Computer systems and information technologies最新文献

筛选
英文 中文
RESEARCH OF METHODS OF DISTRIBUTION OF SEATS IN PUBLIC TRANSPORT 公共交通系统座位分配方法研究
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-13
Y. Hnatchuk, A. Boiko, Alina Hnatchuk
{"title":"RESEARCH OF METHODS OF DISTRIBUTION OF SEATS IN PUBLIC TRANSPORT","authors":"Y. Hnatchuk, A. Boiko, Alina Hnatchuk","doi":"10.31891/csit-2022-2-13","DOIUrl":"https://doi.org/10.31891/csit-2022-2-13","url":null,"abstract":"In large cities, especially during a pandemic, the problem of allocating seats in transport and building the most successful route is an urgent task. The study of four methods of distribution of seats in public transport. Their advantages and disadvantages are investigated. According to the results of the research, it became clear that the existing methods alone do not allow to effectively solve the problem of distribution of seats in transport, so it is necessary to either improve existing methods or develop new methods. Improving existing methods is possible by either combining several methods into one or adding certain elements that eliminate existing shortcomings or minimize their impact on the effectiveness of the method. According to the results of the research, the method of electronic seat selection has been improved in terms of adding seat weight sensors, which makes it possible to record the number of occupied seats and helps to provide information to passengers using a mobile application for free seats. The method was also further developed with the help of a mobile application that allows you to pave a route and helps you choose a convenient place to travel to your destination.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"168 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HARDWARE AND SOFTWARE SYSTEM OF LIGHT VISUALIZATION OF SOUND SIGNALS 声信号光可视化的硬件和软件系统
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-4
Bohdana Hunko
{"title":"HARDWARE AND SOFTWARE SYSTEM OF LIGHT VISUALIZATION OF SOUND SIGNALS","authors":"Bohdana Hunko","doi":"10.31891/csit-2022-2-4","DOIUrl":"https://doi.org/10.31891/csit-2022-2-4","url":null,"abstract":"The paper proposes a hardware and software system for light visualization of sound signals. The paper goes through performance requirements, system design process and practical solutions for audio visualization. The paper differs from the present solutions because it not only shows the end results, but also goes through design process, decision-making and performance measurements. \u0000There are many methods that are practically used for audio visualization: amplitude visualization, spectral visualization, frequency visualization etc. One of the most interesting and common methods is spectral visualization of audio signals. This method is based on a mathematical model of obtaining the frequency spectrum of an audio signal using fast Fourier transform (FFT) and subsequent visualization of this spectrum. \u0000The proposed solution is designed with high performance and low latency in mind and shows practical applications of hardware and software-based optimization techniques. Also, the paper describes several visualizations technics and gives an overview on possible visualization improvements.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"38 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133720182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN APPROACH TO APPLICATIONS ARCHITECTURE MODELS ANALYSIS 一种应用程序体系结构模型分析方法
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-3
A. Kopp, D. Orlovskyi, Dorukhan Ersoyleyen
{"title":"AN APPROACH TO APPLICATIONS ARCHITECTURE MODELS ANALYSIS","authors":"A. Kopp, D. Orlovskyi, Dorukhan Ersoyleyen","doi":"10.31891/csit-2022-2-3","DOIUrl":"https://doi.org/10.31891/csit-2022-2-3","url":null,"abstract":"A relevant problem of applications architecture model analysis was considered in this paper. Its significance is defined by the fact that designed blueprints of software systems should be thoroughly checked for all potential inefficiencies in order to avoid additional effort and costs for defect correction in later project stages. As a result, the research goal was defined as detecting strong and weak points in software design solutions via applications architecture model analysis. The research objective was set at the process of analyzing applications architecture models, and the research subject was set at the software solution for analyzing applications architecture models. Existing software tools for applications architecture modeling and analysis were defined based on an examination of general software development problems for applications architecture model analysis. The ArchiMate enterprise architecture modeling language was chosen as the standard representation of applications architecture models to be analyzed because there are nearly no alternatives to ArchiMate language for architectural description of enterprise application models that are standardized, supported by most diagramming software, and exchangeable. The domain of applications architecture models analysis was discovered, an approach to analyzing applications architecture models was proposed, a software solution for analyzing applications architecture models was designed and developed, and it was used to evaluate applications architecture models that represent web development patterns. The analysis results could be used by system or software architects to estimate the suitability of applications architecture solutions for ongoing projects, detect flaws in specific architectural patterns, and reduce effort and costs in later project stages.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVALUATION OF QUALITY INDICATORS OF FUNCTIONING CYBER PROTECTION MANAGEMENT SYSTEMS OF INFORMATION SYSTEMS 信息系统网络保护管理系统运行质量指标评价
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-6
V. Khoroshko, Vadym Kudinov, M. Kapustian
{"title":"EVALUATION OF QUALITY INDICATORS OF FUNCTIONING CYBER PROTECTION MANAGEMENT SYSTEMS OF INFORMATION SYSTEMS","authors":"V. Khoroshko, Vadym Kudinov, M. Kapustian","doi":"10.31891/csit-2022-2-6","DOIUrl":"https://doi.org/10.31891/csit-2022-2-6","url":null,"abstract":"Evidence of the complexity of the cybersecurity problem is the rapid increase in the number of information security breaches and losses on cybersecurity threats combined with an increase in the average loss from each of the breaches. Therefore, it is necessary to create requirements for a cybersecurity system that could provide more opportunities in the choice of methods in the management of the protection of automated information systems. \u0000The task of determining the optimal quality indicators of information resource management systems of automated systems is one of the most important problems in designing integrated information security systems. This is due to the complexity of such systems, the presence of many variable parameters, and the complexity of calculating quality indicators. In addition, the determined quality indicators should not only ensure the optimality of the target function, but also the stability of the protection system in a wide range of external adverse effects. The problem is that the existing methods of calculating integrated quadratic estimates (IQE) do not take into account errors in determining quality indicators, as well as the vector nature of these indicators. \u0000The aim of this work is to solve problems (development of algorithms), which are a problem of optimization of stable protection management systems using vector objective functions. Based on the model of information management system protection of information resources in the form of an automatic control system, the method of forming integrated quadratic estimates (IQE) of control error is proposed. This method takes into account the weights of the estimates at the desired installation time and standard transfer functions. Algorithms for calculating IQE according to the modified Katz formula and Ostrom's method for arbitrary order control systems are developed, including vector representation of the objective function of the protection system. The vector penalty function is proposed and the algorithm of its calculation is developed to display the degree of infringement of conditions of stability of parameters of the system of protection by the Rauss-Hurwitz criterion.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RESEARCH OF METHODS OF ENERGY EFFICIENCY MANAGEMENT IN THE "SMART HOUSE" SYSTEM. “智能住宅”系统能效管理方法研究。
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-5
V. Yatskiv, Володимир Боднаровський
{"title":"RESEARCH OF METHODS OF ENERGY EFFICIENCY MANAGEMENT IN THE \"SMART HOUSE\" SYSTEM.","authors":"V. Yatskiv, Володимир Боднаровський","doi":"10.31891/csit-2022-2-5","DOIUrl":"https://doi.org/10.31891/csit-2022-2-5","url":null,"abstract":"The research of methods of energy efficiency management in the \"Smart Home\" system is carried out in the work. For researchers and practitioners, the problem of monitoring, estimating and reducing energy consumption by homes is an urgent task. According to the results of research, the method of determining user preferences has been improved, which has allowed to achieve more efficient use of energy. The method has also been further developed, which provides the ability to determine the number of people in the room and helps control oxygen levels.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 MORTALITY PREDICTION USING MACHINE LEARNING METHODS 利用机器学习方法预测COVID-19死亡率
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-12
A. Popovych, V. Yakovyna
{"title":"COVID-19 MORTALITY PREDICTION USING MACHINE LEARNING METHODS","authors":"A. Popovych, V. Yakovyna","doi":"10.31891/csit-2022-2-12","DOIUrl":"https://doi.org/10.31891/csit-2022-2-12","url":null,"abstract":"The paper reports the use of machine learning methods for COVID-19 mortality prediction. An open dataset with large number of features and records was used for research. The goal of the research is to create the efficient model for mortality prediction which is based on large number of factors and enables the authorities to take actions to avoid mass spread of virus to and reduce the number of cases and deaths. Feature selection was conducted in order to remove potentially irrelevant input variables and improve performance of machine learning models. The classic machine learning models (both linear and non-linear), ensemble methods such as bagging, stacking and boosting, as well as neural networks, is used. Comparison of efficiency of ensemble methods and neural networks compared to classic ML methods such as linear regression, support vector machines, K nearest neighbors etc. is conducted. Ensemble methods and neural networks show much greater efficiency than classical ones. Feature selection does not significantly affect the prediction accuracy. \u0000The scientific novelty of this paper is the large number of machine learning models trained on the large-scale dataset with significant number of features related to different factors that can potentially affect COVID-19 mortality, as well as further analysis of their efficiency. This will assist to select the most valuable features and to become a basis for creating a software designed for tracking the dynamics of the pandemic. \u0000The practical significance of this paper is that present study can be useful for authorities and international organizations in prevention of COVID-19 mortality increase by taking proper preventive measures.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126828148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ДОСЛІДЖЕННЯ МЕТОДІВ ТА ЗАСОБІВ ЗАБЕЗПЕЧЕННЯ НАДІЙНОСТІ СПЕЦІАЛІЗОВАНОЇ КОМПЮТЕРНОЇ СИСТЕМИ ГОЛОСОВОГО КЕРУВАННЯ АВТОМОБІЛЕМ
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-11
Єлизавета Гнатчук, Віталій Башук, Денис Квасніцький
{"title":"ДОСЛІДЖЕННЯ МЕТОДІВ ТА ЗАСОБІВ ЗАБЕЗПЕЧЕННЯ НАДІЙНОСТІ СПЕЦІАЛІЗОВАНОЇ КОМПЮТЕРНОЇ СИСТЕМИ ГОЛОСОВОГО КЕРУВАННЯ АВТОМОБІЛЕМ","authors":"Єлизавета Гнатчук, Віталій Башук, Денис Квасніцький","doi":"10.31891/csit-2022-2-11","DOIUrl":"https://doi.org/10.31891/csit-2022-2-11","url":null,"abstract":"В роботі досліджено методи та засоби захисту забезпечення надійності в сучасних спеціалізованих комп’ютерних системах голосового керування автомобілем. Проведена оцінка характеристик та властивостей системи. Розглянуто основні принципи роботи та різні можливості конструкцій голосового керування автомобілем. Показано моделі і методи виявлення небезпек, і визначено недоліки та вразливості автомобільних систем «Android Auto» та «Apple CarPlay» щодо впливу зловмисного програмного забезпечення на основі сучасних способів кібератак. Показано підготовку для здійснення кібератаки ультразвуковими та світловими командами на системи голосового керування автомобілем. Запропоновано методи та засоби для підвищення ступеня захисту системи голосової аутинтефікації спеціалізованих комп’ютерних систем «Android Auto» та «Apple CarPlay». Окремо представлено кожний метод його кроками. \u0000Для реалізації вирішення даної проблеми було створено та розроблено апаратно-програмний продукт додаткової біометричної автомобільної системи аутентифікації користувача. Система була створена для забезпечення надійності від кібератак на систему голосового керування.\u0000 Проведені експериментальні дослідження підтверджують ефективність системи біометричної аутентифікації як запропонованого рішення щодо забезпечення додаткового методу захисту.\u0000Ключові слова: системи голосового керування, метод, захист, ультразвукові атаки\u0000The methods and means of protection of reliability in modern specialized computer systems of voice control of the car are investigated in the work. The evaluation of the characteristics and properties of the system is carried out. The basic principles of work and various possibilities of constructions of voice control of the car are considered. Models and methods of hazard detection are shown, and the shortcomings and vulnerabilities of Android Auto and Apple CarPlay car systems to the impact of malicious software based on modern methods of cyber attacks are identified. Preparation for cyber-attack by ultrasonic and light commands on car voice control systems is shown. Methods and means to increase the level of protection of the voice authentication system of specialized computer systems \"Android Auto\" and \"Apple CarPlay\" are proposed. Each method is presented separately by its steps.\u0000To implement the solution to this problem, a hardware and software product of an additional biometric automotive user authentication system was created and developed. The system was created to ensure the reliability of cyber attacks on the voice control system.\u0000Experimental studies confirm the effectiveness of the biometric authentication system as a proposed solution to provide an additional method of protection.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116827725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
НЕЧІТКІ ТЕХНОЛОГІЇ В УПРАВЛІННІ СОЦІАЛЬНО-ЕКОНОМІЧНИМИ ПРОЦЕСАМИ
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-10
Василь Приймак, Світлана Прийма, О.Р. Голубник
{"title":"НЕЧІТКІ ТЕХНОЛОГІЇ В УПРАВЛІННІ СОЦІАЛЬНО-ЕКОНОМІЧНИМИ ПРОЦЕСАМИ","authors":"Василь Приймак, Світлана Прийма, О.Р. Голубник","doi":"10.31891/csit-2022-2-10","DOIUrl":"https://doi.org/10.31891/csit-2022-2-10","url":null,"abstract":"Метою статті було виконання аналізу перебігу соціально-економічних процесів в Україні протягом останніх восьми років для вироблення рекомендацій щодо удосконалення політики управління ними. Складність поставленого завдання полягала у тому, що розвиток досліджуваних процесів характеризується не одним, а декількома первинними чинниками, одночасний аналіз яких не є тривіальним завданням.  Серед цих чинників є не тільки кількісні, а й якісні показники, що робить нашу задачу слабоструктурованою. \u0000У роботі при виконанні аналізу було використано статистичні й експертні дані, які характеризують соціально-економічні процеси. Це дало змогу при проведенні розрахунків урахувати російську військову агресію проти України і ситуацію з COVID-19. Використання якісної інформації при проведенні аналізу унеможливлює застосування методів багатовимірної статистики. Для виконання цього завдання пропонується використовувати теорію нечіткої логіки і нечітких множин. Для опису лінгвістичних термів нечітких множин запропоновано скористатися трапецієподібними функціями належності, параметри яких  визначені експертами. Побудована модель апроксимації нелінійного об'єкта з лінгвістичними висловлюваннями дозволяє швидше та легше знайти потрібний результат порівняно з класичною процедурою подібних обчислень. \u0000Використовуючи розглянутий підхід у статті проаналізовано тенденції розвитку соціально-економічних процесів в Україні протягом 2013-2020 років. Результатом виконаних розрахунків є значення узагальненого показника, величина якого характеризує рівень розвитку соціально-економічних процесів у відповідному році. Отримані розрахунки показали, що величина цього показника була найбільшою у 2013 році. В наступних двох роках ця величина зменшувалась, а далі почала повільно зростати. Збільшення відбувалось аж до 2019 року, а в 2020 р. величина показника знову зменшилася. Проте в жодному з 2014-2020 років показник не досяг величини, яка була у 2013 році. На нашу думку, головною причиною зменшення величини рівня розвитку соціально-економічних процесів у 2014 і 2015 роках була анексія Росією Автономної республіки Крим і війна на сході України, а в 2020 р. – наслідки пандемії COVID-19","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF SOLVING THE PROBLEM OF SITUATIONAL MANAGEMENT OF THE SEMANTIC KERNEL OF WEB CONTENT 解决web内容语义内核情境管理问题的方法
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-1
Sergii Orekhov, Henadii Malyhon
{"title":"METHOD OF SOLVING THE PROBLEM OF SITUATIONAL MANAGEMENT OF THE SEMANTIC KERNEL OF WEB CONTENT","authors":"Sergii Orekhov, Henadii Malyhon","doi":"10.31891/csit-2022-2-1","DOIUrl":"https://doi.org/10.31891/csit-2022-2-1","url":null,"abstract":"Research conducted over the past ten years in the field of search engine optimization on the Internet shows the creation of a new phenomenon - virtual promotion [1]. Its main goal is to increase the level of sales of goods through technologies that exist in virtual space. In terms of properties, virtual promotion is similar to a logistics channel, but with the characteristics of a marketing channel. That is, virtual promotion can be described as the establishment of a channel for the transmission of a special message from the company to a potential buyer of its goods or services. This article proposes to consider the problem of creating and managing such a message in cyberspace. To do this, it is proposed to solve the problem of situational management of the semantic kernel of web content. At the first stage the review of properties of a semantic kernel is carried out. This analysis allows us to formulate the problem of situational management of the semantic kernel. The main idea of ​​this problem is that the current situation is a variant of the semantic kernel of web content. Then the paper proposes a mathematical model for estimating the current situation and choosing the target situation. Conditions are also proposed to determine the need for transition between situations. The article also describes the algorithmic support for the implementation of the method of solving the problem of situational management. The result of the algorithm is K-applicant, ie the semantic kernel that describes the class of needs, which was identified at the stage of clustering. The prospect for further research is the software implementation of this algorithm on the NodeJS platform.","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LASER AND INFORMATION TECHNOLOGIES FOR CONTROLLING DYNAMIC DISPLACEMENTS SPATIAL STRUCTURES OF OBJECTS UNDER THE INFLUENCE OF ACTIVE MAN-MADE AND NATURAL RISK FACTORS FOR ACCIDENTS 在人为和自然危险因素影响下控制物体动态位移和空间结构的激光和信息技术
Computer systems and information technologies Pub Date : 2022-06-30 DOI: 10.31891/csit-2022-2-7
Lubomyr Sikora, N. Lysa, O. Fedevych, R. Tkachuk
{"title":"LASER AND INFORMATION TECHNOLOGIES FOR CONTROLLING DYNAMIC DISPLACEMENTS SPATIAL STRUCTURES OF OBJECTS UNDER THE INFLUENCE OF ACTIVE MAN-MADE AND NATURAL RISK FACTORS FOR ACCIDENTS","authors":"Lubomyr Sikora, N. Lysa, O. Fedevych, R. Tkachuk","doi":"10.31891/csit-2022-2-7","DOIUrl":"https://doi.org/10.31891/csit-2022-2-7","url":null,"abstract":"At the present stage of science development, for technological and technogenic energy-intensive systems, systematic methods of identification of structure, dynamics, and risk assessment are developed, while for spatial objects this problem is not fully solved. This applies to the construction and operation of such objects with a spatially distributed structure such as bridges, large pavilions, high-rise buildings, aggregate lines on a common foundation for color printing, which are subject to a large dynamic, non-uniform load-capacity, operating over a long period of operation. Their destruction with the combined action of dynamic and static heterogeneous flow factors in time of high power, leads to the accidents and human losses. The main factor that leads to cognitive errors in the design of spatial structures is that experts in the design process do not fully take into account the concepts of physical force, power and physical energy factors with stream random structure. In this aspect, the problem of dynamic structural stability under the influence of factors with a stochastic structure drew attention to Y. P. Dragan, introducing the notion of \"stochastic process of finite energy\" and \"finite power of flows (sequences) of active physical force actions\". Under certain conditions, the complex action of force factors leads to the emergence of solitons, that is, the formation of the peak of energy and power at a certain time in the weakest node of the structure that destroys it. If the designer, by virtue of his cognitive abilities and level of knowledge, does not take into account the energetic nature of the factors as destructive forces, then this leads to the destruction of infrastructure objects (cities in Genoa, Italy 2015, built in 1967) devastating floods, fires, transport disasters, tsunami. As for the steel construction bridges in the USA (New York), built on the basis of the methods of vibration calculations by S. Tymoshenko, they are operated for more than 100 years, with appropriate technical service. \u0000The assessment of the vibrational stability of spatial structures, both existing and new projects, remains a complex control problem that is not resolved to the fullest, and therefore the development of integrated intellectual methods for designing and controlling their state is relevant \u0000The intensive development of infrastructure, both social and technogenic, results from the impact of transport flows, power plants, harmful emissions, to the growth of force environmental load on spatial structures, corrosion of metal components, and the growth of vibrational effects on elements of objects. Further development of such negative processes leads to a decrease in the strength of structures, their stability, operational reliability and destruction. Reducing the quality of bearing structures, due to neglected negative influences, makes it impossible to forecast the moment of emergency situations. Accordingly, the development of methods for r","PeriodicalId":353631,"journal":{"name":"Computer systems and information technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信