Viktor Vyshnivskyi

Work place: State University of Telecommunications, Kiev, Ukraine

E-mail: vish_vv@ukr.net

Website:

Research Interests: Information Theory, Algorithmic Complexity Theory, Algorithmic Information Theory, Theory of Computation, Computability Theory

Biography

Viktor Vyshnivskyi: Chair of Computer Science department of State University of Telecommunications, Ukraine, Kiev, Doct. of Sc.

Born on August 8, 1965. M. Sc. (1987), PhD (1994), Doct. of Sc. (2010) from the Kyiv National Taras Shevchenko University of Ukraine; Assoc. Prof. (2003), Professor (2013) of computer systems department.

Major interest: diagnostics, information technologies, cybersecurity, reliability theory, telecommunications.

Author Articles
Performance Study of Spread Spectrum Systems with Hard Limiters

By Oleksandr Pliushch Viktor Vyshnivskyi Volodymyr Tolubko Vadym Mukhin Serhii Ishcheryakov Mykhailo Okhramovych Vitalii Loza

DOI: https://doi.org/10.5815/ijcnis.2020.05.01, Pub. Date: 8 Oct. 2020

Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied.
It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter.
Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range.
Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.

[...] Read more.
Method for Determination of Cyber Threats Based on Machine Learning for Real-Time Information System

By Volodymyr Tolubko Viktor Vyshnivskyi Vadym Mukhin Halyna Haidur Nadiia Dovzhenko Oleh Ilin Volodymyr Vasylenko

DOI: https://doi.org/10.5815/ijisa.2018.08.02, Pub. Date: 8 Aug. 2018

This work is about the definition of cyber threats in the information system. The cyber threats lead to significant loss of network resources and cause the system disability as a whole. Detecting countermeasures in certain threats can reduce the impact on the system by changing the topology of the network in advance. Consequently, the interruption of a cyberattack forces the intruders to seek for alternative ways to damage the system. The most important task in the information system work is the state of network equipment monitoring. Also it’s the support of the network infrastructure in working order.
The purpose of the work is to develop a method for detecting cyber threats for the information system. The system can independently detect cyber threats and develop countermeasures against them. The main feature of the counteractions is to protect network nodes from compromising.
To ensure the functional stability, the most important issues are providing safety metrics. This technique allows to increase the functional stability of the system, which works in real time.

[...] Read more.
Other Articles