{"id":2105,"date":"2021-01-18T18:56:45","date_gmt":"2021-01-18T16:56:45","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=2105"},"modified":"2021-04-01T12:35:16","modified_gmt":"2021-04-01T09:35:16","slug":"%d1%80%d0%be%d0%bb%d1%8c-%d1%82%d0%b0-%d0%b7%d0%b0%d0%b4%d0%b0%d1%87%d1%96-%d1%83%d0%bf%d1%80%d0%b0%d0%b2%d0%bb%d1%96%d0%bd%d0%bd%d1%8f-%d1%96%d0%bd%d1%84%d0%be%d1%80%d0%bc%d0%b0%d1%86%d1%96%d0%b9","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=2105","title":{"rendered":"\u0420\u043e\u043b\u044c \u0442\u0430 \u0437\u0430\u0434\u0430\u0447\u0456 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u043c\u0435\u0440\u0435\u0436\u0435\u044e, \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0430\u043d\u043e\u044e \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0431\u0435\u0437\u043f\u0440\u043e\u0432\u043e\u0434\u043e\u0432\u0438\u0445 \u0440\u0430\u0434\u0456\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439"},"content":{"rendered":"<p style=\"text-align: center;\">\u0420\u041e\u041b\u042c \u0422\u0410 \u0417\u0410\u0414\u0410\u0427\u0406 \u0423\u041f\u0420\u0410\u0412\u041b\u0406\u041d\u041d\u042f \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u042e \u041c\u0415\u0420\u0415\u0416\u0415\u042e, \u041f\u041e\u0411\u0423\u0414\u041e\u0412\u0410\u041d\u041e\u042e \u0417\u0410 \u0414\u041e\u041f\u041e\u041c\u041e\u0413\u041e\u042e \u0411\u0415\u0417\u041f\u0420\u041e\u0412\u041e\u0414\u041e\u0412\u0418\u0425 \u0420\u0410\u0414\u0406\u041e\u0422\u0415\u0425\u041d\u041e\u041b\u041e\u0413\u0406\u0419<\/p>\n<p style=\"text-align: center;\">DIRECTIONS AND TASKS OF INFORMATION MANAGEMENT\u00a0 BY NETWORK BASED ON RADIO TECHNOLOGIES<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/36-11.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 192-198. \u041d\u043e\u043c\u0435\u0440: \u21162, 2019 (271)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0412. \u0410. \u0414\u0420\u0423\u0416\u0418\u041d\u0406\u041d, \u0412. \u041e. \u041c\u0406\u0429\u0415\u041d\u041a\u041e<br \/>\n\u041d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0423\u043a\u0440\u0430\u0457\u043d\u0438\u00a0\u00ab\u041a\u0438\u0457\u0432\u0441\u044c\u043a\u0438\u0439 \u043f\u043e\u043b\u0456\u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442 \u0456\u043c\u0435\u043d\u0456 \u0406\u0433\u043e\u0440\u044f \u0421\u0456\u043a\u043e\u0440\u0441\u044c\u043a\u043e\u0433\u043e\u00bb<br \/>\n\u042e. \u041c. \u0411\u041e\u0419\u041a\u041e, \u041e. \u041c. \u0420\u0423\u0411\u0410\u041d<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nV. \u0410. DRUZHININ, V. \u041e. MISCHENKO<br \/>\nNational Technical University of Ukraine &#8220;Igor Sikorsky Kyiv Polytechnic Institute&#8221;<br \/>\nJ. \u041c. BOIKO, O. M. RUBAN<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2019-271-2-192-198\">https:\/\/www.doi.org\/10.31891\/2307-5732-2019-271-2-192-198<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 20.02.2019 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 10.04.2019 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u043e \u0437\u0430\u0434\u0430\u0447\u0456, \u044f\u043a\u0456 \u0432\u0438\u043a\u043e\u043d\u0443\u044e\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u043c\u0435\u0440\u0435\u0436\u0435\u044e, \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u0430 \u0440\u043e\u043b\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456\u0439 \u043c\u0435\u0440\u0435\u0436\u0456, \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0430\u043d\u0456\u0439 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0431\u0435\u0437\u043f\u0440\u043e\u0432\u043e\u0434\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439. \u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0456 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u0431\u0435\u0437\u043f\u0435\u043a\u043e\u044e \u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044e \u043c\u0435\u0440\u0435\u0436\u0456. \u041f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0430 \u0437\u0430\u0434\u0430\u0447\u0430 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f. \u041e\u043f\u0438\u0441\u0430\u043d\u043e \u0444\u0430\u043a\u0442\u043e\u0440\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u043c\u0435\u0440\u0435\u0436\u0435\u044e. \u0421\u0444\u043e\u0440\u043c\u043e\u0432\u0430\u043d\u043e \u0431\u0430\u0433\u0430\u0442\u043e\u0440\u0456\u0432\u043d\u0435\u0432\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044f \u0437\u0430\u0432\u0434\u0430\u043d\u044c \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043c\u0435\u0440\u0435\u0436\u0435\u044e.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u043c\u0435\u0440\u0435\u0436\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u043c\u0435\u0440\u0435\u0436\u0435\u044e, \u0431\u0435\u0437\u043f\u0440\u043e\u0432\u043e\u0434\u043e\u0432\u0456 \u0440\u0430\u0434\u0456\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457, \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u044e \u0431\u0435\u0437\u043f\u0435\u043a\u043e\u044e, \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044e \u043c\u0435\u0440\u0435\u0436\u0456.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The tasks that are performed by the information network management systems were reviewed, the role of the management system in the information network that is built using wireless technologies was defined. The algorithms of information security management and network productivity management were analysed. The task of managing the information network should be divided at the level according to the hierarchical organization of the corporate network. The corporate network is constructed hierarchically, reflecting the hierarchy of the enterprise itself and its tasks. The lower level of the network consists of network elements &#8211; individual computers, communication devices, data channels. At the next level of the hierarchy, these elements form networks of different scales &#8211; the network of the working group, the network of the department, the network of the branch and, finally, the network of the enterprise as a whole. When managing the productivity of external and trunk communication channels, the most preferred is the use of a statistical approach to analysing the loading of information channels. It is based on a much smaller amount of information than is required by mass service theory, since as a research object only the load of the channel itself is taken, which is fixed at certain levels of time intervals. One of the ways to solve this problem is to use intelligent technologies to build an information and analytical system for monitoring information security systems information. The use of intelligent technologies will enable IT security professionals to analyse the processes of functioning of computer systems, to detect hidden semantic dependencies in data, to obtain models that allow estimating and predicting attempts of possible attacks and unauthorized connection in order to prevent them and thus increase the level the security of the computer system as a whole.<br \/>\n<strong>Keywords:<\/strong> information network, information network management, wireless radio technologies, information security management, network productivity management.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Olifer N. A. Sredstva analiza i optimizacii lokal&#8217;nyh setej \/ N. A. Olifer, V. G. Olifer. \u2013 Centr Informacionnyh Tehnologij, 1998. \u2013 424 s.<\/li>\n<li>Herasymov B. M. Analiz zadach monitorynhu informatsiinykh merezh ta metodiv pidvyshchennia efektyvnosti yikh funktsionuvannia \/ B. M. Herasymov, I. Yu. Subach, P. V. Khusainov, V. O. Mishchenko \/\/ Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony . \u2013 2008. \u2013 \u2116 3 (3). \u2013 C. 24\u201327.<\/li>\n<li>Kilchytskyi Ye. V. Vlastyvosti ta kryterii otsiniuvannia efektyvnosti suchasnoi avtomatyzovanoi systemy upravlinnia telekomunikatsiiamy \/ Ye. V. Kilchytskyi \/\/ Zviazok. \u2013 2003. \u2013 \u2116 1. \u2013 S. 9\u201312.<\/li>\n<li>Boiko Yu. M. Kontseptualni osoblyvosti realizatsii bezprovidnykh sensornykh merezh \/ Yu. M. Boiko, V. M. Lokaziuk, V. V. Mishan \/\/ Herald of Khmelnytskyi National University. \u2013 2010. \u2013 \u2116 2. \u2013 S. 94\u201398.<\/li>\n<li>Gerasimov B. M. Sistemy podderzhki prinjatija reshenij: proektirovanie, primenenie, ocenka jeffektivnosti \/ B. M. Gerasimov, M. M. Divizinjuk, I. Ju. Subach \/\/ NAN Ukrainy NIC VS Ukrainy Gosudarstvennyj okeanarium, 2004. \u2013 318 s.<\/li>\n<li>ND TZI 1.1-002-99. Zahalni polozhennia shchodo zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu. \u2013 [Vved. 28.04.1999]. \u2013 K. : DSTSZY SB Ukrayn\u044b, 1999.<\/li>\n<li>ND TZI 1.1-003-99. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu. \u2013 [Vved. 28.04.1999]. \u2013 K. : DSTSZY SB Ukrayn\u044b, 1999.<\/li>\n<li>ND TZI 1.4-001-2000. Typove polozhennia pro sluzhbu zakhystu informatsii v avtomatyzovanii systemi. \u2013 [Vved. 04.12.2000]. \u2013 K. : DSTSZY SB Ukrayn\u044b, 2000.<\/li>\n<li>Zamjatin V. S. Principy postroenija kompleksnoj sistemy upravlenija informacionno-vychislitel&#8217;noj set&#8217;ju VUZa \/ V. S. Zamjatin \/\/ Polzunovskij vestnik. \u2013 2006. \u2013 \u2116 2. \u2013 C. 60\u201367.<\/li>\n<li>Zamjatin V. S. Ispol&#8217;zovanie statisticheskogo podhoda pri reshenii zadach analiza i upravlenija komp&#8217;juternymi setjami \/ V. S. Zamjatin \/\/ Izvestija AGU. \u2013 2003. \u2013 \u2116 1. \u2013 S. 54\u201357.<\/li>\n<li>Daniljuk Ju. S. Sistema modelirovanija lokal&#8217;nyh vychislitel&#8217;nyh setej \/ Ju. S. Daniljuk, F. A. Popov \/\/ Izv. AGU: Specsbornik. \u2013 2002. \u2013 S. 63-64.<\/li>\n<li>Boiko J. Signal Processing in Telecommunications with Forward Correction of Errors \/ J. Boiko, O. Eromenko \/\/ Indonesian Journal of Electrical Engineering and Computer Science. \u2013 2018. \u2013 Vol. 11, nr. 3. \u2013 P. 868\u2013877. \u2013 DOI: http:\/\/doi.org\/10.11591\/ijeecs.v11.i3.pp868-877.<\/li>\n<li>Boiko J. Productivity of telecommunication systems with modified signal-code constructions \/ J. Boiko, I. Kovtun, S. Petrashchuk \/\/ Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T), 2017 4th International. \u2013 IEEE, 2017. \u2013 S. 173\u2013178. \u2013 DOI: 10.1109\/INFOCOMMST.2017.8246374.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0420\u041e\u041b\u042c \u0422\u0410 \u0417\u0410\u0414\u0410\u0427\u0406 \u0423\u041f\u0420\u0410\u0412\u041b\u0406\u041d\u041d\u042f \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u042e \u041c\u0415\u0420\u0415\u0416\u0415\u042e, \u041f\u041e\u0411\u0423\u0414\u041e\u0412\u0410\u041d\u041e\u042e \u0417\u0410 \u0414\u041e\u041f\u041e\u041c\u041e\u0413\u041e\u042e \u0411\u0415\u0417\u041f\u0420\u041e\u0412\u041e\u0414\u041e\u0412\u0418\u0425 \u0420\u0410\u0414\u0406\u041e\u0422\u0415\u0425\u041d\u041e\u041b\u041e\u0413\u0406\u0419 DIRECTIONS AND TASKS OF INFORMATION MANAGEMENT\u00a0 BY NETWORK BASED ON RADIO TECHNOLOGIES \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 192-198. \u041d\u043e\u043c\u0435\u0440: \u21162, 2019 (271) \u0410\u0432\u0442\u043e\u0440\u0438: \u0412. \u0410. \u0414\u0420\u0423\u0416\u0418\u041d\u0406\u041d, \u0412. \u041e. \u041c\u0406\u0429\u0415\u041d\u041a\u041e \u041d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0423\u043a\u0440\u0430\u0457\u043d\u0438\u00a0\u00ab\u041a\u0438\u0457\u0432\u0441\u044c\u043a\u0438\u0439 \u043f\u043e\u043b\u0456\u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442 \u0456\u043c\u0435\u043d\u0456 \u0406\u0433\u043e\u0440\u044f \u0421\u0456\u043a\u043e\u0440\u0441\u044c\u043a\u043e\u0433\u043e\u00bb \u042e. \u041c. \u0411\u041e\u0419\u041a\u041e, \u041e. \u041c. \u0420\u0423\u0411\u0410\u041d \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 V. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[22],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2105"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2105"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2105\/revisions"}],"predecessor-version":[{"id":5320,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2105\/revisions\/5320"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}