Computer systems and information technologies最新文献

筛选
英文 中文
METHOD OF CHOOSING THE PROGRAMMING ENVIRONMENT FOR SOFTWARE 选择软件编程环境的方法
Computer systems and information technologies Pub Date : 2021-10-04 DOI: 10.31891/csit-2021-4-1
V. Stetsyuk, T. Hovorushchenko
{"title":"METHOD OF CHOOSING THE PROGRAMMING ENVIRONMENT FOR SOFTWARE","authors":"V. Stetsyuk, T. Hovorushchenko","doi":"10.31891/csit-2021-4-1","DOIUrl":"https://doi.org/10.31891/csit-2021-4-1","url":null,"abstract":"This paper shows an example of the application of the method of hierarchy analysis to build a hierarchy of programming environments, which provides support for selecting the optimal programming environment for software in accordance with the requirements of the developer and user. As a result of the application of the method of hierarchy analysis, a hierarchy of programming environments for software development was built, which will be useful for building criteria and production rules for selecting a programming environment for software. The constructed hierarchy has the following form: 1) Microsoft Visual Studio (33.1%); 2)Eclipse (19.6%); 3) PhpStorm (19.2%); 4) Netbeans (17.2%); 5) PyCharm (11%). Hierarchy analysis makes it possible to determine what is the best for software development is the Microsoft Visual Studio environment, but the price of such an environment is quite high. Next and almost equal in technical capabilities are the environments Eclipse, PhpStorm, Netbeans, PyCharm","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF SELECTION OF SOFTWARE DESIGN TECHNOLOGY 软件设计技术的选择方法
Computer systems and information technologies Pub Date : 2021-10-04 DOI: 10.31891/csit-2021-4-8
D. Medzatyi, T. Hovorushchenko
{"title":"METHOD OF SELECTION OF SOFTWARE DESIGN TECHNOLOGY","authors":"D. Medzatyi, T. Hovorushchenko","doi":"10.31891/csit-2021-4-8","DOIUrl":"https://doi.org/10.31891/csit-2021-4-8","url":null,"abstract":"The paper further develops the mathematical model of the software design technology (SDT) and the criteria for evaluating the SDT, which allow experts to evaluate each considered software design technology more accurately, taking into account all its components. The method and production rules of the selection of the software design technology proposed by the authors give the organization the opportunity to make a motivated and reasonable choice of the design technology for its further implementation \u0000 ","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CYBERCRIME: THE COMPARATIVE ANALYSIS OF THE MODERN INFORMATION SPACE 网络犯罪:现代信息空间的比较分析
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-8
Sergiy Tkalichenko, Valentyna Khotskina, V. Solovieva
{"title":"CYBERCRIME: THE COMPARATIVE ANALYSIS OF THE MODERN INFORMATION SPACE","authors":"Sergiy Tkalichenko, Valentyna Khotskina, V. Solovieva","doi":"10.31891/csit-2021-3-8","DOIUrl":"https://doi.org/10.31891/csit-2021-3-8","url":null,"abstract":"The burning problem of modern society - cybercrime, was considered in the article. In the process of studying cybercrimes and the mechanisms of protection against information security threats, the concept of cybercrime classification was carried out. The comparative analysis between the number of registered cyberattacks and losses from them was performed. The analysis of factual data was carried out, on the basis of which the table of cyberattacks quantity indicators, general losses was developed, and the cost of cyberattacks was calculated. The study provides recommendations for improving the reliability of information protection. \u0000 ","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"568 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NEURAL NETWORK BASED IMAGE RECOGNITION METHOD FOR SMART PARKING 基于神经网络的智能停车图像识别方法
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-7
Olga Pavlova, Volodymyr Kovalenko, T. Hovorushchenko, Volodymyr Avsiyevych
{"title":"NEURAL NETWORK BASED IMAGE RECOGNITION METHOD FOR SMART PARKING","authors":"Olga Pavlova, Volodymyr Kovalenko, T. Hovorushchenko, Volodymyr Avsiyevych","doi":"10.31891/csit-2021-3-7","DOIUrl":"https://doi.org/10.31891/csit-2021-3-7","url":null,"abstract":"With the exponential growth of vehicles on our streets, the need for finding an unoccupied parking spot today could most of the time be problematic, but even more in the coming future. Smart parking solutions have proved to be a helpful approach to facilitate the localization of unoccupied parking spots. In many smart parking solutions, sensors are used to determine the vacancy of a parking spot. i.e use of sensors can provide a highly accurate solution in terms of determining the status of parking lots. However, this is not ideal from a scalability point of view, since the need for installing and maintaining each of the sensors is not considered cost-effective. In the latest years vision based solutions have been considered more when building a smart parking solution, since cameras can easily be installed and used on a large parking area. Furthermore, the use of cameras can provide more advanced solution for finding a vacant parking spot and also for providing the safety of the car on the public parking area. This paper is aimed at the developing a Neural-Network based Image Recognition Method for Smart Parking.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
General model of a transport-technological grain store route node for control systems programs 用于控制系统程序的运输技术粮库路线节点的一般模型
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-4
S. Tkachenko, Liliia Beshta
{"title":"General model of a transport-technological grain store route node for control systems programs","authors":"S. Tkachenko, Liliia Beshta","doi":"10.31891/csit-2021-3-4","DOIUrl":"https://doi.org/10.31891/csit-2021-3-4","url":null,"abstract":"The paper concerns a problem to develop software for engineering control systems based upon standard industrial controllers and SCADA means at enterprises for grain storage and processing. The problem generalizing approaches to develop algorithms controlling equipment as a part of technological routes has been considered. A system to control transport-technological grain route at grain storage is the research object.  Control of transport-technological equipment at a route level is the research subject. \u0000Purpose is to develop general control model for nodes of a network of transport-technological grain storage routes to formalize tasks of software creation for industry specific engineering systems. \u0000Analysis, classification, and generalization of processing equipment have been carried out; approaches to implement functional structures of elevator routes have been studied. General model to control transport-technological grain storage route has been proposed in the form of a graph of states. Transitional conditions in the form of algebraic logic have been developed for this graph as well as algorithms to control certain mechanisms in terms of transitional states of the route. \u0000The control model developed in the form of graph involving transitional conditions and algorithms of transitional states has obtained its software implementation; moreover, it has been introduced in the context of industry specific engineering control systems at operating enterprises of grain storage and processing. The introduction results have demonstrated the model stability under the conditions of different enterprises engaged in grain storage and processing from the viewpoint of its implementation in the system software. \u0000The realized field experiments have demonstrated the system effectiveness, which allows to recommend it to solve the problems of software development for engineering control systems based upon standard industrial controllers and SCADA.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130592263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRINTING PRODUCTS QUALITY CONTROL SYSTEM IN THE CONTEXT OF ISO QUALITY MANAGEMENT 印刷产品质量控制体系在iso质量管理的背景下
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-1
Bohdana Havrysh, O. Tymchenko, I. Izonin
{"title":"PRINTING PRODUCTS QUALITY CONTROL SYSTEM IN THE CONTEXT OF ISO QUALITY MANAGEMENT","authors":"Bohdana Havrysh, O. Tymchenko, I. Izonin","doi":"10.31891/csit-2021-3-1","DOIUrl":"https://doi.org/10.31891/csit-2021-3-1","url":null,"abstract":"The quality control system of printing products is the main part of the process, which performs the task of analyzing the measured quality parameters, determining the causes of identified quality defects and choosing how to eliminate them. After determining the causes of quality changes, the method of their elimination depends on the actions of operational personnel who try to eliminate defects, for example by recalibrating the printing machine, changing environmental conditions, the choice of other consumables.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MATHEMATICAL MODEL OF CHEMICAL PROCESSES OCCURRING IN ELECTRIC ARC FURNACES 电弧炉中化学过程的数学模型
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-6
K. Yashyna, K. Yalova
{"title":"MATHEMATICAL MODEL OF CHEMICAL PROCESSES OCCURRING IN ELECTRIC ARC FURNACES","authors":"K. Yashyna, K. Yalova","doi":"10.31891/csit-2021-3-6","DOIUrl":"https://doi.org/10.31891/csit-2021-3-6","url":null,"abstract":"The article provides a mathematical model of chemical processes occurring in electric arc furnace (EAF). The authors of the article are the first to build up a new algorithm of calculating the main characteristics of chemical processes taking place in EAF. This algorithm is notable for its simplicity and convenience of execution and helps to calculate the mass of substances entering into a chemical reaction and its products, the quantity of heat emitted or absorbed. So, it would be reasonable to use the algorithm described in this article while creating complex models of EAF, in particular, while studying the thermal and chemical processes occurring in the furnace and looking for their correlation, while constructing energy and material balance of EAF. Besides, due to the high level of calculations that are performed with the help of this algorithm, it is convenient to use it while formulating the laws of optimal management of EAF. Its adequacy is proved by comparison of the calculations to the experimental data.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USING ARTIFICIAL INTELLIGENCE ACCELERATORS TO TRAIN COMPUTER GAME CHARACTERS 利用人工智能加速器训练电脑游戏角色
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-9
Y. Hnatchuk, Yevheniy Sierhieiev, Alina Hnatchuk
{"title":"USING ARTIFICIAL INTELLIGENCE ACCELERATORS TO TRAIN COMPUTER GAME CHARACTERS","authors":"Y. Hnatchuk, Yevheniy Sierhieiev, Alina Hnatchuk","doi":"10.31891/csit-2021-3-9","DOIUrl":"https://doi.org/10.31891/csit-2021-3-9","url":null,"abstract":"        A review of the literature has shown that today, given the complexity of computational processes and the high cost of these processes, the gaming computer industry needs to improve hardware and software to increase the efficiency and speed of processing artificial intelligence algorithms. An analysis of existing machine learning tools and existing hardware solutions to accelerate artificial intelligence. A reasonable choice of hardware solutions that are most effective for the implementation of the task. Possibilities of practical use of the artificial intelligence accelerator are investigated. The effectiveness of the proposed solutions has been proven by experiments. The use of an artificial intelligence accelerator model allowed to accelerate the learning of a computer game character by 2.14 times compared to classical methods. \u0000 ","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WEB-BASED INFORMATION TECHNOLOGY FOR CLASSIFYING AND INTERPRETING EARLY PNEUMONIA BASED ON FINE-TUNED CONVOLUTIONAL NEURAL NETWORK 基于精细卷积神经网络的早期肺炎分类与解释的网络信息技术
Computer systems and information technologies Pub Date : 2021-08-21 DOI: 10.31891/csit-2021-3-2
Pavlo Radiuk, O. Barmak
{"title":"WEB-BASED INFORMATION TECHNOLOGY FOR CLASSIFYING AND INTERPRETING EARLY PNEUMONIA BASED ON FINE-TUNED CONVOLUTIONAL NEURAL NETWORK","authors":"Pavlo Radiuk, O. Barmak","doi":"10.31891/csit-2021-3-2","DOIUrl":"https://doi.org/10.31891/csit-2021-3-2","url":null,"abstract":"There have been rapid development and application of computer methods and information systems in digital medical diagnosis in recent years. However, although computer methods of medical imaging have proven helpful in diagnosing lung disease, for detecting early pneumonia on chest X-rays, the problem of cooperation between professional radiologists and specialists in computer science remains urgent. Thus, to address this issue, we propose information technology that medical professionals can employ to detect pneumonia on chest X-rays and interpret the results of the digital diagnosis. The technology is presented as a web-oriented system with an available and intuitive user interface. The information system contains three primary components: a module for disease prediction based on a classification model, a module responsible for hyperparameter tuning of the model, and a module for interpreting the diagnosis results. In combination, these three modules form a feasible tool to facilitate medical research in radiology. Moreover, a web-based system with a local server allows storing personal patient data on the user's computing device, as all calculations are performed locally.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TECHNIQUE FOR THE RISK ASSESSING OF THE CYBERPHYSICAL SYSTEMS’ INFORMATION SECURITY BASED ON THE VULNERABILITIES’ INTERCONNECT 基于漏洞互连的网络物理系统信息安全风险评估技术
Computer systems and information technologies Pub Date : 2020-11-03 DOI: 10.31891/CSIT-2020-2-8
S. Lysenko, A. Kondratyuk
{"title":"TECHNIQUE FOR THE RISK ASSESSING OF THE CYBERPHYSICAL SYSTEMS’ INFORMATION SECURITY BASED ON THE VULNERABILITIES’ INTERCONNECT","authors":"S. Lysenko, A. Kondratyuk","doi":"10.31891/CSIT-2020-2-8","DOIUrl":"https://doi.org/10.31891/CSIT-2020-2-8","url":null,"abstract":"Information security has been growing steadily in recent times. Every organization depends on information technology and information security of cyberphysical systems to successfully perform its work. This has become not just a condition for the stability of doing business, but the most important strategic factor for its future development, even in the current, very turbulent environment. Cyberphysical systems can contain a wide variety of entities, ranging from office networks, financial and personnel systems to highly specialized systems. The rapid development of cyber-physical systems has become due to the large number of cyberattacks, which have become one of the most powerful threats to the security of cyber-physical systems. Many studies have been conducted on the risk assessment method, and limited work has been published on quantifying the security risk of cyber-physical systems. In this paper, a technique for the risk assessing of the cyber-physical systems’ information security based on the vulnerabilities’ interconnect is proposed. Technique operates with two indicators to quantify the risk: the probability of attack success and the index of the consequences of the attack based on the graph of the vulnerability. The first indicator - the index of the probability of a successful attack is calculated taking into account the interdependencies between vulnerabilities, the second indicator when calculating the index of the consequences of the attack takes into account the impact on the physical area resulting from cyberattack. A quantitative experimental example showed whether a system risk and an optimal attack target are possible.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114580556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信