security

Non-alignment strategy: politics and theory (Research Article)

The complex study of the state non-alignment strategy is done. The theoretical and methodological basis of non-alignment strategy is analyzed, the problem of definition this phenomenon is investigated, the main aspects of neutrality strategy tendencies are clarified. The historical aspects of non-alignment policies are developed.

Method of Multiplexing of Timer Signal Structures Based on Ofdm Technology

The method of multiplexing of timer signal structures. based on OFDM technology was considered. This technology is used in many data transmission standards, both in wired channels — asymmetric digital subscriber line (ADSL), and in wireless networks — the standards of IEEE 802.11a and HiperLAN/2. OFDM is characterized by high spectral efficiency, resistance to radio frequency interference, low level of multi-path distortion.

Seismic system for monitoring and forecasting local earthquakes in the Dnepropetrovsk region

Summarizes the results of preliminary studies to ascertain the nature of earthquakes and seismic safety in the provision of technologically-risk areas Krivoy Rog iron ore and coal basins Pavlograd. The possibilities of highly sensitive seismic stations UK15, established in Dnepropetrovsk (n. Mirnij), check local and remote Kryvyi Rih and Pavlogradskij earthquakes.

Comparative Analysis of the European Security Strategy(2003) and Global Strategy of the European Unity (2016)

In this article, the authors carried out a comparative analysis of the European Security Strategy (2003) and Global Strategy of the European Union (2016) in order to track the evolution of perception of threats and challenges to the international system. This comparison answers a number of scientific questions. In particular: Are security risks in Europe, published in 2003, still relevant? Have the methods and means of combating difficulties changed for 13 years? Which methods were decisive? Is the EU’s security strategy, despite some cosmetic changes, still relevant?

Using Kali Linux and Metasploitable for Penetration Testing for Studying Purposes

This paper comprises information about penetration testing methodology, its methods and ways of implementation. The current free and open-source software has been analyzed. It has been done the example of penetration testing in academic field for studying purposes on the base of Kali Linux and Metasploitable2 Linux. This tests and techniques purpose proactive methods of defense and must help to improve security of computer systems and corporate networks.

Energy diplomacy as an important aspect of state's foreing policy: European experience for Ukrainians

The article considers a notion of energy diplomacy and peculiarities of its conduction, defines primary tasks for development of energy diplomacy in the foreign policy of Ukraine. With the help of historical, systemic, and structural functional methods, it is revealed that interstate collaboration in the form of energy diplomacy pursues the national interest of a state through applying a wide range of classical and specific foreign policy actions, and creates additional means of counteracting global contemporary challenges connected with the energy sector.

Prospects for the eastern partnership under geopolitical and security changes in the Eastern European region

The article dwells upon “Eastern Partnership” (EaP) initiativeand proves that the issue of its reforming has been acquiring considerable relevance under conditions of the aggressive foreign policy of the Russian Federation, contradictions within the European Union, and lack of a unified position on the solution of pressing political and security problems in the European region.

Optimal codes on vector combinatorial configurations

Concept of coding systems optimizations based on vector combinatorial configurations (the Ideal Vector Rings models), with the optimization being embedded in the underlying combinatorial models, is regarded in this paper. This paper  is aimed at improving the qualitative indices of multidimensional vector data information technologies and computer systems with respect to transmission speed of vector data  with automatic error correction, and data security using a variety of multidimensional combinatorial configuration and finite cyclic group theory.