Control Systems and Computers, N5, 2019, Article 3
https://doi.org/10.15407/csc.2019.05.023
Control Systems and Computers, 2019, Issue 5 (283), pp. 23-29.
UDK 364.2:331; 681.513
L.M. Koliechkina, Doctor (Phys. and Math.), Professor, University of Lodz, 22 Banaha st., Lodz, 90-238, Poland, ludapl@ukr.net
A.M. Nahirna, PhD, (Phys. and Math.), Associate Professor, National University of “Kyiv-Mohyla Academy”, 2 Skovoroda st., Kyiv, 04070, Ukraine naghirnaalla@ukr.net
The Practical Aspect of Using a Combinatorial Model on Configuration of Combinations
The paper proposes the practical task of choosing a set of programs to protect information at the enterprise. An optimization mathematical model is built on the configuration of combinations to solve the task. An algorithm for finding a solution to this optimization problem is presented. A practical example of the use of a mathematical model and the search for the best choice of a set of programs for data protection at the enterprise is given.
Download full text! (In English).
Keywords: information security, combinatorial optimization, mathematical model, a configuration of combinations, objective function, restrictions.
- Islam, R., Siddiqa, A.,Uddin, P., Kumar, A., Hossain, M.D., 2014. “An Efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography,” IEEE Dhaka, 3rd International Conf. on Informatics, Bangladesh, May 2014, pp. 1-6.
https://doi.org/10.1109/ICIEV.2014.6850714 - Manjunath, N., Hiremath, S.G., 2015. “Image and text steganography based on RSA and chaos cryptography algorithm with hash-LSB technique”, Intl. J. Electr. Electron. Comput. Syst., 3, pp. 5-9.
- Roy, S., Venkateswaran, P., 2014. “Online payment system using steganography and visual cryptography,”International Conf. on IEEE Students Electrical, Electronics and Computer Science, IEEE Bhopal, India, May 2014, pp. 1-6.
https://doi.org/10.1109/SCEECS.2014.6804449 - Saleh,E., Aly, A.A., Omara, F.A., 2016. “Data security using cryptography and steganography techniques”, Intl. J. Adv. Comput. Sci. Appl., 7, pp. 390-397.
- Sheth, K., Tank, R.M., 2016. “Image steganography techniques”, Intl. J. Comput. Eng. Sci., 1, pp. 10-15.
https://doi.org/10.26472/ijces.v1i2.13 - Yadav, V., Ingale, V., Sapkal, A., Patil, G., 2014. “Cryptographic steganography”, J. Comput. Sci. Inf. Technol., pp. 17-23.
https://doi.org/10.5121/csit.2014.4803 - Khalimov, G., Kotukh, E.V., Sherhiychuk, Yu.O. Marukhnenko, A., 2019. “Analysis of the implementation complexity of cryptosystem based on the Suzuki Group”, J. Telecommunications and Radio Engineering, 78(5), pp. 419-427.
https://doi.org/10.1615/TelecomRadEng.v78.i5.40 - Gerasimov, A., Zhuchkov, R.E., 2014. “The mathematical models of information security mechanisms in personal data automated information systems of the state administration bodies”, Vestnik Voronezhskogo instituta MVD Rossii, 4, pp. 282-289.
- Koliechkina, L., Pichugina, O., 2018. “Multiobjective Optimization on Permutations with Applications”, In DEStech Transactions on Computer Science and Engineering, IX International Conference on Optimization and Applications (OPTIMA 2018), pp. 61-75.
https://doi.org/10.12783/dtcse/optim2018/27922 - Koliechkina,L., Nahirna, Dvirna, O., 2019. “Quadratic optimization problem on permutation set with simulation of applied tasks”, CEUR Workshop Proceedings, Vol. 2353, pp. 651-663 .
- Yakovlev, S., Kartashov, O., Pichugina, O., Koliechkina, L., 2018. “The Genetic Algorithms in Optimization Problem on Combinatorial Configurations”, Proc. of Int. Conf. on Innovations in Engineering, Technology and Sciences (ICIETS), Karnataka, India, pp. 106-111.
- Semenova, N.V., Kolechkina, L.N., Nagornaya, A.N., 2010. “On Approach to Solving Vector Problems with Fractionally Linear Functions of the Criteria on the Combinatorial Set of Arrangements”. J. of Automation and Information Sciences, 42 (2), pp. 67-80.
https://doi.org/10.1615/JAutomatInfScien.v42.i2.50 - Donets, H.P., Kolyechkina, L.M., 2011. Ekstremalni zadachi na kombinatornykh konfihuratsiyakh. Poltava: RVV PUET, 309 p.
- Stoyan, Yu.G., Yakovlev, S.V., Pichugina O.S., 2017. Yevklidovy kombinatornyye konfiguratsii: monografiya. Khar’kov : Konstanta, 404 p.
Received 13.11.2019