首页 > 最新文献

Radio Electronics Computer Science Control最新文献

英文 中文
DETERMINATION AND COMPARISON METHODS OF BODY POSITIONS ON STREAM VIDEO 流视频中身体位置的确定与比较方法
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-6
N. Bilous, I. Ahekian, V. V. Kaluhin
Context. One of the tasks of computer vision is the task of determining the human body in the image. There are many methods to solve this problem, some are based on specific equipment (motion capture, kinect) and provide the highest accuracy, some give less accuracy but do not require additional equipment and use less computing power. But usually, such equipment has a high cost, so to ensure the low cost of developments designed to determine the body in the image, you should develop algorithms based on computer vision technology. These algorithms can then be applied to various fields to analyze and compare body positions for a variety of purposes. Objective. The aim of the work is to study the effectiveness of existing libraries to determine the human body position in the image, as well as methods for comparing the obtained poses in terms of speed and accuracy of determination. Methods. A set of libraries and pose comparison algorithms were analyzed for the purpose of developing a system for determining the correctness of exercise by the user in real time. OpenPose, PoseNet and BlazePose libraries were analyzed for their suitability in recognizing and tracking body parts and movements in real-time video streams. The advantages and disadvantages of each library were evaluated based on their performance, accuracy, and computational efficiency. Additionally, different pose comparison algorithms were analyzed. The effectiveness of each algorithm was evaluated based on their ability to accurately determine and compare body positions. As a result, the combination of BlazePose and weighted distance method can achieve the best performance in pose recognition, with high accuracy and robustness across a range of challenging scenarios. The weighted distance method can be further enhanced with techniques such as L2 normalization and pose alignment to improve its accuracy and generalization. Overall, the combination of the BlazePose library and weighted distance methods offers a powerful and effective solution for pose recognition, with high F1 index. Results. Existing models for determining poses have shown similar results in the quality of determination with a run-up of about 2%. When developing a cross-platform software product, the BlazePose library, which has an API for working directly in the browser and on mobile platforms, has a significant advantage in speed and accuracy. Also, as the library uses extended 33 keypoint topology it becomes applicable to a wider list of tasks. In the study of comparison methods, the greatest influence on the results was exerted by the quality of pose determination. Conclusions. Among the methods of comparison, the method of weighted distances showed the best results. The speed of position determination is inversely proportional to the quality of determination and significantly exceeds the recommended value – 40ms.
上下文。计算机视觉的任务之一是确定图像中的人体。有许多方法可以解决这个问题,有些是基于特定的设备(动作捕捉,kinect),并提供最高的精度,有些准确度较低,但不需要额外的设备,使用更少的计算能力。但通常情况下,这样的设备成本很高,所以为了保证低成本的开发设计来确定图像中的人体,就应该开发基于计算机视觉技术的算法。然后,这些算法可以应用于各种领域,以分析和比较各种目的的身体位置。目标。这项工作的目的是研究现有库在图像中确定人体位置的有效性,以及在确定速度和准确性方面比较获得的姿势的方法。方法。为了开发一个实时判断用户运动正确性的系统,分析了一套库和姿态比较算法。分析了OpenPose、PoseNet和BlazePose库在识别和跟踪实时视频流中的身体部位和运动方面的适用性。基于它们的性能、准确性和计算效率评估了每个库的优缺点。此外,还分析了不同的姿态比较算法。每个算法的有效性都是基于它们准确确定和比较身体位置的能力来评估的。因此,结合BlazePose和加权距离方法可以在姿态识别中获得最佳性能,在一系列具有挑战性的场景中具有较高的准确性和鲁棒性。加权距离方法可以通过L2归一化和位姿对齐等技术进一步增强,以提高其精度和泛化程度。总体而言,结合BlazePose库和加权距离方法为姿态识别提供了一个强大而有效的解决方案,具有很高的F1指数。结果。现有的确定姿势的模型在确定质量方面也显示出类似的结果,误差约为2%。在开发跨平台软件产品时,BlazePose库具有直接在浏览器和移动平台上工作的API,在速度和准确性方面具有显着的优势。此外,由于该库使用扩展的33个关键点拓扑,因此它适用于更广泛的任务列表。在比较方法的研究中,位姿确定的质量对结果的影响最大。结论。在比较方法中,加权距离法的效果最好。位置确定的速度与确定的质量成反比,明显超过推荐值- 40ms。
{"title":"DETERMINATION AND COMPARISON METHODS OF BODY POSITIONS ON STREAM VIDEO","authors":"N. Bilous, I. Ahekian, V. V. Kaluhin","doi":"10.15588/1607-3274-2023-2-6","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-6","url":null,"abstract":"Context. One of the tasks of computer vision is the task of determining the human body in the image. There are many methods to solve this problem, some are based on specific equipment (motion capture, kinect) and provide the highest accuracy, some give less accuracy but do not require additional equipment and use less computing power. But usually, such equipment has a high cost, so to ensure the low cost of developments designed to determine the body in the image, you should develop algorithms based on computer vision technology. These algorithms can then be applied to various fields to analyze and compare body positions for a variety of purposes. \u0000Objective. The aim of the work is to study the effectiveness of existing libraries to determine the human body position in the image, as well as methods for comparing the obtained poses in terms of speed and accuracy of determination. \u0000Methods. A set of libraries and pose comparison algorithms were analyzed for the purpose of developing a system for determining the correctness of exercise by the user in real time. OpenPose, PoseNet and BlazePose libraries were analyzed for their suitability in recognizing and tracking body parts and movements in real-time video streams. The advantages and disadvantages of each library were evaluated based on their performance, accuracy, and computational efficiency. Additionally, different pose comparison algorithms were analyzed. The effectiveness of each algorithm was evaluated based on their ability to accurately determine and compare body positions. \u0000As a result, the combination of BlazePose and weighted distance method can achieve the best performance in pose recognition, with high accuracy and robustness across a range of challenging scenarios. The weighted distance method can be further enhanced with techniques such as L2 normalization and pose alignment to improve its accuracy and generalization. Overall, the combination of the BlazePose library and weighted distance methods offers a powerful and effective solution for pose recognition, with high F1 index. \u0000Results. Existing models for determining poses have shown similar results in the quality of determination with a run-up of about 2%. When developing a cross-platform software product, the BlazePose library, which has an API for working directly in the browser and on mobile platforms, has a significant advantage in speed and accuracy. Also, as the library uses extended 33 keypoint topology it becomes applicable to a wider list of tasks. In the study of comparison methods, the greatest influence on the results was exerted by the quality of pose determination. \u0000Conclusions. Among the methods of comparison, the method of weighted distances showed the best results. The speed of position determination is inversely proportional to the quality of determination and significantly exceeds the recommended value – 40ms.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"48 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78631663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHODS FOR DETERMINING SIMILARITY OF CATEGORICAL ORDERED DATA 确定分类有序数据相似性的方法
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-4
N. Kondruk
Context. The development of effective distance metrics and similarity measures for categorical features is an important task in data analysis, machine learning, and decision theory since a significant portion of object properties is described by non-numerical values. Typically, the dependence between categorical features may be more complex than simply comparing them for equality or inequality. Such attributes can be relatively similar, and to construct an effective model, it is necessary to consider this similarity when calculating distance or similarity measures. Objective. The aim of the study is to improve the efficiency of solving practical data analysis problems by developing mathematical tools for determining the similarity of objects based on categorical ordered features. Method. A distance based on weighted Manhattan distance and a similarity measure for determining the similarity of objects based on categorical ordinal features (i.e. a linear order with scales of preference considering the problem domain can be specified on the attribute value set) are proposed. It is proven that the distance formula satisfies the axioms of non-negativity, symmetry, triangle inequality, and upper bound, and therefore is a distance metric in the space of ranked categorical features. It is also proven that the similarity measure presented in the study satisfies the axioms of boundedness, symmetry, maximum and minimum similarity, and is described by a decreasing function. Results. The developed approach has been implemented in an applied problem of determining the degree of similarity between objects described by ordered categorical features. Conclusions. In this study, mathematical tools were developed to determine similarity between structured data described by categorical attributes that can be ordered based on a specific priority in the form of a ranking system with preferences. Their properties were analyzed. Experimental studies have shown the convenience and “intuitive understanding” of the logic of data processing in solving practical problems. The proposed approach can provide the opportunity to conduct new meaningful research in data analysis. Prospects for further research lie in the experimental use of the proposed tools in practical tasks and in studying their effectiveness.
上下文。分类特征的有效距离度量和相似性度量的发展是数据分析,机器学习和决策理论中的重要任务,因为物体属性的很大一部分是由非数值描述的。通常,分类特征之间的依赖关系可能比简单地比较它们的相等或不相等更为复杂。这些属性可以是相对相似的,为了构建一个有效的模型,在计算距离或相似度量时需要考虑这种相似性。目标。该研究的目的是通过开发基于分类有序特征确定对象相似性的数学工具来提高解决实际数据分析问题的效率。方法。提出了一种基于加权曼哈顿距离的距离和一种基于分类有序特征的相似性度量(即在属性值集上指定考虑问题域的具有偏好尺度的线性顺序)。证明了该距离公式满足非负性、对称性、三角形不等式和上界公理,因此是排序分类特征空间中的距离度量。并证明了所提出的相似性测度满足有界性、对称性、最大相似性和最小相似性公理,并用递减函数来描述。结果。所开发的方法已在确定有序分类特征描述的对象之间的相似程度的应用问题中实现。结论。在本研究中,开发了数学工具来确定由分类属性描述的结构化数据之间的相似性,这些分类属性可以基于具有偏好的排序系统的特定优先级进行排序。分析了它们的性质。实验研究表明,在解决实际问题时,数据处理逻辑的便利性和“直观理解”。所提出的方法可以为进行新的有意义的数据分析研究提供机会。进一步研究的前景在于在实际任务中实验使用所提出的工具并研究其有效性。
{"title":"METHODS FOR DETERMINING SIMILARITY OF CATEGORICAL ORDERED DATA","authors":"N. Kondruk","doi":"10.15588/1607-3274-2023-2-4","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-4","url":null,"abstract":"Context. The development of effective distance metrics and similarity measures for categorical features is an important task in data analysis, machine learning, and decision theory since a significant portion of object properties is described by non-numerical values. Typically, the dependence between categorical features may be more complex than simply comparing them for equality or inequality. Such attributes can be relatively similar, and to construct an effective model, it is necessary to consider this similarity when calculating distance or similarity measures. \u0000Objective. The aim of the study is to improve the efficiency of solving practical data analysis problems by developing mathematical tools for determining the similarity of objects based on categorical ordered features. \u0000Method. A distance based on weighted Manhattan distance and a similarity measure for determining the similarity of objects based on categorical ordinal features (i.e. a linear order with scales of preference considering the problem domain can be specified on the attribute value set) are proposed. It is proven that the distance formula satisfies the axioms of non-negativity, symmetry, triangle inequality, and upper bound, and therefore is a distance metric in the space of ranked categorical features. It is also proven that the similarity measure presented in the study satisfies the axioms of boundedness, symmetry, maximum and minimum similarity, and is described by a decreasing function. \u0000Results. The developed approach has been implemented in an applied problem of determining the degree of similarity between objects described by ordered categorical features. \u0000Conclusions. In this study, mathematical tools were developed to determine similarity between structured data described by categorical attributes that can be ordered based on a specific priority in the form of a ranking system with preferences. Their properties were analyzed. Experimental studies have shown the convenience and “intuitive understanding” of the logic of data processing in solving practical problems. The proposed approach can provide the opportunity to conduct new meaningful research in data analysis. Prospects for further research lie in the experimental use of the proposed tools in practical tasks and in studying their effectiveness.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"76 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77299955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VECTOR-LOGICAL FAULT SIMULATION 向量逻辑故障仿真
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-5
V. Hahanov, S. Chumachenko, Y. Litvinova, I. Hahanova, A. Khakhanova, A. Shkil, D. Rakhlis, І. Hahanov, O. Shevchenko
Context. The main idea is the creation of vector-logical in-memory computing (VLC), which uses only read-write transactions on the address memory for faults-as-addresses simulation. There is no traditional logic. VLC is free from processor commands and ALU for computing organization and is therefore focused on implementation in SoC and FPGA. A vector-logical method of deductive matrix synthesis for the transportation of input faults, which has a quadratic computational complexity, is proposed. An inmemory simulator-automata for vector-deductive faults-as-addresses simulation, which based on read-write transactions for implementation in SoC is proposed.Objective. Development of a vector deductive method of fault simulation based on primitive read-write transactions for the analysis of logic circuits.Method. An input test set and a logical functionality vector are used. The proposed method is a development of the deductive vectors’ synthesis algorithm based on the truth table. The deductive matrix is intended for the synthesis and verification of tests using parallel simulation of faults-as-addresses combinations, based on read-write transactions over bits of deductive vectors in memory.Results. A vector method of the deductive matrices synthesis for the transportation of input faults vectors to the output of the element, was proposed. Data structures have been developed for parallel faults simulation of digital circuits based on a primitive readwrite transaction in matrix memory, where combinations of faults serve as address-columns. A sequencer of five blocks, that constitute a vector-logic computing, connected with deductive faults simulation based on read-write transactions, is proposed. Verification of models and methods on test examples has been performed.Conclusions. The scientific novelty consists in the development of the following innovative solutions: 1) a vector-logic method of synthesis of the deductive vectors matrix for parallel simulation of combinations of input faults-as-addresses, is proposed for the first time; 2) an automata for vector-deductive faults-as-addresses simulation, on the basis of read-write transactions, which is oriented for implementation in FPGA LUT, embedded online simulator SoC, as a core for faults simulation of RTL-level digital systems, was proposed for the first time; 3) the demonstration of the technological advantages of the vector-logic synthesis of deductive matrices is performed on numerous examples of traditional and RTL-logic, which accentuate the manufacturability of vectors in comparison with analytical deductive formulas during simulators construction; 4) a matrix of deductive vectors, as a set of vectorcolumns of Boolean derivatives is used to construct minimal tests for logical elements; 5) the recursive formula for the synthesis of the permutation of coordinates matrix in the logical activity vector makes it possible to significantly simplify the obtaining of the deductive matrix for fault
上下文。其主要思想是创建向量逻辑内存计算(VLC),它只使用地址内存上的读写事务来进行故障即地址模拟。没有传统的逻辑。VLC不需要处理器命令和用于计算组织的ALU,因此专注于在SoC和FPGA中实现。提出了一种计算复杂度为二次元的输入故障传输的矢量逻辑演绎矩阵综合方法。提出了一种基于读写事务的矢量演绎故障地址仿真的内存仿真自动机,并在SoC中实现。基于原始读写事务的逻辑电路故障仿真矢量演绎方法的发展。使用输入测试集和逻辑功能向量。该方法是对基于真值表的演绎向量合成算法的发展。演绎矩阵用于综合和验证使用并行模拟故障即地址组合的测试,基于内存中演绎向量位的读写事务。结果。提出了一种将输入故障向量传递到单元输出的演绎矩阵综合向量法。基于矩阵存储器中原始读写事务的数字电路并行故障仿真数据结构已经被开发出来,其中故障的组合作为地址列。提出了一种由五个块组成的矢量逻辑计算序列器,并将其与基于读写事务的演绎故障仿真相结合。通过实例对模型和方法进行了验证。本文的科学新颖性在于:1)首次提出了一种用于并行模拟输入故障作为地址组合的演绎向量矩阵综合的矢量逻辑方法;2)首次提出了面向FPGA LUT实现的基于读写事务的矢量演绎故障地址仿真自动机,并将嵌入式在线模拟器SoC作为rtl级数字系统故障仿真的核心;3)通过传统逻辑和rtl逻辑的大量实例,论证了演绎矩阵的矢量逻辑综合的技术优势,在模拟器构建过程中,与解析演绎公式相比,强调了矢量的可制造性;4)将演绎向量的矩阵作为布尔导数的向量列集合来构造逻辑元素的最小检验;5)逻辑活动向量中坐标矩阵置换合成的递推公式使得故障即地址仿真中演绎矩阵的求出有了显著的简化。其实际意义在于,该内存模拟器可以在数百纳秒的水平上获得SoC真实数字块的故障仿真速度。给出了相应算法的复杂度估计。
{"title":"VECTOR-LOGICAL FAULT SIMULATION","authors":"V. Hahanov, S. Chumachenko, Y. Litvinova, I. Hahanova, A. Khakhanova, A. Shkil, D. Rakhlis, І. Hahanov, O. Shevchenko","doi":"10.15588/1607-3274-2023-2-5","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-5","url":null,"abstract":"Context. The main idea is the creation of vector-logical in-memory computing (VLC), which uses only read-write transactions on the address memory for faults-as-addresses simulation. There is no traditional logic. VLC is free from processor commands and ALU for computing organization and is therefore focused on implementation in SoC and FPGA. A vector-logical method of deductive matrix synthesis for the transportation of input faults, which has a quadratic computational complexity, is proposed. An inmemory simulator-automata for vector-deductive faults-as-addresses simulation, which based on read-write transactions for implementation in SoC is proposed.\u0000Objective. Development of a vector deductive method of fault simulation based on primitive read-write transactions for the analysis of logic circuits.\u0000Method. An input test set and a logical functionality vector are used. The proposed method is a development of the deductive vectors’ synthesis algorithm based on the truth table. The deductive matrix is intended for the synthesis and verification of tests using parallel simulation of faults-as-addresses combinations, based on read-write transactions over bits of deductive vectors in memory.\u0000Results. A vector method of the deductive matrices synthesis for the transportation of input faults vectors to the output of the element, was proposed. Data structures have been developed for parallel faults simulation of digital circuits based on a primitive readwrite transaction in matrix memory, where combinations of faults serve as address-columns. A sequencer of five blocks, that constitute a vector-logic computing, connected with deductive faults simulation based on read-write transactions, is proposed. Verification of models and methods on test examples has been performed.\u0000Conclusions. The scientific novelty consists in the development of the following innovative solutions: 1) a vector-logic method of synthesis of the deductive vectors matrix for parallel simulation of combinations of input faults-as-addresses, is proposed for the first time; 2) an automata for vector-deductive faults-as-addresses simulation, on the basis of read-write transactions, which is oriented for implementation in FPGA LUT, embedded online simulator SoC, as a core for faults simulation of RTL-level digital systems, was proposed for the first time; 3) the demonstration of the technological advantages of the vector-logic synthesis of deductive matrices is performed on numerous examples of traditional and RTL-logic, which accentuate the manufacturability of vectors in comparison with analytical deductive formulas during simulators construction; 4) a matrix of deductive vectors, as a set of vectorcolumns of Boolean derivatives is used to construct minimal tests for logical elements; 5) the recursive formula for the synthesis of the permutation of coordinates matrix in the logical activity vector makes it possible to significantly simplify the obtaining of the deductive matrix for fault","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"70 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80941271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTELLIGENCE ANALYSIS OF EMPIRICAL DATA BASED ON TIME SERIES 基于时间序列的经验数据智能分析
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-29 DOI: 10.15588/1607-3274-2023-2-7
O. Ivanets, R. Khrashchevskyi, M. Kulik, M. Burichenko
Context. The problem of intelligent data analysis for assessing the stability of operators’ functioning as a component of safety management is considered.The object of the study was to verify estimates of the complexity and chaotic nature of physiological processes based on nonlinear dynamics methods. Objective. The goal of work is intelligent data analysis for assessing the stability of the functioning of a dynamic system based on the methods of non-linear dynamics. Method. Data intelligence to obtain additional useful information to avoid wrong decisions when deciding on the current state of the operator to be able to perform professional duties. Quantitative assessment of the complexity of physiological dynamics to determine the stability of feedback control processes of body subsystems and their constant adaptation to changes in environmental conditions. The presence of significant nonlinearities in the biomedical signals of the body is associated with the appearance of a chaotic component that describes the chaotic nature of the body’s processes. Due to the fact that biomedical signals have both a periodic and a chaotic component, the study of the latter makes it possible to determine the informational component of the nature of the internal organization of the organism and provide information about the possible destabilization of the functional state of the operator. The use of nonlinear dynamics methods to study changes in the operator’s body and provide additional independent prognostic information complementing traditional data analysis in the time and frequency domains. Several indices obtained by the methods of nonlinear dynamics are proposed, which contribute to the expansion of the diagnostic solution based on the available data. Results. The results of the study can be used during the construction of mathematical methods of non-linear dynamics to describe empirical data of this kind. Conclusions. Experimental studies have suggested recommending the use of non-linear methods dynamics as an an additional independent component that allows analyzing the chaotic component of biomedical signals to avoid wrong decisions during professional selection and assessment of the current state of aviation industry operators as one of the causes of adverse events in aviation. Prospects for further research may include the creation of a methodology based on nonlinear dynamics methods that will allow to increase the reliability of predicting a malfunction of the cardiovascular system as an indicator of a change in the balance of the functional state of the operator based on additional informative parameters, which can be used to assess triggers that may cause an adverse event in aviation, as well as an experimental study of the proposed mathematical approaches for a wide range of diagnostic problems.
上下文。将智能数据分析作为安全管理的一个组成部分,用于评估操作员功能的稳定性。该研究的目的是验证基于非线性动力学方法的生理过程的复杂性和混沌性的估计。目标。工作的目标是基于非线性动力学方法的动态系统功能稳定性评估的智能数据分析。方法。数据智能获取额外的有用信息,以避免在决定操作人员当前状态时做出错误的决策,从而能够履行专业职责。定量评估生理动力学的复杂性,以确定身体子系统反馈控制过程的稳定性及其对环境条件变化的不断适应。人体生物医学信号中显著非线性的存在与描述人体过程混沌性质的混沌成分的出现有关。由于生物医学信号既有周期性成分,也有混沌成分,对后者的研究使得确定生物体内部组织性质的信息成分成为可能,并提供有关操作者功能状态可能不稳定的信息。使用非线性动力学方法来研究操作员身体的变化,并提供额外的独立预测信息,补充了传统的时域和频域数据分析。提出了用非线性动力学方法得到的几个指标,这有助于扩展基于现有数据的诊断方案。结果。研究结果可用于构建非线性动力学的数学方法来描述这类经验数据。结论。实验研究建议使用非线性方法动力学作为一个额外的独立成分,允许分析生物医学信号的混沌成分,以避免在专业选择和评估航空业运营商当前状态时错误的决策,这是航空不良事件的原因之一。进一步研究的前景可能包括创建一种基于非线性动力学方法的方法,该方法将允许提高预测心血管系统故障的可靠性,作为基于附加信息参数的操作员功能状态平衡变化的指标,可用于评估可能导致航空不良事件的触发因素。以及对广泛的诊断问题提出的数学方法的实验研究。
{"title":"INTELLIGENCE ANALYSIS OF EMPIRICAL DATA BASED ON TIME SERIES","authors":"O. Ivanets, R. Khrashchevskyi, M. Kulik, M. Burichenko","doi":"10.15588/1607-3274-2023-2-7","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-7","url":null,"abstract":"Context. The problem of intelligent data analysis for assessing the stability of operators’ functioning as a component of safety management is considered.The object of the study was to verify estimates of the complexity and chaotic nature of physiological processes based on nonlinear dynamics methods. \u0000Objective. The goal of work is intelligent data analysis for assessing the stability of the functioning of a dynamic system based on the methods of non-linear dynamics. \u0000Method. Data intelligence to obtain additional useful information to avoid wrong decisions when deciding on the current state of the operator to be able to perform professional duties. Quantitative assessment of the complexity of physiological dynamics to determine the stability of feedback control processes of body subsystems and their constant adaptation to changes in environmental conditions. The presence of significant nonlinearities in the biomedical signals of the body is associated with the appearance of a chaotic component that describes the chaotic nature of the body’s processes. Due to the fact that biomedical signals have both a periodic and a chaotic component, the study of the latter makes it possible to determine the informational component of the nature of the internal organization of the organism and provide information about the possible destabilization of the functional state of the operator. The use of nonlinear dynamics methods to study changes in the operator’s body and provide additional independent prognostic information complementing traditional data analysis in the time and frequency domains. Several indices obtained by the methods of nonlinear dynamics are proposed, which contribute to the expansion of the diagnostic solution based on the available data. \u0000Results. The results of the study can be used during the construction of mathematical methods of non-linear dynamics to describe empirical data of this kind. \u0000Conclusions. Experimental studies have suggested recommending the use of non-linear methods dynamics as an an additional independent component that allows analyzing the chaotic component of biomedical signals to avoid wrong decisions during professional selection and assessment of the current state of aviation industry operators as one of the causes of adverse events in aviation. Prospects for further research may include the creation of a methodology based on nonlinear dynamics methods that will allow to increase the reliability of predicting a malfunction of the cardiovascular system as an indicator of a change in the balance of the functional state of the operator based on additional informative parameters, which can be used to assess triggers that may cause an adverse event in aviation, as well as an experimental study of the proposed mathematical approaches for a wide range of diagnostic problems.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"41 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88401590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHASE FREQUENCY INTERPRETATION OF THE COINCIDENCE METHOD FOR FREQUENCY TO CODE CONVERSION 相位频率解释的符合性方法,用于频码转换
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-28 DOI: 10.15588/1607-3274-2023-2-1
V. Petrushak
Context. The problem of fast conversion of radio signal frequency for monitoring the radial velocity of a moving object. The object of the study was the process of converting frequency into a code based on the coincidence method. Objective. The goal of the work is to improve the coincidence method for creating a new signal-to-code frequency converter without fixing the conversion time interval. Method. The coincidence method for converting the signal frequency into a code has been improved. The improved frequency conversion method, unlike the existing ones, consists in counting the number of complete phase cycles of the known and unknown signals during the time of double coincidence and asynchronous mode of hardware determination of the particle. The improved method has advantages in comparison with the method of an electro-counter frequency meter when determining the radial speed of objects and does not have a methodical error, which in an electro-counter frequency meter increases as the unknown frequency approaches the reference to 100%. However, the improved coincidence method compared to other versions has a hardware scheme for tracking the moments of coincidence and determining the fraction and does not require expensive and high-speed microprocessors to calculate the conversion results. Results. Based on the phase-frequency interpretation and the derived conversion equation and the proposed frequency-to-code conversion scheme using the coincidence method, a functional scheme of the frequency converter was developed. This made it possible to implement a 16-bit frequency converter in code on Intel’s MAX V series CPLD. Conclusions. The coincidence method for converting the signal frequency into a code received further development, which, unlike the existing ones, consists in counting the number of complete phase cycles of the known and unknown signals during the time of double coincidence and the asynchronous mode of hardware determination of the fraction. The influence of the frequency of signals on the time of a single measurement was studied using the coincidence method, as a result of which it was found that with an increase in the difference between the reference and unknown frequency, the time of a single measurement decreases. The obtained research results can be used for the development of high-speed means of converting the signal frequency into a binary code: in industrial tomography, radar and radio navigation for monitoring moving objects.
上下文。用于监测运动物体径向速度的无线电信号频率快速转换问题。研究的对象是基于重合法的频率转换成码的过程。目标。这项工作的目标是改进符合方法,在不固定转换时间间隔的情况下创建新的信码变频器。方法。改进了将信号频率转换为码的符合方法。改进的频率转换方法不同于现有的方法,在于计算已知和未知信号在双符合和硬件确定粒子的异步模式下的完整相位周期数。在确定物体径向速度时,改进的方法与电计数频率计的方法相比具有优点,并且不存在方法误差,在电计数频率计中,当未知频率接近参考频率100%时,方法误差会增加。然而,与其他版本相比,改进的符合法具有跟踪符合矩和确定分数的硬件方案,并且不需要昂贵的高速微处理器来计算转换结果。结果。基于相频解释和推导出的转换方程,提出了基于重合法的频率码转换方案,建立了变频器的泛函格式。这使得在Intel的MAX V系列CPLD上用代码实现16位变频器成为可能。结论。将信号频率转换成码的符合法得到了进一步的发展,与现有的符合法不同的是,该符合法是对已知和未知信号在双重符合时的完整相位周期数进行计数,并采用硬件确定分数的异步方式。采用符合法研究了信号频率对单次测量时间的影响,发现随着参考频率与未知频率之差的增大,单次测量时间减小。所获得的研究成果可用于开发将信号频率转换为二进制码的高速手段,用于工业层析成像,雷达和无线电导航,以监测运动物体。
{"title":"PHASE FREQUENCY INTERPRETATION OF THE COINCIDENCE METHOD FOR FREQUENCY TO CODE CONVERSION","authors":"V. Petrushak","doi":"10.15588/1607-3274-2023-2-1","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-1","url":null,"abstract":"Context. The problem of fast conversion of radio signal frequency for monitoring the radial velocity of a moving object. The object of the study was the process of converting frequency into a code based on the coincidence method. \u0000Objective. The goal of the work is to improve the coincidence method for creating a new signal-to-code frequency converter without fixing the conversion time interval. \u0000Method. The coincidence method for converting the signal frequency into a code has been improved. The improved frequency conversion method, unlike the existing ones, consists in counting the number of complete phase cycles of the known and unknown signals during the time of double coincidence and asynchronous mode of hardware determination of the particle. The improved method has advantages in comparison with the method of an electro-counter frequency meter when determining the radial speed of objects and does not have a methodical error, which in an electro-counter frequency meter increases as the unknown frequency approaches the reference to 100%. However, the improved coincidence method compared to other versions has a hardware scheme for tracking the moments of coincidence and determining the fraction and does not require expensive and high-speed microprocessors to calculate the conversion results. \u0000Results. Based on the phase-frequency interpretation and the derived conversion equation and the proposed frequency-to-code conversion scheme using the coincidence method, a functional scheme of the frequency converter was developed. This made it possible to implement a 16-bit frequency converter in code on Intel’s MAX V series CPLD. \u0000Conclusions. The coincidence method for converting the signal frequency into a code received further development, which, unlike the existing ones, consists in counting the number of complete phase cycles of the known and unknown signals during the time of double coincidence and the asynchronous mode of hardware determination of the fraction. \u0000The influence of the frequency of signals on the time of a single measurement was studied using the coincidence method, as a result of which it was found that with an increase in the difference between the reference and unknown frequency, the time of a single measurement decreases. \u0000The obtained research results can be used for the development of high-speed means of converting the signal frequency into a binary code: in industrial tomography, radar and radio navigation for monitoring moving objects.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"38 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89786608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DETECTION OF THE SIGNALS OF THE TERRESTRIAL RADAR STATIONS BY SPACECRAFT WITH A PASSIVE SYNTHESIS OF THE ANTENNA APERTURE 利用无源天线孔径合成技术对航天器地面雷达站信号进行探测
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-28 DOI: 10.15588/1607-3274-2023-2-2
Tetiana A. Vakaliuk, O. Andreiev, O. Dubyna, T. Nikitchuk, I. Puleko
Context is due to the need to analyze the electromagnetic accessibility of terrestrial radio radiation sources at long distances, which is typical for the operation of a spacecraft of radio technical intelligence with a passive synthesis of the antenna aperture. Objective is to calculate the probability indicators of detecting the fact of signal emission of ground-based radar stations using radio-technical intelligence installed on a space carrier. Method. Analytical calculation of the correct detection probability of the signal of the radio radiation sources by the spacecraft of radio technical intelligence based on the determination of the signal-to-noise ratio at the input of the detection device. The analysis of the technical characteristics of the group of ground radars made it possible to calculate the probability of correct detection only for the virtual radar, which generates the minimum number of pulses with the minimum energy during reconnaissance among all the analyzed radars. Results. The fulfillment of the conditions of electromagnetic accessibility is checked and the correct detection probability of the signals of modern radar stations by the space radio-technical intelligence system with a passive synthesis of the antenna aperture was calculated. Conclusion. Proposed use of the correct detection probability of the signal as the resulting indicator of electromagnetic accessibility of the radio radiation source. In the example radar stations of the air defense proved, that the proposed parameters of the space radio technical intelligence system with a passive synthesis of the antenna aperture provide the values of the correct detection probability of the signal, which are quite acceptable for modern monitoring systems.
背景是由于需要分析远距离地面无线电辐射源的电磁可达性,这是典型的具有天线孔径被动合成的无线电技术情报航天器的操作。目的是计算利用空间载体上安装的无线电技术情报探测地面雷达站信号发射事实的概率指标。方法。在确定探测装置输入信噪比的基础上,分析计算无线电技术智能航天器对射电辐射源信号的正确探测概率。通过对地面雷达组技术特性的分析,可以计算出在所有被分析雷达中,在侦察过程中产生脉冲数最少、能量最小的虚拟雷达的正确探测概率。结果。对电磁可达性条件的实现情况进行了校核,并计算了天线孔径被动合成的空间无线电技术情报系统对现代雷达站信号的正确探测概率。结论。建议使用信号的正确检测概率作为无线电辐射源的电磁可达性的最终指标。通过防空雷达站实例验证,提出的无源天线孔径合成空间无线电技术情报系统参数提供了正确的信号探测概率值,为现代监测系统所能接受。
{"title":"DETECTION OF THE SIGNALS OF THE TERRESTRIAL RADAR STATIONS BY SPACECRAFT WITH A PASSIVE SYNTHESIS OF THE ANTENNA APERTURE","authors":"Tetiana A. Vakaliuk, O. Andreiev, O. Dubyna, T. Nikitchuk, I. Puleko","doi":"10.15588/1607-3274-2023-2-2","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-2","url":null,"abstract":"Context is due to the need to analyze the electromagnetic accessibility of terrestrial radio radiation sources at long distances, which is typical for the operation of a spacecraft of radio technical intelligence with a passive synthesis of the antenna aperture. \u0000Objective is to calculate the probability indicators of detecting the fact of signal emission of ground-based radar stations using radio-technical intelligence installed on a space carrier. \u0000Method. Analytical calculation of the correct detection probability of the signal of the radio radiation sources by the spacecraft of radio technical intelligence based on the determination of the signal-to-noise ratio at the input of the detection device. The analysis of the technical characteristics of the group of ground radars made it possible to calculate the probability of correct detection only for the virtual radar, which generates the minimum number of pulses with the minimum energy during reconnaissance among all the analyzed radars. \u0000Results. The fulfillment of the conditions of electromagnetic accessibility is checked and the correct detection probability of the signals of modern radar stations by the space radio-technical intelligence system with a passive synthesis of the antenna aperture was calculated. \u0000Conclusion. Proposed use of the correct detection probability of the signal as the resulting indicator of electromagnetic accessibility of the radio radiation source. In the example radar stations of the air defense proved, that the proposed parameters of the space radio technical intelligence system with a passive synthesis of the antenna aperture provide the values of the correct detection probability of the signal, which are quite acceptable for modern monitoring systems.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"245 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75101215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE CONCEPT OF INFORMATION-ENTROPY SPACE FOR SYSTEM OBJECTS MODELS BUILDING USED IN SUSTAINABLE DEVELOPMENT TASKS 可持续发展任务中系统对象模型构建的信息熵空间概念
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-28 DOI: 10.15588/1607-3274-2023-2-3
T. Kozulia
Context. Solving tasks of interdisciplinary research deepening during sustainable development problems solutions search for real social-ecological-economical objects based on systemological modelling and introducing information-entropy space of such objects state and functionality determining for making managerial decisions in uncertainty conditions. Objective. Modelling current situation of researched social-ecological-economical object as the cooperative connection «studied system-environment» based on systemological model, which determines object study goal conditions due to discovery of internal and external factors interaction inside information-entropy space of object functioning representation. Method. The paper presents the logical-experimental research results of complex social-ecological-economical objects state estimation, their development in stochastic environment conditions from the point of view of sustainable development requirements match based on proposed approach. This approach is the systemological basis of studied object entropy model creation and algorithmization by ecological functional of quality of the complex system objects goal state. The quality functional is the interrelation of «object systems-environment» state entropy functions and their interaction processes, which are gotten through monitoring data statistical analyses of objects that belong to technogenic (economical), social and natural systems. Results. The usage of systemology basis complex union for studied object structure identification is suggested for the first time, along with identification of theoretical knowledge for informational entropy for any object system element description and entropic description of states and process. The relative accordance functional is introduced for final evaluation of the studied object equilibrium. It allows to estimate the presence of system and processes unstable points on the basis of nested system structure. It is important for decision making with synergistically positive feedbacks prediction. Conclusions. The systems and process states entropic estimation complex approach is determined. The systemological model «object-environment» is the basis for determining conditions of studied object sustainable development due to usage of found spontaneous and natural synergistically feedbacks. The universal research base for complex systems study was received for their state and functionality estimation due to process synergy and «object-environment» connections that are based on complex usage of systemological modelling and input information entropy estimation. 
上下文。解决可持续发展问题中跨学科研究深化的任务解决方案,在系统建模的基础上寻找真实的社会-生态-经济对象,并引入这些对象的状态和功能的信息熵空间,以确定不确定条件下的管理决策。目标。将被研究的社会-生态-经济对象现状建模为基于系统学模型的“研究系统-环境”的合作关系,通过发现对象功能表征的信息熵空间内的内外部因素相互作用来确定对象研究的目标条件。方法。本文从可持续发展需求匹配的角度,给出了基于该方法的复杂社会-生态-经济对象状态估计及其在随机环境条件下发展的逻辑-实验研究结果。该方法是利用复杂系统对象目标状态质量生态函数建立研究对象熵模型和算法的系统基础。质量泛函是通过对技术(经济)系统、社会系统和自然系统的监测数据统计分析得出的“对象系统-环境”状态熵函数的相互关系及其相互作用过程。结果。首次提出了利用系统学基础的复杂联合对研究对象结构进行识别,同时提出了对任意对象系统的元素描述和状态与过程的熵描述的信息熵理论知识的识别。引入相对一致泛函对研究对象的平衡状态进行最终评价。它允许在嵌套系统结构的基础上估计系统和过程不稳定点的存在。协同正反馈预测对决策具有重要意义。结论。确定了系统和过程状态熵估计的复杂方法。系统模型“对象-环境”是确定研究对象可持续发展条件的基础,因为使用了发现的自发和自然的协同反馈。复杂系统研究的通用研究基础是由于过程协同作用和基于系统建模和输入信息熵估计的复杂使用的“对象-环境”连接而进行的状态和功能估计。
{"title":"THE CONCEPT OF INFORMATION-ENTROPY SPACE FOR SYSTEM OBJECTS MODELS BUILDING USED IN SUSTAINABLE DEVELOPMENT TASKS","authors":"T. Kozulia","doi":"10.15588/1607-3274-2023-2-3","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-2-3","url":null,"abstract":"Context. Solving tasks of interdisciplinary research deepening during sustainable development problems solutions search for real social-ecological-economical objects based on systemological modelling and introducing information-entropy space of such objects state and functionality determining for making managerial decisions in uncertainty conditions. \u0000Objective. Modelling current situation of researched social-ecological-economical object as the cooperative connection «studied system-environment» based on systemological model, which determines object study goal conditions due to discovery of internal and external factors interaction inside information-entropy space of object functioning representation. \u0000Method. The paper presents the logical-experimental research results of complex social-ecological-economical objects state estimation, their development in stochastic environment conditions from the point of view of sustainable development requirements match based on proposed approach. This approach is the systemological basis of studied object entropy model creation and algorithmization by ecological functional of quality of the complex system objects goal state. The quality functional is the interrelation of «object systems-environment» state entropy functions and their interaction processes, which are gotten through monitoring data statistical analyses of objects that belong to technogenic (economical), social and natural systems. \u0000Results. The usage of systemology basis complex union for studied object structure identification is suggested for the first time, along with identification of theoretical knowledge for informational entropy for any object system element description and entropic description of states and process. The relative accordance functional is introduced for final evaluation of the studied object equilibrium. It allows to estimate the presence of system and processes unstable points on the basis of nested system structure. It is important for decision making with synergistically positive feedbacks prediction. \u0000Conclusions. The systems and process states entropic estimation complex approach is determined. The systemological model «object-environment» is the basis for determining conditions of studied object sustainable development due to usage of found spontaneous and natural synergistically feedbacks. The universal research base for complex systems study was received for their state and functionality estimation due to process synergy and «object-environment» connections that are based on complex usage of systemological modelling and input information entropy estimation. ","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"72 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88766372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT 技术系统在威胁冲击过程中产生的风险终端流分析
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-28 DOI: 10.15588/1607-3274-2023-1-14
V. Sabat, L. Sikora, B. V. Durnyak, I. Povkhan, V. Polishchuk
Context. The analysis of the risk terminal flows in technogenic systems is carried out, which arise in the process of the impact of informational and cognitive threats in the automated document management system as part of the hierarchical production system. The object of the research is the process of functioning of complex systems with a hierarchical structure, in which automated document management systems with a high level of data flow protection for decision-making are used to provide the information quality control of technological processes. The subjects of the research are the methods and means of constructing an information protection system to ensure the reliable functioning of automated document management systems and making targeted decisions in hierarchical structures with minimal risk of exposure to external threats and attacks. Objective is to develop a complex model for assessing the risk of the document management system failure as part of a hierarchical production system under the active threats. Method. For the first time, the cause-and-effect diagram of the event formation with the active action of threat factors and attacks is substantiated and developed, the interpretation of risk in a technogenic system is defined, and the risk in the space of states is presented as a change in the trajectory in the system transitions to the limit operation mode. For the first time, a category diagram of the structure of risk generation under the threat factors and a system-category diagram of interaction in the system risk ↔ emergencyactive nature is constructed, a system-category scheme of risk formation under the active threat factors is suggested. For the first time, a cognitive diagram for assessing losses in the event of a risk situation arising from incorrect actions of the personnel is substantiated. Results. As a result of the research, a system-category diagram of the impact of a set of threats on the system functioning mode and process is constructed, a method is developed for calculating the level of system strategic security of energy-active hierarchical systems in the process of attacks and threats, and a complex model for assessing the risk of a system functioning failure under active threats is suggested. Conclusions. Under the action of active obstacles, cognitive and system factors at the operational and strategic levels of the control hierarchy, due to wrong decisions and informational disorientation, emergency situations and risks of the system function loss and its target-orientation arise. The analysis of a set of risks and the suggested category diagram of the risk generation structure under the impact of threat factors form the basis of the development of the probability structure of the risk concept based on the attack ↔ consequence model, as well as the construction of a system-category diagram of the interaction in the game active factor ↔ accident risk. This, in turn, makes it possible to construct a system
上下文。对作为分层生产系统组成部分的自动化文档管理系统在受到信息威胁和认知威胁影响的过程中产生的技术系统风险终端流进行了分析。研究对象是具有层次结构的复杂系统的功能过程,其中使用具有高水平数据流保护的自动化文档管理系统为决策提供技术过程的信息质量控制。研究的主题是构建信息保护系统的方法和手段,以确保自动化文档管理系统的可靠功能,并在分层结构中做出有针对性的决策,同时将暴露于外部威胁和攻击的风险降到最低。目标是开发一个复杂的模型,用于评估在主动威胁下作为分层生产系统一部分的文件管理系统失效的风险。方法。首次建立了威胁因素和攻击主动作用下事件形成的因果关系图,定义了技术系统风险的解释,并将状态空间中的风险表现为系统向极限运行模式过渡过程中轨迹的变化。首次构造了威胁因素下风险生成结构的分类图和系统风险↔应急主动性质中相互作用的系统分类图,提出了主动威胁因素下风险形成的系统分类方案。这是第一次证实了一个认知图,用于评估因人员的不正确行动而引起的危险情况下的损失。结果。在此基础上,构建了一组威胁对系统功能模式和过程影响的系统类别图,提出了能量主动分层系统在攻击和威胁过程中系统战略安全水平的计算方法,并提出了主动威胁下系统功能失效风险的复杂评估模型。结论。在控制层次的操作层面和战略层面的主动障碍、认知因素和制度因素的作用下,由于错误的决策和信息迷失,出现了系统功能丧失和目标导向的紧急情况和风险。对一组风险的分析和建议的威胁因素影响下的风险生成结构的类别图构成了基于攻击↔后果模型的风险概念的概率结构的发展基础,以及构建了游戏主动因素↔事故风险中相互作用的系统类别图。这反过来又使我们有可能为威胁影响过程中产生的技术系统的风险终端流的形成构建一个系统类别方案。一个评估威胁下系统失效风险的复杂模型可用于构建任何技术系统层次控制结构的保护系统。
{"title":"ANALYSIS OF RISK TERMINAL FLOWS IN TECHNOGENIC SYSTEMS ARISING IN THE PROCESS OF THREAT IMPACT","authors":"V. Sabat, L. Sikora, B. V. Durnyak, I. Povkhan, V. Polishchuk","doi":"10.15588/1607-3274-2023-1-14","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-1-14","url":null,"abstract":"Context. The analysis of the risk terminal flows in technogenic systems is carried out, which arise in the process of the impact of informational and cognitive threats in the automated document management system as part of the hierarchical production system. \u0000The object of the research is the process of functioning of complex systems with a hierarchical structure, in which automated document management systems with a high level of data flow protection for decision-making are used to provide the information quality control of technological processes. \u0000The subjects of the research are the methods and means of constructing an information protection system to ensure the reliable functioning of automated document management systems and making targeted decisions in hierarchical structures with minimal risk of exposure to external threats and attacks. \u0000Objective is to develop a complex model for assessing the risk of the document management system failure as part of a hierarchical production system under the active threats. \u0000Method. For the first time, the cause-and-effect diagram of the event formation with the active action of threat factors and attacks is substantiated and developed, the interpretation of risk in a technogenic system is defined, and the risk in the space of states is presented as a change in the trajectory in the system transitions to the limit operation mode. For the first time, a category diagram of the structure of risk generation under the threat factors and a system-category diagram of interaction in the system risk ↔ emergencyactive nature is constructed, a system-category scheme of risk formation under the active threat factors is suggested. For the first time, a cognitive diagram for assessing losses in the event of a risk situation arising from incorrect actions of the personnel is substantiated. \u0000Results. As a result of the research, a system-category diagram of the impact of a set of threats on the system functioning mode and process is constructed, a method is developed for calculating the level of system strategic security of energy-active hierarchical systems in the process of attacks and threats, and a complex model for assessing the risk of a system functioning failure under active threats is suggested. \u0000Conclusions. Under the action of active obstacles, cognitive and system factors at the operational and strategic levels of the control hierarchy, due to wrong decisions and informational disorientation, emergency situations and risks of the system function loss and its target-orientation arise. The analysis of a set of risks and the suggested category diagram of the risk generation structure under the impact of threat factors form the basis of the development of the probability structure of the risk concept based on the attack ↔ consequence model, as well as the construction of a system-category diagram of the interaction in the game active factor ↔ accident risk. This, in turn, makes it possible to construct a system","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"33 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73368087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF ROUTING A GROUP OF MOBILE ROBOTS IN A FIXED NETWORK FOR SEARCHING THE MISSING OBJECTS IN A TECHNOLOGICAL DISASTER ZONE 一种在固定网络中为寻找技术灾区的失物而路由一组移动机器人的方法
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-27 DOI: 10.15588/1607-3274-2023-1-13
V. Batsamut, S. O. Hodlevsky
Context. The relevance of the article is determined by the need for further development of models of collective behavior of systems with multi-agent structure construction endowed with intelligence that ensures synchronization of the joint efforts of various agents while achieving the goals set for the system. The method proposed in the article solves the problem of competition between different agents of a multi-agent system, which is important while performing search, rescue, and monitoring tasks in crisis areas of various origins. Objective is to develop a method for determining the sufficient population of a multi-agent system and the optimal routes of movement of its individual elements in a stationary network for the most complete examination of a technological disaster zone (any given zone based on a certain transport network). Method. We implemented the concept of a dynamic programming to search for all possible edge-simple longest paths connecting the directed subsets of vertices-sources and vertices-sinks in the structure of the model weighted directed graph. To this end, the modified Dijkstra method was applied. The modification comprises representing the weights of the arcs of the modeling directed graph with the negative values, which are further used in calculations according to the Dijkstra method. After finding the next edgesimple longest path, the arcs that make up it are fixed in the memory of the computer system (in the route plan) and removed from the graph structure, and the process is iteratively repeated. The search for paths takes place as long as the transitive closure between the vertices that are part of the specified subsets of source vertices and sink vertices is preserved. The developed method makes it possible to find such a set of traffic routes for the elements of the multi-agent system, which maximizes the area examined by them in a technological disaster zone (or the number of checked objects on the traffic routes) in one “wave” of the search and distributes the elements of a multi-agent system by routes that do not have common areas. A derivative of the application of the developed method is the determination of a sufficient population of a multi-agent system for effective search activities within the defined zone. Results. 1) A method of routing a group of mobile robots in a stationary network for searching the missing objects in a technological disaster zone has been developed. 2) The working expression of the Dijkstra method for searching in the structure of a network object (in the structure of a model graph) for the longest paths has been formalized. 3) We have suggested a set of indicators for a comprehensive evaluation of route plans of a multi-agent system. 4) The method has been verified on test problems. Conclusions. Theoretical studies and several experiments confirm the efficiency of the developed method. The solutions made using the developed method are accurate, which allows recommending it fo
上下文。本文的相关性取决于需要进一步发展系统的集体行为模型,这些模型具有赋予智能的多智能体结构结构,在实现系统设定目标的同时确保各智能体共同努力的同步。本文提出的方法解决了多智能体系统中不同智能体之间的竞争问题,这对于在不同起源的危机区域执行搜索、救援和监测任务非常重要。目标是开发一种方法,以确定多agent系统的足够数量和固定网络中单个元素的最佳移动路线,以最完整地检查技术灾区(基于某种运输网络的任何给定区域)。方法。我们实现了动态规划的概念,在模型加权有向图的结构中搜索连接顶点源和顶点汇的有向子集的所有可能的边简单最长路径。为此,采用了改进的Dijkstra方法。修改包括用负值表示建模有向图的弧权值,并根据Dijkstra方法进一步用于计算。在找到下一个边简单最长路径后,构成它的弧线被固定在计算机系统的内存中(在路线规划中),并从图结构中删除,迭代重复这个过程。只要保留了作为源顶点和接收顶点的指定子集的一部分的顶点之间的传递闭包,就会进行路径搜索。所开发的方法使得为多智能体系统的要素找到这样一组交通路线成为可能,在搜索的一个“波”中最大化它们在技术灾区检查的区域(或交通路线上检查对象的数量),并通过没有公共区域的路线分配多智能体系统的要素。所开发的方法的应用的派生是确定多代理系统的足够数量,以便在确定的区域内进行有效的搜索活动。结果:1)提出了一种在固定网络中寻找技术灾区失物的移动机器人群路由方法。2)给出了在网络对象结构(模型图结构)中搜索最长路径的Dijkstra方法的工作表达式。3)提出了一套综合评价多智能体系统路线规划的指标。4)对试验问题进行了验证。结论。理论研究和实验验证了该方法的有效性。使用所开发的方法所得到的解决方案是准确的,这使得推荐它用于在自动化模式下确定多代理系统的路线计划,以及在这种系统中执行特定危机区域所需数量的搜索任务所需的代理数量。
{"title":"METHOD OF ROUTING A GROUP OF MOBILE ROBOTS IN A FIXED NETWORK FOR SEARCHING THE MISSING OBJECTS IN A TECHNOLOGICAL DISASTER ZONE","authors":"V. Batsamut, S. O. Hodlevsky","doi":"10.15588/1607-3274-2023-1-13","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-1-13","url":null,"abstract":"Context. The relevance of the article is determined by the need for further development of models of collective behavior of systems with multi-agent structure construction endowed with intelligence that ensures synchronization of the joint efforts of various agents while achieving the goals set for the system. The method proposed in the article solves the problem of competition between different agents of a multi-agent system, which is important while performing search, rescue, and monitoring tasks in crisis areas of various origins. \u0000Objective is to develop a method for determining the sufficient population of a multi-agent system and the optimal routes of movement of its individual elements in a stationary network for the most complete examination of a technological disaster zone (any given zone based on a certain transport network). \u0000Method. We implemented the concept of a dynamic programming to search for all possible edge-simple longest paths connecting the directed subsets of vertices-sources and vertices-sinks in the structure of the model weighted directed graph. To this end, the modified Dijkstra method was applied. The modification comprises representing the weights of the arcs of the modeling directed graph with the negative values, which are further used in calculations according to the Dijkstra method. After finding the next edgesimple longest path, the arcs that make up it are fixed in the memory of the computer system (in the route plan) and removed from the graph structure, and the process is iteratively repeated. The search for paths takes place as long as the transitive closure between the vertices that are part of the specified subsets of source vertices and sink vertices is preserved. The developed method makes it possible to find such a set of traffic routes for the elements of the multi-agent system, which maximizes the area examined by them in a technological disaster zone (or the number of checked objects on the traffic routes) in one “wave” of the search and distributes the elements of a multi-agent system by routes that do not have common areas. A derivative of the application of the developed method is the determination of a sufficient population of a multi-agent system for effective search activities within the defined zone. \u0000Results. 1) A method of routing a group of mobile robots in a stationary network for searching the missing objects in a technological disaster zone has been developed. 2) The working expression of the Dijkstra method for searching in the structure of a network object (in the structure of a model graph) for the longest paths has been formalized. 3) We have suggested a set of indicators for a comprehensive evaluation of route plans of a multi-agent system. 4) The method has been verified on test problems. \u0000Conclusions. Theoretical studies and several experiments confirm the efficiency of the developed method. The solutions made using the developed method are accurate, which allows recommending it fo","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"94 4 Pt 1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89485092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE METHOD OF ASSESSING THE VALUE OF INFORMATION 评估信息价值的方法
IF 0.5 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-27 DOI: 10.15588/1607-3274-2023-1-11
I. Pilkevych, T. Vakaliuk, O. S. Boichenko
Context. The task of assessing the value of the institution’s information as one of the objects of protection of the information security model is considered. Objective. The goal of the work is the creation of a method of assessing the value of information, which takes into account the time of the final aging of information. Method. The results of the analysis of methods for evaluating the value of information showed that modern approaches are conventionally divided into two directions. In the first direction, the value of information is calculated as the amount of information in bytes. In the second direction, the value of information is calculated in monetary terms. It is shown that modern approaches do not take into account the influence of time on the value of information. A method of assessing the value of information is proposed, which takes into account such characteristics as the term of final aging of information, the level of its access restriction, importance, and form of ownership. The value of information is presented as a quantitative measure that determines the degree of its usefulness for the owner. It is proposed to calculate the value of the initial value of information during its creation or acquisition by calculating the normalized weight of the coefficients according to the formula of the arithmetic mean. It was shown that the current value of information has a functional dependence on the time of existence of information and the time of its final aging. Results. The results of the experiment confirm that the value of information has a nonlinear functional dependence on the time of final aging of information. Conclusions. The conducted experiments confirmed the efficiency of the proposed method of evaluating the value of information and allow recommending it for use in practice to protect the institution’s information. Prospects for further research may include the creation of a methodology for assessing the value of an institution’s information, taking into account the aging of information and subsequent adjustment of measures to protect it.
上下文。将评估机构信息价值的任务作为信息安全模型的保护对象之一加以考虑。目标。这项工作的目标是创造一种评估信息价值的方法,该方法考虑了信息最终老化的时间。方法。对信息价值评估方法的分析结果表明,现代方法通常分为两个方向。在第一个方向上,信息的值被计算为以字节为单位的信息量。在第二个方向,信息的价值是用货币来计算的。结果表明,现代方法没有考虑到时间对信息价值的影响。提出了一种信息价值评估方法,该方法考虑了信息的最终老化期限、访问限制程度、重要性和所有权形式等特征。信息的价值是一种量化的度量,它决定了信息对所有者有用的程度。提出根据算术平均数公式,通过计算各系数的归一化权值来计算信息在创建或获取过程中的初始值。结果表明,信息的当前价值与信息存在的时间和信息最终老化的时间具有函数依赖关系。结果。实验结果证实,信息的价值与信息的最终老化时间呈非线性函数依赖关系。结论。所进行的实验证实了所提出的评估信息价值的方法的有效性,并允许推荐它在实践中使用,以保护机构的信息。进一步研究的前景可能包括建立一种评估机构资料价值的方法,同时考虑到资料的老化和随后对保护资料的措施的调整。
{"title":"THE METHOD OF ASSESSING THE VALUE OF INFORMATION","authors":"I. Pilkevych, T. Vakaliuk, O. S. Boichenko","doi":"10.15588/1607-3274-2023-1-11","DOIUrl":"https://doi.org/10.15588/1607-3274-2023-1-11","url":null,"abstract":"Context. The task of assessing the value of the institution’s information as one of the objects of protection of the information security model is considered. \u0000Objective. The goal of the work is the creation of a method of assessing the value of information, which takes into account the time of the final aging of information. \u0000Method. The results of the analysis of methods for evaluating the value of information showed that modern approaches are conventionally divided into two directions. In the first direction, the value of information is calculated as the amount of information in bytes. In the second direction, the value of information is calculated in monetary terms. It is shown that modern approaches do not take into account the influence of time on the value of information. A method of assessing the value of information is proposed, which takes into account such characteristics as the term of final aging of information, the level of its access restriction, importance, and form of ownership. The value of information is presented as a quantitative measure that determines the degree of its usefulness for the owner. It is proposed to calculate the value of the initial value of information during its creation or acquisition by calculating the normalized weight of the coefficients according to the formula of the arithmetic mean. It was shown that the current value of information has a functional dependence on the time of existence of information and the time of its final aging. \u0000Results. The results of the experiment confirm that the value of information has a nonlinear functional dependence on the time of final aging of information. \u0000Conclusions. The conducted experiments confirmed the efficiency of the proposed method of evaluating the value of information and allow recommending it for use in practice to protect the institution’s information. Prospects for further research may include the creation of a methodology for assessing the value of an institution’s information, taking into account the aging of information and subsequent adjustment of measures to protect it.","PeriodicalId":43783,"journal":{"name":"Radio Electronics Computer Science Control","volume":"26 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87150474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Radio Electronics Computer Science Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1