{"title":"METHOD OF CHOOSING THE PROGRAMMING ENVIRONMENT FOR SOFTWARE","authors":"V. Stetsyuk, T. Hovorushchenko","doi":"10.31891/csit-2021-4-1","DOIUrl":"https://doi.org/10.31891/csit-2021-4-1","url":null,"abstract":"This paper shows an example of the application of the method of hierarchy analysis to build a hierarchy of programming environments, which provides support for selecting the optimal programming environment for software in accordance with the requirements of the developer and user. As a result of the application of the method of hierarchy analysis, a hierarchy of programming environments for software development was built, which will be useful for building criteria and production rules for selecting a programming environment for software. The constructed hierarchy has the following form: 1) Microsoft Visual Studio (33.1%); 2)Eclipse (19.6%); 3) PhpStorm (19.2%); 4) Netbeans (17.2%); 5) PyCharm (11%). Hierarchy analysis makes it possible to determine what is the best for software development is the Microsoft Visual Studio environment, but the price of such an environment is quite high. Next and almost equal in technical capabilities are the environments Eclipse, PhpStorm, Netbeans, PyCharm","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"METHOD OF SELECTION OF SOFTWARE DESIGN TECHNOLOGY","authors":"D. Medzatyi, T. Hovorushchenko","doi":"10.31891/csit-2021-4-8","DOIUrl":"https://doi.org/10.31891/csit-2021-4-8","url":null,"abstract":"The paper further develops the mathematical model of the software design technology (SDT) and the criteria for evaluating the SDT, which allow experts to evaluate each considered software design technology more accurately, taking into account all its components. The method and production rules of the selection of the software design technology proposed by the authors give the organization the opportunity to make a motivated and reasonable choice of the design technology for its further implementation \u0000 ","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128348547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sergiy Tkalichenko, Valentyna Khotskina, V. Solovieva
{"title":"CYBERCRIME: THE COMPARATIVE ANALYSIS OF THE MODERN INFORMATION SPACE","authors":"Sergiy Tkalichenko, Valentyna Khotskina, V. Solovieva","doi":"10.31891/csit-2021-3-8","DOIUrl":"https://doi.org/10.31891/csit-2021-3-8","url":null,"abstract":"The burning problem of modern society - cybercrime, was considered in the article. In the process of studying cybercrimes and the mechanisms of protection against information security threats, the concept of cybercrime classification was carried out. The comparative analysis between the number of registered cyberattacks and losses from them was performed. The analysis of factual data was carried out, on the basis of which the table of cyberattacks quantity indicators, general losses was developed, and the cost of cyberattacks was calculated. The study provides recommendations for improving the reliability of information protection. \u0000 ","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"568 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olga Pavlova, Volodymyr Kovalenko, T. Hovorushchenko, Volodymyr Avsiyevych
{"title":"NEURAL NETWORK BASED IMAGE RECOGNITION METHOD FOR SMART PARKING","authors":"Olga Pavlova, Volodymyr Kovalenko, T. Hovorushchenko, Volodymyr Avsiyevych","doi":"10.31891/csit-2021-3-7","DOIUrl":"https://doi.org/10.31891/csit-2021-3-7","url":null,"abstract":"With the exponential growth of vehicles on our streets, the need for finding an unoccupied parking spot today could most of the time be problematic, but even more in the coming future. Smart parking solutions have proved to be a helpful approach to facilitate the localization of unoccupied parking spots. In many smart parking solutions, sensors are used to determine the vacancy of a parking spot. i.e use of sensors can provide a highly accurate solution in terms of determining the status of parking lots. However, this is not ideal from a scalability point of view, since the need for installing and maintaining each of the sensors is not considered cost-effective. In the latest years vision based solutions have been considered more when building a smart parking solution, since cameras can easily be installed and used on a large parking area. Furthermore, the use of cameras can provide more advanced solution for finding a vacant parking spot and also for providing the safety of the car on the public parking area. This paper is aimed at the developing a Neural-Network based Image Recognition Method for Smart Parking.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General model of a transport-technological grain store route node for control systems programs","authors":"S. Tkachenko, Liliia Beshta","doi":"10.31891/csit-2021-3-4","DOIUrl":"https://doi.org/10.31891/csit-2021-3-4","url":null,"abstract":"The paper concerns a problem to develop software for engineering control systems based upon standard industrial controllers and SCADA means at enterprises for grain storage and processing. The problem generalizing approaches to develop algorithms controlling equipment as a part of technological routes has been considered. A system to control transport-technological grain route at grain storage is the research object. Control of transport-technological equipment at a route level is the research subject. \u0000Purpose is to develop general control model for nodes of a network of transport-technological grain storage routes to formalize tasks of software creation for industry specific engineering systems. \u0000Analysis, classification, and generalization of processing equipment have been carried out; approaches to implement functional structures of elevator routes have been studied. General model to control transport-technological grain storage route has been proposed in the form of a graph of states. Transitional conditions in the form of algebraic logic have been developed for this graph as well as algorithms to control certain mechanisms in terms of transitional states of the route. \u0000The control model developed in the form of graph involving transitional conditions and algorithms of transitional states has obtained its software implementation; moreover, it has been introduced in the context of industry specific engineering control systems at operating enterprises of grain storage and processing. The introduction results have demonstrated the model stability under the conditions of different enterprises engaged in grain storage and processing from the viewpoint of its implementation in the system software. \u0000The realized field experiments have demonstrated the system effectiveness, which allows to recommend it to solve the problems of software development for engineering control systems based upon standard industrial controllers and SCADA.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130592263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRINTING PRODUCTS QUALITY CONTROL SYSTEM IN THE CONTEXT OF ISO QUALITY MANAGEMENT","authors":"Bohdana Havrysh, O. Tymchenko, I. Izonin","doi":"10.31891/csit-2021-3-1","DOIUrl":"https://doi.org/10.31891/csit-2021-3-1","url":null,"abstract":"The quality control system of printing products is the main part of the process, which performs the task of analyzing the measured quality parameters, determining the causes of identified quality defects and choosing how to eliminate them. After determining the causes of quality changes, the method of their elimination depends on the actions of operational personnel who try to eliminate defects, for example by recalibrating the printing machine, changing environmental conditions, the choice of other consumables.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MATHEMATICAL MODEL OF CHEMICAL PROCESSES OCCURRING IN ELECTRIC ARC FURNACES","authors":"K. Yashyna, K. Yalova","doi":"10.31891/csit-2021-3-6","DOIUrl":"https://doi.org/10.31891/csit-2021-3-6","url":null,"abstract":"The article provides a mathematical model of chemical processes occurring in electric arc furnace (EAF). The authors of the article are the first to build up a new algorithm of calculating the main characteristics of chemical processes taking place in EAF. This algorithm is notable for its simplicity and convenience of execution and helps to calculate the mass of substances entering into a chemical reaction and its products, the quantity of heat emitted or absorbed. So, it would be reasonable to use the algorithm described in this article while creating complex models of EAF, in particular, while studying the thermal and chemical processes occurring in the furnace and looking for their correlation, while constructing energy and material balance of EAF. Besides, due to the high level of calculations that are performed with the help of this algorithm, it is convenient to use it while formulating the laws of optimal management of EAF. Its adequacy is proved by comparison of the calculations to the experimental data.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USING ARTIFICIAL INTELLIGENCE ACCELERATORS TO TRAIN COMPUTER GAME CHARACTERS","authors":"Y. Hnatchuk, Yevheniy Sierhieiev, Alina Hnatchuk","doi":"10.31891/csit-2021-3-9","DOIUrl":"https://doi.org/10.31891/csit-2021-3-9","url":null,"abstract":" A review of the literature has shown that today, given the complexity of computational processes and the high cost of these processes, the gaming computer industry needs to improve hardware and software to increase the efficiency and speed of processing artificial intelligence algorithms. An analysis of existing machine learning tools and existing hardware solutions to accelerate artificial intelligence. A reasonable choice of hardware solutions that are most effective for the implementation of the task. Possibilities of practical use of the artificial intelligence accelerator are investigated. The effectiveness of the proposed solutions has been proven by experiments. The use of an artificial intelligence accelerator model allowed to accelerate the learning of a computer game character by 2.14 times compared to classical methods. \u0000 ","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WEB-BASED INFORMATION TECHNOLOGY FOR CLASSIFYING AND INTERPRETING EARLY PNEUMONIA BASED ON FINE-TUNED CONVOLUTIONAL NEURAL NETWORK","authors":"Pavlo Radiuk, O. Barmak","doi":"10.31891/csit-2021-3-2","DOIUrl":"https://doi.org/10.31891/csit-2021-3-2","url":null,"abstract":"There have been rapid development and application of computer methods and information systems in digital medical diagnosis in recent years. However, although computer methods of medical imaging have proven helpful in diagnosing lung disease, for detecting early pneumonia on chest X-rays, the problem of cooperation between professional radiologists and specialists in computer science remains urgent. Thus, to address this issue, we propose information technology that medical professionals can employ to detect pneumonia on chest X-rays and interpret the results of the digital diagnosis. The technology is presented as a web-oriented system with an available and intuitive user interface. The information system contains three primary components: a module for disease prediction based on a classification model, a module responsible for hyperparameter tuning of the model, and a module for interpreting the diagnosis results. In combination, these three modules form a feasible tool to facilitate medical research in radiology. Moreover, a web-based system with a local server allows storing personal patient data on the user's computing device, as all calculations are performed locally.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TECHNIQUE FOR THE RISK ASSESSING OF THE CYBERPHYSICAL SYSTEMS’ INFORMATION SECURITY BASED ON THE VULNERABILITIES’ INTERCONNECT","authors":"S. Lysenko, A. Kondratyuk","doi":"10.31891/CSIT-2020-2-8","DOIUrl":"https://doi.org/10.31891/CSIT-2020-2-8","url":null,"abstract":"Information security has been growing steadily in recent times. Every organization depends on information technology and information security of cyberphysical systems to successfully perform its work. This has become not just a condition for the stability of doing business, but the most important strategic factor for its future development, even in the current, very turbulent environment. Cyberphysical systems can contain a wide variety of entities, ranging from office networks, financial and personnel systems to highly specialized systems. The rapid development of cyber-physical systems has become due to the large number of cyberattacks, which have become one of the most powerful threats to the security of cyber-physical systems. Many studies have been conducted on the risk assessment method, and limited work has been published on quantifying the security risk of cyber-physical systems. In this paper, a technique for the risk assessing of the cyber-physical systems’ information security based on the vulnerabilities’ interconnect is proposed. Technique operates with two indicators to quantify the risk: the probability of attack success and the index of the consequences of the attack based on the graph of the vulnerability. The first indicator - the index of the probability of a successful attack is calculated taking into account the interdependencies between vulnerabilities, the second indicator when calculating the index of the consequences of the attack takes into account the impact on the physical area resulting from cyberattack. A quantitative experimental example showed whether a system risk and an optimal attack target are possible.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114580556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}