首页 > 最新文献

2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

英文 中文
Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement 基于多位置距离测量的隐式发射机定位精度模型
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349304
V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov
The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.
本文考虑了基于距离测量法的隐式发射机多位置定位精度的数学模型。该模型以发射机到同步接收机群的距离作为主要参数进行计算。采用最小二乘法建立定位精度模型。定位精度的估计是在对隐藏发射机的定位精度与对接收天线的距离测量精度进行比较的基础上进行的。通过仿真得到了典型办公楼定位精度场的实际结果。
{"title":"Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement","authors":"V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov","doi":"10.1109/ATIT50783.2020.9349304","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349304","url":null,"abstract":"The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Generative Adversarial Neural Network for Creating Photorealistic Images 生成对抗神经网络创建逼真的图像
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349326
Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova
This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity
本文的重点是研究生成对抗神经网络(GAN或GANN)作为创建各种功能样本的工具,特别是逼真的图像(图形,分子等)。本文考虑了现有的网络设计和算法的方法和途径,以及不同类型的结构与各种组合的有效性,并以手写体数字创建为例作为逼真图像之一。本文探讨了生成对抗神经网络作为人工智能复杂范式的实现的应用价值。研究结果证明了GAN技术在设计各种复杂类型和类别的样品方面的效率
{"title":"Generative Adversarial Neural Network for Creating Photorealistic Images","authors":"Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova","doi":"10.1109/ATIT50783.2020.9349326","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349326","url":null,"abstract":"This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125821078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations 用微分-泰勒变换求解稳定微分方程的建模
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349265
Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov
The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.
本文给出了鲍姆加特法稳定常微分方程数值积分的一种典型算法。积分是在普霍夫微分-泰勒变换的基础上进行的。考虑了恒步长和顺序集成,以及“分步”、“分步和顺序”自适应。针对自适应问题,在传统的根据积分的相位变量给出给定相对误差的方法之外,提出了一种根据鲍姆加特法稳定所采用的原微分方程的积分给出给定相对误差的方法。考虑了对航天器运动微分方程进行积分的一个实例。该算法可有效地用于常微分方程计算机积分程序的开发。
{"title":"Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations","authors":"Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov","doi":"10.1109/ATIT50783.2020.9349265","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349265","url":null,"abstract":"The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm 基于神经网络MELM算法的无人机自主飞行轨迹控制方法
Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349317
O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko
{"title":"Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm","authors":"O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko","doi":"10.1109/atit50783.2020.9349317","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349317","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Results of System Analysis of Functional Diagrams and Operation Algorithms of Tracking Systems of Tracking Radar of Antiaircraft Missile Armament With Digital Processing of Error Signal 基于误差信号数字化处理的防空导弹武器装备跟踪雷达跟踪系统功能图与操作算法系统分析结果
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349335
I. Sachuk, P. Kushch, A. Kalyta, P. Open’ko, V. Orlenko, S. Bondarenko
Typical functional diagrams and operation algorithms of tracking system of tracking radar of antiaircraft missile armament with digital processing of error signal are considered. It’s showed that independent of the measurable parameters of radio signal all tracking systems have a similar structure. The leading place of digital filter in the performance of defined target movement model by tracking system is based. The state matrix equations for target movement model used in tracking system of tracking radar of antiaircraft missile armament are obtained. The ways of further research for improvement of target tracking accuracy are defined.
研究了采用误差信号数字化处理的防空导弹武器装备跟踪雷达跟踪系统的典型功能图和操作算法。结果表明,与无线电信号的可测参数无关,所有跟踪系统都具有相似的结构。分析了数字滤波器在跟踪系统对目标运动模型的性能控制中的领先地位。得到了防空导弹武器装备跟踪雷达跟踪系统中目标运动模型的状态矩阵方程。明确了进一步研究提高目标跟踪精度的途径。
{"title":"The Results of System Analysis of Functional Diagrams and Operation Algorithms of Tracking Systems of Tracking Radar of Antiaircraft Missile Armament With Digital Processing of Error Signal","authors":"I. Sachuk, P. Kushch, A. Kalyta, P. Open’ko, V. Orlenko, S. Bondarenko","doi":"10.1109/ATIT50783.2020.9349335","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349335","url":null,"abstract":"Typical functional diagrams and operation algorithms of tracking system of tracking radar of antiaircraft missile armament with digital processing of error signal are considered. It’s showed that independent of the measurable parameters of radio signal all tracking systems have a similar structure. The leading place of digital filter in the performance of defined target movement model by tracking system is based. The state matrix equations for target movement model used in tracking system of tracking radar of antiaircraft missile armament are obtained. The ways of further research for improvement of target tracking accuracy are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission 傅里叶变换在数据传输信号理论研究中的应用
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349308
Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna
Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.
现在,我们总是使用不同的网络进行任何数据传输。这种数据传输通常是用某种类型的信号来实现的。有时用傅里叶级数和傅里叶变换来研究这些信号会更好。本文提出了一种可用于数据传输的信号理论研究方法。这项工作的科学新颖之处在于研究了基于傅里叶级数的函数的积分表示在构造插值多项式中的应用。有许多插值多项式,可以通过这种方式建立。用相同的积分表示来构造插值多项式有不同的方法。主要研究了泊松积分在插值多项式定义中的应用。在工作时间内建立的插值多项式与常用的插值多项式相比,具有较好的信号恢复效果,并且易于进行不同的修改。将建立的插值多项式与傅里叶变换相结合,为信号理论提供了许多有用而有力的工具。
{"title":"Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission","authors":"Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna","doi":"10.1109/ATIT50783.2020.9349308","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349308","url":null,"abstract":"Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information and Encoding Theory 信息与编码理论
Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349293
{"title":"Information and Encoding Theory","authors":"","doi":"10.1109/atit50783.2020.9349293","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349293","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of Security Authentication and Authorization into Informationals Systems 信息系统的安全认证和授权方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349333
Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav
There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.
在信息系统中,有许多组织身份验证和授权的方法。通常,身份验证用于提供登录,身份验证主要是个人用户数据的安全工具。它是防止接收任何系统信息的第一级保护。反过来,授权有助于在运行具有不同权限的多个不同用户时确保数据完整性。信息和通信系统的安全包括保护为存储、搜索和处理信息而设计的计算机系统(数据库、应用程序、各种设备的控制系统等)和用于传播信息的计算机系统(互联网、本地控制和无线网络、移动通信、无线电通信、卫星通信等)中的信息流通,使其免遭未经授权的访问。伪造和破坏。在我们这个时代,信息和通信革命是最紧迫的任务,解决这一问题对使用计算机技术和电信的人类活动的各个领域的安全至关重要。本文考虑了现有的认证和授权机制,以及它们影响信息系统网络安全的优缺点。阐述了使用标准化信息系统登录方法的理论和方法要求。
{"title":"Methods of Security Authentication and Authorization into Informationals Systems","authors":"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav","doi":"10.1109/ATIT50783.2020.9349333","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349333","url":null,"abstract":"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion and Fire Detection Method by Wireless Sensor Network 基于无线传感器网络的入侵和火灾探测方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349351
A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko
The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.
验证本文的新颖性和实用价值的主要任务是开发用于检测入侵和火灾的无线传感器网络。提出了一种用于监测温度和一氧化碳浓度的传感器网络模型。提出了一种用于监测温度和一氧化碳水平的无线传感器单元。提出了一种测定温度跳跃和一氧化碳以测定穿透和火灾的方法。研究了用于火灾和入侵探测的无线传感器网络的数据传输过程。
{"title":"Intrusion and Fire Detection Method by Wireless Sensor Network","authors":"A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko","doi":"10.1109/ATIT50783.2020.9349351","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349351","url":null,"abstract":"The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Algorithm of Control of Functionally Stable Manufacturing Processes of Enterprises 企业功能稳定制造过程控制算法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349332
V. Sobchuk, V. Pichkur, O. Barabash, O. Laptiev, Kovalchuk Igor, Amina Zidan
The article analyzes the concept of process control at an industrial enterprise, ensuring the functional stability of technological processes. A novelty of the proposed model is the use of pseudo- inversion tools as an apparatus that provides the best solution of a system of algebraic equations, the parameters of which describe the technological process. The algorithm for the organization and planning of technological processes is offered. With the help of pseudo-inversion the control algorithm for functionally stable technological process of the production enterprise is constructed
本文分析了工业企业过程控制的概念,以保证工艺过程的功能稳定性。提出的模型的一个新颖之处在于使用伪反演工具作为一种装置,它提供了代数方程系统的最佳解,其参数描述了工艺过程。给出了工艺流程的组织与规划算法。利用伪逆构造了生产企业功能稳定工艺过程的控制算法
{"title":"Algorithm of Control of Functionally Stable Manufacturing Processes of Enterprises","authors":"V. Sobchuk, V. Pichkur, O. Barabash, O. Laptiev, Kovalchuk Igor, Amina Zidan","doi":"10.1109/ATIT50783.2020.9349332","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349332","url":null,"abstract":"The article analyzes the concept of process control at an industrial enterprise, ensuring the functional stability of technological processes. A novelty of the proposed model is the use of pseudo- inversion tools as an apparatus that provides the best solution of a system of algebraic equations, the parameters of which describe the technological process. The algorithm for the organization and planning of technological processes is offered. With the help of pseudo-inversion the control algorithm for functionally stable technological process of the production enterprise is constructed","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1