首页 > 最新文献

Radioelectronic and Computer Systems最新文献

英文 中文
Design of information and measurement systems within the Industry 4.0 paradigm 工业4.0模式下的信息和测量系统设计
Q3 Computer Science Pub Date : 2023-03-07 DOI: 10.32620/reks.2023.1.04
O. Vasylenko, Sergii Ivchenko, Hennadii Snizhnoi
The subject of the study is the process of Information and Measuring System (IMS) designing as a component of the Cyber-Physical System (CPS) in the paradigm of Industry 4.0 (I4.0). The aim of the study is to develop methodological support for the design of IMS and Automatic Control Systems (ACS) as components of production CPS (CPPS), in particular, for Digital Factory. Objectives: to determine the conceptual model of IMS; choose the IoT model for structural synthesis, select the appropriate regulatory (sets of standards and implementation models) and hardware; perform R&D of IMS based on NB-IoT sensors; formalize the procedure for integrating components into the CPPS, develop the Asset Administration Shell. The methods used are: heuristic synthesis methods, experimental planning theory. The following results were obtained. The key role of optimally designed IMS level 4.0 in increased decision-making accuracy in CPPS management and control processes is demonstrated. The quality of control is improved both by quickly obtaining accurate information for updating models in cyber add-ons, and at the physical level, in ACS. The universal model of IMS implementation in CPPS was proposed. The stages of choosing the concept, structure, hardware and communication protocols of the IIoT ecosystem IMS + ACS have been performed. The methodology was tested during the development of the NB-IoT Tech remote monitoring system, which has a decentralized structure for collection data on resources consumed. The integration of the ecosystem as a component of CPPS at the appropriate levels of the architectural model RAMI 4.0 has been performed. Regulatory support has been formed and the functional aspect of the Asset Administrative Shell for CPPS integration has been developed. Conclusions. Scientific novelty: it is proposed to design the IMS as a component of the AAS of the cyber-physical system, according to the implementation methodology of its subsystems at the corresponding levels of RAMI4.0 and the selected IoT model. The new approach, called "soft digitalization", combines the approaches of Industry 3.0 and 4.0, it is designed for the sustainable development of automated systems to the level of cyber-physical systems and is relevant for the recovery of the economy of Ukraine. Practical significance of the results: the IoT-Tech system based on Smart sensors has been developed and tested. This information and measurement system is non-volatile and adapted to measure any parameters in automated systems of various levels of digitization.
本研究的主题是在工业4.0 (I4.0)范式下,作为信息物理系统(CPS)组成部分的信息与测量系统(IMS)的设计过程。该研究的目的是为IMS和自动控制系统(ACS)的设计提供方法支持,作为生产CPS (CPPS)的组成部分,特别是数字工厂。目的:确定IMS的概念模型;选择物联网模型进行结构综合,选择合适的监管(标准集和实施模型)和硬件;基于NB-IoT传感器的IMS研发;将组件集成到CPPS的程序正规化,开发资产管理外壳。采用的方法有:启发式综合法、实验规划理论。得到了以下结果:优化设计的IMS 4.0在提高CPPS管理和控制过程中的决策准确性方面发挥了关键作用。通过快速获得准确的信息来更新网络附加组件中的模型,以及在ACS的物理层面上,控制质量得到了提高。提出了在CPPS中实现IMS的通用模型。完成了工业物联网生态系统IMS + ACS的概念、结构、硬件和通信协议的选择阶段。该方法在NB-IoT技术远程监控系统的开发过程中进行了测试,该系统具有分散的结构,用于收集所消耗资源的数据。已经在体系结构模型RAMI 4.0的适当级别上将生态系统集成为CPPS的组件。已经形成了监管支持,并且已经开发了资产管理外壳的功能方面,用于CPPS集成。结论。科学新颖性:建议根据RAMI4.0相应级别和所选物联网模型的子系统实施方法,将IMS设计为网络物理系统AAS的一个组成部分。这种被称为“软数字化”的新方法结合了工业3.0和4.0的方法,旨在将自动化系统的可持续发展提升到网络物理系统的水平,并与乌克兰的经济复苏有关。结果的现实意义:基于智能传感器的IoT-Tech系统已经开发和测试。该信息和测量系统是非易失性的,适合于测量各种数字化水平的自动化系统中的任何参数。
{"title":"Design of information and measurement systems within the Industry 4.0 paradigm","authors":"O. Vasylenko, Sergii Ivchenko, Hennadii Snizhnoi","doi":"10.32620/reks.2023.1.04","DOIUrl":"https://doi.org/10.32620/reks.2023.1.04","url":null,"abstract":"The subject of the study is the process of Information and Measuring System (IMS) designing as a component of the Cyber-Physical System (CPS) in the paradigm of Industry 4.0 (I4.0). The aim of the study is to develop methodological support for the design of IMS and Automatic Control Systems (ACS) as components of production CPS (CPPS), in particular, for Digital Factory. Objectives: to determine the conceptual model of IMS; choose the IoT model for structural synthesis, select the appropriate regulatory (sets of standards and implementation models) and hardware; perform R&D of IMS based on NB-IoT sensors; formalize the procedure for integrating components into the CPPS, develop the Asset Administration Shell. The methods used are: heuristic synthesis methods, experimental planning theory. The following results were obtained. The key role of optimally designed IMS level 4.0 in increased decision-making accuracy in CPPS management and control processes is demonstrated. The quality of control is improved both by quickly obtaining accurate information for updating models in cyber add-ons, and at the physical level, in ACS. The universal model of IMS implementation in CPPS was proposed. The stages of choosing the concept, structure, hardware and communication protocols of the IIoT ecosystem IMS + ACS have been performed. The methodology was tested during the development of the NB-IoT Tech remote monitoring system, which has a decentralized structure for collection data on resources consumed. The integration of the ecosystem as a component of CPPS at the appropriate levels of the architectural model RAMI 4.0 has been performed. Regulatory support has been formed and the functional aspect of the Asset Administrative Shell for CPPS integration has been developed. Conclusions. Scientific novelty: it is proposed to design the IMS as a component of the AAS of the cyber-physical system, according to the implementation methodology of its subsystems at the corresponding levels of RAMI4.0 and the selected IoT model. The new approach, called \"soft digitalization\", combines the approaches of Industry 3.0 and 4.0, it is designed for the sustainable development of automated systems to the level of cyber-physical systems and is relevant for the recovery of the economy of Ukraine. Practical significance of the results: the IoT-Tech system based on Smart sensors has been developed and tested. This information and measurement system is non-volatile and adapted to measure any parameters in automated systems of various levels of digitization.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47008334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for spectrum holes detection based on mode analysis of spectral samples histogram 基于频谱样本直方图模式分析的频谱空洞检测方法
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.08
M. Buhaiov, V. Kliaznyka, Ihor Kozyura, Denys Zavhorodnii
The subject of this article is the process of detection and estimation frequency boundaries of spectrum holes under conditions of high spectrum occupancy when using receivers with narrow instantaneous bandwidths. The work increases the probability of spectrum holes correct detection in conditions of high occupancy of the radio frequency spectrum and variable noise levels by developing a method to distinguish signal and noise samples based on the analysis of the histogram of spectral sample modes. The tasks to be solved are: development of a method for separation signal and noise samples in the frequency domain; development of a methodology to find the minimum mode of a multimodal probability distribution; determination of frequency boundaries of spectrum holes; formulation of recommendations for the practical implementation of developed method. The methods used are: methods of probability theory and mathematical statistics, methods of statistical modeling. The essence of the proposed method is to distinguish the set of energy spectrum samples using a threshold, obtained for the value of the histogram mode, which corresponds to noise, and to determine the frequency boundaries of spectrum holes. The following results were obtained: an expression for calculating the threshold value for separation signal and noise samples in the frequency domain using the value, which corresponds to the noise mode of the frequency samples of the probability density function. It was found that the noise mode has the smallest value among other modes, since noise samples have a smaller value compared to the signal ones. A technique for estimating the value of the noise mode has been developed, which consists of a histogram of energy spectrum frequency samples and finding the partition interval that corresponds to the value of the minimal mode. An approach was proposed to determine the frequency boundaries of noise samples in the presence of one signal in the analyzed band. Conclusions. The developed method allows detecting spectrum holes with a probability of at least 0.9 at signal-to-noise ratio values of at least 5 dB for the spectrum with a rectangular shape envelope and 12 dB for other envelopes under occupancy of up to 80%.
本文的主题是在使用具有窄瞬时带宽的接收机时,在高频谱占用条件下检测和估计频谱空洞的频率边界的过程。该工作通过开发一种基于频谱样本模式直方图分析的区分信号和噪声样本的方法,增加了在无线电频谱占用率高和噪声水平可变的条件下频谱空洞正确检测的概率。要解决的任务是:开发一种在频域中分离信号和噪声样本的方法;开发一种方法来寻找多模式概率分布的最小模式;频谱孔频率边界的确定;为所开发方法的实际实施制定建议。使用的方法有:概率论和数理统计方法,统计建模方法。所提出的方法的本质是使用阈值来区分能谱样本集,该阈值是针对对应于噪声的直方图模式的值而获得的,并且确定谱孔的频率边界。获得了以下结果:使用该值计算频域中分离信号和噪声样本的阈值的表达式,该值对应于概率密度函数的频率样本的噪声模式。发现噪声模式在其他模式中具有最小的值,因为噪声样本与信号样本相比具有较小的值。已经开发了一种估计噪声模式值的技术,该技术由能谱频率样本的直方图组成,并找到与最小模式值相对应的分割区间。提出了一种在分析频带中存在一个信号的情况下确定噪声样本的频率边界的方法。结论。所开发的方法允许在具有矩形包络的频谱的信噪比值至少为5dB和在高达80%的占用率下的其他包络的信噪比值为12dB的情况下,以至少0.9的概率检测频谱空穴。
{"title":"Method for spectrum holes detection based on mode analysis of spectral samples histogram","authors":"M. Buhaiov, V. Kliaznyka, Ihor Kozyura, Denys Zavhorodnii","doi":"10.32620/reks.2022.4.08","DOIUrl":"https://doi.org/10.32620/reks.2022.4.08","url":null,"abstract":"The subject of this article is the process of detection and estimation frequency boundaries of spectrum holes under conditions of high spectrum occupancy when using receivers with narrow instantaneous bandwidths. The work increases the probability of spectrum holes correct detection in conditions of high occupancy of the radio frequency spectrum and variable noise levels by developing a method to distinguish signal and noise samples based on the analysis of the histogram of spectral sample modes. The tasks to be solved are: development of a method for separation signal and noise samples in the frequency domain; development of a methodology to find the minimum mode of a multimodal probability distribution; determination of frequency boundaries of spectrum holes; formulation of recommendations for the practical implementation of developed method. The methods used are: methods of probability theory and mathematical statistics, methods of statistical modeling. The essence of the proposed method is to distinguish the set of energy spectrum samples using a threshold, obtained for the value of the histogram mode, which corresponds to noise, and to determine the frequency boundaries of spectrum holes. The following results were obtained: an expression for calculating the threshold value for separation signal and noise samples in the frequency domain using the value, which corresponds to the noise mode of the frequency samples of the probability density function. It was found that the noise mode has the smallest value among other modes, since noise samples have a smaller value compared to the signal ones. A technique for estimating the value of the noise mode has been developed, which consists of a histogram of energy spectrum frequency samples and finding the partition interval that corresponds to the value of the minimal mode. An approach was proposed to determine the frequency boundaries of noise samples in the presence of one signal in the analyzed band. Conclusions. The developed method allows detecting spectrum holes with a probability of at least 0.9 at signal-to-noise ratio values of at least 5 dB for the spectrum with a rectangular shape envelope and 12 dB for other envelopes under occupancy of up to 80%.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49431106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis and prediction of polarity vaccines based on Twitter data using deep NLP techniques 基于Twitter数据的极性疫苗情感分析和预测,使用深度自然语言处理技术
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.02
H. Badi, Imad Badi, K. E. Moutaouakil, Aziz Khamjane, Abdelkhalek Bahri
The global impact of COVID-19 has been significant and several vaccines have been developed to combat this virus. However, these vaccines have varying levels of efficacy and effectiveness in preventing illness and providing immunity. As the world continues to grapple with the ongoing pandemic, the development and distribution of effective vaccines remains a top priority, making monitoring prevention strategies mandatory and necessary to mitigate the spread of the disease. These vaccines have raised a huge debate on social networks and in the media about their effectiveness and secondary effects. This has generated big data, requiring intelligent tools capable of analyzing these data in depth and extracting the underlying knowledge and feelings. There is a scarcity of works that analyze feelings and the prediction of these feelings based on their estimated polarities at the same time. In this work, first, we use big data and Natural Language Processing (NLP) tools to extract the entities expressed in tweets about AstraZeneca and Pfizer and estimate their polarities; second, we use a Long Short-Term Memory (LSTM) neural network to predict the polarities of these two vaccines in the future. To ensure parallel data treatment for large-scale processing via clustered systems, we use the Apache Spark Framework (ASF) which enables the treatment of massive amounts of data in a distributed way. Results showed that the Pfizer vaccine is more popular and trustworthy than AstraZeneca. Additionally, according to the predictions generated by Long Short-Term Memory (LSTM) model, it is likely that Pfizer will continue to maintain its strong market position in the foreseeable future. These predictive analytics, which uses advanced machine learning techniques, have proven to be accurate in forecasting trends and identifying patterns in data. As such, we have confidence in the LSTM's prediction of Pfizer's ongoing dominance in the industry.
新冠肺炎对全球的影响是巨大的,已经开发了几种疫苗来对抗这种病毒。然而,这些疫苗在预防疾病和提供免疫力方面具有不同程度的疗效和有效性。随着世界继续与持续的疫情作斗争,开发和分发有效的疫苗仍然是当务之急,这使得监测预防策略成为强制性的,也是减缓疾病传播的必要手段。这些疫苗在社交网络和媒体上引发了关于其有效性和副作用的巨大辩论。这就产生了大数据,需要能够深入分析这些数据并提取潜在知识和感受的智能工具。很少有作品同时分析情感和基于估计的极性来预测这些情感。在这项工作中,首先,我们使用大数据和自然语言处理(NLP)工具提取关于阿斯利康和辉瑞的推文中表达的实体,并估计它们的极性;其次,我们使用长短期记忆(LSTM)神经网络来预测这两种疫苗在未来的极性。为了确保通过集群系统进行大规模处理的并行数据处理,我们使用了Apache Spark框架(ASF),它能够以分布式方式处理大量数据。结果显示,辉瑞疫苗比阿斯利康更受欢迎,更值得信赖。此外,根据长短期记忆(LSTM)模型产生的预测,辉瑞很可能在可预见的未来继续保持其强大的市场地位。这些使用先进机器学习技术的预测分析已被证明在预测趋势和识别数据模式方面是准确的。因此,我们对LSTM对辉瑞在该行业持续主导地位的预测充满信心。
{"title":"Sentiment analysis and prediction of polarity vaccines based on Twitter data using deep NLP techniques","authors":"H. Badi, Imad Badi, K. E. Moutaouakil, Aziz Khamjane, Abdelkhalek Bahri","doi":"10.32620/reks.2022.4.02","DOIUrl":"https://doi.org/10.32620/reks.2022.4.02","url":null,"abstract":"The global impact of COVID-19 has been significant and several vaccines have been developed to combat this virus. However, these vaccines have varying levels of efficacy and effectiveness in preventing illness and providing immunity. As the world continues to grapple with the ongoing pandemic, the development and distribution of effective vaccines remains a top priority, making monitoring prevention strategies mandatory and necessary to mitigate the spread of the disease. These vaccines have raised a huge debate on social networks and in the media about their effectiveness and secondary effects. This has generated big data, requiring intelligent tools capable of analyzing these data in depth and extracting the underlying knowledge and feelings. There is a scarcity of works that analyze feelings and the prediction of these feelings based on their estimated polarities at the same time. In this work, first, we use big data and Natural Language Processing (NLP) tools to extract the entities expressed in tweets about AstraZeneca and Pfizer and estimate their polarities; second, we use a Long Short-Term Memory (LSTM) neural network to predict the polarities of these two vaccines in the future. To ensure parallel data treatment for large-scale processing via clustered systems, we use the Apache Spark Framework (ASF) which enables the treatment of massive amounts of data in a distributed way. Results showed that the Pfizer vaccine is more popular and trustworthy than AstraZeneca. Additionally, according to the predictions generated by Long Short-Term Memory (LSTM) model, it is likely that Pfizer will continue to maintain its strong market position in the foreseeable future. These predictive analytics, which uses advanced machine learning techniques, have proven to be accurate in forecasting trends and identifying patterns in data. As such, we have confidence in the LSTM's prediction of Pfizer's ongoing dominance in the industry.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44725996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On strange images with application to lossy image compression 奇异图像及其在有损图像压缩中的应用
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.11
Boban P. Bondzulic, Dimitrije Bujaković, Fangfang Li, V. Lukin
Single and three-channel images are widely used in numerous applications. Due to the increasing volume of such data, they must be compressed where lossy compression offers more opportunities. Usually, it is supposed that, for a given image, a larger compression ratio leads to worse quality of the compressed image according to all quality metrics. This is true for most practical cases. However, it has been found recently that images are called “strange” for which a rate-distortion curve like dependence of the peak signal-to-noise ratio on the quality factor or quantization step, behaves non-monotonously. This might cause problems in the lossy compression of images. Thus, the basic subject of this paper are the factors that determine this phenomenon. The main among them are artificial origin of an image, possible presence of large homogeneous regions, specific behavior of image histograms. The main goal of this paper is to consider and explain the peculiarities of the lossy compression of strange images. The tasks of this paper are to provide definitions of strange images and to check whether non-monotonicity of rate-distortion curves occurs for different coders and metrics. One more task is to put ideas and methodology forward of further studies intended to detect strange images before their compression. The main result is that non-monotonous behavior can be observed for the same image for several quality metrics and coders. This means that not the coder but image properties determine the probability of an image to being strange. Moreover, both grayscale and color images can be strange, and both the natural scene and artificial images can be strange. This depends more on image properties than on image origin and number of channels. In particular, the percentage of pixels that belong to large homogeneous regions and image entropy play an important role. As conclusions, we outline possible directions of future research that, in the first order, relate to the analysis of images in large databases to establish parameters that show that a given image can be considered as strange.
单通道和三通道图像在许多应用中被广泛使用。由于此类数据的数量不断增加,必须在有损压缩提供更多机会的地方对其进行压缩。通常,假设对于给定的图像,根据所有质量度量,较大的压缩比导致压缩图像的质量较差。在大多数实际情况下都是如此。然而,最近发现,图像被称为“奇异”,对于这种图像,峰值信噪比与质量因子或量化步长的率失真曲线样依赖性表现为非单调。这可能会导致图像的有损压缩出现问题。因此,本文的基本主题是决定这一现象的因素。其中主要有图像的人为起源、可能存在的大的均匀区域、图像直方图的特定行为。本文的主要目的是考虑和解释奇异图像有损压缩的特点。本文的任务是提供奇异图像的定义,并检查不同编码器和度量是否存在率失真曲线的非单调性。另一项任务是提出进一步研究的想法和方法,旨在在压缩前检测奇怪的图像。主要结果是,对于多个质量度量和编码器,对于同一图像可以观察到非单调行为。这意味着不是编码器而是图像属性决定了图像奇怪的概率。此外,灰度和彩色图像都可能很奇怪,自然场景和人工图像都可能奇怪。这更多地取决于图像属性,而不是图像原点和通道数量。特别是,属于大均匀区域的像素的百分比和图像熵起着重要作用。作为结论,我们概述了未来研究的可能方向,这些方向首先与分析大型数据库中的图像有关,以确定表明给定图像可以被视为奇怪的参数。
{"title":"On strange images with application to lossy image compression","authors":"Boban P. Bondzulic, Dimitrije Bujaković, Fangfang Li, V. Lukin","doi":"10.32620/reks.2022.4.11","DOIUrl":"https://doi.org/10.32620/reks.2022.4.11","url":null,"abstract":"Single and three-channel images are widely used in numerous applications. Due to the increasing volume of such data, they must be compressed where lossy compression offers more opportunities. Usually, it is supposed that, for a given image, a larger compression ratio leads to worse quality of the compressed image according to all quality metrics. This is true for most practical cases. However, it has been found recently that images are called “strange” for which a rate-distortion curve like dependence of the peak signal-to-noise ratio on the quality factor or quantization step, behaves non-monotonously. This might cause problems in the lossy compression of images. Thus, the basic subject of this paper are the factors that determine this phenomenon. The main among them are artificial origin of an image, possible presence of large homogeneous regions, specific behavior of image histograms. The main goal of this paper is to consider and explain the peculiarities of the lossy compression of strange images. The tasks of this paper are to provide definitions of strange images and to check whether non-monotonicity of rate-distortion curves occurs for different coders and metrics. One more task is to put ideas and methodology forward of further studies intended to detect strange images before their compression. The main result is that non-monotonous behavior can be observed for the same image for several quality metrics and coders. This means that not the coder but image properties determine the probability of an image to being strange. Moreover, both grayscale and color images can be strange, and both the natural scene and artificial images can be strange. This depends more on image properties than on image origin and number of channels. In particular, the percentage of pixels that belong to large homogeneous regions and image entropy play an important role. As conclusions, we outline possible directions of future research that, in the first order, relate to the analysis of images in large databases to establish parameters that show that a given image can be considered as strange.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43922254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks 智能电网和风力发电机:供电网络的网络威胁和漏洞概述
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.04
Ihor Fursov, Klym Yamkovyi, Oleksandr Shmatko
The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autonomous power systems in medical institutions, autonomous power supply of homes, charging stations for cars, etc. Wind generators operate in two aspects: in the physical and information space. Thus, a violation of the security of the information flow of a wind generator can affect the physical performance of electricity generation, and disable equipment. The study aims to identify types of cyber threats in the wind generator network based on the analysis of known attack incidents, analysis of the Smart Grid network structure, network devices, protocols, and control mechanisms of a wind generator. The tasks of the work are: review and analyze known cyberattack incidents; review the classification of cyber threats to wind farms; consider the most common methods of attacks on the cyberphysical system of wind farms; consider ways of intrusions into the information flow of the cyberphysical system wind generator; consider resilience mechanisms of wind generators in case of a cyberattack, consider the directions of further research. The methods are a systematic approach that provides a comprehensive study of the problem, quantitative and qualitative analysis of incidents of cyber attacks on wind generators, and methods of attacks. The following results were obtained: 11 large-scale known incidents of cyber attacks on the cyberphysical systems of the energy sector and smart power supply networks were analyzed, and information flow features and structure of the wind generators were considered. Main communication interfaces of the Smart Grid network were reviewed, control mechanisms for the physical parts of the wind generator system such as automatic voltage regulator, and automatic generation control were observed, vulnerable data transmission protocols, DNP3 in particular, were analyzed, possible consequences in the case of a cyber-intrusion into the network were considered. Conclusions: wind farms, as part of the Smart Grid system, are a convenient target for cyberattacks, as the number of potential ways to interfere with the information flow of the cyberphysical system is growing due to an increase in the number of sensors, communication channels in the network. This is especially important for the further development of wind farm security systems, which at the time, are not able to provide high accuracy of intrusion detection into the information flow.
本研究的主题是风力发电机的网络脆弱性,作为智能电网网络物理系统的一部分。风力发电机产生的电力在“智能”电力消费者之间的网络中进一步分配,这些消费者通常包括医疗机构的自主电力系统、家庭的自主电力供应、汽车充电站等。风力发电机在两个方面运行:物理空间和信息空间。因此,违反风力发电机信息流的安全可以影响发电的物理性能,并使设备失效。本研究旨在通过对已知攻击事件的分析,以及对智能电网网络结构、网络设备、协议和风力发电机控制机制的分析,识别风力发电机网络中的网络威胁类型。工作内容包括:检讨及分析已知的网络攻击事件;审查风电场网络威胁的分类;考虑一下风力发电场网络物理系统最常见的攻击方法;考虑入侵网络物理系统风力发电机信息流的方法;考虑风力发电机在网络攻击情况下的恢复机制,考虑进一步研究的方向。该方法是一种系统的方法,提供了对问题的全面研究,对风力发电机网络攻击事件的定量和定性分析,以及攻击方法。研究结果如下:分析了已知的11起针对能源部门网络物理系统和智能供电网络的大规模网络攻击事件,并考虑了风力发电机组的信息流特征和结构。回顾了智能电网的主要通信接口,观察了风力发电系统的自动调压器、自动发电控制等物理部分的控制机制,分析了易受攻击的数据传输协议,特别是DNP3协议,并考虑了网络入侵可能造成的后果。结论:风力发电场作为智能电网系统的一部分,是网络攻击的方便目标,因为由于网络中传感器和通信通道数量的增加,干扰网络物理系统信息流的潜在方法正在增加。这对于风力发电场安全系统的进一步发展尤其重要,因为目前风力发电场安全系统还不能对信息流提供高精度的入侵检测。
{"title":"Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks","authors":"Ihor Fursov, Klym Yamkovyi, Oleksandr Shmatko","doi":"10.32620/reks.2022.4.04","DOIUrl":"https://doi.org/10.32620/reks.2022.4.04","url":null,"abstract":"The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autonomous power systems in medical institutions, autonomous power supply of homes, charging stations for cars, etc. Wind generators operate in two aspects: in the physical and information space. Thus, a violation of the security of the information flow of a wind generator can affect the physical performance of electricity generation, and disable equipment. The study aims to identify types of cyber threats in the wind generator network based on the analysis of known attack incidents, analysis of the Smart Grid network structure, network devices, protocols, and control mechanisms of a wind generator. The tasks of the work are: review and analyze known cyberattack incidents; review the classification of cyber threats to wind farms; consider the most common methods of attacks on the cyberphysical system of wind farms; consider ways of intrusions into the information flow of the cyberphysical system wind generator; consider resilience mechanisms of wind generators in case of a cyberattack, consider the directions of further research. The methods are a systematic approach that provides a comprehensive study of the problem, quantitative and qualitative analysis of incidents of cyber attacks on wind generators, and methods of attacks. The following results were obtained: 11 large-scale known incidents of cyber attacks on the cyberphysical systems of the energy sector and smart power supply networks were analyzed, and information flow features and structure of the wind generators were considered. Main communication interfaces of the Smart Grid network were reviewed, control mechanisms for the physical parts of the wind generator system such as automatic voltage regulator, and automatic generation control were observed, vulnerable data transmission protocols, DNP3 in particular, were analyzed, possible consequences in the case of a cyber-intrusion into the network were considered. Conclusions: wind farms, as part of the Smart Grid system, are a convenient target for cyberattacks, as the number of potential ways to interfere with the information flow of the cyberphysical system is growing due to an increase in the number of sensors, communication channels in the network. This is especially important for the further development of wind farm security systems, which at the time, are not able to provide high accuracy of intrusion detection into the information flow.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44884443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Method of encrypting images based on two multidimensional chaotic systems using fuzzy logic 基于模糊逻辑的二维混沌系统图像加密方法
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.09
M. Kushnir, Hryhorii Kosovan, Petro Kroialo
The subject of the study: it is proposed to develop a method of image encryption with pixel permutation implemented using fuzzy logic and Hainaut mapping, as well as diffusion, which is implemented using the Lorenz system. Study objectives: To propose an effective way to apply the rules of fuzzy logic in relation to the values generated by the Henon mapping to implement the permutation of pixels in the image, which will provide a random permutation and increase the efficiency of the encryption method. Also, to achieve better security in the process of image encryption, the use of the diffusion process implemented using the Lorenz system. In addition, to increase the sensitivity of the encryption method to change the initial value of the component colors of the pixels will also be used in the encryption process. Investigation methods and research results: developed and presented a method of image encryption with pixel permutation implemented using fuzzy logic and Henon mapping, as well as diffusion, implemented using the Lorenz system. The initial values for the Henon mapping and the Lorenz system will be determined from the entered keyword, and the control parameters are set by the operator, while the values of the component colors of the pixels will also participate in the encryption process. In addition, before the process of rearranging the pixels in the image, the rules of fuzzy logic are implemented by Henon mapping. Also, the values of the component pixels before and after the diffusion procedure will be reduced to a single interval. Thus, as a result of image encryption, the original image changes completely, loses its content and shape, and the color intensity distribution of pixels becomes uniform. The program implementation of the proposed encryption method was also carried out and the qualitative characteristics of the proposed image encryption method were evaluated, namely: analysis of histograms of original and encrypted images, correlation of adjacent image pixels, root mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy before changing the color components of the pixels. Conclusions: the implementation of the method has shown that it has a large number of encryption keys, which makes brute force (the process of their selection) resource-intensive and complex, and the implementation of the encryption process in two stages and using two different chaotic systems significantly improves the security of the encrypted image. The resulting cryptosystem is also resistant to the following attacks: approximation of chaotic orbits, correlation, analytical and statistical attacks.
研究主题:提出了一种图像加密方法,该方法使用模糊逻辑和Hainaut映射实现像素排列,并使用Lorenz系统实现扩散。研究目的:提出一种有效的方法,将模糊逻辑规则应用于Henon映射生成的值,以实现图像中像素的排列,这将提供随机排列,并提高加密方法的效率。此外,为了在图像加密过程中实现更好的安全性,使用扩散过程实现了Lorenz系统。此外,为了提高加密的灵敏度,在加密过程中还将使用改变像素的成分颜色的初始值的方法。研究方法和研究结果:开发并提出了一种利用模糊逻辑和Henon映射实现像素排列的图像加密方法,以及利用Lorenz系统实现的扩散方法。Henon映射和Lorenz系统的初始值将根据输入的关键字确定,控制参数由操作员设置,而像素的成分颜色的值也将参与加密过程。此外,在重新排列图像中的像素之前,模糊逻辑的规则通过Henon映射来实现。此外,在扩散过程之前和之后的分量像素的值将被减少到单个间隔。因此,作为图像加密的结果,原始图像完全改变,失去其内容和形状,并且像素的颜色强度分布变得均匀。还对所提出的加密方法进行了程序实现,并评估了所提出的图像加密方法的定性特征,即:原始图像和加密图像的直方图分析、相邻图像像素的相关性、均方根误差(MSE)、峰值信噪比(PSNR),在改变像素的颜色分量之前的熵。结论:该方法的实现表明,它具有大量的加密密钥,这使得暴力(其选择过程)资源密集且复杂,并且分两个阶段和使用两个不同的混沌系统来实现加密过程显著提高了加密图像的安全性。由此产生的密码系统还可以抵抗以下攻击:混沌轨道近似、相关性、分析和统计攻击。
{"title":"Method of encrypting images based on two multidimensional chaotic systems using fuzzy logic","authors":"M. Kushnir, Hryhorii Kosovan, Petro Kroialo","doi":"10.32620/reks.2022.4.09","DOIUrl":"https://doi.org/10.32620/reks.2022.4.09","url":null,"abstract":"The subject of the study: it is proposed to develop a method of image encryption with pixel permutation implemented using fuzzy logic and Hainaut mapping, as well as diffusion, which is implemented using the Lorenz system. Study objectives: To propose an effective way to apply the rules of fuzzy logic in relation to the values generated by the Henon mapping to implement the permutation of pixels in the image, which will provide a random permutation and increase the efficiency of the encryption method. Also, to achieve better security in the process of image encryption, the use of the diffusion process implemented using the Lorenz system. In addition, to increase the sensitivity of the encryption method to change the initial value of the component colors of the pixels will also be used in the encryption process. Investigation methods and research results: developed and presented a method of image encryption with pixel permutation implemented using fuzzy logic and Henon mapping, as well as diffusion, implemented using the Lorenz system. The initial values for the Henon mapping and the Lorenz system will be determined from the entered keyword, and the control parameters are set by the operator, while the values of the component colors of the pixels will also participate in the encryption process. In addition, before the process of rearranging the pixels in the image, the rules of fuzzy logic are implemented by Henon mapping. Also, the values of the component pixels before and after the diffusion procedure will be reduced to a single interval. Thus, as a result of image encryption, the original image changes completely, loses its content and shape, and the color intensity distribution of pixels becomes uniform. The program implementation of the proposed encryption method was also carried out and the qualitative characteristics of the proposed image encryption method were evaluated, namely: analysis of histograms of original and encrypted images, correlation of adjacent image pixels, root mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy before changing the color components of the pixels. Conclusions: the implementation of the method has shown that it has a large number of encryption keys, which makes brute force (the process of their selection) resource-intensive and complex, and the implementation of the encryption process in two stages and using two different chaotic systems significantly improves the security of the encrypted image. The resulting cryptosystem is also resistant to the following attacks: approximation of chaotic orbits, correlation, analytical and statistical attacks.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48769769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotion recognition of human speech using deep learning method and MFCC features 基于深度学习方法和MFCC特征的人类语音情感识别
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.13
Sumon Kumar Hazra, Romana Rahman Ema, S. Galib, Shalauddin Kabir, Nasim Adnan
Subject matter: Speech emotion recognition (SER) is an ongoing interesting research topic. Its purpose is to establish interactions between humans and computers through speech and emotion. To recognize speech emotions, five deep learning models: Convolution Neural Network, Long-Short Term Memory, Artificial Neural Network, Multi-Layer Perceptron, Merged CNN, and LSTM Network (CNN-LSTM) are used in this paper. The Toronto Emotional Speech Set (TESS), Surrey Audio-Visual Expressed Emotion (SAVEE) and Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS) datasets were used for this system. They were trained by merging 3 ways TESS+SAVEE, TESS+RAVDESS, and TESS+SAVEE+RAVDESS. These datasets are numerous audios spoken by both male and female speakers of the English language. This paper classifies seven emotions (sadness, happiness, anger, fear, disgust, neutral, and surprise) that is a challenge to identify seven emotions for both male and female data. Whereas most have worked with male-only or female-only speech and both male-female datasets have found low accuracy in emotion detection tasks. Features need to be extracted by a feature extraction technique to train a deep-learning model on audio data. Mel Frequency Cepstral Coefficients (MFCCs) extract all the necessary features from the audio data for speech emotion classification. After training five models with three datasets, the best accuracy of 84.35 % is achieved by CNN-LSTM with the TESS+SAVEE dataset.
主题:言语情感识别(SER)是一个正在进行的有趣的研究课题。它的目的是通过语音和情感建立人与计算机之间的互动。为了识别语音情绪,本文使用了五种深度学习模型:卷积神经网络、长短期记忆、人工神经网络、多层感知器、合并CNN和LSTM网络(CNN-LSTM)。该系统使用了多伦多情感语音集(TESS)、萨里视听表达情感(SAVE)和瑞尔森情感语音和歌曲视听数据库(RAVDESS)数据集。他们通过合并TESS+SAVEE、TESS+RAVESS和TESS+SSAVE+RAVESS三种方式进行训练。这些数据集是讲英语的男性和女性所说的大量音频。本文对七种情绪(悲伤、快乐、愤怒、恐惧、厌恶、中性和惊讶)进行了分类,这对识别男性和女性数据的七种情绪是一个挑战。然而,大多数人都使用了仅限男性或仅限女性的语音,而且男性和女性数据集在情绪检测任务中的准确性都很低。需要通过特征提取技术来提取特征,以在音频数据上训练深度学习模型。Mel频率倒谱系数(MFCC)从音频数据中提取所有必要的特征,用于语音情感分类。在用三个数据集训练五个模型后,使用TESS+SAVE数据集的CNN-LSTM获得了84.35%的最佳准确率。
{"title":"Emotion recognition of human speech using deep learning method and MFCC features","authors":"Sumon Kumar Hazra, Romana Rahman Ema, S. Galib, Shalauddin Kabir, Nasim Adnan","doi":"10.32620/reks.2022.4.13","DOIUrl":"https://doi.org/10.32620/reks.2022.4.13","url":null,"abstract":"Subject matter: Speech emotion recognition (SER) is an ongoing interesting research topic. Its purpose is to establish interactions between humans and computers through speech and emotion. To recognize speech emotions, five deep learning models: Convolution Neural Network, Long-Short Term Memory, Artificial Neural Network, Multi-Layer Perceptron, Merged CNN, and LSTM Network (CNN-LSTM) are used in this paper. The Toronto Emotional Speech Set (TESS), Surrey Audio-Visual Expressed Emotion (SAVEE) and Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS) datasets were used for this system. They were trained by merging 3 ways TESS+SAVEE, TESS+RAVDESS, and TESS+SAVEE+RAVDESS. These datasets are numerous audios spoken by both male and female speakers of the English language. This paper classifies seven emotions (sadness, happiness, anger, fear, disgust, neutral, and surprise) that is a challenge to identify seven emotions for both male and female data. Whereas most have worked with male-only or female-only speech and both male-female datasets have found low accuracy in emotion detection tasks. Features need to be extracted by a feature extraction technique to train a deep-learning model on audio data. Mel Frequency Cepstral Coefficients (MFCCs) extract all the necessary features from the audio data for speech emotion classification. After training five models with three datasets, the best accuracy of 84.35 % is achieved by CNN-LSTM with the TESS+SAVEE dataset.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44082658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Model and algorithm of creation of silicon photodiod with high sensitivity in the middle infrared area of the spectrum 光谱中红外区高灵敏度硅光电二极管的制造模型与算法
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.07
Y. Dobrovolsky, Yurii Sorokatyi
The sensitivity of the photodiode will depend on the amount of radiation power that it must register. The characteristics of a photodiode, as is known, are determined by its design. In particular, the characteristics of the material used, the configuration of electric fields, the mobility of charge carriers, the width of the SCR (space charge region), etc. Additionally, the characteristics of the photodiode are determined by the external applied voltage and the wavelength of the received optical radiation. In the case of its absorption only in the SCR (region of space charge) and at small distances around it, for example, in a p-i-n photodiode, its frequency characteristics will be determined mainly by the flight time of the generated charge carriers through the SCR. .The subject is to create an algorithm for building a photodiode, which must work at a certain wavelength, for example, at a wavelength of 0.95 μm. Silicon of the p-type conductivity with a specific resistance of at least 10 kΩ • cm was chosen as the starting material. The goal is to create a model and algorithm for developing a photodiode capable of providing maximum values of current monochromatic sensitivity due to the maximum collection of photogenerated charge carriers in its volume at the appropriate external bias. Task: To fulfill this requirement, theoretical and experimental research must be conducted. Methods: technological processes for manufacturing the proposed photodiode can be similar to the processes of forming planar p-i-n photodiodes based on silicon. The proposed technical solution determines the correlation between the area of collection of photogenerated charge carriers and the area of their generation. The result can be achieved by changing the design of the photodiode crystal, considering the obtained theoretical conclusions. Results: An analysis of the factors determining the current monochromatic sensitivity of the photodiode was carried out. A design of a photodiode with increased sensitivity compared to a serial photodiode of the FD - 309 type has been developed. Conclusions: The proposed calculation was used to estimate the sensitivity of the photodiode. The operating voltage and, accordingly, the width of the OPZ (area of space charge) W was chosen considering the absorption depth of the operating wavelength of 0.95 μm. The calculation shows that the current monochromatic sensitivity of such a photodiode can be increased to 0.57 A/W in contrast to the declared sensitivity of 0.5 A/W. Comparative studies of the produced batch of created photodiodes and FD - 309 photodiodes were conducted, which showed that the proposed photodiode really has a current monochromatic sensitivity at a wavelength of 0.95 μm not less than 0.55 A/W. Simultaneously, its rise time is reduced from 50 ns to 10 ns, and the capacitance is 90 pF instead of 100 pF in FD - 309.
光电二极管的灵敏度将取决于它必须记录的辐射功率的大小。众所周知,光电二极管的特性是由它的设计决定的。特别是所用材料的特性、电场的结构、载流子的迁移率、SCR(空间电荷区)的宽度等。此外,光电二极管的特性由外部施加的电压和接收到的光辐射的波长决定。在其仅在SCR(空间电荷区)和周围小距离内吸收的情况下,例如在p-i-n光电二极管中,其频率特性将主要由产生的载流子通过SCR的飞行时间决定。本课题是建立一个必须在特定波长下工作的光电二极管的算法,例如在0.95 μm的波长下。选择比电阻至少为10 kΩ•cm的p型导电性硅作为起始材料。目标是创建一个模型和算法,用于开发能够提供电流单色灵敏度最大值的光电二极管,因为在适当的外部偏置下,其体积中最大的光电生成载流子集合。任务:为了满足这一要求,必须进行理论和实验研究。方法:制造所提出的光电二极管的工艺过程可以类似于基于硅的平面p-i-n光电二极管的工艺过程。所提出的技术解决方案确定了光生载流子的收集面积与其生成面积之间的相关性。结合已得到的理论结论,可以通过改变光电二极管晶体的设计来实现这一结果。结果:对影响光电二极管电流单色灵敏度的因素进行了分析。与FD - 309型串行光电二极管相比,设计了一种灵敏度更高的光电二极管。结论:所提出的计算方法可用于估计光电二极管的灵敏度。考虑工作波长的吸收深度为0.95 μm,选择工作电压和空间电荷区宽度W。计算表明,该光电二极管的电流单色灵敏度可从声明的0.5 a /W提高到0.57 a /W。将所制备的光电二极管与FD - 309光电二极管进行了对比研究,结果表明,所制备的光电二极管在0.95 μm波长范围内具有不小于0.55 a /W的电流单色灵敏度。同时,它的上升时间从50ns减少到10ns,电容从FD - 309的100pf减少到90pf。
{"title":"Model and algorithm of creation of silicon photodiod with high sensitivity in the middle infrared area of the spectrum","authors":"Y. Dobrovolsky, Yurii Sorokatyi","doi":"10.32620/reks.2022.4.07","DOIUrl":"https://doi.org/10.32620/reks.2022.4.07","url":null,"abstract":"The sensitivity of the photodiode will depend on the amount of radiation power that it must register. The characteristics of a photodiode, as is known, are determined by its design. In particular, the characteristics of the material used, the configuration of electric fields, the mobility of charge carriers, the width of the SCR (space charge region), etc. Additionally, the characteristics of the photodiode are determined by the external applied voltage and the wavelength of the received optical radiation. In the case of its absorption only in the SCR (region of space charge) and at small distances around it, for example, in a p-i-n photodiode, its frequency characteristics will be determined mainly by the flight time of the generated charge carriers through the SCR. .The subject is to create an algorithm for building a photodiode, which must work at a certain wavelength, for example, at a wavelength of 0.95 μm. Silicon of the p-type conductivity with a specific resistance of at least 10 kΩ • cm was chosen as the starting material. The goal is to create a model and algorithm for developing a photodiode capable of providing maximum values of current monochromatic sensitivity due to the maximum collection of photogenerated charge carriers in its volume at the appropriate external bias. Task: To fulfill this requirement, theoretical and experimental research must be conducted. Methods: technological processes for manufacturing the proposed photodiode can be similar to the processes of forming planar p-i-n photodiodes based on silicon. The proposed technical solution determines the correlation between the area of collection of photogenerated charge carriers and the area of their generation. The result can be achieved by changing the design of the photodiode crystal, considering the obtained theoretical conclusions. Results: An analysis of the factors determining the current monochromatic sensitivity of the photodiode was carried out. A design of a photodiode with increased sensitivity compared to a serial photodiode of the FD - 309 type has been developed. Conclusions: The proposed calculation was used to estimate the sensitivity of the photodiode. The operating voltage and, accordingly, the width of the OPZ (area of space charge) W was chosen considering the absorption depth of the operating wavelength of 0.95 μm. The calculation shows that the current monochromatic sensitivity of such a photodiode can be increased to 0.57 A/W in contrast to the declared sensitivity of 0.5 A/W. Comparative studies of the produced batch of created photodiodes and FD - 309 photodiodes were conducted, which showed that the proposed photodiode really has a current monochromatic sensitivity at a wavelength of 0.95 μm not less than 0.55 A/W. Simultaneously, its rise time is reduced from 50 ns to 10 ns, and the capacitance is 90 pF instead of 100 pF in FD - 309.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47787183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive model of COVID-19 epidemic process based on neural network 基于神经网络的新冠肺炎疫情过程预测模型
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.01
Serhii Krivtsov, I. Meniailov, K. Bazilevych, D. Chumachenko
The COVID-19 pandemic, which has been going on for almost three years, has shown that public health systems are not ready for such a challenge. Measures taken by governments in the healthcare sector in the context of a sharp increase in the pressure on it include containment of the transmission and spread of the virus, providing sufficient space for medical care, ensuring the availability of testing facilities and medical care, and mobilizing and retraining medical personnel. The pandemic has changed government and business processes, digitalizing the economy and healthcare. Global challenges have stimulated data-driven medicine research. Forecasting the epidemic process of infectious processes would make it possible to assess the scale of the impending pandemic to plan the necessary control measures. The study builds a model of the COVID-19 epidemic process to predict its dynamics based on neural networks. The target of the research is the infectious diseases epidemic process in the example of COVID-19. The research subjects are the methods and models of epidemic process simulation based on neural networks. As a result of this research, a simulation model of COVID-19 epidemic process based on a neural network was built. The model showed high accuracy: from 93.11% to 93.96% for Germany, from 95.53% to 95.54% for Japan, from 97.49% to 98.43% for South Korea, from 93.34% up to 94.18% for Ukraine, depending on the forecasting period. The assessment of absolute errors confirms that the model can be used in healthcare practice to develop control measures to contain the COVID-19 pandemic. The respective contribution of this research is two-fold. Firstly, the development of models based on the neural network approach will allow estimate the accuracy of such methods applied to the simulation of the COVID-19 epidemic process. Secondly, an investigation of the experimental study with a developed model applied to data from four countries will contribute to empirical evaluation of the effectiveness of its application not only to COVID-19 but also to other infectious diseases simulations. Conclusions. The research’s significance lies in the fact that automated decision support systems for epidemiologists and other public health workers can improve the efficiency of making anti-epidemic decisions. This study is especially relevant in the context of the escalation of the Russian war in Ukraine when the healthcare system's resources are limited.
COVID-19大流行已经持续了近三年,表明公共卫生系统还没有准备好应对这样的挑战。在卫生保健部门面临的压力急剧增加的情况下,各国政府在卫生保健部门采取的措施包括遏制病毒的传播和扩散,为医疗保健提供足够的空间,确保提供检测设施和医疗保健,以及动员和再培训医务人员。疫情改变了政府和商业流程,使经济和医疗保健数字化。全球挑战刺激了数据驱动的医学研究。对传染过程的流行过程进行预测,就有可能评估即将到来的大流行的规模,从而规划必要的控制措施。本研究建立了基于神经网络的新冠肺炎流行过程模型,对其动态进行预测。以COVID-19为例,研究传染病的流行过程。研究课题是基于神经网络的流行病过程仿真方法和模型。在此基础上,建立了基于神经网络的新型冠状病毒流行过程仿真模型。模型显示出较高的准确率,根据预测周期的不同,德国为93.11% ~ 93.96%,日本为95.53% ~ 95.54%,韩国为97.49% ~ 98.43%,乌克兰为93.34% ~ 94.18%。对绝对误差的评估证实,该模型可用于医疗保健实践,以制定控制措施,以遏制COVID-19大流行。这项研究各自的贡献是双重的。首先,基于神经网络方法的模型的开发将允许估计这些方法应用于COVID-19流行过程模拟的准确性。其次,将开发的模型应用于四个国家的数据,对实验研究进行调查,将有助于实证评估其应用于COVID-19以及其他传染病模拟的有效性。结论。该研究的意义在于,为流行病学家和其他公共卫生工作者提供的自动化决策支持系统可以提高抗疫决策的效率。这项研究是特别相关的背景下,俄罗斯在乌克兰的战争升级时,医疗系统的资源是有限的。
{"title":"Predictive model of COVID-19 epidemic process based on neural network","authors":"Serhii Krivtsov, I. Meniailov, K. Bazilevych, D. Chumachenko","doi":"10.32620/reks.2022.4.01","DOIUrl":"https://doi.org/10.32620/reks.2022.4.01","url":null,"abstract":"The COVID-19 pandemic, which has been going on for almost three years, has shown that public health systems are not ready for such a challenge. Measures taken by governments in the healthcare sector in the context of a sharp increase in the pressure on it include containment of the transmission and spread of the virus, providing sufficient space for medical care, ensuring the availability of testing facilities and medical care, and mobilizing and retraining medical personnel. The pandemic has changed government and business processes, digitalizing the economy and healthcare. Global challenges have stimulated data-driven medicine research. Forecasting the epidemic process of infectious processes would make it possible to assess the scale of the impending pandemic to plan the necessary control measures. The study builds a model of the COVID-19 epidemic process to predict its dynamics based on neural networks. The target of the research is the infectious diseases epidemic process in the example of COVID-19. The research subjects are the methods and models of epidemic process simulation based on neural networks. As a result of this research, a simulation model of COVID-19 epidemic process based on a neural network was built. The model showed high accuracy: from 93.11% to 93.96% for Germany, from 95.53% to 95.54% for Japan, from 97.49% to 98.43% for South Korea, from 93.34% up to 94.18% for Ukraine, depending on the forecasting period. The assessment of absolute errors confirms that the model can be used in healthcare practice to develop control measures to contain the COVID-19 pandemic. The respective contribution of this research is two-fold. Firstly, the development of models based on the neural network approach will allow estimate the accuracy of such methods applied to the simulation of the COVID-19 epidemic process. Secondly, an investigation of the experimental study with a developed model applied to data from four countries will contribute to empirical evaluation of the effectiveness of its application not only to COVID-19 but also to other infectious diseases simulations. Conclusions. The research’s significance lies in the fact that automated decision support systems for epidemiologists and other public health workers can improve the efficiency of making anti-epidemic decisions. This study is especially relevant in the context of the escalation of the Russian war in Ukraine when the healthcare system's resources are limited.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45124932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information technology for choosing the project portfolio management approach and the optimal level of maturity of an organization 用于选择项目组合管理方法和组织的最佳成熟度级别的信息技术
Q3 Computer Science Pub Date : 2022-11-29 DOI: 10.32620/reks.2022.4.14
Igor Kononenko, Maximilien Kpodjedo, Andrii Morhun, Maksym Oliinyk
The choice of a project portfolio management approach has a significant impact on the effectiveness of the organization. However, each organization that carries out project activities must not only choose a project portfolio management approach, but also the degree to which its capabilities are used.  This degree determines an organization's level of maturity in project portfolio management.  There are many models of maturity known. The use of such models often involves a long study and costs organizations a lot of money.  The paper is aimed at creating an information technology for choosing a project portfolio management approach and the optimal level of maturity of the organization in the field of project portfolio management. This information technology is created and presented in the form of IDEF0 diagram. Using information about the organization and the environment, experts can investigate the application of different alternative project portfolio management approaches. When performing this analysis, they use the Project Portfolio Management Approach Selection Method and the Organizational Maturity Level Selection Method for Portfolio Management. Using the first of these methods, experts can select the most appropriate approach based on two criteria: the risks from non-performance or imperfect performance of the processes of the generalized portfolio management process table and the cost of performing the approach processes. The second method is used to assess an organization's level of maturity in portfolio management and select the optimal level of maturity. Information technology is based on two developed applications. The first solution is designed to select the project portfolio management approach. The second application solves the problem of choosing the level of maturity of the organization in the field of portfolio management Projects.  The applications have an intuitive interface. Both applications have been tested and are ready for use.  Information technology is intended for use by project portfolio managers.
项目组合管理方法的选择对组织的有效性有重大影响。然而,开展项目活动的每个组织不仅必须选择项目组合管理方法,还必须选择其能力的使用程度。这个学位决定了一个组织在项目组合管理方面的成熟度。成熟度的模型有很多。使用这样的模型通常需要进行长期的研究,并花费组织大量资金。本文旨在创建一种信息技术,用于在项目组合管理领域选择项目组合管理方法和组织的最佳成熟度水平。这种信息技术是以IDEF0图的形式创建和呈现的。利用有关组织和环境的信息,专家可以调查不同替代项目组合管理方法的应用。在进行此分析时,他们使用项目组合管理方法选择方法和组合管理的组织成熟度水平选择方法。使用这些方法中的第一种,专家可以根据两个标准选择最合适的方法:广义投资组合管理流程表中流程的不绩效或不完美绩效带来的风险和执行方法流程的成本。第二种方法用于评估组织在投资组合管理中的成熟度水平,并选择最佳成熟度水平。信息技术基于两个已开发的应用程序。第一个解决方案旨在选择项目组合管理方法。第二个应用程序解决了在项目组合管理领域中选择组织成熟度级别的问题。应用程序具有直观的界面。这两个应用程序都经过了测试,可以使用了。信息技术旨在供项目组合经理使用。
{"title":"Information technology for choosing the project portfolio management approach and the optimal level of maturity of an organization","authors":"Igor Kononenko, Maximilien Kpodjedo, Andrii Morhun, Maksym Oliinyk","doi":"10.32620/reks.2022.4.14","DOIUrl":"https://doi.org/10.32620/reks.2022.4.14","url":null,"abstract":"The choice of a project portfolio management approach has a significant impact on the effectiveness of the organization. However, each organization that carries out project activities must not only choose a project portfolio management approach, but also the degree to which its capabilities are used.  This degree determines an organization's level of maturity in project portfolio management.  There are many models of maturity known. The use of such models often involves a long study and costs organizations a lot of money.  The paper is aimed at creating an information technology for choosing a project portfolio management approach and the optimal level of maturity of the organization in the field of project portfolio management. This information technology is created and presented in the form of IDEF0 diagram. Using information about the organization and the environment, experts can investigate the application of different alternative project portfolio management approaches. When performing this analysis, they use the Project Portfolio Management Approach Selection Method and the Organizational Maturity Level Selection Method for Portfolio Management. Using the first of these methods, experts can select the most appropriate approach based on two criteria: the risks from non-performance or imperfect performance of the processes of the generalized portfolio management process table and the cost of performing the approach processes. The second method is used to assess an organization's level of maturity in portfolio management and select the optimal level of maturity. Information technology is based on two developed applications. The first solution is designed to select the project portfolio management approach. The second application solves the problem of choosing the level of maturity of the organization in the field of portfolio management Projects.  The applications have an intuitive interface. Both applications have been tested and are ready for use.  Information technology is intended for use by project portfolio managers.","PeriodicalId":36122,"journal":{"name":"Radioelectronic and Computer Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42832818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Radioelectronic and Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1