Work place: State University of Telecommunications, Kiev, Ukraine
E-mail: vish_vv@ukr.net
Website:
Research Interests: Information Theory, Algorithmic Complexity Theory, Algorithmic Information Theory, Theory of Computation, Computability Theory
Biography
Viktor Vyshnivskyi: Chair of Computer Science department of State University of Telecommunications, Ukraine, Kiev, Doct. of Sc.
Born on August 8, 1965. M. Sc. (1987), PhD (1994), Doct. of Sc. (2010) from the Kyiv National Taras Shevchenko University of Ukraine; Assoc. Prof. (2003), Professor (2013) of computer systems department.
Major interest: diagnostics, information technologies, cybersecurity, reliability theory, telecommunications.
By Viktor Vyshnivskyi Vadym Mukhin Vitalii Kotelianets Yuri Kargapolov Valerii Zavgorodnii Oleksandr Vyshnivskyi
DOI: https://doi.org/10.5815/ijwmt.2025.04.02, Pub. Date: 8 Aug. 2025
The article discusses the solution to the issue of information systems architecture, which makes it possible to separate identification flows associated with the processes of managing the identification of digital entities and data flows associated with the processes of managing data describing the properties of digital entities. At the same time, a new architecture of connections between digital entities and services is proposed, which makes it possible to create a flexible system for processing the properties of identifiers that can be described in an irregular and unstructured form. In this case, the nomenclature of the parameters of the properties of a digital entity can be customized and expanded as a separate entity, which always maintaining a connection with the identifier. This allows, within the framework of the information system, on the one hand, to adapt any identification systems and ensure the solution of convergence requirements, to ensure compliance and solution of the requirements of recognition, immutability, stability in conditions of processing large volumes of data without implementing generally accepted principles of a global unique permanent identifier, and on the other hand, build flexible connections between digital entities and services.
[...] Read more.By Oleksandr Pliushch Viktor Vyshnivskyi Volodymyr Tolubko Vadym Mukhin Serhii Ishcheryakov Mykhailo Okhramovych Vitalii Loza
DOI: https://doi.org/10.5815/ijcnis.2020.05.01, Pub. Date: 8 Oct. 2020
Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied.
It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter.
Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range.
Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.
By Volodymyr Tolubko Viktor Vyshnivskyi Vadym Mukhin Halyna Haidur Nadiia Dovzhenko Oleh Ilin Volodymyr Vasylenko
DOI: https://doi.org/10.5815/ijisa.2018.08.02, Pub. Date: 8 Aug. 2018
This work is about the definition of cyber threats in the information system. The cyber threats lead to significant loss of network resources and cause the system disability as a whole. Detecting countermeasures in certain threats can reduce the impact on the system by changing the topology of the network in advance. Consequently, the interruption of a cyberattack forces the intruders to seek for alternative ways to damage the system. The most important task in the information system work is the state of network equipment monitoring. Also it’s the support of the network infrastructure in working order.
The purpose of the work is to develop a method for detecting cyber threats for the information system. The system can independently detect cyber threats and develop countermeasures against them. The main feature of the counteractions is to protect network nodes from compromising.
To ensure the functional stability, the most important issues are providing safety metrics. This technique allows to increase the functional stability of the system, which works in real time.
Subscribe to receive issue release notifications and newsletters from MECS Press journals