{"title":"Modeling of Air Pollution in the City Using Thematic Diagrams","authors":"A.М. Bashkatov","doi":"10.15407/emodel.46.01.112","DOIUrl":"https://doi.org/10.15407/emodel.46.01.112","url":null,"abstract":"The proposed methodology for assessing local pollution levels demonstrates the potential for addressing such tasks in principle. However, its practical implementation necessitates the con-sideration of numerous diverse factors, including unforeseen events such as accidents, com-plexities arising from military scenarios, and human factors. Furthermore, it should account for recent climatic changes characterized by rising temperatures and prolonged precipitation defi-cits, requiring adjustments to correction data for variable Di. Effective utilization of accumulat-ed data and the availability of thematic maps proves advantageous in cities with established ur-ban planning solutions and a stable transport network configuration. Successful implementation hinges on the completeness and reliability of data, accessibility to data and observational out-comes from stationary monitoring stations. Most significantly, the adoption of this metho-dology depends on practical demand and interest, the potential for automation of tasks con-ducted by specialized organizations and services, and compliance with international standards and requirements.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Computer Vision Methods and Means for Explosive Ordnance Detection Mobile Systems","authors":"V.V. Mishchuk, H.V. Fesenko","doi":"10.15407/emodel.46.01.090","DOIUrl":"https://doi.org/10.15407/emodel.46.01.090","url":null,"abstract":"The detection and removal of unexploded ordnance and landmines are vital for ensuring civil-ian safety, enabling the repurposing of affected land, and supporting post-conflict recovery ef-forts. Robotization plays a pivotal role in addressing the hazardous and labor-intensive nature of demining operations. The purpose of this paper is to review prominent computer vision tech-niques, particularly object detection, and analyze their applications in the specialized domain of explosive ordnance detection. An extensive review of the literature was conducted to explore the utilization of computer vision in the field of explosive ordnance detection. The study in-volved a comparative analysis of diverse imaging sensors employed for data capture. Special at-tention was given to reviewing sources that elaborate on different methods for detecting objects within the field of computer vision. Various approaches to object detection were thoroughly examined and compared. The research extensively examined the metrics and datasets used to evaluate different approaches for object detection. Possibilities of applying computer vision methods to detect explosive ordnance under the limitations of mobile platforms were studied. Directions of future research are formulated.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"73 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Kameneva, V. O. Artemchuk, A. V. Іatsyshyn, А.A. Vladimirsky
{"title":"Probabilistic Models of Knowledge Representation to Support Decision-Making in Conditions of Risk and Uncertainty in Atmospheric Air Protection Example","authors":"I. Kameneva, V. O. Artemchuk, A. V. Іatsyshyn, А.A. Vladimirsky","doi":"10.15407/emodel.46.01.003","DOIUrl":"https://doi.org/10.15407/emodel.46.01.003","url":null,"abstract":"In order to systematize and integrate the acquired experience necessary for decision-making in conditions of war and man-made danger, as well as for the purpose of controlling emissions of greenhouse gases or other harmful substances, knowledge presentation models have been de-veloped that take into account both the results of the analysis of available data and probabilistic assessments of the state safety of man-made enterprises and adjacent territories. In order to im-prove the decision-making process, a number of probabilistic models are considered, which are based on the calculation of subjective probability estimates regarding the occurrence of danger-ous events and forecasting the corresponding risks. Factors of various nature are considered during modeling: external influences, concentrations of harmful substances, greenhouse gas emissions, indicators of the state of safety of man-made productions, efficiency of equipment, accounting of violations, and other indicators. Also, the knowledge system provides for calcu-lating the risks of dangerous events, the probability of which increases under the interaction of two or a number of hazardous factors. On the basis of the conducted research, an algorithm for building and the structure of a probabilistic model of knowledge focused on software implementation in the decision-making support system for managing the safety of man-made enterprises that pose threats to the popula-tion and the natural environment has been developed.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"65 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Combined Channel Network Coding for Cognitive Radio Networks with Cooperative Relay","authors":"А.M. Kapiton, R.V. Baranenko, H.V. Sokol, M.Yu. Okhrymenko","doi":"10.15407/emodel.46.01.078","DOIUrl":"https://doi.org/10.15407/emodel.46.01.078","url":null,"abstract":"Cognitive radio is one of the new technologies for 4G/5G applications, so cooperative relay communication and network coding are considered as certain methods to help improve their re-spective applications. A primary broadcast system for multimedia video streaming applications that broad¬casts data to primary users and an auxiliary cooperative relay secondary cognitive ra-dio system are considered. The secondary cooperative overlay system can use multiple error control coding methods for point-to-point data retransmission, such as channel coding, network coding, and combi¬ned coding methods to improve system performance under variable link con-ditions. A new technique of adaptive coding of AC2NC combined channel network for data re-transmission is proposed. The new AC2NC first analyzes the channel feedback information and then selects the best retransmission coding technique based on the target bandwidth or trans-mission time optimization. This is instead of using a single static channel or a network coding technique with dynamic channel conditions. The proposed AC2NC improves system through-put, reduces retransmission time, and provides more spectrum access opportunities for the sec-ondary sys¬tem's own data transmissions. AC2NC's relative throughput and time saving capabil-ities for cognitive radio users have been shown to exceed ninety percent, under certain channel conditions, compared to some static coding methods.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security in the Energy Industry Against the Background of Rapid Development of Artificial Intelligence","authors":"L.O. Mytko","doi":"10.15407/emodel.46.01.070","DOIUrl":"https://doi.org/10.15407/emodel.46.01.070","url":null,"abstract":"The problems of protecting information resources from cyberattacks of public and private en-terprises are considered based on the analysis of data in the USA for 2022, taking into account the type of cyberattack and estimates of the damage caused. The analysis of cyberattacks allows us to conclude that the security of information resources depends on the human factor for more than 90 percent and it is in this direction that maximum efforts should be made. Improving the protection of information resources is not possible without the use of artificial intelligence (AI). The possibilities of the influence of AI on the cyber defense of the energy industry are consid-ered and areas that require attention in the development of systems of protection against cyber attacks, which are \"doomed\" to attract the achievements of AI, are proposed. At the same time, it is taken into account that AI not only allows you to increase protection against cyber attacks, but can also make computer networks less secure. And the extraordinary capabilities of neural networks require the urgent creation of agreed international protocols for their developers.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"72 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140459120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelization of the Fluid Behavior Modeling Algorithm in Real Time","authors":"L.I. Mochurad, A.A. Dereviannyi, O.R. Tkachuk","doi":"10.15407/emodel.45.06.085","DOIUrl":"https://doi.org/10.15407/emodel.45.06.085","url":null,"abstract":"A parallel algorithm based on Compute Unified Device Architecture (CUDA) technology is proposed to accelerate fluid behavior simulation and real-time decision making capability. Three main steps were highlighted: implementation of the fluid flow simulation method, distri-bution of work between CUDA threads, and collection of results. A software product was de-veloped to analyze the obtained results. As a result, it was found that the minimum acceptable refresh rate of the simulation environment is achieved on an environment with a size of 512 512 and is an average of 51.54 FPS (number of frames per second) for both states (quiet and ac-tive simulation). An analysis of literary sources was carried out, where the current state of this scientific problem is outlined and the advantages of the proposed approach are indicated. Among the simulation methods, the method using the Navier―Strokes equation for the flow of incompressible matter was chosen because it is simple and has good possibilities for parallelization.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"34 1‐10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138981962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Innovative Methods of Computer Data Loss Prevention","authors":"А.M. Kapiton, О.S. Dziuban, Т.M. Franchuk, I.L. Yatsenko","doi":"10.15407/emodel.45.06.077","DOIUrl":"https://doi.org/10.15407/emodel.45.06.077","url":null,"abstract":"The influence of the development of information technologies on the improvement and devel-opment of innovative methods of preventing the loss of computer data is considered. It has been proven that the development of computer network technologies is gradually accelerating, as today vulnerability is considered a potential threat to information security. The main prob-lems of computer information leakage and computer software encryption technology to prevent computer information leakage are analyzed. Classification of the information leak has been car-ried out. The consequences of information leakage, which have an impact on the economic ben-efits of enterprises or individuals, have been studied. Data leakage prevention methods have been proposed and are currently relevant, including technical tools and product solutions such as traditional DSM (Data Encryption Management) and DSA (Data Security Isolation), as well as DLP (Data Leak Prevention) based. The protection technology to contain the leakage of computer information was analyzed. It is justified that due to the fact that electrostatic shielding is used to prevent electrostatic communication interference, it is advisable to use grounding conductors. It is determined that electromagnetic shielding uses the principle of reflection and absorption of electromagnetic waves on the surface of the conductor and inside the conductor to protect against high voltage interference.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"105 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138982935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of the Multi-Agent Environment Architecture of the Pricing Process Simulation Model in the Electricity Market","authors":"Z. Borukaiev, V. Evdokimov, K. Ostapchenko","doi":"10.15407/emodel.45.06.015","DOIUrl":"https://doi.org/10.15407/emodel.45.06.015","url":null,"abstract":"The question of building the architecture of the multi-agent environment of the simulation model of the pricing process, as a space of heterogeneous interconnected organizational, infor-mational, technological and economic interactions of the simulated agents of the pricing pro-cess, is considered.Using the example of a complex organizational and technical system (COTS) of the electricity micro-market in local electric power systems, the set of agents sur-rounding them and ensuring the vital activity of the COTS of pricing is formalized, consisting of classified internal agents and environmental agents with a definition of their functional pur-pose. It was established that a set of partially observable influence factors of subjects of the electricity micro-market external environment are additionally formalized in the multi-agent pricing system as communication agents with stochastic, dynamic. but with discrete fixation of distinct states of observation processes in this environment. As a result, the simulation model of the pricing process is presented as a heterogeneous distributed multi-agent system.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"207 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138982351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Parallel Algorithm for Solving Systems of Volterra Integral Equations of the Second Kind","authors":"V.O. Tykhokhod, V.A. Fedorchuk","doi":"10.15407/emodel.45.06.003","DOIUrl":"https://doi.org/10.15407/emodel.45.06.003","url":null,"abstract":"The problem of increasing the effectiveness of the study of integral models of dynamic systems is considered. A parallel algorithm for solving a system of Volterra linear integral equations of the second kind based on the quadrature method of numerical integration is proposed. The algo-rithm was implemented in the MATLAB computer mathematics system in the form of an m-function. The program uses the MATLAB Distributed Computing Toolbox infrastructure to manage workflows and distribute computations between them on multi-core processors. Com-putational experiments were conducted on a model example using the Symbolic Math Toolbox package for symbolic calculations and a comparison of the execution of parallel calculations with the execution time of the implementation of a sequential algorithm. The results showed a significant increase in the speed of research of integral models on multi-core processors when using the proposed algorithm and its computer implementation.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"690 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138982818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Faure, M. Makhynko, A. Shcherba, D. Faure, B. Stupka
{"title":"A Frame Synchronization Method Based on Tuples of Pairwise Distinct Elements","authors":"E. Faure, M. Makhynko, A. Shcherba, D. Faure, B. Stupka","doi":"10.15407/emodel.45.06.041","DOIUrl":"https://doi.org/10.15407/emodel.45.06.041","url":null,"abstract":"The further development of the frame synchronization method is presented, which uses as a synchronization word the permutation of the elements of the set of integers of the segment [0; M 1], was further developed. It is proposed to use a tuple of M-η pairwise distinct elements of the set of integers of the segment [0; M 1] as a syncword. The elements of this set are encoded with a fixed-length binary code and the minimum binary Hamming distance between the syncword and all its circular shifts is the maximum. The paper established that the maximum value of the minimum Hamming distance for tuples of 15 pairwise distinct elements of the set of integers for M = 16 is equal to 30. A comparative assessment of the frame synchronization effectiveness was performed based on tuples of 15 elements, as well as on permutations of length 16 and 8. A computer simulation model of the frame synchronization system in a binary symmetric communication channel was built. Synchronization indicators were determined with parameters calculated for bit error probability 0,4 and 0,495, as well as requirements for a min-imum probability of correct synchronization of 0,9997 and a maximum probability of false synchronization of 3E-4. The effectiveness of using tuples of pairwise distinct elements in frame synchronization systems has been confirmed. The efficiency indicator depends on com-munication channel bit error probability.","PeriodicalId":474184,"journal":{"name":"Èlektronnoe modelirovanie","volume":"461 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138983040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}