{"title":"CONSTRUCTIVE-SYNTHESIZING MODELING OF NATURAL LANGUAGE TEXTS","authors":"V. Shynkarenko, I. Demidovich","doi":"10.31891/csit-2023-3-10","DOIUrl":"https://doi.org/10.31891/csit-2023-3-10","url":null,"abstract":"Means for solving the problem of establishing the natural language texts authorship were developed. Theoretical tools consist of a constructors set was developed on the basis of structural and production modeling. These constructors are presented in this work. Some results of experimental studies based on this approach have been published in previous works by the author, the main results should be published in the next ones. Constructors developed: converter of natural language text into tagged, tagged text into a formal stochastic grammar and the authors style similarity degree establishment of two natural language works based on the coincidence of the corresponding stochastic grammars (their substitution rules). The proposed approach makes it possible to highlight the semantic features of the author's phrases construction, which is a characteristic of his speech. Working with a sentence as a unit of text to analyze its construction will allow you to more accurately determine the author's style in terms of the use of words, their sequences and characteristic language constructions. Allows not to be attached to specific parts of speech, but reveals the general logic of building phrases.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"63 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hovorushchenko, Iryna Zabelina, Kostyantyn Rei, O. Hovorushchenko
{"title":"METHOD OF CREATING AN INFORMATION SYSTEM FOR MONITORING INFECTIOUS PATIENTS","authors":"T. Hovorushchenko, Iryna Zabelina, Kostyantyn Rei, O. Hovorushchenko","doi":"10.31891/csit-2023-3-7","DOIUrl":"https://doi.org/10.31891/csit-2023-3-7","url":null,"abstract":"In the context of the COVID-19 pandemic, infectious disease information systems are widely used and promoted to prevent the spread of the pandemic (mainly in the form of mobile applications). Many countries have offered their apps to improve contact tracing and thus reduce the number of infections. However, the level of adoption of such applications has been and remains relatively low, which, obviously, given their massive use and effectiveness, has been largely influenced by issues related to privacy and anonymity, as well as the perception of potential users of the price-benefit ratio. Thus, the task of creating information systems for monitoring infectious patients is still relevant today. Therefore, our study is devoted to the development of a method and an information system for monitoring infectious patients. The article develops a method for creating an information system for monitoring infectious patients, which, unlike the known ones, is based on intelligent analysis of data on the geolocation of patients and contact persons, and provides the ability to design an information system for controlling infectious patients. The purpose of the information system for monitoring infectious patients is to prevent the spread of epidemics and pandemics by tracking patient contacts and reducing the number of infections. The tasks of the information system for monitoring infectious patients are to track the self-isolation of infectious patients and their contacts, identify the most \"infected\" buildings, districts, cities, etc. based on intelligent analysis of data on infectious patients and their contacts. The designed mobile-oriented information system for monitoring infectious patients can be used to prevent the spread of the pandemic by tracking contacts and reducing the number of infections. The design of screen forms, reports, implementation, testing and commissioning of the information system for monitoring infectious patients will be carried out by the authors in the course of their further research.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APPROACHES OF BUILDING A REAL-WORLD OBJECT DETECTOR DATA SOURCE","authors":"Olga Pavlova, Andriy Bashta, Andrii Kuzmin","doi":"10.31891/csit-2023-3-3","DOIUrl":"https://doi.org/10.31891/csit-2023-3-3","url":null,"abstract":"Object detection is a crucial task in computer vision and AI applications, enabling machines to identify and locate objects within images or video frames. The accuracy and performance of an object detector heavily rely on the quality and diversity of the training data. Several structured approaches of building an object detector data source have been build, drawing inspiration from Apple's Create ML documentation on the topic. Additionally, real-world applications available on both the App Store and Google Play that leverage object detection technology are showcased.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"63 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ENHANCING THE EFFECTIVENESS OF USABILITY TESTING FOR USER INTERFACES","authors":"Yuriy Skorin, Irynа Zolotаryovа","doi":"10.31891/csit-2023-3-8","DOIUrl":"https://doi.org/10.31891/csit-2023-3-8","url":null,"abstract":"The paper analyses the problems of maintaining software quality, namely, usability testing as a direction of ensuring this quality, analyses publications that consider the methods of electro-oculography, electro-retinography, mouse-tracking, eye-tracking, etc. and proves that the issue of improving the quality of software products largely depends on the effectiveness of usability testing. The study is based on the analysis of traditional software testing methods and tools and the proposal of mouse-tracking and eye-tracking technologies as an alternative solution to the problem. Criteria and metrics for assessing the usability of web applications were identified, an analytical approach was used as a methodological basis, which involves a comprehensive consideration of the research object, methods of comparative analysis and classification were used to obtain data, the results were processed using standard statistical methods, and the necessity and importance of usability testing of websites was assessed. The article considers generally accepted rules and recommendations in the field of usability testing, analyses quantitative and qualitative methods of usability testing evaluation, for a more detailed study of the subject of research the ergonomic interaction of a user with an information system, namely with a web resource, studies the main categories of users depending on a number of indicators, and pays special attention to establishing quality assessment criteria based on existing standards of recommendations. the article reviews the process of usability testing of information system interfaces, its analysis and evaluation, analyses the methods of electro-oculography and electro-retinography, mouse-tracking and eye-tracking technologies, and concludes that the use of eye-tracking technology will allow collecting and systematising quantitative and qualitative data on user interaction with the system and will make it possible to optimise the process of usability testing by reducing the time of its implementation. The prerequisites for conducting an experimental study of theoretical results using eye-tracking technologies have been created.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"92 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ALGORITHM AND SOFTWARE TO ASSESSS THE COMPLIANCE OF BUSINESS PROCESS MODELS WITH THEIR TEXTUAL DESCRIPTIONS","authors":"Oleksandr Rudskyi, Andrii Kopp","doi":"10.31891/csit-2023-3-5","DOIUrl":"https://doi.org/10.31891/csit-2023-3-5","url":null,"abstract":"This paper is devoted to solve the problem of analyzing the compliance of business process models with their textual descriptions. The problem being business process models describe re-designed or completely new organizational activities, but “wrong” models that do not reflect correctly business process requirements may mislead involved business process participants and other stakeholders, and cause workflow errors followed by extra costs. Therefore, the research goal is to ensure the correctness of business process models by analyzing their compliance with textual descriptions formulated by business process owners or business analysts. In the work, a review of existing tools for modeling and analysis of business processes is outlined, as well as the main technologies of natural language processing are considered, including tokenization, search for stop words, and stemming. These technologies are proposed to be used to analyze the compliance of business process models with their textual descriptions. An approach to solving the problem of analyzing the compliance of business process models with their textual descriptions, using the selected natural language processing tools is proposed and the respective algorithm is developed. The process of analyzing the compliance of business process models with their textual descriptions is formalized using data flow modeling. The corresponding software that implements this process is developed. Sample calculations are demonstrated that confirm the performance of the proposed approach by analyzing the model of the goods dispatch business process and the corresponding textual description of this business process. Finally, conclusions are given and the directions for further work are determined.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hovorushchenko, Sergii Aleksov, Yurii Popov, Vyacheslav Bachuk
{"title":"DECISION-MAKING METHOD FOR TEMPERATURE CONTROL IN THE SMART HOME","authors":"T. Hovorushchenko, Sergii Aleksov, Yurii Popov, Vyacheslav Bachuk","doi":"10.31891/csit-2023-3-1","DOIUrl":"https://doi.org/10.31891/csit-2023-3-1","url":null,"abstract":"The current challenge is to provide automatic decision support in a smart home. A study of the top solutions of well-known smart homes has shown that existing solutions usually do not provide for fully automatic control in a smart home, but are focused either on automatic control in conjunction with manual control or user-controlled control. Therefore, the goal of this study is to support decision-making for fully automatic temperature control in a smart home. Human well-being and performance depend on the meteorological conditions of the environment in which a person is located. The most important condition for high performance, rest, and health is the creation and maintenance of an optimal home microclimate. One of the main parameters of the indoor microclimate is temperature. The room temperature control subsystem ensures the optimal temperature level and allows for individual adjustment for each family member. The developed rules for determining the optimal room temperature allow you to evaluate the existing temperature parameters for further automatic operation of the smart home temperature control subsystem in residential premises of various types. The purpose of the temperature control subsystem is to provide comfortable conditions in residential premises of various types in terms of their temperature regime. The developed decision-making method for temperature control in a smart home, which is the basis of the smart home temperature control subsystem, provides a comfortable and optimal (taking into account building and sanitary and hygienic standards) temperature in the corresponding living space. The results of the functioning of the smart home temperature control decision-making method have shown that the developed method provides for the recognition of situations (optimal temperature, low temperature, high temperature) and support for decision-making on the temperature regime in a certain type of residential space (turning on heating devices, turning on cooling devices, no action, etc.).","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Zasornova, M. Fedula, Olga Pavlova, Tetiana Kysil
{"title":"AUTOMATED TESTING OF WEB PROJECT FUNCTIONALITY WITH USING OF ERROR PROPAGATION ANALYSIS","authors":"I. Zasornova, M. Fedula, Olga Pavlova, Tetiana Kysil","doi":"10.31891/csit-2023-3-11","DOIUrl":"https://doi.org/10.31891/csit-2023-3-11","url":null,"abstract":"Automated testing is indispensable in the area of software engineering, particularly for web project functionality, as the complexity of software systems continues to surge. This paper delves into the pivotal role of automated testing and how the integration of error propagation analysis, grounded in chaos theory, can elevate its efficacy. The objective is to elucidate the significance of this methodology and its application in bolstering the reliability and performance of web projects. Automated testing automates the execution of predefined test cases, offering efficiency gains, reduced human error, and swift defect detection in software development. Various testing approaches, including unit testing, integration testing, and regression testing, cater to distinct facets of software functionality, ensuring seamless operation of all components. Web project functionality is integral to the user experience, encompassing navigation menus, forms, and search features. Testing this functionality is imperative to unearth inconsistencies or errors that could compromise user satisfaction and task completion. This paper proposes a methodology for automated testing coupled with error propagation analysis, which involves scrutinizing how errors evolve through a system over time. Chaos theory, a branch of mathematics examining complex systems' behavior, is employed to understand how minor variations in initial conditions can precipitate substantial system behavior shifts. Traditional error propagation analysis hinges on linear, deterministic models, but real-world systems often exhibit non-linear, chaotic characteristics, rendering such models inadequate. Chaos theory's non-linear dynamics model the intricate interactions between input variables and their effects on outputs, capturing the sensitivity of chaotic systems to initial conditions. This approach appreciates system complexity and intricate feedback loops, enhancing error analysis's robustness and accuracy. However, the application of chaos theory introduces complexity and computational demands, necessitating a balance between model intricacy and practicality. The proposed methodology unveil valuable insights into error propagation within web projects' functionality, pinpointing vulnerable components and areas ripe for improvement. The methodology's advantages include the ability to identify potential issues and vulnerabilities, ultimately enhancing web project reliability.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ПРОГНОЗУВАННЯ ПІКОВОГО НАВАНТАЖЕННЯ НА ЕЛЕКТРИЧНІ МЕРЕЖІ","authors":"Євген Холявка, Юлія Парфененко","doi":"10.31891/csit-2023-3-2","DOIUrl":"https://doi.org/10.31891/csit-2023-3-2","url":null,"abstract":"У сучасному світі точний прогноз пікового споживання електроенергії використовується як одне з ключових значень для ефективного управління електромережами. Вирішення цієї задачі вимагає ретельного розгляду різних методів прогнозування, використовуючи годинні дані споживання електроенергії та різні моделі прогнозування. Ця стаття присвячена аналізу різних методів прогнозування пікового навантаження, використовуючи дослідницьку методологію, що включає обробку даних, вибір моделі та оптимізацію параметрів. Моделі, що розглядаються, охоплюють широкий спектр методів прогнозування, включаючи ARIMA, SARIMA, LSTM, GRU та Random Forest. Для оцінки їх ефективності було використано низку метрик оцінки, таких як середня абсолютна помилка (MAE), коренева середня квадратична помилка (RMSE), середня абсолютна відсоткова помилка (MAPE), R-квадрат та площа під кривою характеристики отримувача (ROC AUC). Результати цього дослідження підкреслюють сильні та слабкі сторони кожної моделі прогнозування споживання електроенергії. Зокрема, деякі підходи проявляють себе з більшою точністю в короткострокових сценаріях прогнозування пікового споживання електроенергії, тоді як інші відзначаються в довгострокових прогнозах. Вибір оптимального методу прогнозування стає залежним від конкретних умов, обмежень та цілей конкретного дослідження. Моделі LSTM та GRU, що представляють собою нейронні мережі глибокого навчання, проявляють свою ефективність в розгляді складних динамік даних щодо споживання електроенергії. Їх здатність розпізнавати патерни, нелінійності та довгострокові залежності робить їх потужними конкурентами в області довгострокового прогнозування піку споживання. Модель Random Forest виявилась універсальною, здатною адаптуватися до багатогранних характеристик даних споживання електроенергії. Її здатність автономно визначати складні залежності, нелінійні відносини та сезонні патерни, враховуючи зовнішні фактори підвищує її корисність в широкому спектрі сценаріїв прогнозування. Ця робота має значення для практичного вивчення різних методів прогнозування піку споживання електроенергії. Результати, отримані з цього аналізу, мають значні значення для вдосконалення стратегій управління електромережами, що в кінцевому рахунку сприяє стабільності та стійкості енергетичної мікромережі.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"178 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MACHINE LEARNING CLUSTER MODEL FOR THE DECISION-MAKING SUPPORT IN CRIMINAL JUSTICE","authors":"O. Kovalchuk","doi":"10.31891/csit-2023-3-6","DOIUrl":"https://doi.org/10.31891/csit-2023-3-6","url":null,"abstract":"In a modern digital society, information technologies play a crucial role in security policy. The increase in the number of criminals and the expansion of the range of crimes committed by them, which is observed all over the world, poses serious risks to the personal safety of citizens, the internal security of the country, and international security. Identifying links between the individual characteristics of prisoners and their criminal recidivism can help to solve serial crimes, develop new crime prevention strategies, and provide reliable support for public safety decisions. The presented work is a part of research on the development of information and analytical support for decision-making systems in criminal justice. This document presents a new analytical approach to criminal profiling. It is a case study of a unique real-world dataset of 13,010 criminal convicts. The k-means clustering technique was used to determine significant indicators (individual characteristics of prisoners) that determine the propensity of convicts to commit repeated criminal offenses. The built clustering model makes obvious the connection between the propensity for criminal recidivism and the following elements of the criminal profile: the number of previous convictions, the age at the time of the first conviction, the presence of conditional convictions, and early releases. The developed models can be applied to new criminal convicted datasets. The dynamic interaction of information technology and the criminal justice system will help reduce crime and strengthen internal security.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"СПЕКТРАЛЬНИЙ ФІЛЬТР БЛУМА НА ОСНОВІ ПРОСТИХ ЧИСЕЛ ДЛЯ ВИКОРИСТАННЯ В ACTIVE-ANTI ENTROPY МЕХАНІЗМІ УЗГОДЖЕННЯ ДАНИХ У РОЗПОДІЛЕНІЙ ДОКУМЕНТООРІЄНТОВАНІЙ НЕРЕЛЯЦІЙНІЙ БАЗІ ДАНИХ","authors":"Валерій Нікітін, Євген Крилов","doi":"10.31891/csit-2023-3-9","DOIUrl":"https://doi.org/10.31891/csit-2023-3-9","url":null,"abstract":"Метою даної роботи є порівняння існуючих методів формування спектрального фільтра Блума з використанням хеш-функцій та запропонованого методу з використанням простих чисел. Запропонований метод дозволяє отримати знімки з документів, які можна використовувати для підтримки узгодженості даних в розподілених документоорієнтованих NoSQL базах даних як частину механізму Active Anti-Entropy. Узгодженість даних є важливою та складною задачею через необхідність горизонтального масштабування інформаційних систем. Нехтування цим може призводити до матеріальних або навіть людських втрат, оскільки цифровізація охоплює абсолютно всі сфери діяльності людини і є необхідність у розподіленій обробці та зберіганні інформації. Консистентність може забезпечуватись різними шляхами, серед яких архітектурний підхід та Active Anti-Entropy механізми. Під архітектурним підходом мається на увазі централізовані операції запису, які розповсюджуються до другорядних вузлів. Відповідно операції читання відбуваються з другорядних вузлів. Даний підхід не є гнучким, оскільки вимагає стабільного та швидкого зв’язку з центральним вузлом, що не завжди можливо. Active Anti-Entropy механізм представляє собою фоновий процес, який перевіряє узгодженість даних між вузлами використовуючи спеціальні знімки, які можуть бути отримані з використанням хеш-функцій або такої структури даних як Merkle Tree. Використання останнього ідеально підходить для перевірки узгодженості цілих наборів даних, але для критично важливих даних це рішення не підходить. Ймовірність колізій або обчислювальні витрати можуть призводити до неузгодженості цілого набору даних і це вимагає спеціального рішення для критично важливих даних. Запропонований метод дозволяє швидше отримувати спектральний фільтр Блума з вихідного набору даних. Окрім цього, він має вищу колізійну стійкість в порівнянні з використанням хеш-функцій, що дозволяє швидше ідентифікувати неузгодженість документів, які зберігаються на різних вузлах.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139334615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}