M. Kryshtanovych, Sierhiei Sakhanienko, O. Sylkin, S. Lypovska, Olha Purtskhvanidze
{"title":"Information Support of Public Administration in the Conditions of COVID-19","authors":"M. Kryshtanovych, Sierhiei Sakhanienko, O. Sylkin, S. Lypovska, Olha Purtskhvanidze","doi":"10.1109/ACIT54803.2022.9913197","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913197","url":null,"abstract":"The main purpose of the study is to form a model of information support for the public administration system in the context of COVID-19. The public administration system is a complex element involving a huge number of departments and processes. It is difficult today to imagine a public administration system without the proper level of information support. Thanks to information, we can achieve certain results. Such a large system as public administration is complex and therefore an appropriate level of information support is very important for it. The information is different, but in general, as a result of the study, it was found that the information support of the public administration system in the context of COVID-19 is a process that has a certain amount of necessary information at the input, which ultimately allows you to achieve the desired goal. As a result of the study, we have proposed key ways of information support for the public administration system in the context of COVID-19. In addition, the main model of information support for the public administration system in the context of COVID-19 has been formed.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134436448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Model Analysis of Atypical Gas Filtration in a Porous Medium","authors":"N. Lopuh, Y. Pyanylo","doi":"10.1109/ACIT54803.2022.9913079","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913079","url":null,"abstract":"A new numerical model of gas filtration in a porous medium is proposed and investigated. Gas filtration is modeled with a nonlinear differential equation in partial derivatives. Methods of solving of the equation are discussed. Computer experiment basing on real-experiment-extracted input physical and geometrical parameters is performed and its results are analyzed. The received results agree well with the corresponding experimental data.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134579668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Nykolaychuk, V. Hryha, N. Vozna, A. Voronych, A. Segin, Petro Humennyi
{"title":"High-performance Coprocessors for Arithmetic and Logic Operations of Multi-Bit Cores for Vector and Scalar Supercomputers","authors":"Y. Nykolaychuk, V. Hryha, N. Vozna, A. Voronych, A. Segin, Petro Humennyi","doi":"10.1109/ACIT54803.2022.9913198","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913198","url":null,"abstract":"The relevance of solving the priority improvement problem for functional and computational components of microelectronics for arithmetic and logic unit (ALU) of modern supercomputers is emphasized. It is shown that in the structures of ALU operations such as: comparison, multiplexing and adding affect the marginal productivity of ALU. It is substantiated that mathematical operations of addition, accumulation of sums, multiplication and division are crucial for ensuring extremely high speed of vector and scalar computers. New algorithms for coding RGB pixels of color images in the theoretical and numerical bases of Rademacher-Crestenson and Haar-Crestenson are proposed. Microelectronic structures of multi-bit ALU coprocessors have been developed, which are characterized by extremely minimal parameters of speed, hardware and structural complexity.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"701 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116119056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Dyvak, A. Melnyk, L. Dostálek, V. Ostroverkhov, L. Honchar, Ihor Romanets
{"title":"Repository of Interval Models of Dynamics of Concentrations of Harmful Emissions of Motor Transport","authors":"M. Dyvak, A. Melnyk, L. Dostálek, V. Ostroverkhov, L. Honchar, Ihor Romanets","doi":"10.1109/ACIT54803.2022.9913123","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913123","url":null,"abstract":"To build mathematical models based on the obtained interval data, it is necessary to solve the problems of structural and parametric identification. The result of the identification is the interval difference equations of the dynamics of concentrations of harmful emissions of vehicles. Procedures for structural and parametric identification of such models are quite complex. Therefore, in practice, based on the experience gained in modeling these processes, it is advisable to create a repository of interval models that would describe these processes, or easily customized to specific application conditions. This task is considered in the article. The basis for repository management is the ontological model. The features of building an appropriate ontological model, analysis the shortcomings of existing tasks, which are solving with its help also presented in this paper.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unilaterally Supported Beam by an Elastic Obstacle","authors":"Michaela Zahradníková, J. Eisner","doi":"10.1109/ACIT54803.2022.9913153","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913153","url":null,"abstract":"We study a simple model of a spring or beam in ID given by a second order ODE and homogeneous Dirichlet boundary conditions. We assume that the spring/beam is unilaterally supported from below on a part of the domain by a soft/elastic obstacle. We focus on the dependence of the critical forces (which stress the beam and cause its buckling) on the strength/elasticity parameter of the obstacle. We present both analytical and numerical results.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123533001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Rak, O. Potapchuk, Yurii Turanov, Yuriy Franko, I. Lutsyk, Andrii Uruskyi
{"title":"Analysis of the Target Use and Tools of Information Communication Technologies by Students of Pedagogical Specialties","authors":"V. Rak, O. Potapchuk, Yurii Turanov, Yuriy Franko, I. Lutsyk, Andrii Uruskyi","doi":"10.1109/ACIT54803.2022.9913187","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913187","url":null,"abstract":"The article presents the results of research on the target use tools of information communication technologies by students of universities of teacher education in the learning process and everyday life. Changes in the goals of using modern digital tools are analyzed, namely, a clear trend towards the transition to mobile devices, which requires adaptation of the appropriate software and didactic support. A constant expansion of the goals of using information and communication tools has been established, which actualizes the issues of forming the information culture of students. The increase in the duration and complexity of work with Internet resources is determined. This confirms the importance of a high-quality selection of Internet sources for learning and the growth of the role of media literacy. A scheme for the use of information and communication technologies by students is proposed, in which the role of Internet resources as the main carriers of digital information is highlighted. The factors contributing to the reduction of “digital overwork” of students and optimization of the use of ICT tools in the educational process are identified.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hign Availability System for Monitoring Material Degradation Processes at the Concrete-polymer Interface","authors":"R. Mysiuk, V. Yuzevych, B. Koman, M. Yasinskyi","doi":"10.1109/ACIT54803.2022.9913086","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913086","url":null,"abstract":"This paper considers the possibility of dividing traffic between several systems for calculating material degradation processes at the concrete-polymer interface. Depreciation of concrete and other elements is crucial to check due to exposure to external influences and loads increases every year. Usually, the development of new solutions takes time to implement. In addition, there are often cases when the client at the stage of proofing a concept needs to have an old version of the software for a possible return to the original solution. This method helps to maintain high availability in case of problems in case of malfunctions in one of the systems. One of the possible options for changing the redirection of traffic from one subsystem to another can be considered a random change in the percentage between subsystems. As a result of research to test the possibilities of traffic redirection is the development of a system for monitoring defects in concrete structural elements when one of the applications is down. Therefore, among the existing solutions for redirection is the ability to use the web service, or other load balancers, but the development of a separate API will help bind code at lower levels and without unnecessary features to simplify the system as a whole. Therefore, data for the processing of data on defects make it possible to timely detect and prevent damage of various kinds in structural elements for their rapid neutralization.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134571312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of the Theory of Fuzzy Sets in Determining the Level of Enterprise Security","authors":"Viacheslav Dzhedzhula, Iryna Yepifanova, Yurii Kravchyk","doi":"10.1109/ACIT54803.2022.9913150","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913150","url":null,"abstract":"The concept of “enterprise security” and the factors that determine it are considered in the paper. A mathematical model based on the theory of fuzzy logic and linguistic variable to determine the level of enterprise security is proposed. Each of the proposed influencing factors is characterized, a universal set of variations and linguistic terms for evaluation are developed. It is proposed to divide the factors into five groups: legal, financial and economic, informational, technical, energy. A tree of logical inference of the hierarchical connection of factors is offered. A mathematical model is implemented in a specialized free package FisPro. Based on the simulation results, the level of security of the real enterprise is determined and the main recommendations for its improvement are given. The use of the proposed mathematical model will allow a comprehensive assessment of the level of security in any enterprise.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Concept of Automated Phonetic Analysis of a Speech with Asymptotic Adaptation to the Specifics of Phonation of Language Units","authors":"Oleh V. Bisikalo, O. Kovtun, V. Kovtun","doi":"10.1109/ACIT54803.2022.9913100","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9913100","url":null,"abstract":"A new concept of automated phonetic analysis of a speech with asymptotic adaptation to the specifics of phonation of language units is proposed. Unlike analogues, the concept is formalized in the paradigm of information theory with the criterion of analysis of the speech signal based on its relative entropy. The obtained mathematical apparatus allows for analysing the studied process both in statics and dynamics. The quality of the analysis is characterized by errors in the first (incorrect recognition of the language unit) and the second (variability of phonation of the language unit within the corresponding cluster) kind. The derived result is an analytically substantiated possibility of estimating the phonetic saturation of speech. The formulated concept can also be used to assess the degree of information saturation of the cluster of the language unit. Such an assessment is important for the task of creating universal background models, which are an essential element of current recognition systems for both language and speaker.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133584410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Podolchak, V. Martyniuk, N. Tsygylyk, Y. Dziurakh
{"title":"Improving the Assessment of Personnel Security Level and its Control Using Human Intellectual Activity Simulation Model","authors":"N. Podolchak, V. Martyniuk, N. Tsygylyk, Y. Dziurakh","doi":"10.1109/ACIT54803.2022.9912745","DOIUrl":"https://doi.org/10.1109/ACIT54803.2022.9912745","url":null,"abstract":"Assessment of personnel security level and its control using artificial neural networks and artificial intelligence has been improved. The main personnel security level assessment criteria under the influence of strong negative factors - martial law and Covid -19 pandemic have been determined. The main risks of faulty estimation of personnel security level during (due to) strong influence of negative factors have been established. Implementation algorithm of personnel security control in an organization using human intellectual activity simulation model has been proposed.","PeriodicalId":431250,"journal":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}