49 results
Search Results
2. Feedback system for reactor process analysis
- Author
-
Paweł Kaleta, Krzysztof Król, Marek Opielak, Michał Jarmuł, Ryszard Nowak, and Sebastian Zupok
- Subjects
feedback system ,process analysis ,sensors ,optimization ,algorithms ,image reconstruction ,monitoring ,Social Sciences - Abstract
The article discusses an approach to analyzing processes in industrial reactors using advanced systems with feedback. The authors describe the system preparation and image reconstruction algorithms of ultrasonic tomographs (USTs) that have applications in industry. The research presented in this paper focuses on developing effective strategies for controlling and monitoring chemical reaction processes in reactors. Using advanced data processing techniques, the authors propose systems with feedback that enable accurate analysis and optimization of reactor operating conditions. A key aspect is ultrasonic tomographic imaging, which provides precise data on the state of the process in the reactor. In summary, the paper presents a state-of-the-art approach to analyzing chemical reaction processes in industrial reactors using advanced feedback systems and ultrasonic imaging technologies. The proposed solutions are essential for improving efficiency and process control in the chemical industry.
- Published
- 2024
- Full Text
- View/download PDF
3. ФОРМАЛІЗАЦІЯ МЕТОДІВ ПОБУДОВИ АВТОНОМНИХ СИСТЕМ ШТУЧНОГО ІНТЕЛЕКТУ.
- Author
-
ЗГУРОВСЬКИЙ, М. З., КАСЬЯНОВ, П. О., and ЛЕВЕНЧУК, Л. Б.
- Subjects
ARTIFICIAL intelligence ,DYNAMIC programming ,MATHEMATICAL models ,MARKOV processes ,ALGORITHMS ,COMPUTATIONAL complexity - Abstract
This paper explores the problem of formalizing the development of autonomous artificial intelligence systems (AAIS), whose mathematical models may be complex or non-identifiable. Using the value-iterations method for Q-functions of rewards, a methodology for constructing of ε-optimal strategies with a given accuracy has been developed. The results allow us to outline classes (including dual-use), for which it is possible to rigorously justify the construction of optimal and ε-optimal strategies even in cases where the models are identifiable but the computational complexity of standard dynamic programming algorithms may not be strictly polynomial. [ABSTRACT FROM AUTHOR]
- Published
- 2023
4. УДОСКОНАЛЕННЯ АЛГОРИТМУ РОЗРАХУНКУ ТЕМПЕРАТУРИ КВАЗІЛІНІЙНОГО РЕЗИСТИВНОГО СЕНСОРА PT100.
- Author
-
Герасименко, І. В., Зайцев, Є. О., Латенко, В. І., Миронов, Р. Д., Орнатський, І. А., and Філь, С. О.
- Subjects
NONLINEAR equations ,TEMPERATURE sensors ,ALGORITHMS ,PLATINUM ,EQUATIONS ,DETERMINISTIC algorithms - Abstract
The paper investigates iterative algorithms for solving the equation according to the Kalendar-Van Dusyn formula, which describes the dependence of the electrical resistance of the Pt100 family sensor on temperature. This family of platinum sensors is considered quasi-linear, but for high-precision measurements the nonlinearity of the sensor cannot be neglected, so it is necessary to solve the nonlinear equation of Pt100. At minus temperatures, the equation according to the Kalendar-Van Dusyn formula reaches the fourth power and has no solution with respect to temperature in an analytical form. The analysis of the previously published iterative algorithm for the approximate solution of the equation reveals a desadvantage of this algorithm. The residual error of the solution is not a monotonic function of the argument, because it contains extrema, moreover, the sign of the error changes to the opposite after each extremum. The purpose of this study was to obtain an algorithm that provides the residual error in the form of a monotonic deterministic function of the argument with the minimization of the maximum error value. The possibility to modify the iterative algorithm-prototype in an elementary way by fixing the number of iterations is shown. The residual error of solving the equation according to the modified algorithm has the form of a monotonic deterministic function of the argument. It is assumed that any iterative calculation algorithm can be improved in this way. At the same time, the minimization of the error values of the modified algorithm is achieved by setting the maximum number of iterations compared to the prototype algorithm. To overcome this desadvantage of the modified algorithm, a new algorithm is proposed, in which, in addition to a fixed number of iterations, the property of the smallness of the components of higher degrees is used. The high efficiency of the new algorithm is shown, which reduces the residual error of the solution to a negligible value in just four iterations. It is claimed that the high efficiency of the new algorithm makes further research in the direction of its improvement unnecessary. The article presents a scheme of the new algorithm and a corresponding program on the VBA platform for Excel, which is suitable for direct use in the software of temperature meters based on Pt100 resistance temperature sensors. References 5, figures 4, tables 3. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. ДОСЛІДЖЕННЯ БЕЗПЕКИ СТАНДАРТУ WI-FI PROTECTED ACCESS 3 (WPA3).
- Author
-
Опірський, Іван, Максимів, Назар, and Женчур, Марія
- Subjects
TECHNOLOGICAL innovations ,ALGORITHMS ,INTERNET ,SMARTPHONES ,COMPUTER passwords ,EVERYDAY life ,COMPUTER network security ,WIRELESS Internet ,WIRELESS communications - Abstract
Wi-Fi technology is very relevant nowadays, as wireless communication has become a necessary part of our everyday life. Wi-Fi allows you to connect to the Internet on various devices, such as smartphones, tablets, laptops, TVs, and others. In addition, Wi-Fi technology is constantly evolving and improving. New technology standards, such as 802.11ax (Wi-Fi 6), allow for improved data transfer speeds and greater resistance to interference and interference. However, with the popularity of Wi-Fi technology comes a greater threat to network security. Therefore, it is important to improve security methods and encryption algorithms for Wi-Fi networks to ensure their safety and security. The study of vulnerabilities of Wi-Fi WPA2 and WPA3 wireless communication protocols is very relevant due to the fact that wireless networks are an integral part of the modern world. Since hacker attacks on wireless networks have become widespread, researching WPA2 and WPA3 vulnerabilities is very important for ensuring the security of Wi-Fi networks. After all, WPA2 and WPA3 protocol vulnerabilities can be exploited by attackers to gain unauthorized access to the network and obtain sensitive information such as passwords and user data. This paper will cover such topics as the vulnerabilities of securing WIFI networks using WPA2 and WPA3, the main means of protection against attacks, and a comparative characterization of these two security methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. ТЕСТУВАННЯ ДАТЧИКІВ ПСЕВДОВИПАДКОВИХ ЧИСЕЛ, ВБУДОВАНИХ В СМАРТ-КАРТИ.
- Author
-
Поперешняк, С. В.
- Subjects
SMART cards ,STATISTICS ,TEST methods ,PROBLEM solving ,ALGORITHMS - Abstract
Copyright of Science-Based Technologies is the property of National Aviation University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
7. МЕТОД СИНТЕЗУ ВИСОКОЯКІСНИХ S-БЛОКІВ НА ОСНОВІ ФУНКЦІЙ БАГАТОЗНАЧНОЇ ЛОГІКИ.
- Author
-
Радуш, В. В. and Соколов, А. В.
- Subjects
BOOLEAN functions ,MANY-valued logic ,CIPHERS ,STATISTICAL correlation ,ALGORITHMS ,CRYPTOGRAPHY - Abstract
The cryptographic S-box is the crucial component of modern ciphers which determines their efficiency, cryptographic security, and performance. Today, the development of quantum cryptanalysis, as well as the appearance of possible attacks on cryptographic algorithms by describing them using many-valued logic functions made urgent the task of developing algorithms for the synthesis of S-boxes, which would be characterized by high quality not only when represented by component Boolean functions, but also with any other representation by component functions of many-valued logic. At the same time, most of the existing methods of synthesis of S-boxes presented in the literature are focused only on the research of their cryptographic quality when represented by component Boolean functions. In this paper, on the basis of S-boxes of length N=16, which corresponds to the strict avalanche criterion of component Boolean and 4- functions, we propose a method for synthesis of a set of high cardinality equal to J=117588 of S-boxes of practically valuable length N=256, which simultaneously corresponds the strict avalanche criterion of component Boolean functions, the strict avalanche criterion of component 4-functions, as well as the criterion of correlation immunity of component Boolean functions, i.e., they have ideal matrices of correlation coefficients between output and input vectors. The high cryptographic quality of the developed S-boxes when they are represented by component Boolean and 4-functions makes it possible to recommend them for practical use both in the tasks of increasing the effectiveness of existing cryptographic algorithms and in the development of promising ciphers, while the cardinality of the class of synthesized S-boxes allows them to be used as a long-term key. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. УДОСКОНАЛЕННЯ АЛГОРИТМУ ВИЯВЛЕННЯ ДИНАМІЧНИХ ОБ’ЄКТІВ НА ВІДЕОПОСЛІДОВНОСТЯХ.
- Author
-
І. С., Катеринчук and А. О., Бабарика
- Subjects
VIDEO surveillance ,CAMCORDERS ,DEMPSTER-Shafer theory ,SYSTEMS theory ,ALGORITHMS ,EXPERT systems - Abstract
Copyright of Radio Electronics, Computer Science, Control is the property of Zaporizhzhia National Technical University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
9. ДОСЛІДЖЕННЯ ПЕРЕХІДНИХ ХАРАКТЕРИСТИК ГРАДІЄНТНОГО АЛГОРИТМУ НАЛАШТУВАННЯ АНТЕННОЇ РЕШІТКИ.
- Author
-
Плющ, О. Г.
- Subjects
ADAPTIVE antennas ,STANDARD deviations ,ALGORITHMS ,ANTENNA arrays ,COMPUTER simulation - Abstract
Copyright of Science-Based Technologies is the property of National Aviation University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
10. ДОСЛІДЖЕННЯ ХАРАКТЕРИСТИК КОМПЕНСАТОРА БОКОВИХ ПЕЛЮСТОК АНТЕНИ
- Author
-
Плющ, О. Г.
- Subjects
ADAPTIVE antennas ,TELECOMMUNICATION systems ,EIGENVALUES ,EIGENVECTORS ,COMPUTER simulation ,ALGORITHMS - Abstract
Copyright of Science-Based Technologies is the property of National Aviation University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
11. ТЕСТУВАННЯ ГЕНЕРАТОРА ПСЕВДОВИПАДКОВИХ ЧИСЕЛ ЯК СКЛАДОВА БЕЗПЕКИ ІНТЕРНЕТУ РЕЧЕЙ
- Author
-
Поперешняк, С. В.
- Subjects
INTERNET of things ,INTERNET security ,DATA protection ,WIRELESS Internet ,INFORMATION storage & retrieval systems - Abstract
Copyright of Science-Based Technologies is the property of National Aviation University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
12. РАНДОМIЗОВАНI АЛГОРИТМИ ПЕРЕВIРКИ ЧИСЕЛ НА ПРОСТОТУ
- Author
-
О. Я., Козачок
- Abstract
Randomization and probabilistic approach in the algorithms development occupy prominent place. Due to limited computing resources and complexity many tasks in some cases it's impossible to obtain accurate results or it's too costly, so the results may contain some uncertainty. There are also cases when the indeterminacy of the algorithm is its advantage, for example in cryptography problems, or a useful characteristic: in simulations of processes containing undefined parameters. In this paper, we consider the basic concepts and statements concerning randomized algorithms for checking numbers for simplicity, we present the necessary theorems. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. 3D modeling of the urinary bladder using electrical impedance tomography: advanced reconstruction algorithms and medical applications
- Author
-
Daria Stefańczak, Marcin Dziadosz, Katarzyna Iskra, and Piotr Bednarczuk
- Subjects
urinary bladder ,3d modeling ,reconstruction ,electrical impedance tomography ,tomographic measurements ,algorithms ,Social Sciences - Abstract
Purpose: The research presented in this paper was conducted to obtain a detailed 3D model of the urinary bladder using electrical impedance tomography, a noninvasive tomographic technique. Methods: Electrical impedance tomography (EIT) is an imaging technique that measures electrical impedance inside the human body. Many methods, including those based on physical models and machine learning, are used to reconstruct the considered 3D object using EIT. The work focuses on the Gauss-Newton algorithm in its generalized form. Results: Three-dimensional reconstructions of the urinary bladder were obtained. The models are built with high accuracy and can be processed by subsequent algorithms. Discussion: The constructed models can serve as the basis for correct diagnosis in medicine and as research material for subsequent work, for example, on the possibilities of 3D printing. Possible methods of obtaining even higher-quality reconstruction also remain to be considered.
- Published
- 2024
- Full Text
- View/download PDF
14. АЛГОРИТМИ РОЗВ'ЯЗАННЯ ЗАДАЧ КРИПТОЗАХИСТУ ПІКСЕЛІВ КОЛЬОРОВИХ ЗОБРАЖЕНЬ У БАЗИСІ РАДЕМАХЕРА ТА ЗАЛИШКОВИХ КЛАСАХ
- Author
-
ВОЗНА, Н. Я., НИКОЛАИЧУК, Я. М., and ВОЛИНСЬКИМ, О. І.
- Abstract
Copyright of Cybernetics & Systems Analysis / Kibernetiki i Sistemnyj Analiz is the property of V.M. Glushkov Institute of Cybernetics of NAS of Ukraine and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
15. ПІДВИЩЕННЯ ЕФЕКТИВНОСТІ АЛГОРИТМІЧНОГО ЗАБЕЗПЕЧЕННЯ ПОБУДОВИ ДИСКРЕТНИХ МАКРОМОДЕЛЕЙ ТА ЇХНЯ АДАПТАЦІЯ ДО ПРОГРАМ РОЗРАХУНКУ ЕЛЕКТРИЧНИХ КІЛ
- Author
-
Гоголюк, О. П., Козак, Ю. Я., Росоловскі, Є., and Стахів, П. Г.
- Subjects
PARALLEL programming ,COMPUTER software ,COMPUTATIONAL complexity ,COMPUTER algorithms ,ALGORITHMS - Abstract
Copyright of Technical Electrodynamics / Tekhnichna Elektrodynamika is the property of National Academy of Sciences of Ukraine, Institute of Electrodynamics and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
16. МЕТОДИЧНІ ОСОБЛИВОСТІ ОБГРУНТУВАННЯ БАЗОВИХ СТАТИСТИЧНИХ ФУНКЦІЙ
- Author
-
ЗАСЯДЬКО, Аліна Анатоліївна, КАСЯРУМ, Олег Павлович, КАСЯРУМ, Ярослав Олегович, and ДІДКОВСЬКИЙ, Руслан Михайлович
- Abstract
Copyright of Financial Space is the property of Cherkasy Institute of Banking, University of Banking of the National Bank of Ukraine and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
17. Компенсація затримок та втрати пакетів у динамічних онлайн-іграх
- Author
-
Andrew Alexeev and Rinata Sinitsyna
- Subjects
client-server ,алгоритми ,онлайн-ігри ,клієнт-сервер ,online games ,algorithms ,TCP/IP - Abstract
A couple of decades ago, data rates on the network were measured in kilobytes per second, and even then, online game developers had some problems with the packet loss and transmission delays. Now the transfer rate is hundreds of times higher, and the problem of delay compensation is even more relevant.For many dynamic online games, a transmission delay of as little as 20 ms can be quite noticeable, negatively affecting the gameplay and emotions of the game, which can repel players.The problem is exacerbated by the fact that along with the need to compensate for the time of delivery of packets, on the client side there are other non-network factors that are beyond the control of developers, which make the total delay 5-10 ms longer. Because of this, the desire to get rid of network delays as much and as well as possible becomes a necessity, and developers are forced to look for optimal ways to solve this problem.The problem statement is as follows: to review the causes of delays in online games and possible solu- tions, as well as the advantages and disadvantages of certain approaches. The problem is considered at the 4 levels of the TCP / IP network model, as well as at the application level. The approaches are given for the most commonly used protocols for each layer, but basic ideas can be easily transferred to other implementations.The main causes of delays under consideration: propagation delay, router queue delay, transmission delay, and processing delays.This article shows the impact of network delays on the online games and the ways to compensate for them, along with the theory of data transmission protocols in the network and the ways to solve the problems that arise in the development of algorithms.Recommendations for solving the compensation problem can be taken into account when designing and launching online shooters, strategies, etc. Thanks to the given receptions it is possible to minimize the general delay on the transfer of packets in a network, thanks to which the game on the client looks as if the player plays in the Single Player mode., У цій статті розглянуто основні причини застосування алгоритмів компенсації затримок в онлайн-іграх та основні аспекти їх реалізації. У роботі подано інформацію щодо впровадження таких алгоритмів і кроків, які необхідно зробити на різних рівнях TCP/IP. Також для наведених алгоритмів показано вузькі місця, певні недоліки та переваги.
- Published
- 2021
18. МОДИФІКОВАНИЙ МЕТОД КОРЕКЦІЇ ПОМИЛОК ІЗ ЗАСТОСУВАННЯМ ШИФРУ ВЕРНАМА У СИСТЕМАХ QKD
- Author
-
Білаш, Б. О.
- Subjects
PARITY-check matrix ,ERROR correction (Information theory) ,POLARIZED photons ,ALGORITHMS ,COHERENT states ,QUANTUM noise ,QUADRATURE domains - Abstract
Copyright of Science-Based Technologies is the property of National Aviation University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
19. [Diagnostic algorithm for complicated calculous cholecystitis].
- Author
-
Ohorodnyk PV, Deĭnychenko AH, Chrystiuk DI, and Kolomiĭtsev VI
- Subjects
- Adult, Aged, Cholangiography, Cholecystitis diagnostic imaging, Cholecystitis surgery, Choledocholithiasis diagnostic imaging, Choledocholithiasis surgery, Diagnosis, Differential, Female, Gallstones diagnostic imaging, Gallstones surgery, Humans, Male, Middle Aged, Ultrasonography, Algorithms, Cholecystitis diagnosis, Choledocholithiasis diagnosis, Gallstones diagnosis
- Abstract
This paper contains results of 312 patients who were examined and treated over complicated calculouscholecystitis Institute of Surgery and Transplantology named A. A. Shalimov NAMS of Ukraine from 2010 to 2012. Depending on the complexity of the diagnosis of the patients were divided into two groups. The first group--188 patients in which was enough to do a standard algorithm testing. The second group consisted of 124 patients in whom standard survey methods were insufficient to establish the correct diagnosis.
- Published
- 2013
20. Special features of using neuronetwork technolo-ies to control the work processes of bulldozers with a gnss-intensifier
- Subjects
unmediated technologies ,алгоритми ,непромережені технології ,програмні коди ,TensorFlow ,GPS ,machine learning languages ,program codes ,GNSS-інтенсифікатор ,мови машинного навчання ,GNSS-intensifier ,algorithms ,Python - Abstract
Problem. The specificity of modern road construction works requires evaluation of the situation; forecast of the machine's normal operation and the development of emergency situations; synthesis and evaluation of possible actions of the operator and selection of the best ones. That is, there is a problem of effective support of the road car, whose solution is transferred to the intelligence of the car itself. A distinctive feature of intelligent systems is the ability to plan behaviour, adapt and learn. An intelligent system automatically changes the algorithms of its functioning and the structure in order to preserve or achieve an optimal state when external conditions change. The integration of algorithmic methods of controlling complex objects and methods of artificial intelligence is aimed at solving the tasks with uncertainty of the source information. Theimplementation of intelligent systems shows their prospects in the field of road construction works. Thus, optimization of road machine work processes, increasing the efficiency of road-construction machines (RCM) due to an intelligent control system is an urgent task. Studying the structure of the intelligent system of the road machine is relevant as well as developing a mathematical model of intelligent optimization of work processes based on the complex of readings of integrated GNSS sensors. Goal. Thepurpose of the research is to increase the efficiency of construction machines through their intellectualization, development of scientific algorithms for creating mathematical models of the working bodies of the RCM with SNS-intensifier of work processes of interaction with the soil environment. Methodology. In the paper the scientific methods of system analysis and decision-making theory for the structuring and synthesis of intelligent control systems are used; mathematical modeling methods for building and researching hydraulic and dynamic models of road vehicles; theories of automatic control under conditions of uncertainty; methods of object-oriented programming for simulation modeling of a road machine work process during operations. Results. For the first time, the methods of solving the problem of controlling the hydraulic drive of a road machine were offered, which, unlike traditional ones, take into account the execution of digging operations in conditions of a short decision-making time, which ensures the movement of the working body along an arbitrary trajectory in a short time with high accuracy. Originality. This paper is one of the first in Ukraine in which the scientific problem of increasing the efficiency of RCM at the interaction of working bodies with the soil environment in conditions of limited time for decision-making was formulated and solved. Practical value. Time of work is cut due to the reduced number of passes during soil development and increasing the productivity of RCM, which will have a positive effect on financial and labour costs, ensuring the possibility of continuous operation, which increases the productivity of RCM., Застосування GNSS і систем інтелектуального керування робочими процесами землерийних машин дає змогу більш точно визначити місце розташування й висоту робочого органа, що сприяє більш ефективній роботі бульдозера. GNSS може забезпечити високу точність вимірювань розташування бульдозера, що допомагає оптимізувати процес роботи й мінімізувати витрати часу на профілювання та вирівнювання поверхні. За допомогою машинного навчання бульдозер може автоматично аналізувати дані GNSS і приймати рішення про оптимальну траєкторію руху для досягнення потрібної точності та швидкості роботи, це підвищує ефективність дії машини, завдяки чому скорочуються терміни і вартість будівельних робіт. Устатті розглянуто алгоритми й програмні коди, що можуть бути застосовані для автоматизованого керування робочими процесами землерийних машин із використанням штучного інтелекту. Запропоновано конкретну реалізацію мовами програмування Python та TensorFlow, проаналізовано основні алгоритми й показано необхідність врахування параметрів робочого процесу на машинне навчання.
- Published
- 2023
- Full Text
- View/download PDF
21. ЗАХИСТ ІНФОРМАЦІЙНИХ ПОТОКІВ У МОБІЛЬНИХ МЕРЕЖАХ СТАНДАРТУ CDMA2000
- Author
-
Петренко, А. Б., Єлізаров, А. Б., Шматок, С. А., and Ващук, В. О.
- Subjects
DATA security ,MOBILE communication systems ,CODE division multiple access ,ALGORITHMS ,COMPUTER networks - Abstract
In this paper is investigation of data security fo ensure the confidentiality of mobile communication standard CDMA2000. Namely the authentication algorithm, it's basic function principles and possible attacks for unauthorized network access. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
22. Increasing the Efficiency of Frequency Load Shedding of Power System.
- Author
-
Yandulskii, O. S., Timokhin, O. V., and Timokhina, A. O.
- Subjects
ELECTRICAL load shedding ,ELECTRIC power ,ALGORITHMS ,COMPUTER software ,ELECTRIC potential ,POWER resources - Abstract
The paper considers the frequency load shedding of an electric power system. The objective of this paper is to enhance the structure and algorithms of frequency load shedding-1 (AUFLS-1) using cutting-edge technologies, namely Wide Area Measurement System. We model the operation of the system of complex power supply when various emergencies in the Power Factory software occur. We aim at revealing the fact of the voltage corner reaction on the emergency occurrence and elaborating the algorithm of detecting the emergency by speed of voltage corner change. The result and novelty of this research is that we propose how to upgrade the system AUFLS-1 by introducing the additional starting block reacting to the speed of the voltage corner change which increases the speed of AUFLS-1 system operation. As a result the system AUFLS-1 starts up not only by achieving "frequency" set point but also by analyzing the speed of voltage corner change. [ABSTRACT FROM AUTHOR]
- Published
- 2013
23. Оцінювання поліморфізму rs1800012 гена COL1A1 й стигм недиференційованої дисплазії сполучної тканини як предикторів пролапсу тазових органів.
- Author
-
Прощенко, О. М. and Говсєєв, Д. О.
- Subjects
COLLAGEN ,RESEARCH ,PHYSICAL diagnosis ,CONFIDENCE intervals ,GENETIC polymorphisms ,CONNECTIVE tissue diseases ,RISK assessment ,COMPARATIVE studies ,SEVERITY of illness index ,GENETIC carriers ,CHI-squared test ,DESCRIPTIVE statistics ,QUESTIONNAIRES ,UTERINE prolapse ,STATISTICAL correlation ,POLYMERASE chain reaction ,ODDS ratio ,ALGORITHMS ,DISEASE risk factors ,DISEASE complications ,EVALUATION - Abstract
The article presents data on the association of the rs1800012 polymorphism of the procollagen type I alpha (α) 1 COL1A1 gene and the stigma of non-differentiated connective tissue dysplasia with the development of vaginal prolapse in the Ukrainian population. The objective: to determine the prognostic significance of the rs1800012 polymorphism of the procollagen type I alpha (α) 1 COL1A1 gene and the clinical and anamnestic stigmata of non-differentiated connective tissue dysplasia as factors associated with the development of vaginal prolapse in the Ukrainian population. Materials and methods. In order to achieve the research aim, polymorphism in the rs1800012 locus of the COL1A1 gene was studied by polymerase chain reaction in venous blood samples of 120 women. The main group included 60 patients with vaginal prolapse III, IV, who had indications for surgical correction; to the comparison group – 60 women without pelvic floor dysfunction. The diagnostic algorithm included a physical examination, taking the general and gynecological history, evaluation of the state of the pelvic floor and urogenital dysfunction. The severity of pelvic floor prolapse was assessed based on the Pelvic Organ Prolapse Quantification (POP-Q) classification. Results. During the analysis of clinical and anamnestic data in women of both research groups, concomitant pathology with a possible connection with signs of non-differentiated connective tissue dysplasia was identified as risk factors for the development of pelvic floor dysfunction: 37 people in the main group versus 21 patients in the comparison group (x² =8.5428; p=.003469). The prevalence of rs1800012 polymorphism of the gene procollagen type I alpha (α) 1 COL1A1 in the homozygous variant (TT) in this study was found in the main group in 8 samples (13.33%) and only in 2 (3.33%) – in the comparison group. The presented polymorphism in the heterozygous variant (GT) in the main group was determined in 19 samples (31.67%) and only in 12 (20.00%) – in the comparison group (x² =7.3199; p=.025734). Conclusions. The association of the rs1800012 polymorphism in the COL1A1 gene (p=.025734) and clinical and anamnestic stigmata of non-differentiated connective tissue dysplasia (NDST) (p=.003469) with the development of pelvic organ prolapse was established, which is evidence of the importance of genetic changes and connective tissue remodeling in the etiology of genital prolapse The presence of NDST stigma increases the risk of pelvic organ prolapse by 3 times (OR=3.788; 95% CI: 1.664–8.624), polymorphism rs1800012 in the COL1A1 gene – by 2 times with the heterozygous variant (OR=2.400; 95% CI: 1.230–6.633) and 3 times with the homozygous variant (OR=3.275; 95% CI: 1.300–19.969). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. АСИМЕТРИЧНІ АЛГОРИТМИ ШИФРУВАННЯ У СИСТЕМІ ЗАЛИШКОВИХ КЛАСІВ.
- Author
-
НИКОЛАЙЧУК, Я. М., ЯКИМЕНКО, І. 3., ВОЗНА, Н. Я., and КАСЯНЧУК, М. М.
- Subjects
PROBLEM solving ,FACTORIZATION ,NUMBER systems ,MULTIPLICATION ,ALGORITHMS ,CRYPTOGRAPHY ,PUBLIC key cryptography ,LOCKS & keys - Abstract
Theoretical foundations of asymmetric encryption based on the residue number system and its modified perfect form are developed. The selected moduli of the residue number system are considered to be secret keys. When recovering a number from its residues, multiplication by arbitrarily selected coefficients (public keys) takes place. It is established that cryptostability of the proposed algorithms is based on solving the problem of factorization or exhaustive search of sets of moduli. The developed approaches allow us to increase the block of plaintext almost indefinitely, eliminating the need to use different encryption modes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
25. REVAMP STUDY OF RECONFIGURABLE LOGIC USAGE FOR COMPUTING ACCELERATION.
- Author
-
ZAKHARCHENKO, T.
- Subjects
- *
ALGORITHMS , *ADAPTIVE computing systems , *COMPUTER systems , *LOGIC devices , *PROGRAMMABLE logic devices - Abstract
The aim. The article is to prove effectiveness of reconfigurable logic usage for computing acceleration. In order to prove this hypothesis, some experiments were conducted. Methodology. For this purpose, in the following paper examples of popular acceleration procedures were shown and quantitative comparison of different acceleration procedures with and without usage of reconfigurable logic devices was found. As examples an implementations of image filtering algorithm and implementations of matrix-vector multiplication were used. As the result of the hypothesis examination, the author found that usage of reconfigurable logic makes sense. For examples mentioned above, there is significant productivity increase was achieved. However, one should understand that an ideal case was examined, when implementations of algorithms mentioned above was made by man, not computer. Automatic algorithm porting to reconfigurable logic may yield much worse results. Metrics used for porting to reconfigurable platform quality evaluation were using for the first time. A challenge of computing acceleration and effective utilization of chip area is very actual nowadays. [ABSTRACT FROM AUTHOR]
- Published
- 2014
26. PES32-16 network consisting of sixteen round functions.
- Author
-
Tuichiyev, G.
- Subjects
CRYPTOGRAPHY ,ALGORITHMS ,BLOCK ciphers ,DATA encryption ,COMPUTER security - Abstract
Using the cryptographic methods is one of most effective way to provide information confidentiality. From the viewpoint of modern computation technologies cryptographic algorithms developing and improving (such as block symmetric algorithms) are actual scientific problem. In this paper we develop network PES32-16, consisting of sixteen round functions, which uses the structure of the block cipher algorithm PES. The main advantages of the proposed network are using the same algorithm for encryption and decryption and also ability for using any transformation as a round function. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
27. Achromatization and Athermalization of Infrared Technology Objectives.
- Author
-
Kucherenko, O. K., Muraviov, O. V., and Tyagur, V. M.
- Subjects
ALGORITHMS ,INFRARED radiation ,MECHANICAL behavior of materials ,SYSTEMS design ,TEMPERATURE distribution ,THERMOPHYSICAL properties - Abstract
This paper considers the method of temperature influence indemnification to image quality of optical systems working in the infrared range of spectrum for the case of homogeneous temperature distribution through the system. The simultaneous achromatization of focusing knot is possible when passive athermalization is used. Rational problem decision of athermal and achromatic optical system designing is possible when the triplet including specific compositions of optical materials combined with specific mechanical housing materials is utilized. The algorithm proposed allows obtaining athermal and achromatic three-component optical system by selecting necessary combination of materials. In addition, we give some recommendations on how to select the triplet materials based on the dependence diagram of optical and thermophysical materials properties. The method includes the influence of housing material expansion of focusing knot when the ambient temperature changes. We also consider examples of possible combinations of optical and mechanical materials for the infra-red waveband of spectrum of 3-5 and 8-12 μm. [ABSTRACT FROM AUTHOR]
- Published
- 2012
28. Using Forecasting Methodology Evaluating Development Scenarios of the AR Crimea Argo-Industrial Sector.
- Author
-
Ivchenko, V. A.
- Subjects
FORECASTING methodology ,STRATEGIC planning ,INDUSTRIALIZATION ,AGRICULTURAL industries ,COST analysis ,ALGORITHMS - Abstract
In this paper we study and formalize the processes of the strategic planning. We define the algorithm to structure and evaluate the development scenarios of the object under research as a part of the strategic planning. In addition, we propose the methodology for choosing actors' policies to achieve the desired future state of the researched system. This methodology takes into account the factors of benefits, costs, opportunities, and risks. The methodology is based on the method of the hierarchy analysis, and utilizes the iterative application of the direct and reverse processes defined in this method. Moreover, we propose the solution to the problem of calculating actors' weights indirectly by the influence of the actors on the considered factors, namely the increase of benefits and oppotunities, and decrease of costs and risks. Finally, we reveal that an integration with other approaches to the management of the economic systems is required for applying our prediction evaluation methodology. [ABSTRACT FROM AUTHOR]
- Published
- 2012
29. Synthesis of Control System on Integrated Quality Criteria.
- Author
-
Golinko, I. M., Kubrak, A. I., and Tregub, V. G.
- Subjects
CONTROL theory (Engineering) ,QUALITY control ,MATHEMATICAL optimization ,ALGORITHMS ,MATHEMATICAL models ,AUTOMATIC control systems ,PARAMETER estimation - Abstract
This paper considers the optimization algorithm of a digital control system on integrated quality criteria. The algorithm proposed allows performing parametrical synthesis of a digital proportional-integral-derivative control at the integrated quality criteria. Moreover, we calculate the integrated quality criteria of interrelation with character of transients in a control system. We also show the dependence of quality transients on the influence channel. Examples of the algorithm proposed are considered at modeling transients in a control system. Practically, this algorithm can be used by developers of automatic control systems for optimization of control systems. [ABSTRACT FROM AUTHOR]
- Published
- 2011
30. ON THE COMMON EXTENSION OF MEASURES.
- Author
-
Tarashchanskii, M. T. and Shchestjuk, N. J.
- Subjects
MATHEMATICS ,ALGEBRA ,MATHEMATICAL analysis ,EQUATIONS ,ALGORITHMS - Abstract
In this paper, we describe the conditions, providing the existence of splicing of the measures λ , μ and v - finite, finitely additive and integral functions of sets, defined on the algebras of subsets B and C of some set Ω and the algebra U, based on the algebras B and C . Moreover, we show that the measure λ should be a common extension of the measures μ and v , and λ(B∩C)= λ(B)λ(C) for any B ε B, C ε C. [ABSTRACT FROM AUTHOR]
- Published
- 2009
31. PREDICTIVE CORRECTION OF ERRORS.
- Author
-
Gubar, V. I.
- Subjects
ERRORS ,ALGORITHMS ,FOUNDATIONS of arithmetic ,COMPUTER programming ,MACHINE theory - Abstract
The paper considers the newly developed methods of transient errors correction in the computer couplers. Various ways of errors correction are determined and their predictive algorithms are implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2009
32. THE COMPONENT MODEL OF INFORMATION ANALYSIS SYSTEM AND GENETIC ALGORITHM OF OPTIMAL EQUITIES PORTFOLIO FORMATION.
- Author
-
Maslyanko, P. P. and Riabushenko, A. V.
- Subjects
ALGORITHMS ,FINANCIAL markets ,STOCK exchanges ,SECURITIES trading ,STOCKS (Finance) - Abstract
The present paper shows the modeling results of information analysis control system of financial investment and development of component model of optimal equity portfolio system. We demonstrate the implementation of two system components: optimization of equity portfolio and return forecasting. Moreover, we test the models on the historical data of Ukrainian stock exchange (PFTS). [ABSTRACT FROM AUTHOR]
- Published
- 2009
33. A MODEL OF CELLULAR AUTOMATON WITH ANTICIPATION.
- Author
-
Makarenko, O. S., Krushinsky, D. A., and Goldengorin, B. I.
- Subjects
PARALLEL processing ,CELLULAR automata ,MACHINE theory ,ALGORITHMS ,ROBOTICS - Abstract
In this paper, we consider the mechanisms for endowing the cellular automata (CA) models with the anticipation property. On the experimental side, we apply a widely known Conway's game 'Life'. The research results show that even within this simple model, the introduction of anticipation has a crucial impact on the behavior of the system, resulting in emergence of multiple co-existing solutions. Furthermore, the inherent behavioral templates of classical 'Life' (fixed point, cycle, chaos) are valid for its anticipatory version; however, they develop at a level of configurations' sets. Finally, we make the extensive computational simulations and present the most significant research results. [ABSTRACT FROM AUTHOR]
- Published
- 2009
34. ЗАХИСТ ВЛАСНОСТІ ЄВРОПЕЙСЬКИМ СУДОМ З ПРАВ ЛЮДИНИ І ГОРИЗОНТАЛЬНИЙ ЕФЕКТ
- Author
-
Карнаух, Богдан
- Subjects
PROPERTY rights ,CIVIL law ,CIVIL rights ,HUMAN rights ,ALGORITHMS ,APPELLATE courts ,DIGNITY - Abstract
The modern doctrine of property law in Ukraine shall be reconsidered from the perspective of understanding the right to property as The purpose of the article is (a) to outline the approach of the European Court of Human Rights to addressing applications under Article 1 of Protocol No 1 to the European Convention for the Protection of Human Rights and Fundamental Freedoms and (b) to analyse the horizontal effect of the right peaceful enjoyment of property. While deciding on the applications pertaining to protection of property, the ECtHR utilizes a sophisticated algorithm comprising a sequence of yes-or-no questions, where the transition to each subsequent question is preconditioned by affirmative answer to the previous one: (1) Was there any property rights? (2) Has there been an interference with property rights? (3) Was the interference lawful? (4) Did the intervention have a legitimate aim? (5) Was the interference proportionate to the aim pursued? According to this algorithm, if the answer to the first four questions is "yes" and to the last, fifth, is "no", the ECtHR finds that the respondent State has violated applicant's right to peaceful enjoyment of property. In all other cases there is no violation. If, within the jurisdiction of the State, an individual may infringe the property rights of another without any liability for the former and any remedy for the latter, the State may be reasonably blamed for it, since the situation may indicate that either there is no legislation prohibiting the infringement, or the cases of infringement are not investigated or the courts do not properly apply the provisions of the respective legislation. Correcting these defects of "State's work" certainly has an impact on horizontal relations and is perceived by private persons in their relations with each other. Tectonic shift in the national doctrine of property rights manifests itself in the new perspective on property: the property is no longer seen as either an exclusively civil or an exclusively national legal institution. Like a number of other private law institutions, property is being constitutionalized. Any dispute over property rights receives a new perspective in terms of fundamental human rights. And it is true not only with regard to vertical relations of individual vis-à-vis public authority, but also with regard to relations of private persons between themselves (horizontal). The horizontal effect of human rights is achieved through the concept of positive obligations of the state being applied by the Supreme Court and by the implementation of the proportionality test in domestic jurisprudence. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
35. Chiral Fermions Algorithms In Lattice QCD
- Author
-
Dafina Xhako and Rudina Zeqirllari
- Subjects
algorithms ,chiral ,critical-slowing ,fermions ,lattice ,QCD ,Physics ,QC1-999 - Abstract
The theory that explains the strong interactions of the elementary particles, as part of the standard model, it is the so-called Quantum Chromodynamics (QCD) theory. In regimes of low energy this theory it is formulated and solved in a lattice with four dimensions using numerical simulations. This method it is called the lattice QCD theory. Quark propagator it the most important element that is calculated because it contains the physical information of lattice QCD. Computing quark propagator of chiral fermions in lattice means that we should invert the chiral Dirac operator, which has high complexity. In the standard inversion algorithms of the Krylov subspace methods, that are used in these kinds of simulations, the time of inversion is scaled with the inverse of the quark mass. In lattice QCD simulations with chiral fermions, this phenomenon it is knowing as the critical slowing-down problem. The purpose of this work is to show that the preconditioned GMRESR algorithm, developed in our previous work, solves this problem. The preconditioned GMRESR algorithm it is developed in U(1) group symmetry using QCDLAB 1.0 package, as good “environment” for testing new algorithms. In this paper we study the escalation of the time of inversion with the quark mass for this algorithm. It turned out that it is a fast inversion algorithm for lattice QCD simulations with chiral fermions, that “soothes” the critical slowing-down of standard algorithms. The results are compared with SHUMR algorithm that is optimal algorithm used in these kinds of simulations. The calculations are made for 100 statistically independent configurations on 64 x 64 lattice gauge U(1) field for three coupling constant and for some quark masses. The results showed that for the preconditioned GMRESR algorithm the coefficient k, related to the critical slowing down phenomena, it is approximately - 0.3 compared to the inverse proportional standard law (k = -1) that it is scaled SHUMR algorithm, even for dense lattices. These results make more stable and confirm the efficiency of our algorithm as an algorithm that avoid the critical slowing down phenomenon in lattice QCD simulations. In our future studies we have to develop the preconditioned GMRESR algorithm in four dimensions, in SU (3) lattice gauge theory.
- Published
- 2019
- Full Text
- View/download PDF
36. ТЕМАТИЧНЕ МОДЕЛЮВАННЯ НАУКОВЦІВ НА ОСНОВІ ЇХ ІНТЕРЕСІВ У GOOGLE SCHOLAR.
- Author
-
ШТОВБА, С. Д. and ПЕТРИЧКО, М. В.
- Subjects
INFORMATION resources ,ALGORITHMS ,CLASSIFICATION ,SCHOLARS ,NOISE - Abstract
Copyright of System Research & Information Technologies / Sistemnì Doslìdžennâ ta Ìnformacìjnì Tehnologìï is the property of Institute for the Applied System Analysis at the NTUU KPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
37. The structure of urgent conditions of servicemen of the Armed Forces of Ukraine in modern conditions
- Author
-
M. I. Badiuk, O. O. Mykyta, I. P. Semeniv, M. M. Rygan, and V. V. Kosarchuk
- Subjects
emergencies ,wounds and injuries ,algorithms ,clinical protocols ,standard of care ,military personnel ,Ukraine ,Pathology ,RB1-214 - Abstract
Purpose: to study the structure of urgent conditions of servicemen with combat injuries and diseases in modern conditions in order to substantiate the development of promising algorithms and medical aid protocols adapted to NATO standards.Materials and methods. The paper presents the results of analysis of the structure and nature of urgent conditions of modern combat pathology and diseases among military personnel who were on treatment at the National Military Medical Clinical Center “Main Military Clinical Hospital” from 1999 to 2018 (191 731 disease histories).Results. The article analyzes the structure of emergency conditions for servicemen of the Armed Forces of Ukraine, who were admitted the National Military Medical Clinical Center “MMCH” in the period from 1999 to 2013 compared with the corresponding indicators for 2014–2017 years. The trends in the dynamics of the indicators of the structure of emergency conditions of servicemen with injuries (including combat ones) and diseases during the period of armed conflict compared to the previous period (1999–2013) were studied. The most urgent conditions of servicemen with combat trauma and serious illnesses are identified, which are the priority for the development and implementation of modern algorithms and protocols for the provision of medical assistance in combat conditions in the Armed Forces of Ukraine. A list of algorithms and protocols for the provision of medical assistance to servicemen of the Armed Forces of Ukraine under the main emergency conditions in today's conditions is proposed.Conclusions. The basic nosological forms of combat injuries and illnesses of military personnel are established in which emergencies are formed: the ХІХ class – injuries and head and brain injuries (27.3 %), abdominal injuries (18.2 %), chest injuries and ribs (12.9 %); X class – pneumonia (75.9 %); ІX class – strokes (40.1 %), myocardial infarction (30.1 %) and hypertensive disease (12.5 %). The main classes, whose nosological forms are accompanied by severe and extremely serious conditions, are the ХІХ class – traumas, poisonings and some other consequences of external causes (48.5 %), class X – respiratory diseases (12.1 %), class IX – Diseases of the circulatory system (7.4 %) and class V – disorders of the psyche and behavior (6.1 %). Identified urgent conditions of servicemen, arising from appropriate nosological forms and included in the described classes of diseases, are priority for the development of priority algorithms and protocols for the provision of medical assistance to servicemen in combat conditions according to NATO standards.
- Published
- 2018
- Full Text
- View/download PDF
38. Розробка методу оцінювання ефективної швидкості передачі інформації на базі емпіричної моделі статистичного зв’язку основних параметрів безпровідного каналу стандарту 802.11.
- Author
-
Михалевський, Д. В.
- Subjects
ENERGY consumption ,STATISTICAL models ,MATHEMATICAL models ,WIRELESS channels ,ALGORITHMS - Abstract
A method of estimating the effective data rate in channels of the Standard 802.11 was proposed. It provides for the measurement of the main energy parameter using the software and hardware of the subscriber device. This method is based on the empirical models of statistical relationships between the main parameters of the channel which are obtained on the basis of experimental studies using monitoring algorithms. The solutions obtained during the implementation of this method make it possible to take into account the maximum possible number of destabilizing factors and significantly reduce the time of assessment of the effective data rate. It should be noted that this method can be used for technical diagnostics of wireless networks of Standards 802.11x at the stages of network design and operation. It was established that when using the coefficient of energy efficiency, a significant error in the displacement of the points of intersection of the linear and logarithmic mathematical model occurs. This can lead to a discrepancy between the mathematical estimates of the effective data rate and real values. The statistical relationship gives a smaller error; however, it increases requirements for empirical studies to obtain the maximum possible reliability. One of the features of the proposed method is the reliability of assessment of the effective data rate. This reliability depends on three main factors: accuracy of assessing the results based on which the mathematical model was obtained; estimation of fluctuation intervals and characteristics of the Standard 802.11 equipment of different manufacturers. The last factor can be considered as a disadvantage that involves the creation of a database of parameters of the model of statistical relationship for different devices with correction coefficients. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
39. ANALYSIS OF DIFFERENTIAL RELAY PROTECTION ALGORITHMS AND THEIR MODELLING IN MATLAB
- Subjects
алгоритми ,математична модель ,relay protection ,діджиталізація ,коротке замикання ,differential relay ,short circuit ,digitalisation ,релейний захист ,диференційне реле ,algorithms ,mathematical model - Abstract
The paper is devoted to identifying the prospects for software implementation of differential relay protection. The purpose of this study was to analyse the algorithms of the devices' operation, which allowed to create a mathematical model in the MATLAB software environment with the prospect of integration in the form of a single regional relay protection server into the unified energy system of Ukraine. It has been established that virtual models have both advantages and disadvantages compared to digital-analog devices. Their positive feature is that, due to the block principle of construction, it is possible to easily change not only the parameters but also the configuration of the primary network. The disadvantage is that the configuration of virtual protections differs from the configuration of their prototypes - real relays and terminals. The article evaluates the existing, widely used methodology and considers the actual algorithms of two-stage differential relay protection. It is established that differential protection has two stages: 1 - fast-acting differential current cut-off; 2 - sensitive differential current protection with inhibition from through current and recovery from magnetisation current surges. A simplified diagram of a fragment of the electrical system and differential relay protection of a transformer are developed and presented in MATLAB. The algorithms are considered in detail, and it is established that with their help and with the help of the considered principles of differential protection in the Simulink package, the logic of the model is implemented similarly to the logic of microprocessor-based transformer protection "RS-83DT2" of RZA Systems LLC, SPAD 346 C of ABB. Based on the modelling results, the oscillograms of primary currents of normal mode and emergency modes with external and internal short circuits are obtained. The conclusions establish the prospects of using this model and algorithms for the development of a software solution for the relay protection server and for future integration into the integrated power system., Робота присвячена виявленню перспектив програмної реалізації диференційного релейного захисту. Метою статті був аналіз алгоритмів роботи пристроїв, що дозволило створити математичну модель в програмному середовищі MATLAB з перспективою інтеграції у вигляді єдиного регіонального серверу релейного захисту до об’єднаної енергетичної системи України. Встановлено що віртуальні моделі мають як переваги, так і недоліки порівняно з цифро-аналоговими пристроями. Їхня позитивна властивість – завдяки блоковому принципу побудови можна легко змінювати не тільки параметри, але й конфігурацію первинної мережі. Недолік – налаштування віртуальних захистів відрізняється від налаштування їхніх прототипів – реальних реле і терміналів. Оцінено існуючу широко застосовану методику, розглянуто актуальні алгоритми двоступеневого диференційного релейного захисту. Встановлено, що диференційний захист має два ступені – швидкодіючу диференціальну струмову відсічку та чутливий диференційний струмовий захист із гальмуванням від наскрізного струму і відбудовою від кидків струму намагнічування. Розроблено та наведено спрощену схему фрагмента електричної системи та диференціальний релейний захист трансформатора в середовищі MATLAB. Детально розглянуто алгоритми та встановлено, що за їх допомогою та допомогою розглянутих принципів диференціального захисту в пакеті Simulink реалізовано логіку роботи моделі аналогічно логіці мікропроцесорних захистів трансформаторів «РС-83ДТ2» ТОВ «РЗА СІСТЕМЗ» і SPAD 346 C фірми ABB. За результатами моделювання отримано осцилограми первинних струмів нормального режиму й аварійних режимів із зовнішнім та внутрішнім короткими замиканнями. Встановлено перспективність використання даної моделі та алгоритмів для розробки програмного рішення для сервера релейного захисту та для майбутньої інтеграції в об’єднану енергосистему.
- Published
- 2023
40. System for dynamic prediction of the technical condition of the equipment of a combined electric power system
- Subjects
експлуатаційні умови ,алгоритми ,математична модель ,neuro-fuzzy model ,прогнозування ,prediction ,нейро-нечітка модель ,algorithms ,simulation ,імітація ,mathematical model ,operating conditions - Abstract
This paper analyses the neuro-fuzzy modelling method for predicting the technical state of a system. The model of the system for dynamic forecasting of the technical condition of the equipment of an integrated power system consists of: a simulation model of a solar power plant, a simulation model of a wind turbine, and a simulation model of a synchronous generator acting as a thermal power plant. To perform the modelling, a special system of tools Fuzzy extension logic toolbox was used to assess the quality of the synchronous generator. The obtained estimates of the technical condition of the equipment are processed using an adaptive neuro-fuzzy inference system (ANFIS), which results in a forecast of the technical condition of the equipment at a given time interval. It has been established that fuzzy models have found wide practical application in the construction of fuzzy controllers, data recognition and processing systems, etc. Modelling of real systems with fuzzy models is based on the fact that fuzzy models of the Sugeno and Mamdani types are universal function approximators. The constructed model of the system for dynamic forecasting of the technical condition of equipment can be used in the design of renewable energy facilities, as well as in the development and testing of algorithms for control and monitoring systems. The system for assessing and predicting the state of equipment using fuzzy logic can be used to support decision-making by the power plant operator when determining the need for repair and relocation of equipment. The key advantage of the presented system is its ability to take into account dynamic changes in the state of a solar power plant depending on the transmitted operating conditions, which makes it possible to bring the obtained data even closer to the real ones. Also, a feature of the system for dynamic forecasting of the technical condition of equipment is the use of a simulation model of a solar power plant, which has a model to bring the simulation closer to real operating conditions, taking into account dust, surface heating etc., В роботі проаналізовано метод нейро-нечіткого моделювання для прогнозування технічного стану системи. Модель системи динамічного прогнозування технічного стану обладнання об’єднаної електроенергетичної системи складається з імітаційних моделей сонячної електростанції, вітрогенератора та синхронного генератора, що виконує роль теплової станції. Для виконання моделювання використовувалася спеціальна система інструментів Fuzzy extension logic toolbox, призначена для оцінки якості роботи синхронного генератора. Отримані оцінки технічного стану обладнання обробляються за допомогою адаптивної системи нейро-нечіткого виведення (ANFIS), в результаті чого формується прогноз технічного стану обладнання на заданому часовому інтервалі. Встановлено, що нечіткі моделі знайшли широке практичне застосування під час побудови нечітких регуляторів, систем розпізнавання та обробки даних тощо. Моделювання реальних систем нечіткими моделями ґрунтується на тому, що нечіткі моделі типу Сугено і Мамдані є універсальними апроксиматорами функцій. Побудована модель системи динамічного прогнозування технічного стану обладнання може бути використана при проектуванні об’єктів відновлюваної енергетики, а також при розробці та тестуванні алгоритмів систем управління та моніторингу. Система оцінки та прогнозування стану обладнання з використанням апарату нечіткої логіки може бути використана для підтримки прийняття рішень оператором електричної станції при визначенні необхідності ремонту та перестановки обладнання. Ключовою перевагою представленої системи є її здатність враховувати динамічні зміни стану сонячної електростанції залежно від трансльованих умов експлуатації, що дозволяє ще більше наблизити отримані дані до реальних. Також, особливістю реалізації системи динамічного прогнозуванн технічного стану обладнання є використання моделі сонячної електростанції, що має в своєму складі моделі для наближення імітації до реальних умов експлуатації з урахуванням пилу, нагрів поверхні тощо.
- Published
- 2023
41. Application of GNSS systems for automated control of working processes of graders with artificial intelligence
- Subjects
алгоритми ,decision-making systems ,GNSS ,системи прийняття рішень(СППР) ,непромережені технології ,інтелектуальна система ,GPS ,non-mediated technologies ,intelligent system ,algorithms - Abstract
Problem. Despite rather successful application of artificial intelligence to control graders, these systems have a number of disadvantages associated with their use: complexity of choosing the system architecture; batch learning and multi-epoch learning require significant time resources; many of the existing computational intelligence systems cannot determine the evolving rules by which the system develops; problems when considering a multitude of indicators that have a complex structure of relationships and contradict each other; difficulty of taking into account the indirect influence of interdependent components in conditions of uncertainty; non-linear character of mutual influence of objects and processes, non-stochastic uncertainty, non-linearity of mutual influence, partial inconsistency and significant interdependence of components. Goal. There is an urgent scientific task of developing a methodology for creating intelligent road vehicle control systems using artificial neural networks and fuzzy cognitive models. Methodology. The methodology of assessment and forecasting in intelligent decision support systems consists of the following sequence of actions: 1) input of initial data. At this stage, the initial data available on the object to be analyzed are entered. Initialization of the basic object state model is carried out; 2) identification of factors and connections between them. Analysis of the models of multi-criteria evaluation of alternatives under conditions of uncertainty showed that the values of model parameters are often represented by intervals, as there are differences of opinion when obtaining parameter values. When there is interval and fuzzy information, it is advisable to use the fuzzy-interval method. Results. This paper briefly examines the features of using neural network technologies, machine control systems and training to increase the productivity of graders. A formalized description of the task of analyzing and forecasting the state of objects in intelligent decision-making support systems of the intelligent system of the road vehicle is carried out. The specified formalization allows us to describe the processes that take place in intelligent decision support systems when solving the tasks of analyzing and forecasting the state of objects of the road machine intelligent system. Originality. An overview of intelligent control systems that can be used for automated control of work processes of earthmoving machines with the use of artificial intelligence is presented, a methodology for implementing practical tasks is proposed. Practical value. An overview of intelligent control systems is presented, practical implementation in programming languages is proposed, the influence of ground conditions on the process of automated work is analyzed, the concept of assessment and forecasting methods in intelligent decision support systems for an intelligent system of graders is given., GNSS (Global Navigation Satellite System) - це глобальна навігаційна система, яка використовує супутникові сигнали для визначення місця і часу в будь-якій точці світу. Одним із застосувань GNSS є використання разом з елементами машинного навчання з метою керування грейдерами. Грейдери використовуються для профілювання і вирівнювання поверхні грунту на будівельних майданчиках. Використання GNSS та машинного навчання дозволяє більш точно визначити місце розташування і висоту відвалу грейдера, що в свою чергу призводить до більш точної і ефективної роботи машини. GNSS може забезпечити високу точність вимірювань місцезнаходження грейдера, що дозволяє оптимізувати процес роботи грейдера та мінімізувати витрати часу на профілювання та вирівнювання поверхні. За допомогою машинного навчання грейдер може автоматично аналізувати дані GNSS і приймати рішення про оптимальну траєкторію руху для досягнення потрібної точності і швидкості роботи. Використання GNSS і машинного навчання дозволяє підвищити ефективність роботи грейдера, що в свою чергу призводить до скорочення часу і витрат на будівельні роботи. Також це може зменшити кількість помилок і підвищити якість роботи грейдера, що поліпшить кінцевий результат проекту. У даній роботі показано особливості інтелектуальних систем керування, що можуть бути використані для автоматизованого керування робочими процесами землерийних машин із використанням штучного інтелекту. Запропоновано реалізацію на мовах програмування, проаналізовано вплив ґрунтових умов на процес автоматизованої роботи, представлено концепцію методики оцінки та прогнозування в інтелектуальних системах підтримки прийняття рішень для інтелектуальної системи дорожньої машини.
- Published
- 2023
- Full Text
- View/download PDF
42. МЕТОДОЛОГІЯ ПОБУДОВИ ОСНОВНИХ МЕТРИК Q-АНАЛІЗУ ТА ЇХ ЗАСТОСУВАННЯ
- Author
-
ПОЛУЦИГАНОВА, В. І. and СМИРНОВ, С. А.
- Subjects
CURRICULUM ,CONCEPTS ,ALGORITHMS - Abstract
Copyright of System Research & Information Technologies / Sistemnì Doslìdžennâ ta Ìnformacìjnì Tehnologìï is the property of Institute for the Applied System Analysis at the NTUU KPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
43. Система моніторингу безпеки
- Author
-
Волокита, Артем Миколайович
- Subjects
алгоритми ,кібернапад ,cybersecurity ,програмування ,004.4 ,кібербезпека ,algorithms ,programming ,cyber attack - Abstract
В цій праці, базуючись на результатах виявлення видів, типів і механізмів дії кібер-цифрових загроз, сформована адекватна цим загрозам базова концепція системи моніторингу безпеки у кіберпросторі, що відповідає сучасним уявленням і вимогам до таких систем та потребує відповідної деталізації і проектування з метою впровадження та реалізації доцільної системи кіберзахисту. Розроблено адаптивний математичний апарат моніторингу безпеки та кіберзахисту ІоТ-систем державного рівня диференціації. Досягнуте наукове завдання щодо удосконалення моніторингу безпеки та інформаційного захисту досліджуваних кіберфізичних систем шляхом впровадження оптимізованої (за ресурсоємністю механізму дії) Blockchain-технології для надійної автентифікації, що є актуальним та сучасним рішенням з застосуванням провідних цифрових технологій. In this paper, based on the results of identifying the types, types and mechanisms of cyber-digital threats, formed adequate to these threats basic concept of cyber security monitoring system, which meets modern ideas and requirements for such systems and requires appropriate detail and design to implement and implementation of an appropriate cyber defense system. An adaptive mathematical apparatus for monitoring the security and cyber protection of IoT-system statelevel differentiation has been developed. The scientific task of improving the security monitoring and information protection of the studied cyberphysical systems by implementing optimized (resource-intensive mechanism of action) Blockchain-technology for reliable authentication, which is a relevant and modern solution using leading digital technologies.
- Published
- 2022
44. Метод та програмні засоби планування і управління виконанням мікросервісних задач
- Author
-
Ліхоузова, Тетяна Анатоліївна
- Subjects
алгоритми ,004.021 ,виконання задач ,microservice architecture ,планування ,планувальник ,planning ,tasks ,algorithms ,scheduler ,мікросервісна архітектура - Abstract
Розмір пояснювальної записки – 74 аркуші, містить 13 ілюстрацій, 27 таблиць, 7 додатків. Актуальність теми. У роботі розглянуто проблему в області проектування мікросервісної архітектури з програмним забезпеченням для запуску простих та періодичних мікросервісних задач, показано основні особливості існуючих рішень проблеми, їх переваги та недоліки. Виявлено потребу в удосконаленні методу побудови мікросервісної архітектури з урахуванням виконання та моніторингу розподілених задач. Мета дослідження. Підвищити зручність та розширити функціонал сервісу для моніторингу та управління виконанням задач в мікросервісному середовищі. Об’єкт дослідження: програмне забезпечення системи моніторингу та управління мікросервісними задачами. Предмет дослідження: сервіси, що виконують запуск простих та періодичних мікросервісних задач. Для реалізації поставленої мети сформульовані наступні завдання: ‒ аналіз існуючих рішень; ‒ створення методів конфігурацій для планування запуску задач; ‒ побудова системи керування запусками задач; ‒ створення системи моніторингу; ‒ оцінка ефективності розробленої системи. Наукова новизна результатів магістерської дисертації полягає в тому, що удосконалено метод побудови мікросервісної архітектури з урахуванням виконання та моніторингу розподілених задач та запропоновано відповідне програмне забезпечення. Результат досягнутий шляхом розробки сервісу для моніторингу та управління виконанням задач в мікросервісному середовищі. Практичне значення отриманих результатів полягає в тому, що створено автономний сервіс для управління виконанням задач у інших сервісах. Зв’язок з науковими програмами, планами, темами. Робота виконувалась на кафедрі інформатики та програмної інженерії Національного технічного університету України "Київський політехнічний інститут імені Ігоря Сікорського". Апробація. Наукові положення дисертації пройшли апробацію на X Міжнародній науково-практичній конференції «SCIENCE FOUNDATIONS OF MODERN SCIENCE AND PRACTICE» – м. Афіни, Греція. Публікації. Наукові положення дисертації опубліковані в: Смірнов О.М. Методи та програмні засоби планування і управління виконанням мікросервісних задач / О.М. Смірнов // Матеріали X Міжнародної науково-практичної конференції «SCIENCE FOUNDATIONS OF MODERN SCIENCE AND PRACTICE» – Афіни, Греція, 23-26 листопада 2021р. Explanatory note size – 74 pages, contains 13 illustrations, 27 tables, 7 applications. Topicality. The paper considers the problem in the field of microservice architecture design with software for running simple and periodic microservice tasks, shows the main features of existing solutions to the problem, their advantages and disadvantages. The need to improve the method of building a microservice architecture, taking into account the implementation and monitoring of distributed tasks. The aim of the study. The main target is to increase convenience and expand the functionality of the service for monitoring and managing the performance of tasks in a microservice environment. Object of research: the software for monitoring and management of microservice tasks. Subject of research: services that perform simple and periodic microservice tasks. To achieve this goal, the following tasks were formulated: ‒ analysis of existing solutions; ‒ creating a configuration methods to plan the start of tasks; ‒ building a task start management system; ‒ creation of a monitoring system; ‒ evaluation of the effectiveness of the developed system. The scientific novelty of the results is that the method of building a microservice architecture is improved, taking into account the implementation and monitoring of distributed tasks, and the appropriate software is proposed. The result was achieved by developing a service for monitoring and managing the implementation of tasks in a microservice environment. The practical value of the obtained results is that an autonomous service has been created to manage the execution of tasks in other services. Relationship with working with scientific programs, plans, topics. Work was performed at the Department of Informatics and Software Engineering of the National Technical University of Ukraine «Kyiv Polytechnic Institute. Igor Sikorsky». Approbation. The scientific provisions of the dissertation were tested at the X International Scientific and Practical Conference "SCIENCE FOUNDATIONS OF MODERN SCIENCE AND PRACTICE" - Athens. Publications. The scientific provisions of the dissertation published in: Smirnov O. M. Methods and software for planning and managing the performance of microservice tasks / O. M. Smirnov // Proceedings of the X International Scientific and Practical Conference "SCIENCE FOUNDATIONS OF MODERN SCIENCE AND PRACTICE" - Athens, Greece, November 23-26, 2021.
- Published
- 2021
45. Randomized Primality Tests
- Author
-
Kozachok, Oleksandra
- Subjects
алгоритми ,простi числа ,randomized algorithms ,primality tests ,prime numbers ,рандомiзованi алгоритми ,перевiрка чисел на простоту ,algorithms - Abstract
Randomization and probabilistic approach in the algorithms development occupy prominent place.Due to limited computing resources and complexity many tasks in some cases it’s impossible to obtain accurate results or it’s too costly, so the results may contain some uncertainty. There are also cases when the indeterminacy of the algorithm is its advantage, for example in cryptography problems, or a useful characteristic: in simulations of processes containing undefined parameters.In this paper, we consider the basic concepts and statements concerning randomized algorithms for checking numbers for simplicity, we present the necessary theorems., Рандомiзацiя та ймовiрнiсний пiдхiд у побудовi алгоритмiв займають помiтне мiсце. Через обмеженiсть обчислювальних ресурсiв та складнiсть багатьох задач у деяких випадках отримати точнi результати є неможливим або занадто витратним, тому результати можуть мiстити деяку невизначенiсть. Також у деяких випадках недетермiнованiсть алгоритму є його перевагою, наприклад у задачах криптографiї, або корисною характеристикою, як-от у симуляцiях процесiв, що мiстять невизначенi параметри.У цiй роботi ми розглядаємо основнi поняття та твердження, що стосуються рандомiзованих алгоритмiв перевiрки чисел на простоту, наводимо необхiднi теореми.
- Published
- 2021
46. Experimental research of the power frequency technogenic magnetic field active screening in system with different control algorithms and with a single coil.
- Author
-
Kuznetsov, B. I., Nikitina, T. B., Bovdyj, I. V., Voloshko, A. V., Vinichenko, E. V., and Kotliarov, D. A.
- Subjects
ELECTROMAGNETS ,MAGNETIC fields ,GEOMAGNETISM ,ELECTROMAGNETIC induction ,ALGORITHMS ,MATHEMATICAL models - Abstract
Purpose. Development of methodology and experimental studies of the layout of the active screening of technogenic power frequency magnetic fields with different control algorithms with a single coil magnetic executive body. Methodology. In the course of mathematical modeling to determine geometrical size of the magnetic coil executive body based on the size of the protected area, and the configuration of the coil magnetic executive body is determined based on the required uniformity of the magnetic field distribution in the protected area. Results. Experimental studies of open, closed and combined systems of active screening of technogenic power frequency magnetic fields with a single coil magnetic executive body. Originality. For the first time experimentally confirmed the possibility of reducing the level of induction of man-made power frequency magnetic fields in a given area 3-5 times with a single coil magnetic executive body.. The possibility of reducing the level of the magnetic field in a limited area of the space by 15-20 times Practical value. On the basis of the calculations the layout of active screening of technogenic power frequency magnetic fields with different control algorithms with a single coil magnetic executive body has been made. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
47. METHOD OF FORECASTING NEEDS IN MATERIAL INVENTORIES ON THE BASIS OF AUTOMOBILE ENTERPRISE
- Author
-
kozhushko, Andrey and Kruikova, Tetiana
- Subjects
automotive company ,forecasting ,purchasing ,methods ,algorithms ,optimization ,автомобільне підприємство ,прогнозування ,закупка ,метод ,алгоритм ,оптимізація - Abstract
The development of a road transport company, in today's realities, directly depends on the planning of its financial activities, because when the demand for services, products changes or when the market situation changes, the profit is also varied. When forming a development plan for an enterprise, the process of forecasting the final financial result plays an important role. The same tendency can be traced in the procurement work of any enterprise. In the process of forecasting in general and in its individual areas, great complexity arises due to a number of objective (and in some cases subjective) reasons. It is a well-known fact that making a forecast increases the efficiency of overall work planning, especially in an environment when forecast results are constantly being adjusted taking into account the variable external environment and the specifics of procurement. In this regard, the purpose of this work arises - the analysis and generalization of the most popular forecasting methods, as well as the proposed combined forecasting method based on optimization theory. When solving this goal, a technique was used, based on the presentation of mathematical algorithms of the most popular forecasting methods. On the basis of which a combined forecasting method is proposed, which has the ability to be implemented by three approaches in determining the weight coefficients using the principles of optimization theory. As a result, the materials of this work show the predicted values of procurement using regression analysis, moving average and exponential smoothing. As the predicted values showed, when using regression analysis per month, the error is 17%. When using extrapolation methods (moving average and exponential smoothing) when forecasting for 3 months, the error was 7.5% and 4.2%, respectively., Розвиток автомобільно-транспортного підприємства, в сьогоднішніх реаліях, напряму залежить від планування його фінансової діяльності, адже при зміні попиту на послуги, продукцію або при варіативності ринкової кон’юнктури варіюється і отримання прибутку. При формуванні плану розвитку підприємства важливу роль відіграє процес прогнозування кінцевого фінансового результату. Така ж тенденція простежується і при закупівельній роботі будь-якого підприємства. В процесі прогнозування в цілому та в окремих його напрямках виникає велика складність, що викликана рядом об’єктивних (а в деяких випадках і суб’єктивних) причин. Відомим фактом є те, що проведення прогнозу підвищує ефективність загального планування роботи, особливо в умовах коли прогнозні результати постійно корегуються з урахуванням змінного зовнішнього середовища та особливостей закупівельної діяльності. В зв’язку з цим виникає мета даної роботи – аналіз та узагальнення найпопулярніших методів прогнозування, а також запропонування комбінованого методу прогнозування, який базується на теорій оптимізації. При вирішенні поставленої мети використовувалась методика, яка ґрунтувалась на представленні математичних алгоритмів найпопулярніших методів прогнозування. На основі якої запропоновано комбінований метод прогнозування, який має можливість реалізовуватись за трьома підходами при визначенні вагових коефіцієнтів з залученням принципів теорії оптимізації. Як результат в матеріалах даної роботи показано прогнозні значення закупівельної діяльності з використанням регресійного аналізу, ковзаючої середньої та експоненціального згладжування. Як показали прогнозні значення, при використанні регресійного аналізу на місяць похибка становить 17%. При використанні методів екстраполяції (ковзаючої середньої та експоненціального згладжування) при прогнозуванні на 3 місяці похибка склала 7,5% та 4,2%, відповідно.
- Published
- 2020
48. Аналіз структури невідкладних станів військовослужбовців Збройних Сил України в сучасних умовах
- Author
-
Badiuk, M. I., Mykyta, O. O., Semeniv, I. P., Rygan, M. M., and Kosarchuk, V. V.
- Subjects
невідкладні стани ,бойова травма ,алгоритми ,протоколи та стандарти надання медичної допомоги ,Збройні Сили України ,emergencies ,wounds and injuries ,algorithms ,clinical protocols ,standard of care ,military personnel ,Ukraine ,неотложные состояния ,боевая травма ,алгоритм ,протоколы и стандарты оказания медицинской помощи ,Вооруженные Силы Украины - Abstract
Purpose: to study the structure of urgent conditions of servicemen with combat injuries and diseases in modern conditions in order to substantiate the development of promising algorithms and medical aid protocols adapted to NATO standards.Materials and methods. The paper presents the results of analysis of the structure and nature of urgent conditions of modern combat pathology and diseases among military personnel who were on treatment at the National Military Medical Clinical Center “Main Military Clinical Hospital” from 1999 to 2018 (191 731 disease histories).Results. The article analyzes the structure of emergency conditions for servicemen of the Armed Forces of Ukraine, who were admitted the National Military Medical Clinical Center “MMCH” in the period from 1999 to 2013 compared with the corresponding indicators for 2014–2017 years. The trends in the dynamics of the indicators of the structure of emergency conditions of servicemen with injuries (including combat ones) and diseases during the period of armed conflict compared to the previous period (1999–2013) were studied. The most urgent conditions of servicemen with combat trauma and serious illnesses are identified, which are the priority for the development and implementation of modern algorithms and protocols for the provision of medical assistance in combat conditions in the Armed Forces of Ukraine. A list of algorithms and protocols for the provision of medical assistance to servicemen of the Armed Forces of Ukraine under the main emergency conditions in today's conditions is proposed.Conclusions. The basic nosological forms of combat injuries and illnesses of military personnel are established in which emergencies are formed: the ХІХ class – injuries and head and brain injuries (27.3 %), abdominal injuries (18.2 %), chest injuries and ribs (12.9 %); X class – pneumonia (75.9 %); ІX class – strokes (40.1 %), myocardial infarction (30.1 %) and hypertensive disease (12.5 %). The main classes, whose nosological forms are accompanied by severe and extremely serious conditions, are the ХІХ class – traumas, poisonings and some other consequences of external causes (48.5 %), class X – respiratory diseases (12.1 %), class IX – Diseases of the circulatory system (7.4 %) and class V – disorders of the psyche and behavior (6.1 %). Identified urgent conditions of servicemen, arising from appropriate nosological forms and included in the described classes of diseases, are priority for the development of priority algorithms and protocols for the provision of medical assistance to servicemen in combat conditions according to NATO standards., Цель работы – исследовать структуру неотложных состояний военнослужащих с боевыми травмами и заболеваниями в современных условиях для обоснования разработки перспективных алгоритмов и протоколов медицинской помощи, адаптированных к стандартам НАТО.Материалы и методы. В работе приведены результаты анализа структуры и характера неотложных состояний современной боевой патологии и заболеваний у военнослужащих, которые находились на лечении в Национальном военно-медицинском клиническом центре «Главный военный клинический госпиталь» с 1999 г. до 2018 г. (191 731 история болезни).Результаты. Проведен анализ структуры неотложных состояний военнослужащих Вооруженных сил Украины, которые поступили в Национальный Военно-медицинский клинический центр «ГВКГ» в период с 1999 по 2013 г. в сравнении с соответствующими показателями за 2014–2017 гг. Исследована тенденция динамики показателей структуры неотложных состояний военнослужащих с травмами (в том числе боевыми) и заболеваниями за время ведения вооруженного конфликта по сравнению с предыдущим периодом (1999–2013). Установлены наиболее актуальные неотложные состояния военнослужащих с боевой травмой и тяжелыми заболеваниями, которые являются приоритетными для разработки и внедрения в Вооруженных Силах Украины современных алгоритмов и протоколов оказания медицинской помощи в боевых условиях. Предложен перечень алгоритмов и протоколов для оказания медицинской помощи военнослужащим Вооруженных Сил Украины при основных неотложных состояниях в современных условиях.Выводы. Установлены основные нозологические формы боевых травм и заболеваний военнослужащих, при которых формируются неотложные состояния: ХІХ класс – ранения и травмы головы и головного мозга (27,3 %), травмы органов брюшной полости (18,2 %), травмы грудной клетки и ребер (12,9 %); X класс – пневмонии (75,9 %); ІX класс – инсульты (40,1 %), инфаркты миокарда (30,1 %), гипертензивная болезнь (12,5 %). Основными классами, нозологические формы которых сопровождаются тяжелыми и крайне тяжелыми состояниями, являются ХІХ – травмы, отравления и некоторые другие последствия воздействия внешних причин (48,5 %), класс X – болезни органов дыхания (12,1 %), класс IX – болезни системы кровообращения (7,4 %), класс V – расстройства психики и поведения (6,1 %). Неотложные состояния военнослужащих, которые возникают при соответствующих нозологических формах и входят в названные классы болезней, являются приоритетными для разработки первоочередных алгоритмов и протоколов оказания медицинской помощи военнослужащим в боевых условиях по стандартам НАТО., Мета роботи – дослідити структуру невідкладних станів військовослужбовців із бойовими травмами та захворюваннями в сучасних умовах.Матеріали та методи. У роботі наведені результати аналізу структури, характеру невідкладних станів сучасної бойової патології та захворювань у військовослужбовців, які перебували на лікуванні в Національному військово-медичному клінічному центрі «Головний військовий клінічний госпіталь» із 1999 р. до 2018 р. (191 731 історія хвороби).Результати. Виконали аналіз структури невідкладних станів військовослужбовців Збройних Сил України, які надійшли до Національного Військово-медичного клінічного центру «ГВКГ» у період з 1999 до 2013 р. порівняно з відповідними показниками за 2014–2017 рр. Дослідили тенденції динаміки показників структури невідкладних станів військовослужбовців із травмами (зокрема бойовими) і захворюваннями за час ведення збройного конфлікту порівняно з попереднім періодом (1999–2013). Виявлено найбільш актуальні невідкладні стани військовослужбовців із бойовою травмою та тяжкими захворюваннями, що є пріоритетними для розробки, впровадження у Збройних Силах України сучасних алгоритмів і протоколів надання медичної допомоги в бойових умовах. Запропоновано перелік алгоритмів і протоколів для надання медичної допомоги військовослужбовцям Збройних Сил України при основних невідкладних станах в умовах сьогодення.Висновки. Встановили основні нозологічні форми бойових травм і захворювань військовослужбовців, коли формуються невідкладні стани: ХІХ клас – поранення та травми голови, головного мозку (27,3 %), травми органів черевної порожнини (18,2 %), травми грудної клітки й ребер (12,9 %); X клас – пневмонії (75,9 %); ІX клас – інсульти (40,1 %), інфаркти міокарда (30,1 %), гіпертензивна хвороба (12,5 %). Основними класами, нозологічні форми яких супроводжуються тяжкими і вкрай тяжкими станами, є ХІХ – травми, отруєння та деякі інші наслідки дії зовнішніх причин (48,5 %), клас X – хвороби органів дихання (12,1 %), клас ІX – хвороби системи кровообігу (7,4 %), клас V – розлади психіки і поведінки (6,1 %). Виявлені невідкладні стани військовослужбовців, що виникають при відповідних нозологічних формах і входять до названих класів хвороб, є пріоритетними для розроблення першочергових алгоритмів і протоколів надання медичної допомоги військовослужбовцям у бойових умовах за стандартами НАТО.
- Published
- 2018
49. Computer algebra systems in the elementary number theory
- Subjects
теорія чисел ,Maple ,алгоритми ,подільність ,порівняння ,символ Лежандра ,первісні корені ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Computer Science::Mathematical Software ,теория чисел ,алгоритмы ,делимость ,сравнения ,первообразные корни ,number theory ,algorithms ,divisibility ,congruence ,Legendre symbol ,primitive roots ,УДК 510.6 - Abstract
Recently we have seen the active penetration of computer algebra systems to the educational process because it allows to form an innovative learning technologies. Almost every branch of mathematics the Maple developed the separate specialized package commands. However, currently these technologies, despite its effectiveness and visibility, for various reasons, are still not common in the classroom. The purpose of this article is to review basic information about the capabilities of computer algebra to solve some common problems of the elementary number theory, and which can be used to solve educational problems. The paper describes the package description commands NumberTheory of the computer algebra system Maple. The methods of solving some common problems in the number theory in Maple. Using discussed the team package Maple a teacher can illustrate the problem solving in the classroom for the subject of the elementary number theory., Дано описание основных команд пакета numtheory системы компьютерной алгебры Maple. Рассмотрены способы решения некоторых типичных вычислительных задач элементарной теории чисел в Maple. В частности рассмотрены команды для следующих разделов: делимость чисел, арифметические и мультипликативные функции, сравнения, символы Якоби и Лежандра, первообразные корни и дискретные логарифмы., Дано опис основних команд пакету numtheory системи комп’ютерної алгебри Maple. Розглянуто способи розв’язання деяких типових обчислювальних задач елементарної теорії чисел в Maple. Зокрема розглянуті команди для наступних розділів: подільність чисел, арифметичні та мультиплікативні функції, порівняння, символи Якобі та Лежандра, первісні корені та дискретні логарифми.
- Published
- 2013
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.