Cybernetics and programming
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Journal "Cybernetics and programming" > Contents of Issue № 02/2019
This issue is currently being formed. All articles presented on this page have already been included in this issue, are considered published, and will remain unchanged in the final version of the issue along with other metadata of the articles.
Учредитель: Даниленко Василий Иванович, w.danilenko@nbpublish.com
Главный редактор: Сидоркина Ирина Геннадьевна, доктор технических наук, igs592000@mail.ru
Contents of Issue № 02/2019
Programming languages
Revnivykh A.V., Velizhanin A.S. - Methods for automated formation of a disassembled listing structure pp. 1-16


Abstract: The subject of the research is the method of splitting a disassembled code into logical blocks in automatic mode, searching for software vulnerabilities without using source code (using a binary file or its equivalent, obtained by reverse engineering).The object of the research is the existing code analyzers and features of their functionality.The aim of the study is to consider the possibility of splitting a disassembled code into logical blocks in automatic mode and some of the possible difficulties associated with this.Formulation of the problem. The complexity of analyzing large software products at the level of machine code necessitates the automation of this process. The research methodology is based on a combination of theoretical and empirical approaches using the methods of static and dynamic analysis, comparison, generalization, algorithmization, modeling, synthesis. Key findings. Splitting the code into blocks by sequential in line-by-line analysis of machine code in some cases can lead to misinterpretation. In addition, the analysis of the code according to the conclusions of the functions also does not guarantee the correctness of the determination of the boundaries of the functions. However, in general, the matrix method can be applied to analyze the dependencies of functions on the blocks of code thus selected.The scientific novelty is connected with the determination of promising vectors for the study of software code for vulnerability, the rationale for the approach (building the transition matrix from integer values), which may be the initial stage of preparation for the automated analysis of the disassembled code.
Mathematical models and computer simulation experiment
Efimov A.I., Balily N.A. - Methods of teaching control systems for unmanned aerial vehicles by immersing them in virtual reality pp. 17-22


Abstract: The subject of study is the implementation of control systems for unmanned aerial vehicles. As their solution, a method of teaching and testing of these systems by immersing the entire system and its individual components into a virtual reality as close as possible to real conditions is proposed. The advantages and difficulties of implementation in relation to each of the system modules involved are considered. For each of the difficulties the authors propose solutions. The most successful scopes of application are revealed, and also possibility of application of the given method to land and surface vehicles is allocated. In the framework of this work, the existing aircraft control systems and the use of virtual reality within the framework of training their individual parts are investigated and the option of extending the use of such methods to the entire control system with an analysis of the advantages and disadvantages of this approach is proposed. The novelty of this article lies in the training of control systems for unmanned aerial vehicles by immersing it in virtual reality. The completeness and flexibility of such a training system is able, on the one hand, to adapt to any equipment configuration, on the other hand, to provide the highest quality training. The most important aspect is ensuring that you can use a larger proportion of the learning algorithms than is possible in other cases. In addition, this approach to the crane is useful in the framework of video navigation in connection with the possibility of better implementation of computer vision. The article shows the relevance of the research and the effectiveness of this method in the framework of aircraft control systems and proposed its application to other vehicles.
Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website