Control Systems and Computers, N5, 2019, Article 3

Control Systems and Computers, 2019, Issue 5 (283), pp. 23-28.

UDK  364.2:331; 681.513

L.M. Koliechkina, Doctor (Phys. and Math.), Professor, University of Lodz, 22 Banaha st., Lodz, 90-238, Poland,

A.M. Nahirna, PhD, (Phys. and Math.), Associate ProfessorNational University of “Kyiv-Mohyla Academy”, 2 Skovoroda st., Kyiv, 04070, Ukraine

 The Practical Aspect of Using a Combinatorial Model on Configuration of Combinations

The paper proposes the practical task of choosing a set of programs to protect information at the enterprise. An optimization mathematical model is built on the configuration of combinations to solve the task. An algorithm for finding a solution to this optimization problem is presented. A practical example of the use of a mathematical model and the search for the best choice of a set of programs for data protection at the enterprise is given.

Download full text! (In English).

 Keywords: information security, combinatorial optimization, mathematical model, a configuration of combinations, objective function, restrictions.

  1. Islam, R., Siddiqa, A.,Uddin, P., Kumar, A., Hossain, M.D., 2014. “An Efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography,” IEEE Dhaka, 3rd International Conf. on Informatics, Bangladesh, May 2014, pp. 1-6.
  2. Manjunath, N., Hiremath, S.G., 2015. “Image and text steganography based on RSA and chaos cryptography algorithm with hash-LSB technique”, Intl. J. Electr. Electron. Comput. Syst., 3, pp. 5-9.
  3. Roy, S., Venkateswaran, P., 2014. “Online payment system using steganography and visual cryptography,”International Conf. on IEEE Students Electrical, Electronics and Computer Science, IEEE Bhopal, India, May 2014, pp. 1-6.
  4. Saleh,E., Aly, A.A., Omara, F.A., 2016. “Data security using cryptography and steganography techniques”, Intl. J. Adv. Comput. Sci. Appl., 7, pp. 390-397.
  5. Sheth, K., Tank, R.M., 2016. “Image steganography techniques”, Intl. J. Comput. Eng. Sci., 1, pp. 10-15.
  6. Yadav, V., Ingale, V., Sapkal, A., Patil, G., 2014. “Cryptographic steganography”, J. Comput. Sci. Inf. Technol., pp. 17-23.
  7. Khalimov, G., Kotukh, E.V., Sherhiychuk, Yu.O. Marukhnenko, A., 2019. “Analysis of the implementation complexity of cryptosystem based on the Suzuki Group”, J. Telecommunications and Radio Engineering, 78(5), pp. 419-427.
  8. Gerasimov, A., Zhuchkov, R.E., 2014. “The mathematical models of information security mechanisms in personal data automated information systems of the state administration bodies”, Vestnik Voronezhskogo instituta MVD Rossii, 4, pp. 282-289.
  9. Koliechkina, L., Pichugina, O., 2018. “Multiobjective Optimization on Permutations with Applications”, In DEStech Transactions on Computer Science and Engineering, IX International Conference on Optimization and Applications (OPTIMA 2018), pp. 61-75.
  10. Koliechkina,L., Nahirna, Dvirna, O., 2019. “Quadratic optimization problem on permutation set with simulation of applied tasks”, CEUR Workshop Proceedings, Vol. 2353, pp. 651-663 .
  11. Yakovlev, S., Kartashov, O., Pichugina, O., Koliechkina, L., 2018. “The Genetic Algorithms in Optimization Problem on Combinatorial Configurations”, Proc. of Int. Conf. on Innovations in Engineering, Technology and Sciences (ICIETS), Karnataka, India, pp. 106-111.
  12. Semenova, N.V., Kolechkina, L.N., Nagornaya, A.N., 2010. “On Approach to Solving Vector Problems with Fractionally Linear Functions of the Criteria on the Combinatorial Set of Arrangements”. J. of Automation and Information Sciences, 42 (2), pp. 67-80.
  13. Donets, H.P., Kolyechkina, L.M., 2011. Ekstremalni zadachi na kombinatornykh konfihuratsiyakh. Poltava: RVV PUET, 309 p.
  14. Stoyan, Yu.G., Yakovlev, S.V., Pichugina O.S., 2017. Yevklidovy kombinatornyye konfiguratsii: monografiya. Khar’kov : Konstanta, 404 p.

  Received 13.11.2019