{"title":"АЛГОРИТМИ ОНОВЛЕННЯ ДАНИХ В СИСТЕМІ МАШИННОГО НАВЧАННЯ","authors":"Наталія Бойко, Роман Ковальчук","doi":"10.31891/csit-2023-1-1","DOIUrl":"https://doi.org/10.31891/csit-2023-1-1","url":null,"abstract":"У цій роботі було виконано аналіз методів для операціоналізації пошуку аномалій, виявлення дрифту даних та самого DataQC пайплайну як такого. Проаналізовані підходи до аналізу операціоналізації пайплайну та до операціоналізації виявлення дрифту даних. Виявлення аномалій допомагає нам оцінити чистоту і якість наших даних. Важливо, щоб у моделі не було аномальних викидів, оскільки вони заплутують модель. Також важливо мати послідовні дані без змін у розподілі ознак. Було запропоновано рішення з вибраними технологіями для операціоналізації DataQC пайплайну, визначено наступні кроки для подальшого дослідження. Запропоновано для побудови заданого DataQC пайплайну використати та обґрунтовати власне рішення для пошуку аномалій та виявлення дрифту даних через специфіку задачі, проблеми та відстуності готових рішень які б задовольняли наші вимоги. В роботі розглядаються етапи операціоналізація вищезгаданого пайплайну, який виконує етапи: фільтрування, пошуку аномалій, звітування, валідації, та порівняння нових даних з історичними, для існуючої у системі моделі машинного навчання. Описується складність задачі операціоналізації у реальному світі, яка полягає у постійному оновленні даних, необхідності їх опрацювання та подальшому застосуванні у системі машинного навчання. Також доводиться користь від пайплайну, який б автоматично опрацьовував нові дані. В роботі досліджується проблематика, яку слід розглядати як Time-Series проблему, то при формуванні інтерактивних звітів, перевірці даних на валідність, наявність та пошук викидів, аномалій. Це рішення дозволить нам візуалізувати всі кроки, які виконує конвеєр валідації даних, що дасть змогу іншим розробникам переглянути результат його роботи, не знаючи нюансів його реалізації та не витрачаючи зайвого часу. Також пропонована архітектура MLOps дозволяє відстежувати зміни трендів даних та гарантувати, що модель збереже свою прогностичну ефективність з часом.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS","authors":"Tetiana Okhrimenko, Serhii Dorozhynskyi, Bohdan Horbakha","doi":"10.31891/csit-2023-1-8","DOIUrl":"https://doi.org/10.31891/csit-2023-1-8","url":null,"abstract":"The development of modern computer technologies endangers the confidentiality of information, which is usually ensured by traditional cryptographic means. This circumstance forces us to look for new methods of protection. In view of modern trends, quantum cryptography methods can become such alternatives, which allow solving a number of important cryptographic problems, for which the impossibility of solving using only classical (that is, non-quantum) communication has been proven. Quantum cryptography is a branch of quantum informatics that studies methods of protecting information by using quantum carriers. The possibility of such protection is ensured by the fundamental laws of quantum mechanics. One of the promising directions of quantum cryptography is Quantum Secure Direct Communication (QSDC) that offers secure communication without any shared key. A characteristic feature of this method is the absence of cryptographic transformations, accordingly, there is no key distribution problem. The purpose of this work is a general overview of quantum cryptography protocols, finding their weak points for further development and improvement, as well as identifying vulnerabilities to different attacks.\u0000The article analyzes new methods and protocols, as well as presents their advantages and disadvantages. Based on partial generalizations of theoretical provisions and practical achievements in the field of quantum cryptography, a generalized classification was developed. By comparing various factors of the protocols, and their resistance to certain cyberattacks, we have the opportunity to identify several problems in this field and expand the possibilities for choosing appropriate methods for building modern quantum information protection systems. In accordance with this, conclusions were presented regarding the use of protocols and increasing the level of their effectiveness.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"METHOD OF REAL-TIME VIDEO STREAM SYNCHRONIZATION IN THE WORKING ENVIRONMENT OF AN APPLE ORCHARD","authors":"O. Melnychenko","doi":"10.31891/csit-2023-1-12","DOIUrl":"https://doi.org/10.31891/csit-2023-1-12","url":null,"abstract":"Monitoring and analyzing the state of harvest in an apple orchard is essential for efficient horticulture. Unmanned aerial vehicles (UAVs) have been increasingly used for this purpose due to their ability to capture high-resolution images and videos of the orchard from different perspectives. However, synchronizing the video streams from multiple UAVs in real-time presents a significant challenge. The traditional controller-worker architecture used for video stream synchronization is prone to latency issues, which can negatively impact the accuracy of the monitoring system. To address this issue, the authors propose a decentralized method using a consensus algorithm that allows the group of UAVs to synchronize their video streams in real time without relying on a centralized controller device. The proposed method also addresses the challenges of limited network connectivity and environmental factors, such as wind and sunlight. The automated system that utilizes the proposed method was tested in an actual apple orchard. The experimental results show that the proposed approach achieves real-time video stream synchronization with minimal latency and high accuracy. As such, the SSIM index varies from 0.79 to 0.92, with an average value of 0.87, and the PSNR index – varies from 22 to 39, which indicates the decent quality of the received information from combined images. Meanwhile, the effectiveness of the developed system with the proposed approach was proven, which is confirmed by a high average value of 82.69% of the reliability indicator of detecting and calculating the number of fruit fruits and a low average level of type I (14.67%) and II (18.33%) errors. Overall, the proposed method provides a more reliable and efficient approach to real-time video stream synchronization in an apple orchard, which can significantly improve the monitoring and management of apple orchards.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128110990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khrystyna Lipianina-Honcharenko, A. Sachenko, Vitaliy Kulyk, Ruslan Savchyshyn, Oleksandra Provozin, S.A. Shchur, Liliia Kurpita
{"title":"SIMULATION MODEL STRUCTURE OF BUSINESS PROCESSES FOR A PRODUCT BASED ON AURALIZATION TECHNOLOGY","authors":"Khrystyna Lipianina-Honcharenko, A. Sachenko, Vitaliy Kulyk, Ruslan Savchyshyn, Oleksandra Provozin, S.A. Shchur, Liliia Kurpita","doi":"10.31891/csit-2022-4-15","DOIUrl":"https://doi.org/10.31891/csit-2022-4-15","url":null,"abstract":"Within the framework of the Auralization of acoustic heritage sites using Augmented and Virtual Reality (AURA) project, the task was to develop the business models for potential products that would use the developed auralized 3D model. Accordingly, the purpose of the article is to analyze typical business models for the specified products with an auralized 3D model, which can further be adapted to each specific use case (marketing scenario). \u0000In the most general terms, a business model is a method of doing business that allows a company to sustain itself, i.e. generate income and revenue. Therefore, the development of a business model is relevant to calculate the possible income or expenses of a future product. \u0000The article analyzes existing business models and determines which ones are most suitable for the task at hand. It is proposed to use the following business models: \"Canvas\", \"Barter\" and \"Joint Ownership\". \u0000The \"Canvas\" business model is described by the following structure: consumer segment, value proposition, sales channels, customer relationships, product revenues, key resources, key activities, key partners, and cost structure. In addition, this business model proposes the E-commerce, Affiliations, and Additional Opportunities business processes. \u0000The \"Barter\" business model is based on the use of a social media platform to promote products and services. And in the Shared Ownership business model, investors do not buy the entire asset, but only a part of it. For these business models, the Barter and Shared Ownership business processes are presented. \u0000Based on the business processes the structure of the simulation model was proposed. The study can be extended and adapted to other products. In further research, scenario modeling will be conducted using system dynamics approaches.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USE OF ANALYTICAL MODEL FOR SYNTHESIS OF ALGORITHMS FOR CONTROL OF TRANSPORT CONVEYOR PARAMETERS","authors":"O. Pihnastyi, M. Sobol","doi":"10.31891/csit-2022-4-10","DOIUrl":"https://doi.org/10.31891/csit-2022-4-10","url":null,"abstract":"This study presents a methodology for synthesizing optimal control algorithms for the flow parameters of a conveyor-type transport system with a variable transport delay. A multi-section transport conveyor is a complex dynamic system with a variable transport delay. The transport conveyor is an important element of the production system, used to synchronize technological operations and move material. The Analytical PiKh-model of the conveyor section was used as a model for designing a control system for flow parameters. The characteristic dimensionless parameters of the conveyor section are introduced and the similarity criteria for the conveyor sections are determined. The model of a conveyor section in a dimensionless form is used to develop a methodology for synthesizing algorithms for optimal control of the flow parameters of a transport conveyor section. The dependencies between the value of the input and output material flow of the section are determined, taking into account the initial distribution of the material along the conveyor section, variable transport delay, restrictions on the specific density of the material, and restrictions on the speed of the belt. The dependencies between the value of the input and output material flow for the case of a constant transport delay are analyzed. A technique for synthesizing algorithms for optimal belt speed control based on the PiKh-model of a conveyor section is presented. As a simplification, a two-stage belt speed control is considered. Particular attention is paid to the methodology for synthesizing optimal control algorithms based on the energy management methodology (TOU-Tariffs). The criteria of control quality are introduced and problems of optimal control of flow parameters of the transport system are formulated. Taking into account differential connections and restrictions on phase variables and admissible controls, which are typical for the conveyor section, the Pontryagin function and the adjoint system of equations are written. As examples demonstrating the design of optimal control, algorithms for optimal control of the flow parameters of the transport system are synthesized and analysis of optimal controls is performed.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Martynovych, Y. Gunchenko, Y. Shugailo, Yurii Bercov
{"title":"DESIGN AND SYNTHESIS OF TERNARY LOGIC ELEMENTS","authors":"L. Martynovych, Y. Gunchenko, Y. Shugailo, Yurii Bercov","doi":"10.31891/csit-2022-4-8","DOIUrl":"https://doi.org/10.31891/csit-2022-4-8","url":null,"abstract":"The aim of this paper is creating some ternary elements. The threshold element of ternary logic on bipolar transistors and elements of ternary systems based on it are considered. The main disadvantages of this approach are identified. The multi-threshold element of multivalued logic and its specific four-threshold implementation are considered. The scientific nowelty is the using of a multithreshold element of multivalued logic as a basis for constructing elements of ternary systems. It is shown that the advantages of a multi-threshold element of multi-valued logic are a larger number of thresholds of input signals, a larger number of levels that it can distinguish and a larger number of output signals. The implementation of some ternary elements, such as half-adder, disjunction and strong conjunction, is given. The practical significance of obtained results is that the multithreshold element of multivalued logic allows us to use it for synthesis basic elements of ternary logic and use one approach for all of them. Additional practical advantage is that in practice it allows you to build more diverse logical and arithmetic devices with a simplified implementation. The implementation of ternary devices based on threshold logic is a way to create ternary devices that can compete with binary devices in terms of equipment, capacity, operational capabilities, and variety. This, in turn, leads to greater speed and simplification of the structure of devices, as well as increasing the speed of data processing. These advantages are significant in such areas of computer use as intelligent data processing systems, expert systems, decision theory, i.e., where data analysis is performed. Prospects for further research are to use the method of construction and synthesis of nodes of ternary computer systems, based on MTEML. Their optimization, and development of principles of mathematical modeling and software of such systems and their elements is expedient.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TIME MANAGEMENT WEB -ORIENTED INFORMATION SYSTEM BASED ON THE MERN TECHNOLOGY STACK","authors":"N. Sokolova, Maryna Petryha, Tetiana Bulana","doi":"10.31891/csit-2022-4-12","DOIUrl":"https://doi.org/10.31891/csit-2022-4-12","url":null,"abstract":"The problem of fleeting time and its effective use has deep roots in human history. Many generations have asked the question of what time is, how it can be controlled, and if it cannot be controlled, how to deal with this enormous influence on human life. Time is the most valuable resource that you have to learn to manage. The more we manage to do, the better the quality of our work and life in general. And in the conditions of digital transformation and acceleration of changes, a clear order sometimes helps to maintain focus on goals, not to deviate from the course, and, ultimately, to be in demand in the labor market. \u0000The main drivers of the time management system are management methods and techniques. Techniques allow different ways to compose a plan for different periods and evaluate priority. The methods, in turn, solve the issue of the implementation of this plan. The implementation tool is no less important, and here information systems have offered themselves very well. The possibility of dynamic planning, scalability, a system of reminders, and a system of rewards - all reflects powerful solutions for the introduction of time management. \u0000This work offers an overview of the process of developing a convenient information system with time management methods. A study of time management methods was conducted. An information model was developed that combines Pomodoro techniques, ABC analysis based on the Eisenhower principle, and Getting Things Done. This model allows you to classify tasks according to the degree of importance, divide them into different groups and lists, assign time for long-term and short-term tasks, and analyze the degree of completion of each task and the work as a whole. \u0000Modeling of the information system was carried out using the unified modeling language UML and its diagrams of precedents, deployment, classes, packages, and components, which simplify the creation of the application logic and reflect the structure of the application. The design of the system was also carried out using the creation of a prototype in the online vector service Figma. The information system is implemented as a client-server web-oriented application based on the MERN technology stack. React is used to develop the web application interface, Node.js, and the Express.js framework for the application server, which implements the creation and request of APIs for communicating with the document-oriented database management system MongoDB using the mongoose module.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERFORMANCE STUDY OF THE TEXT ANALYSIS MODULE IN THE PROPOSED MODEL OF AUTOMATIC SPEAKER’S SPEECH ANNOTATION","authors":"Olesia Barkovska","doi":"10.31891/csit-2022-4-2","DOIUrl":"https://doi.org/10.31891/csit-2022-4-2","url":null,"abstract":"The global spread and use of remote and online learning systems at various educational levels puts forward a number of requirements for existing systems and needs for expansion of functionality. The current problem in Ukraine is the unstable operation of the energy infrastructure due to frequent hostile shelling, so it is problematic for residents of Ukraine to join online classes on time, to listen to lectures by lecturers and teachers completely, to take part in conferences and master classes in full. This determines the need to provide the opportunity of familiarization with educational materials at a convenient time in a form convenient for understanding and mastering. The lecture recording provides access to audio files that are intended for listening, but are not intended for printed reproduction. Therefore, the expansion of existing digital educational platforms with the possibility of forming an annotation (summary, abstract) of a lecture and presenting it in the form of text-and-graphic materials for further use by course students on paper media is an urgent task and can improve the quality assessment of a remote educational resource from the point of view of the content and methodological aspect. The aim of the study is to create a generalized hybrid model of automatic annotation of the speaker’s speech, which provides for the possibility of recognizing the speech, transforming the available data into text and, at the last stage, summarizing the given text, keeping only the important meaningful part of a lecture. The desired aim was achieved due to the creation of a generalized hybrid model of automatic annotation of input audio data, taking into account the effectiveness and features of existing methods of automatic text annotation obtained after converting speech into text. The uniqueness of this study is the use of marker words at the stage of text summarization, as well as the comparison of the efficiency of data processing at different stages of operation of this model when using different hardware. The results of computational experiments on graphics processing units with the Turing architecture showed that when the scope of input data increases by almost 30 times, the time also increases proportionally, but the use of a more powerful graphics processing unit NVIDIA Tesla T4 gives an speedup of more than 2.5 times compared to the graphics processing unit NVIDIA GeForce GTX GPU 1650 Mobile for both English and Ukrainian languages. For texts in the Ukrainian language, the text compression obtained (the ratio of the word count of the input text array to the word count in the resulting annotation) is 89.7%, for English – 94.15%. The proposed use of marker words showed an increase in the logical connection of input information internally, but obliges speakers to use predefined marker words to preserve the structure of the annotation formed.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FEATURES OF THE IMPLEMENTATION OF THE SPEAKER IDENTIFICATION SOFTWARE SYSTEM","authors":"Yana Bielozorova, Kateryna Yatsko","doi":"10.31891/csit-2022-4-5","DOIUrl":"https://doi.org/10.31891/csit-2022-4-5","url":null,"abstract":"The proposed architecture of the identification software system in the form of class and sequence diagrams. The main criteria for assessing the accuracy of speaker identification were studied and possible sources of loss of speaker identification accuracy were identified, which can be used when building a speaker identification system. A software system based on the proposed architecture and previously developed identification algorithms and methods was created. \u0000The following conclusions can be drawn on the basis of the performed research: approaches to the construction of existing announcer identification systems are considered; the main criteria for assessing the accuracy of announcer identification were investigated and the main sources of loss of accuracy during announcer identification were identified; the structural construction of the announcer identification system is considered, taking into account the identified sources of loss of accuracy during announcer identification; the proposed architecture of the speaker identification system in the UML language in the form of class and sequence diagrams; a software system was built that implements the functions of speech signal identification according to the methods and algorithm proposed in previous works. \u0000The software system uses a ranking method based on three different criteria. These include: calculation of the proximity of two-dimensional probability density function curves for the frequency of the main tone and the location in the spectrum of three frequency ranges that are extracted from the speech recorded in the speech signal; calculation of the proximity of the probability density function curves for each of these features separately; calculation of the degree of closeness of the absolute maxima of the formant spectra extracted from the speech recorded in the speech signal.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129989166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hovorushchenko, Sergii Aleksov, Snizhana Talapchuk, Oleksii Shpylyuk, Viktor Magdin
{"title":"OVERVIEW OF THE METHODS AND TOOLS FOR SITUATION IDENTIFICATION AND DECISION-MAKING SUPPORT IN THE CYBERPHYSICAL SYSTEM «SMART HOUSE»","authors":"T. Hovorushchenko, Sergii Aleksov, Snizhana Talapchuk, Oleksii Shpylyuk, Viktor Magdin","doi":"10.31891/csit-2022-4-3","DOIUrl":"https://doi.org/10.31891/csit-2022-4-3","url":null,"abstract":"The technology of a smart house is mostly understood as a system that combines a number of subsystems that provide comfortable living conditions for residents in the room and make it possible to significantly reduce energy costs. A house is called smart if it has a certain computer or control system for managing engineering equipment. \"Smart House\" should be designed so that all services can be integrated with each other with minimal costs (in terms of finances, time and effort), and their maintenance would be organized in an optimal way. \u0000The \"Smart House\" system should competently allocate resources, reduce operating costs and provide a clear control and management interface. Such an intelligent system should be able to recognize specific planned and emergency situations occurring in the home and respond to them (make decisions) in accordance with the given program. Therefore, today the urgent task is to recognize the situation and support decision-making in the \"Smart House\" cyber-physical system. \u0000The conducted overview of methods and tools for situation identification and decision-making support in the \"Smart House\" cyber-physical system showed that: in existing solutions, situation recognition occurs only for one of the groups of the system of managed housing functions or does not occur at all; existing solutions provide decision-making support for only one of the groups of the system of managed housing functions or do not provide it at all; the available solutions do not provide for the possibility of assessing the sufficiency of information for decision-making in the \"Smart House\" cyber-physical system. \u0000Therefore, there is a need to develop such methods and tools for situation identification and decision-making support in the \"Smart House\" cyber-physical system, which would: perform situation recognition for all 5 groups of the system of managed housing functions; provide the decision-making support for all 5 groups of the system of managed housing functions; perform an assessment of the sufficiency of information for making all decisions in the \"Smart House\" cyber-physical system, which will be the focus of the authors' further efforts.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}