Mathematical apparatus for finding the optimal configuration secure communication network with a specified number of subscribers
Article Sidebar
Open full text
Issue Vol. 15 No. 1 (2025)
-
Statistical reliability of decisions on controlled process faults
Yevhen Volodarskyi, Oleh Kozyr, Zygmunt Warsza5-9
-
Pulse chaotic generator based a classical Chua’s circuit
Volodymyr Rusyn, Andrii Samila, Bogdan Markovych, Aceng Sambas, Christos Skiadas, Milan Guzan10-14
-
Stability of metaheuristic PID controllers in photovoltaic dc microgrids
Elvin Yusubov, Lala Bekirova15-21
-
Integrating numerical simulation and experimental data for enhanced structural health monitoring of bridges
Om Narayan Singh, Kaushik Dey22-26
-
Application of multi-agent programming for modeling the viscosity state of mash in alcohol production
Larysa Gumeniuk, Ludmyla Markina, Viktor Satsyk, Pavlo Humeniuk, Anton Lashch27-32
-
A stochastic interval algebra for smart factory processes
Piotr Dziurzanski, Konrad Kabala, Agnieszka Konrad33-38
-
Advancements in solar panel maintenance: a review of IoT-integrated automatic dust cleaning systems
Balamurugan Rangaswamy, Ramasamy Nithya39-44
-
Modified cosine-quadratic reflectance model
Oleksandr Romanyuk, Volodymyr Lytvynenko, Yevhen Zavalniuk45-48
-
Comparative analysis of lithium-iron-phosphate and sodium-ion energy storage devices
Huthaifa A. Al_Issa, Mohamed Qawaqzeh, Lina Hani Hussienat, Ruslan Oksenych, Oleksandr Miroshnyk, Oleksandr Moroz, Iryna Trunova, Volodymyr Paziy, Serhii Halko, Taras Shchur49-54
-
Investigation of DC-AC converter with microcontroller control of inverter frequency
Anatolii Tkachuk, Mykola Polishchuk, Liliia Polishchuk, Serhii Kostiuchko, Serhii Hryniuk, Liudmyla Konkevych55-61
-
Mathematical apparatus for finding the optimal configuration secure communication network with a specified number of subscribers
Volodymyr Khoroshko, Yuliia Khokhlachova, Oleksandr Laptiev, Al-Dalvash Ablullah Fowad62-66
-
Critical cybersecurity aspects for improving enterprise digital infrastructure protection
Roman Kvуetnyy, Volodymyr Kotsiubynskyi, Serhii Husak, Yaroslav Movchan, Nataliia Dobrovolska, Sholpan Zhumagulova, Assel Aitkazina67-72
-
Modification of the Peterson algebraic decoder
Dmytro Mogylevych, Iryna Kononova, Liudmyla Pogrebniak, Kostiantyn Lytvyn, Igor Gyrenko73-78
-
Development of a model for calculating the dilution of precision coefficients of the global navigation system at a given point in space
Oleksandr Turovsky, Nazarii Blazhennyi, Roman Vozniak, Yana Horbachova, Kostiantyn Horbachov, Nataliia Rudenko79-87
-
LLM based expert AI agent for mission operation management
Sobhana Mummaneni, Syama Sameera Gudipati, Satwik Panda88-94
-
Review of operating systems used in unmanned aerial vehicles
Viktor Ivashko, Oleh Krulikovskyi, Serhii Haliuk, Andrii Samila95-100
-
Optimization of machine learning methods for de-anonymization in social networks
Nurzhigit Smailov, Fatima Uralova, Rashida Kadyrova, Raiymbek Magazov, Akezhan Sabibolda101-104
-
Robust deepfake detection using Long Short-Term Memory networks for video authentication
Ravi Kishan Surapaneni, Hameed Syed, Harshitha Kakarala, Venkata Sai Srikar Yaragudipati105-108
-
Regional trending topics mining from real time Twitter data for sentiment, context, network and temporal analysis
Mousumi Hasan, Mujiba Shaima, Quazi Saad ul Mosaher109-116
-
Model development to improve the predictive maintenance reliability of medical devices
Khalid Musallam Alahmadi, Essam Rabea Ibrahim Mahmoud, Fitrian Imaduddin117-124
-
Explainable artificial intelligence for detecting lung cancer
Vinod Kumar R S, Bushara A R, Abubeker K M, Smitha K M, Abini M A, Jubaira Mammoo, Bijesh Paul125-130
-
Design and implementation of a vein detection system for improved accuracy in blood sampling
Omar Boutalaka, Achraf Benba, Sara Sandabad131-134
-
Metrological feature for determining the concentration of cholesterol, triglycerides, and phospholipids for psoriasis detection
Ivan Diskovskyi, Yurii Kachurak, Orysya Syzon, Marta Kolishetska, Bogdan Pinaiev, Oksana Stoliarenko135-138
-
Development of a mobile application for testing fine motor skills disorders
Marko Andrushchenko, Karina Selivanova, Oleg Avrunin, Alla Kraievska, Orken Mamyrbayev, Kymbat Momynzhanova139-143
-
Artificial intelligence in education: ChatGPT-based simulations in teachers’ preparation
Marina Drushlyak, Tetiana Lukashova, Volodymyr Shamonia, Olena Semenikhina144-152
-
CKSD: Comprehensive Kurdish-Sorani database
Jihad Anwar Qadir, Samer Kais Jameel, Wshyar Omar Khudhur, Kamaran H. Manguri153-156
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
Main Article Content
DOI
Authors
Abstract
Information flows in the world are growing very quickly. The exchange of information is growing rapidly. In connection with this fact, the existing mathematical apparatus and its practical application are constantly developing. The scientific and mathematical apparatus is aimed at finding the optimal configuration of the information communication network, solving the problem of building protected channels for the transmission of a large amount of data. A scientific task arises to develop a new and improve the existing mathematical apparatus for finding the optimal configuration of a protected communication network with a given number of subscribers. This scientific work is dedicated to the solution of this urgent task. The paper formulated and proved four Lemmas. The formulation of the Lemma made it possible to prove two new theorems that allow solving the task of finding the optimal configuration of a protected communication network with a given number of subscribers. Solutions to both partial and general tasks of the process of optimization and protection of transmission channels of a large amount of data are provided. Thus, the paper proposes a solution to the scientific task of finding the optimal configuration of a protected communication network with a given number of subscribers. The direction of further research may be the development of a software implementation of the given mathematical apparatus.
Keywords:
References
[1] Al-Dalvash A.: Models of optimal fuel functioning of remote access security in information networks. Ukrainian Scientific Journal of Information Security 26(3), 2021, 126–131 [https://doi.org/10.18372/2225-5036.27.16513]. DOI: https://doi.org/10.18372/2225-5036.27.16513
[2] Barabash O. V. et al.: Target Programming with Multicriteria Restrictions Application to the Defense Budget Optimization. Advances in Military Technology 14(2), 2019, 213–229.
[3] Buryachok V. L. et al.: Information and cyber security: socio-technical aspect. DUT, Kyiv 2015, 24–30.
[4] Khoroshko V. et al.: Optimization of information structures of local networks. Informatics and mathematical methods in modeling 10(1-2), 2020, 45–54. DOI: https://doi.org/10.15276/imms.v10.no1-2.45
[5] Khoroshko V. et al.: Synthesis of the optimal topology of the data transmission network. Legal, regulatory and metrological support of the information protection system in Ukraine 2(28), 2022, 20–28.
[6] Kyrychok R. et al.: Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations. Eastern-European journal of enterprise technologies 1(9), 2022, 93–101 [https://doi.org/10.15587/1729-4061.2022.253530]. DOI: https://doi.org/10.15587/1729-4061.2022.253530
[7] Laptiev O. et al.: The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS) 13(2), 2021, 271–277 [https://doi.org/10.54039/ijcnis.v13i2.5008]. DOI: https://doi.org/10.17762/ijcnis.v13i2.5008
[8] Lukova-Chuiko N. et al.: The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021, 67–70. DOI: https://doi.org/10.1109/ATIT54053.2021.9678856
[9] Milov O. et al.: Mechanisms of cyber security: the problem of conceptualization. Ukrainian Scientific Journal of Information Security 25(2), 2019, 110–116 [https://doi.org/10.18372/2225-5036. 25.13841]. DOI: https://doi.org/10.18372/2225-5036.25.13841
[10] Mukhamadieva Z. B.: Algorithms of the optimal structure of a computer network. A young scientist 22(102), 2015, 29–30.
[11] Sobchuk V. et al.: Algorithm for solution of systems of singularly perturbed differential equations with a differential turning point. Bulletin of the Polish Academy of Sciences Technical Sciences 71(3), 2023, e145682 [https://doi.org/10.24425/bpasts.2023.145682 WoS]. DOI: https://doi.org/10.24425/bpasts.2023.145682
[12] Sobchuk V. et al.: Ensuring the properties of functional stability of manufacturing processes based on the application of neural networks CEUR Workshop Proceedings, 2021, 2845, 106–116.
[13] Sobchuk V. et al.: The limited solutions method for telecommunications network information security models. IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021. 2021, 126–131. DOI: https://doi.org/10.1109/ATIT54053.2021.9678655
[14] Tolyupa S. et al.: Formation of a strategy for managing the modes of operation of protection systems based on the game management model. Security of information systems and technologies 3, 2020, 78–86.
[15] Zamrii I. V. et al.: Algorithm of control and prediction of functional stability of complex information and technical systems. Telecommunications and information technologies 1(74), 2022, 4–15. DOI: https://doi.org/10.31673/2412-4338.2022.010414
Article Details
Abstract views: 148

