Radio Electronics Computer Science Control最新文献

筛选
英文 中文
DETERMINATION AND COMPARISON METHODS OF BODY POSITIONS ON STREAM VIDEO 流视频中身体位置的确定与比较方法
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-6
N. Bilous, I. Ahekian, V. V. Kaluhin
{"title":"DETERMINATION AND COMPARISON METHODS OF BODY POSITIONS ON STREAM VIDEO","authors":"N. Bilous, I. Ahekian, V. V. Kaluhin","doi":"10.15588/1607-3274-2023-2-6","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-6","url":null,"abstract":"Context. One of the tasks of computer vision is the task of determining the human body in the image. There are many methods to solve this problem, some are based on specific equipment (motion capture, kinect) and provide the highest accuracy, some give less accuracy but do not require additional equipment and use less computing power. But usually, such equipment has a high cost, so to ensure the low cost of developments designed to determine the body in the image, you should develop algorithms based on computer vision technology. These algorithms can then be applied to various fields to analyze and compare body positions for a variety of purposes. \u0000Objective. The aim of the work is to study the effectiveness of existing libraries to determine the human body position in the image, as well as methods for comparing the obtained poses in terms of speed and accuracy of determination. \u0000Methods. A set of libraries and pose comparison algorithms were analyzed for the purpose of developing a system for determining the correctness of exercise by the user in real time. OpenPose, PoseNet and BlazePose libraries were analyzed for their suitability in recognizing and tracking body parts and movements in real-time video streams. The advantages and disadvantages of each library were evaluated based on their performance, accuracy, and computational efficiency. Additionally, different pose comparison algorithms were analyzed. The effectiveness of each algorithm was evaluated based on their ability to accurately determine and compare body positions. \u0000As a result, the combination of BlazePose and weighted distance method can achieve the best performance in pose recognition, with high accuracy and robustness across a range of challenging scenarios. The weighted distance method can be further enhanced with techniques such as L2 normalization and pose alignment to improve its accuracy and generalization. Overall, the combination of the BlazePose library and weighted distance methods offers a powerful and effective solution for pose recognition, with high F1 index. \u0000Results. Existing models for determining poses have shown similar results in the quality of determination with a run-up of about 2%. When developing a cross-platform software product, the BlazePose library, which has an API for working directly in the browser and on mobile platforms, has a significant advantage in speed and accuracy. Also, as the library uses extended 33 keypoint topology it becomes applicable to a wider list of tasks. In the study of comparison methods, the greatest influence on the results was exerted by the quality of pose determination. \u0000Conclusions. Among the methods of comparison, the method of weighted distances showed the best results. The speed of position determination is inversely proportional to the quality of determination and significantly exceeds the recommended value – 40ms.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"48 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78631663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHODS FOR DETERMINING SIMILARITY OF CATEGORICAL ORDERED DATA 确定分类有序数据相似性的方法
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-4
N. Kondruk
{"title":"METHODS FOR DETERMINING SIMILARITY OF CATEGORICAL ORDERED DATA","authors":"N. Kondruk","doi":"10.15588/1607-3274-2023-2-4","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-4","url":null,"abstract":"Context. The development of effective distance metrics and similarity measures for categorical features is an important task in data analysis, machine learning, and decision theory since a significant portion of object properties is described by non-numerical values. Typically, the dependence between categorical features may be more complex than simply comparing them for equality or inequality. Such attributes can be relatively similar, and to construct an effective model, it is necessary to consider this similarity when calculating distance or similarity measures. \u0000Objective. The aim of the study is to improve the efficiency of solving practical data analysis problems by developing mathematical tools for determining the similarity of objects based on categorical ordered features. \u0000Method. A distance based on weighted Manhattan distance and a similarity measure for determining the similarity of objects based on categorical ordinal features (i.e. a linear order with scales of preference considering the problem domain can be specified on the attribute value set) are proposed. It is proven that the distance formula satisfies the axioms of non-negativity, symmetry, triangle inequality, and upper bound, and therefore is a distance metric in the space of ranked categorical features. It is also proven that the similarity measure presented in the study satisfies the axioms of boundedness, symmetry, maximum and minimum similarity, and is described by a decreasing function. \u0000Results. The developed approach has been implemented in an applied problem of determining the degree of similarity between objects described by ordered categorical features. \u0000Conclusions. In this study, mathematical tools were developed to determine similarity between structured data described by categorical attributes that can be ordered based on a specific priority in the form of a ranking system with preferences. Their properties were analyzed. Experimental studies have shown the convenience and “intuitive understanding” of the logic of data processing in solving practical problems. The proposed approach can provide the opportunity to conduct new meaningful research in data analysis. Prospects for further research lie in the experimental use of the proposed tools in practical tasks and in studying their effectiveness.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"76 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77299955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VECTOR-LOGICAL FAULT SIMULATION 向量逻辑故障仿真
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-5
V. Hahanov, S. Chumachenko, Y. Litvinova, I. Hahanova, A. Khakhanova, A. Shkil, D. Rakhlis, І. Hahanov, O. Shevchenko
{"title":"VECTOR-LOGICAL FAULT SIMULATION","authors":"V. Hahanov, S. Chumachenko, Y. Litvinova, I. Hahanova, A. Khakhanova, A. Shkil, D. Rakhlis, І. Hahanov, O. Shevchenko","doi":"10.15588/1607-3274-2023-2-5","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-5","url":null,"abstract":"Context. The main idea is the creation of vector-logical in-memory computing (VLC), which uses only read-write transactions on the address memory for faults-as-addresses simulation. There is no traditional logic. VLC is free from processor commands and ALU for computing organization and is therefore focused on implementation in SoC and FPGA. A vector-logical method of deductive matrix synthesis for the transportation of input faults, which has a quadratic computational complexity, is proposed. An inmemory simulator-automata for vector-deductive faults-as-addresses simulation, which based on read-write transactions for implementation in SoC is proposed.\u0000Objective. Development of a vector deductive method of fault simulation based on primitive read-write transactions for the analysis of logic circuits.\u0000Method. An input test set and a logical functionality vector are used. The proposed method is a development of the deductive vectors’ synthesis algorithm based on the truth table. The deductive matrix is intended for the synthesis and verification of tests using parallel simulation of faults-as-addresses combinations, based on read-write transactions over bits of deductive vectors in memory.\u0000Results. A vector method of the deductive matrices synthesis for the transportation of input faults vectors to the output of the element, was proposed. Data structures have been developed for parallel faults simulation of digital circuits based on a primitive readwrite transaction in matrix memory, where combinations of faults serve as address-columns. A sequencer of five blocks, that constitute a vector-logic computing, connected with deductive faults simulation based on read-write transactions, is proposed. Verification of models and methods on test examples has been performed.\u0000Conclusions. The scientific novelty consists in the development of the following innovative solutions: 1) a vector-logic method of synthesis of the deductive vectors matrix for parallel simulation of combinations of input faults-as-addresses, is proposed for the first time; 2) an automata for vector-deductive faults-as-addresses simulation, on the basis of read-write transactions, which is oriented for implementation in FPGA LUT, embedded online simulator SoC, as a core for faults simulation of RTL-level digital systems, was proposed for the first time; 3) the demonstration of the technological advantages of the vector-logic synthesis of deductive matrices is performed on numerous examples of traditional and RTL-logic, which accentuate the manufacturability of vectors in comparison with analytical deductive formulas during simulators construction; 4) a matrix of deductive vectors, as a set of vectorcolumns of Boolean derivatives is used to construct minimal tests for logical elements; 5) the recursive formula for the synthesis of the permutation of coordinates matrix in the logical activity vector makes it possible to significantly simplify the obtaining of the deductive matrix for fault","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"70 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80941271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTELLIGENCE ANALYSIS OF EMPIRICAL DATA BASED ON TIME SERIES 基于时间序列的经验数据智能分析
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-7
O. Ivanets, R. Khrashchevskyi, M. Kulik, M. Burichenko
{"title":"INTELLIGENCE ANALYSIS OF EMPIRICAL DATA BASED ON TIME SERIES","authors":"O. Ivanets, R. Khrashchevskyi, M. Kulik, M. Burichenko","doi":"10.15588/1607-3274-2023-2-7","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-7","url":null,"abstract":"Context. The problem of intelligent data analysis for assessing the stability of operators’ functioning as a component of safety management is considered.The object of the study was to verify estimates of the complexity and chaotic nature of physiological processes based on nonlinear dynamics methods. \u0000Objective. The goal of work is intelligent data analysis for assessing the stability of the functioning of a dynamic system based on the methods of non-linear dynamics. \u0000Method. Data intelligence to obtain additional useful information to avoid wrong decisions when deciding on the current state of the operator to be able to perform professional duties. Quantitative assessment of the complexity of physiological dynamics to determine the stability of feedback control processes of body subsystems and their constant adaptation to changes in environmental conditions. The presence of significant nonlinearities in the biomedical signals of the body is associated with the appearance of a chaotic component that describes the chaotic nature of the body’s processes. Due to the fact that biomedical signals have both a periodic and a chaotic component, the study of the latter makes it possible to determine the informational component of the nature of the internal organization of the organism and provide information about the possible destabilization of the functional state of the operator. The use of nonlinear dynamics methods to study changes in the operator’s body and provide additional independent prognostic information complementing traditional data analysis in the time and frequency domains. Several indices obtained by the methods of nonlinear dynamics are proposed, which contribute to the expansion of the diagnostic solution based on the available data. \u0000Results. The results of the study can be used during the construction of mathematical methods of non-linear dynamics to describe empirical data of this kind. \u0000Conclusions. Experimental studies have suggested recommending the use of non-linear methods dynamics as an an additional independent component that allows analyzing the chaotic component of biomedical signals to avoid wrong decisions during professional selection and assessment of the current state of aviation industry operators as one of the causes of adverse events in aviation. Prospects for further research may include the creation of a methodology based on nonlinear dynamics methods that will allow to increase the reliability of predicting a malfunction of the cardiovascular system as an indicator of a change in the balance of the functional state of the operator based on additional informative parameters, which can be used to assess triggers that may cause an adverse event in aviation, as well as an experimental study of the proposed mathematical approaches for a wide range of diagnostic problems.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"41 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88401590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHASE FREQUENCY INTERPRETATION OF THE COINCIDENCE METHOD FOR FREQUENCY TO CODE CONVERSION 相位频率解释的符合性方法,用于频码转换
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-28 DOI: 10.15588/1607-3274-2023-2-1
V. Petrushak
{"title":"PHASE FREQUENCY INTERPRETATION OF THE COINCIDENCE METHOD FOR FREQUENCY TO CODE CONVERSION","authors":"V. Petrushak","doi":"10.15588/1607-3274-2023-2-1","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-1","url":null,"abstract":"Context. The problem of fast conversion of radio signal frequency for monitoring the radial velocity of a moving object. The object of the study was the process of converting frequency into a code based on the coincidence method. \u0000Objective. The goal of the work is to improve the coincidence method for creating a new signal-to-code frequency converter without fixing the conversion time interval. \u0000Method. The coincidence method for converting the signal frequency into a code has been improved. The improved frequency conversion method, unlike the existing ones, consists in counting the number of complete phase cycles of the known and unknown signals during the time of double coincidence and asynchronous mode of hardware determination of the particle. The improved method has advantages in comparison with the method of an electro-counter frequency meter when determining the radial speed of objects and does not have a methodical error, which in an electro-counter frequency meter increases as the unknown frequency approaches the reference to 100%. However, the improved coincidence method compared to other versions has a hardware scheme for tracking the moments of coincidence and determining the fraction and does not require expensive and high-speed microprocessors to calculate the conversion results. \u0000Results. Based on the phase-frequency interpretation and the derived conversion equation and the proposed frequency-to-code conversion scheme using the coincidence method, a functional scheme of the frequency converter was developed. This made it possible to implement a 16-bit frequency converter in code on Intel’s MAX V series CPLD. \u0000Conclusions. The coincidence method for converting the signal frequency into a code received further development, which, unlike the existing ones, consists in counting the number of complete phase cycles of the known and unknown signals during the time of double coincidence and the asynchronous mode of hardware determination of the fraction. \u0000The influence of the frequency of signals on the time of a single measurement was studied using the coincidence method, as a result of which it was found that with an increase in the difference between the reference and unknown frequency, the time of a single measurement decreases. \u0000The obtained research results can be used for the development of high-speed means of converting the signal frequency into a binary code: in industrial tomography, radar and radio navigation for monitoring moving objects.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"38 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89786608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DETECTION OF THE SIGNALS OF THE TERRESTRIAL RADAR STATIONS BY SPACECRAFT WITH A PASSIVE SYNTHESIS OF THE ANTENNA APERTURE 利用无源天线孔径合成技术对航天器地面雷达站信号进行探测
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-28 DOI: 10.15588/1607-3274-2023-2-2
Tetiana A. Vakaliuk, O. Andreiev, O. Dubyna, T. Nikitchuk, I. Puleko
{"title":"DETECTION OF THE SIGNALS OF THE TERRESTRIAL RADAR STATIONS BY SPACECRAFT WITH A PASSIVE SYNTHESIS OF THE ANTENNA APERTURE","authors":"Tetiana A. Vakaliuk, O. Andreiev, O. Dubyna, T. Nikitchuk, I. Puleko","doi":"10.15588/1607-3274-2023-2-2","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-2","url":null,"abstract":"Context is due to the need to analyze the electromagnetic accessibility of terrestrial radio radiation sources at long distances, which is typical for the operation of a spacecraft of radio technical intelligence with a passive synthesis of the antenna aperture. \u0000Objective is to calculate the probability indicators of detecting the fact of signal emission of ground-based radar stations using radio-technical intelligence installed on a space carrier. \u0000Method. Analytical calculation of the correct detection probability of the signal of the radio radiation sources by the spacecraft of radio technical intelligence based on the determination of the signal-to-noise ratio at the input of the detection device. The analysis of the technical characteristics of the group of ground radars made it possible to calculate the probability of correct detection only for the virtual radar, which generates the minimum number of pulses with the minimum energy during reconnaissance among all the analyzed radars. \u0000Results. The fulfillment of the conditions of electromagnetic accessibility is checked and the correct detection probability of the signals of modern radar stations by the space radio-technical intelligence system with a passive synthesis of the antenna aperture was calculated. \u0000Conclusion. Proposed use of the correct detection probability of the signal as the resulting indicator of electromagnetic accessibility of the radio radiation source. In the example radar stations of the air defense proved, that the proposed parameters of the space radio technical intelligence system with a passive synthesis of the antenna aperture provide the values of the correct detection probability of the signal, which are quite acceptable for modern monitoring systems.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"245 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75101215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE CONCEPT OF INFORMATION-ENTROPY SPACE FOR SYSTEM OBJECTS MODELS BUILDING USED IN SUSTAINABLE DEVELOPMENT TASKS 可持续发展任务中系统对象模型构建的信息熵空间概念
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-06-28 DOI: 10.15588/1607-3274-2023-2-3
T. Kozulia
{"title":"THE CONCEPT OF INFORMATION-ENTROPY SPACE FOR SYSTEM OBJECTS MODELS BUILDING USED IN SUSTAINABLE DEVELOPMENT TASKS","authors":"T. Kozulia","doi":"10.15588/1607-3274-2023-2-3","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-3","url":null,"abstract":"Context. Solving tasks of interdisciplinary research deepening during sustainable development problems solutions search for real social-ecological-economical objects based on systemological modelling and introducing information-entropy space of such objects state and functionality determining for making managerial decisions in uncertainty conditions. \u0000Objective. Modelling current situation of researched social-ecological-economical object as the cooperative connection «studied system-environment» based on systemological model, which determines object study goal conditions due to discovery of internal and external factors interaction inside information-entropy space of object functioning representation. \u0000Method. The paper presents the logical-experimental research results of complex social-ecological-economical objects state estimation, their development in stochastic environment conditions from the point of view of sustainable development requirements match based on proposed approach. This approach is the systemological basis of studied object entropy model creation and algorithmization by ecological functional of quality of the complex system objects goal state. The quality functional is the interrelation of «object systems-environment» state entropy functions and their interaction processes, which are gotten through monitoring data statistical analyses of objects that belong to technogenic (economical), social and natural systems. \u0000Results. The usage of systemology basis complex union for studied object structure identification is suggested for the first time, along with identification of theoretical knowledge for informational entropy for any object system element description and entropic description of states and process. The relative accordance functional is introduced for final evaluation of the studied object equilibrium. It allows to estimate the presence of system and processes unstable points on the basis of nested system structure. It is important for decision making with synergistically positive feedbacks prediction. \u0000Conclusions. The systems and process states entropic estimation complex approach is determined. The systemological model «object-environment» is the basis for determining conditions of studied object sustainable development due to usage of found spontaneous and natural synergistically feedbacks. The universal research base for complex systems study was received for their state and functionality estimation due to process synergy and «object-environment» connections that are based on complex usage of systemological modelling and input information entropy estimation. ","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"72 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88766372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT 技术系统在威胁冲击过程中产生的风险终端流分析
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-02-28 DOI: 10.15588/1607-3274-2023-1-14
V. Sabat, L. Sikora, B. V. Durnyak, I. Povkhan, V. Polishchuk
{"title":"ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT","authors":"V. Sabat, L. Sikora, B. V. Durnyak, I. Povkhan, V. Polishchuk","doi":"10.15588/1607-3274-2023-1-14","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-1-14","url":null,"abstract":"Context. The analysis of the risk terminal flows in technogenic systems is carried out, which arise in the process of the impact of informational and cognitive threats in the automated document management system as part of the hierarchical production system. \u0000The object of the research is the process of functioning of complex systems with a hierarchical structure, in which automated document management systems with a high level of data flow protection for decision-making are used to provide the information quality control of technological processes. \u0000The subjects of the research are the methods and means of constructing an information protection system to ensure the reliable functioning of automated document management systems and making targeted decisions in hierarchical structures with minimal risk of exposure to external threats and attacks. \u0000Objective is to develop a complex model for assessing the risk of the document management system failure as part of a hierarchical production system under the active threats. \u0000Method. For the first time, the cause-and-effect diagram of the event formation with the active action of threat factors and attacks is substantiated and developed, the interpretation of risk in a technogenic system is defined, and the risk in the space of states is presented as a change in the trajectory in the system transitions to the limit operation mode. For the first time, a category diagram of the structure of risk generation under the threat factors and a system-category diagram of interaction in the system risk ↔ emergencyactive nature is constructed, a system-category scheme of risk formation under the active threat factors is suggested. For the first time, a cognitive diagram for assessing losses in the event of a risk situation arising from incorrect actions of the personnel is substantiated. \u0000Results. As a result of the research, a system-category diagram of the impact of a set of threats on the system functioning mode and process is constructed, a method is developed for calculating the level of system strategic security of energy-active hierarchical systems in the process of attacks and threats, and a complex model for assessing the risk of a system functioning failure under active threats is suggested. \u0000Conclusions. Under the action of active obstacles, cognitive and system factors at the operational and strategic levels of the control hierarchy, due to wrong decisions and informational disorientation, emergency situations and risks of the system function loss and its target-orientation arise. The analysis of a set of risks and the suggested category diagram of the risk generation structure under the impact of threat factors form the basis of the development of the probability structure of the risk concept based on the attack ↔ consequence model, as well as the construction of a system-category diagram of the interaction in the game active factor ↔ accident risk. This, in turn, makes it possible to construct a system","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"33 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73368087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF ROUTING A GROUP OF MOBILE ROBOTS IN A FIXED NETWORK FOR SEARCHING THE MISSING OBJECTS IN A TECHNOLOGICAL DISASTER ZONE 一种在固定网络中为寻找技术灾区的失物而路由一组移动机器人的方法
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-02-27 DOI: 10.15588/1607-3274-2023-1-13
V. Batsamut, S. O. Hodlevsky
{"title":"METHOD OF ROUTING A GROUP OF MOBILE ROBOTS IN A FIXED NETWORK FOR SEARCHING THE MISSING OBJECTS IN A TECHNOLOGICAL DISASTER ZONE","authors":"V. Batsamut, S. O. Hodlevsky","doi":"10.15588/1607-3274-2023-1-13","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-1-13","url":null,"abstract":"Context. The relevance of the article is determined by the need for further development of models of collective behavior of systems with multi-agent structure construction endowed with intelligence that ensures synchronization of the joint efforts of various agents while achieving the goals set for the system. The method proposed in the article solves the problem of competition between different agents of a multi-agent system, which is important while performing search, rescue, and monitoring tasks in crisis areas of various origins. \u0000Objective is to develop a method for determining the sufficient population of a multi-agent system and the optimal routes of movement of its individual elements in a stationary network for the most complete examination of a technological disaster zone (any given zone based on a certain transport network). \u0000Method. We implemented the concept of a dynamic programming to search for all possible edge-simple longest paths connecting the directed subsets of vertices-sources and vertices-sinks in the structure of the model weighted directed graph. To this end, the modified Dijkstra method was applied. The modification comprises representing the weights of the arcs of the modeling directed graph with the negative values, which are further used in calculations according to the Dijkstra method. After finding the next edgesimple longest path, the arcs that make up it are fixed in the memory of the computer system (in the route plan) and removed from the graph structure, and the process is iteratively repeated. The search for paths takes place as long as the transitive closure between the vertices that are part of the specified subsets of source vertices and sink vertices is preserved. The developed method makes it possible to find such a set of traffic routes for the elements of the multi-agent system, which maximizes the area examined by them in a technological disaster zone (or the number of checked objects on the traffic routes) in one “wave” of the search and distributes the elements of a multi-agent system by routes that do not have common areas. A derivative of the application of the developed method is the determination of a sufficient population of a multi-agent system for effective search activities within the defined zone. \u0000Results. 1) A method of routing a group of mobile robots in a stationary network for searching the missing objects in a technological disaster zone has been developed. 2) The working expression of the Dijkstra method for searching in the structure of a network object (in the structure of a model graph) for the longest paths has been formalized. 3) We have suggested a set of indicators for a comprehensive evaluation of route plans of a multi-agent system. 4) The method has been verified on test problems. \u0000Conclusions. Theoretical studies and several experiments confirm the efficiency of the developed method. The solutions made using the developed method are accurate, which allows recommending it fo","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"94 4 Pt 1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89485092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE METHOD OF ASSESSING THE VALUE OF INFORMATION 评估信息价值的方法
IF 0.5
Radio Electronics Computer Science Control Pub Date : 2023-02-27 DOI: 10.15588/1607-3274-2023-1-11
I. Pilkevych, T. Vakaliuk, O. S. Boichenko
{"title":"THE METHOD OF ASSESSING THE VALUE OF INFORMATION","authors":"I. Pilkevych, T. Vakaliuk, O. S. Boichenko","doi":"10.15588/1607-3274-2023-1-11","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-1-11","url":null,"abstract":"Context. The task of assessing the value of the institution’s information as one of the objects of protection of the information security model is considered. \u0000Objective. The goal of the work is the creation of a method of assessing the value of information, which takes into account the time of the final aging of information. \u0000Method. The results of the analysis of methods for evaluating the value of information showed that modern approaches are conventionally divided into two directions. In the first direction, the value of information is calculated as the amount of information in bytes. In the second direction, the value of information is calculated in monetary terms. It is shown that modern approaches do not take into account the influence of time on the value of information. A method of assessing the value of information is proposed, which takes into account such characteristics as the term of final aging of information, the level of its access restriction, importance, and form of ownership. The value of information is presented as a quantitative measure that determines the degree of its usefulness for the owner. It is proposed to calculate the value of the initial value of information during its creation or acquisition by calculating the normalized weight of the coefficients according to the formula of the arithmetic mean. It was shown that the current value of information has a functional dependence on the time of existence of information and the time of its final aging. \u0000Results. The results of the experiment confirm that the value of information has a nonlinear functional dependence on the time of final aging of information. \u0000Conclusions. The conducted experiments confirmed the efficiency of the proposed method of evaluating the value of information and allow recommending it for use in practice to protect the institution’s information. Prospects for further research may include the creation of a methodology for assessing the value of an institution’s information, taking into account the aging of information and subsequent adjustment of measures to protect it.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"26 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87150474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信