transistors, quantum mechanical Fowler—Nordheim effect (FN—tunneling), hot electron injection, a combination of these recording methods, their advantages and disadvantages, various NOR and NAND flash memory architectures and their combinations, cell varieties and bad block culling. Prospects of further development of flash memory are considered. Currently, attempts are being made to move from two-dimensional topology to three-dimensional. These developments allow the use of metal nanocrystals in the production of memory chips, without making almost any changes in the technological process. A material capable of doubling the capacity of conventional flash memory chips by adding self-forming metal nanocrystals to the production stage of chips by introducing a third dimension into the memory matrix has been developed. At this stage of development continues to dominate flash memory, the prospects of which is devoted to the article is given.
- ПубликацияТолько метаданныеEncrypted Data Transmission Over an Open Channel(2019) Vavrenyuk, A. B.; Makarov, V. V.; Shurygin, V. A.; Tcibisov, D. V.; Вавренюк, Александр Борисович; Шурыгин, Виктор Александрович© 2019, Springer Nature Switzerland AG. This paper discusses methods for transmitting cipher messages over an open communication channel using an additional channel for transmitting a secret key. Set of the possible one-time keys are contained in the table on the sending and receiving side. The key to encrypt and decrypt a message is selected based on a signal that can be transmitted over an additional channel at a specified time or a timestamp in the cipher message itself. The proposed method also allows the use of a truly random number generator to obtain secret keys, which provides an absolutely strong cipher. Two variants of forming and using tables with secret keys are proposed. Estimations of the required time for encryption and decryption of data, as well as the necessary amount of memory for storing tables are given.
- ПубликацияТолько метаданныеMulti-User System for Remote Access to the Resources of the Educational Computer Cluster Based on Single Board Diskless Computer Raspberry PI 3 Model B as a Service(2021) Vavrenyuk, A. B.; Shishov-Turchin, D. B.; Alexeev, A. N.; Makarov, V. V.; Вавренюк, Александр Борисович© 2021 IEEE.For teaching students in the course on "Parallel Computing", the idea of building an educational computing cluster based on single-board computers is relevant. This cluster should provide multi-user remote access for the simultaneous interaction of a group of students with it in order to carry out a laboratory practice in the above discipline. The paper presents the general structure of a cluster based on 64 single-board computers Raspberry Pi 3 Model B with an individual power module for rebooting each cluster node separately. Provided remote access to the cluster with LDAP authorization and authentication, as well as diskless boot of the operating system. This article describes the organization of a network with a division into a cluster management network and a data network. Due to the easy scalability of the considered configuration, this cluster has great prospects for daily use and subsequent modernization.
- ПубликацияТолько метаданныеDevelopment of automated robot to human dialogue system(2019) Kolosov, R. V.; Vavrenyuk, A. B.; Zareshin, S. V.; Makarov, V. V.; Shaymardanov, T. A.; Вавренюк, Александр Борисович© 2019 IEEE The article observes the algorithm of creating an automated dialogue human with robot. Also, it describes the way of searching answer from robot to human using full-text search by preliminary specified keys. There are analyzed cases when robot was able to conduct a full-fledged dialogue with human. The identified problems of finding the necessary key with this approach of creating an automated dialogue are described.
- ПубликацияТолько метаданныеDevelopment of an Anti-fraud System with Real-Time Analytics(2022) Shaymardanov, T. A.; Vavrenyuk, A. B.; Вавренюк, Александр Борисович© 2022 IEEE.A large number of payments, transactions, logins are made daily. Our task was to implement an anti-fraud system for making decisions when processing bank payments. This paper describes the challenges that many companies around the world face on a daily basis. It describes the architecture of the solution, design patterns, and also describes the issues of fault tolerance and scalability of this system.