Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-82-92
Y. Bilynsky, S. Zhyvotivskyi
The article reviews the key means of creating 3D models of objects and controlling their geometric parameters by using 3D scanners. A comparative analysis was conducted based on the use of the most promising 3D scanners.
{"title":"Overview of industrial non-contact 3D scanners for biomedical using","authors":"Y. Bilynsky, S. Zhyvotivskyi","doi":"10.31649/1681-7893-2022-44-2-82-92","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-82-92","url":null,"abstract":"The article reviews the key means of creating 3D models of objects and controlling their geometric parameters by using 3D scanners. A comparative analysis was conducted based on the use of the most promising 3D scanners.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-44-48
O. Galochkin, D. Uhryn, A.V. Hostyuk, O. Ushenko
Data security is one of the main tasks solved by IT departments of companies. Moreover, it is not only about preventing the leakage of corporate information, reducing the volume of parasitic traffic and repelling attacks on the company's resources, but also about optimizing the system as a whole. It is virtually impossible to find a universal solution in this matter: the heterogeneity of the spheres of activity and the structures of organizations translates the task into a category that requires an individual approach. The article deals with the main information threats of corporate systems, as well as methods of protection against common threats and attacks on information systems of the enterprise, estimated the cost of specific solutions.
{"title":"Complex protection of information in operating systems","authors":"O. Galochkin, D. Uhryn, A.V. Hostyuk, O. Ushenko","doi":"10.31649/1681-7893-2022-44-2-44-48","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-44-48","url":null,"abstract":"Data security is one of the main tasks solved by IT departments of companies. Moreover, it is not only about preventing the leakage of corporate information, reducing the volume of parasitic traffic and repelling attacks on the company's resources, but also about optimizing the system as a whole. \u0000It is virtually impossible to find a universal solution in this matter: the heterogeneity of the spheres of activity and the structures of organizations translates the task into a category that requires an individual approach. The article deals with the main information threats of corporate systems, as well as methods of protection against common threats and attacks on information systems of the enterprise, estimated the cost of specific solutions.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-66-81
S. Pavlov, W. Wójcik, R. Holyaka, N. Titova, L. Nykyforova, O. D. Azarov, M.F. Tereshchenko, V. Kholin, M.F. Bogomolov, O.S. Komarova
It is shown that thermal flow sensors are characterized by high structural and technological compatibility with biomedical equipment and, compared to other types of flow sensors, they most fully meet the requirements for this equipment. The developed signal converters fully meet the requirements for modern biomedical equipment and energy-saving low-voltage electronics (unipolar 3V power supply), provide a negligible thermal effect on the flow environment and are implemented on the latest element base - high-precision CMOS railto-rail operational amplifiers, bidirectional multiplexers of the type ADG, ADuC type microconverters, powerful D-MOS HEX FET transistors, etc
{"title":"Design features of thermal flow sensors for biomedical purposes","authors":"S. Pavlov, W. Wójcik, R. Holyaka, N. Titova, L. Nykyforova, O. D. Azarov, M.F. Tereshchenko, V. Kholin, M.F. Bogomolov, O.S. Komarova","doi":"10.31649/1681-7893-2022-44-2-66-81","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-66-81","url":null,"abstract":"It is shown that thermal flow sensors are characterized by high structural and technological compatibility with biomedical equipment and, compared to other types of flow sensors, they most fully meet the requirements for this equipment. The developed signal converters fully meet the requirements for modern biomedical equipment and energy-saving low-voltage electronics (unipolar 3V power supply), provide a negligible thermal effect on the flow environment and are implemented on the latest element base - high-precision CMOS railto-rail operational amplifiers, bidirectional multiplexers of the type ADG, ADuC type microconverters, powerful D-MOS HEX FET transistors, etc","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-100-113
V. I. Malinovsky, L. Kupershtein, V. Kaplun
The article presents and provides materials for the analysis of the main distributed information. Influences and information threats in microcontroller systems that work as part of electronic systems of modern electronic devices and automation. The main widespread information threats and the ways of intervention of informational influences are determined. An assessment of their impact and short-term ways of minimizing them are provided. The main basic types of widespread cyberthreats and channels directly affect the stability and safety of the microprograms of the MK itself and, as a result, the operation of the electronic devices in which this MK is included. The channels of information threats for microcontrollers are their weak points, which need to be studied in order to further eliminate and minimize them. This made it possible to assess the main vulnerabilities in the MK architecture and, in the future, to plan an action plan to minimize and neutralize the main threats and information influences in the MK for the stable and safe functioning of electronic systems based on microcontrollers.
{"title":"Analysis of the main information threats and impacts in modern microcontroller systems (analytical review)","authors":"V. I. Malinovsky, L. Kupershtein, V. Kaplun","doi":"10.31649/1681-7893-2022-44-2-100-113","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-100-113","url":null,"abstract":"The article presents and provides materials for the analysis of the main distributed information. Influences and information threats in microcontroller systems that work as part of electronic systems of modern electronic devices and automation. The main widespread information threats and the ways of intervention of informational influences are determined. An assessment of their impact and short-term ways of minimizing them are provided. The main basic types of widespread cyberthreats and channels directly affect the stability and safety of the microprograms of the MK itself and, as a result, the operation of the electronic devices in which this MK is included. The channels of information threats for microcontrollers are their weak points, which need to be studied in order to further eliminate and minimize them. This made it possible to assess the main vulnerabilities in the MK architecture and, in the future, to plan an action plan to minimize and neutralize the main threats and information influences in the MK for the stable and safe functioning of electronic systems based on microcontrollers.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124624442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-93-99
Y. Ushenko, D. Uhryn, O. Galochkin, I.V. Zosko
In given article, we investigate medical images and develop an intelligent system for identification of the disease on their basis. The paper proposes an approach to finding the affected tissue areas in medical images. To find them, a mask was extracted for training a neural network. Mask extraction was carried out using annotations, where polygons with affected tissues were identified. The studied objects were assigned to different classifications of morbidity.
{"title":"System analysis and model of disease identification based on medical images","authors":"Y. Ushenko, D. Uhryn, O. Galochkin, I.V. Zosko","doi":"10.31649/1681-7893-2022-44-2-93-99","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-93-99","url":null,"abstract":"In given article, we investigate medical images and develop an intelligent system for identification of the disease on their basis. The paper proposes an approach to finding the affected tissue areas in medical images. To find them, a mask was extracted for training a neural network. Mask extraction was carried out using annotations, where polygons with affected tissues were identified. The studied objects were assigned to different classifications of morbidity.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114815617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-32-37
T. Martyniuk, D.O. Katashynskyi, M.V. Mykytyuk, M.O. Zaitsev
The features and functionality of processing of the one – dimensional (vector) arrays of numerical data by the use of computational method with the formation of difference slices are considered. At the base of this method SM – transformation principles are used. The allocation of the minimum of non-zero component of the element array in this case is considered as the formation of the internal processing threshold and is the basic procedure of SM - transformation in each processing cycle. As a result, not only the operation of parallel multi-operand summation of the number array is realized, but also there is an opportunity to restore the initial number array, as well as to sort its elements according to the growth of their numerical values and to form their ranks. Two matrices of binary masks are used for this, that are formed during the processing, which are the matrices of zero and positive criterion, respectively, inherent in the elements of the current difference slices. In addition, in each processing cycle the internal thresholds form a vector of internal thresholds as a result, which takes part in restoring the elements of the initial array. The it is presented in the article the basic relations of difference slice processing, and the examples that confirm their validity using data presented in the form of a table.
{"title":"Features of computational processes based on SM – transformation","authors":"T. Martyniuk, D.O. Katashynskyi, M.V. Mykytyuk, M.O. Zaitsev","doi":"10.31649/1681-7893-2022-44-2-32-37","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-32-37","url":null,"abstract":"The features and functionality of processing of the one – dimensional (vector) arrays of numerical data by the use of computational method with the formation of difference slices are considered. At the base of this method SM – transformation principles are used. The allocation of the minimum of non-zero component of the element array in this case is considered as the formation of the internal processing threshold and is the basic procedure of SM - transformation in each processing cycle. As a result, not only the operation of parallel multi-operand summation of the number array is realized, but also there is an opportunity to restore the initial number array, as well as to sort its elements according to the growth of their numerical values and to form their ranks. Two matrices of binary masks are used for this, that are formed during the processing, which are the matrices of zero and positive criterion, respectively, inherent in the elements of the current difference slices. In addition, in each processing cycle the internal thresholds form a vector of internal thresholds as a result, which takes part in restoring the elements of the initial array. The it is presented in the article the basic relations of difference slice processing, and the examples that confirm their validity using data presented in the form of a table.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123906273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-55-65
Y. Tomka, M. Talakh, V. Dvorzhak, O. Ushenko
The generalized algorithm of a typical convolutional neural network realization by means of TensorFlow machine learning library is considered. The peculiarities of the coding implementation of the convolutional neural network in the image recognition problem are analyzed with the example of the MNIST datаset.
{"title":"Implementation of a convolutional neural network using Tensorflow machine learning platform","authors":"Y. Tomka, M. Talakh, V. Dvorzhak, O. Ushenko","doi":"10.31649/1681-7893-2022-44-2-55-65","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-55-65","url":null,"abstract":"The generalized algorithm of a typical convolutional neural network realization by means of TensorFlow machine learning library is considered. The peculiarities of the coding implementation of the convolutional neural network in the image recognition problem are analyzed with the example of the MNIST datаset.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-5-12
O. M. Yatsko, E.V. Vatamanitsa, M. Gorsky
The analysis of the possibility of using OLAP-modeling that support the activities of financial institutions and support the functioning of business processes, the adoption of effective solutions at all levels of organization management (production, marketing, and personnel decisions, decisions affecting prices, discounts), which in the final the result will lead that the success of the entire organization as a whole, can be implemented through the use of OLAP technologies and OLAP systems. The results of the study can be tested through the implementation of relevant projects driven by challenges and trends in the financial industry, and market and regulatory changes.
{"title":"Review of olap-modeling application in the economic industry of Ukraine","authors":"O. M. Yatsko, E.V. Vatamanitsa, M. Gorsky","doi":"10.31649/1681-7893-2022-44-2-5-12","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-5-12","url":null,"abstract":"The analysis of the possibility of using OLAP-modeling that support the activities of financial institutions and support the functioning of business processes, the adoption of effective solutions at all levels of organization management (production, marketing, and personnel decisions, decisions affecting prices, discounts), which in the final the result will lead that the success of the entire organization as a whole, can be implemented through the use of OLAP technologies and OLAP systems. The results of the study can be tested through the implementation of relevant projects driven by challenges and trends in the financial industry, and market and regulatory changes.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131298433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-17DOI: 10.31649/1681-7893-2022-44-2-38-43
V. Antonenko, V. Borovytsky
The article presents an overview of bio-similar motion sensors facet systems of technical vision – the Reichard correlation detector, the Horridge and Nguyen model, and it proposed the universal motion detection sensor. This sensor contains a microcontroller that quickly calculates the correlation function and its maximum value to find the direction and speed of movement in the field of view. The principles of their operation, advantages, disadvantages, and possibilities of application are considered.
{"title":"Signal processing in facet systems of technical vision","authors":"V. Antonenko, V. Borovytsky","doi":"10.31649/1681-7893-2022-44-2-38-43","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-44-2-38-43","url":null,"abstract":"The article presents an overview of bio-similar motion sensors facet systems of technical vision – the Reichard correlation detector, the Horridge and Nguyen model, and it proposed the universal motion detection sensor. This sensor contains a microcontroller that quickly calculates the correlation function and its maximum value to find the direction and speed of movement in the field of view. The principles of their operation, advantages, disadvantages, and possibilities of application are considered.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-28DOI: 10.31649/1681-7893-2022-43-1-76-81
O. Galochkin, D. Uhryn, E.V. Vatamanitsa, I. Soltys
The paper describes a method for obtaining p-n transitions due to the laser recrystallization of the surface of CdTe semiconductor samples, as well as a software application developed in Java that allows the simulation of thermal processes at the boundary of the epitaxial layer-substrate with laser irradiation of the semiconductor surface. It allows to make predictions regarding the thickness of the melted layer, which will affect the parameters of the devices made on the basis of the obtained barrier layers. The theoretical modeling of the processes taking place at absorption of laser radiation by the surface layer of a semiconductor is carried out.
{"title":"Simulation of the depth of the melted layer on the surface of a semiconductor using JAVA cross-platform application","authors":"O. Galochkin, D. Uhryn, E.V. Vatamanitsa, I. Soltys","doi":"10.31649/1681-7893-2022-43-1-76-81","DOIUrl":"https://doi.org/10.31649/1681-7893-2022-43-1-76-81","url":null,"abstract":"The paper describes a method for obtaining p-n transitions due to the laser recrystallization of the surface of CdTe semiconductor samples, as well as a software application developed in Java that allows the simulation of thermal processes at the boundary of the epitaxial layer-substrate with laser irradiation of the semiconductor surface. It allows to make predictions regarding the thickness of the melted layer, which will affect the parameters of the devices made on the basis of the obtained barrier layers. The theoretical modeling of the processes taking place at absorption of laser radiation by the surface layer of a semiconductor is carried out.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115102982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}