Кафедра інформаційних технологій і систем (ДМетІ)
Permanent URI for this community
UK: Кафедра інформаційних технологій і систем (Дніпровський металургійний інститут, ДМетІ)
EN: Department of Information Technologies and Systems (DMetI)
Browse
Browsing Кафедра інформаційних технологій і систем (ДМетІ) by Author "Guda, Anton I."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Analysis of Monolithic and Microservice Architectures Features and Metrics(Хмельницький національний університет, Україна, 2021) Selivorstova, Tatjana V.; Klishch, Sergey M.; Kyrychenko, Serhii; Guda, Anton I.; Ostrovskaya, Kateryna Yu.ENG: In this paper the information technologies stack is presented. These technologies are used during network architecture deployment. The analysis of technological advantages and drawbacks under investigation for monolithic and network architectures will be useful during of cyber security analysis in telecom networks. The analysis of the main numeric characteristics was carried out with the aid of Kubectl. The results of a series of numerical experiments on the evaluation of the response speed to requests and the fault tolerance are presented. The characteristics of the of monolithic and microservice-based architectures scalability are under investigation. For the time series sets, which characterize the network server load, the value of the Hurst exponent was calculated. The research main goal is the monolithic and microservice architecture main characteristics analysis, time series data from the network server accruing, and their statistical analysis. The methodology of Kubernetes clusters deploying using Minikube, Kubectl, Docker has been used. Application deploy on AWS ECS virtual machine with monolithic architecture and on the Kubernetes cluster (AWS EKS) were conducted. The investigation results gives us the confirmation, that the microservices architecture would be more fault tolerance and flexible in comparison with the monolithic architecture. Time series fractal analysis on the server equipment load showed the presence of long-term dependency, so that we can treat the traffic implementation as a self-similar process. The scientific novelty of the article lies in the application of fractal analysis to real time series: use of the kernel in user space, kernel latency, RAM usage, caching of RAM collected over 6 months with a step of 10 seconds, establishing a long-term dependence of time series data. The practical significance of the research is methodology creation of the monolithic and microservice architectures deployment and exploitation, as well as the use of time series fractal analysis for the network equipment load exploration.Item New Approach for the Step-up Converter Efficiency Increasing(НМетАУ, Дніпро, 2021) Guda, Anton I.; Zimoglyad, Andrey Yu.ENG: This paper is devoted to the problem of efficient power conversion technologies creation. The main article objectives are: provide a simple method for the step-up converter energy efficiency improvement, without usage of the bleeding-edge components, explore the characteristics the proposed method and schematic properties, and to establish the bounds of the applicability for the proposed solution. In this paper an another approach is proposed. In the initial state, input voltage is used for the gate driver powering. After the start-up, when output voltage become greater, than the input one, it become the source for the driver. Schottky diodes may be used as a switch between input and output schematic branches for driver powering. Experimental unit to test new approach was created. It is base on IC MC34063A, TC4420, MOSFET IRFP3205 and other components. A series of experiments was held to determine new approach properties. Comparison with classic step-up method reveals difference between approach. Experiments shows, that in the case of high load, classic schematic fails to stabilize output voltage some earlier, than proposed method. In the same conditions power efficiency may be higher up to 15 %. On the other hand, due to increasing power loss in control circuit this method has slightly lesser efficiency in the case low load.Numerical estimation of new approach properties, along with experimental results provides background for correct approach selection. Some discrepancies between theory and experiments requires further investigation. Proposed approach really provides better power efficiency in the case of high load, but using this approach on lower loads may be useless due to control power rising. Precise working range can not be determined only by calculations, experiments are required.Item A Practical Approach to Malware Analysis(НМетАУ, Дніпро, 2021) Klishch, Sergey M.; Guda, Anton I.; Mala, Yuliia; Synytsina, YuliiaENG: Malware analysis takes significant place at the intersection of incident response, forensics, and security monitoring, and system and network administration. The reason behind performing malware analysis is to extract information from a malware sample that can assist in responding to a malware incident. From a business perspective malware analysis is critical for saving valuable data of many organizations since the control of any IT system vulnerability in the wrong hands can have unexpected consequences. In this article we will cover general practical aspects and pre requirements needed for quick start in this area.