Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-58-62
L.A. Savytska, I. S. Bosak, N. V. Dobrovolska, S. V. Bohomolov
ERP (Enterprise Resource Planning) information systems are necessary components of modern business, which play a critical role in managing enterprise resources and integrating business processes. By providing centralized management, integration, and automation, ERP systems help businesses effectively manage their operations, reduce costs, increase productivity, and make informed decisions. ERP information systems consist of various modules that interact with each other and provide comprehensive functionality for managing various aspects of the organization's activities. There are many popular ERP systems on the market that meet the needs of various industries and organizations. These systems are only a few examples on the market for ERP systems, there are many other solutions that can meet the specific needs of organizations of different sizes and industries. The choice of the system should take into account the needs of the enterprise, the budget, scalability and integration capabilities. Thus, an example of ERP - a system that takes into account the specifics of resource planning of industrial companies of PJSC "PlasmaTech" is called the "PlasmIS" information system. This system is constantly being developed and improved, taking into account the changing needs of factories producing welding electrodes, starting from the supply of materials and raw materials to the manufacture of finished products. Expansion and creation of new modules in the "PlasmIS" system take place in accordance with the tasks set, in particular in the field of filling the database through collections, providing new functionality of the system." [1]. This article presents a research study on the use of collections for populating databases. Various types of collections and their advantages are discussed, and methods for inserting data from collections into databases are analyzed. The impact of using collections on system performance is also investigated. The research confirms the effectiveness of using collections for populating databases and improving system performance.
{"title":"FILLING DATABASE THROUGH COLLECTIONS","authors":"L.A. Savytska, I. S. Bosak, N. V. Dobrovolska, S. V. Bohomolov","doi":"10.31649/1999-9941-2023-57-2-58-62","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-58-62","url":null,"abstract":"ERP (Enterprise Resource Planning) information systems are necessary components of modern business, which play a critical role in managing enterprise resources and integrating business processes. By providing centralized management, integration, and automation, ERP systems help businesses effectively manage their operations, reduce costs, increase productivity, and make informed decisions. ERP information systems consist of various modules that interact with each other and provide comprehensive functionality for managing various aspects of the organization's activities. There are many popular ERP systems on the market that meet the needs of various industries and organizations. These systems are only a few examples on the market for ERP systems, there are many other solutions that can meet the specific needs of organizations of different sizes and industries. The choice of the system should take into account the needs of the enterprise, the budget, scalability and integration capabilities. Thus, an example of ERP - a system that takes into account the specifics of resource planning of industrial companies of PJSC \"PlasmaTech\" is called the \"PlasmIS\" information system. This system is constantly being developed and improved, taking into account the changing needs of factories producing welding electrodes, starting from the supply of materials and raw materials to the manufacture of finished products. Expansion and creation of new modules in the \"PlasmIS\" system take place in accordance with the tasks set, in particular in the field of filling the database through collections, providing new functionality of the system.\" [1]. This article presents a research study on the use of collections for populating databases. Various types of collections and their advantages are discussed, and methods for inserting data from collections into databases are analyzed. The impact of using collections on system performance is also investigated. The research confirms the effectiveness of using collections for populating databases and improving system performance.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-78-86
Yu.V. Ulianovska, A.D. Firsov, M.F. Mormul, D.O. Pikulin
Work is devoted the development of web-appendix for the imitation design of municipal travelling motion on crossing. As on this time a transport system dissatisfies on 100% of demand through the moral ramshackleness and existence of many factors that influence on her, and that it is difficult constantly to take into account a man, an actual task is automation of process of design of transport streams by software development on the basis of modern web technologies. The classes of primary and necessary data are in-process analyzed, boolean variables, classes of necessary functions. The program is worked out in programming of JavaScript language, experimental calculations are done. In the total it is worked out web-appendix, that simplifies research of transport areas due to an imitation design, that allows to perfect monitoring of the travelling crossing and promote them carrying capacity. web-appendix has a simple intuitively-clear interface and does verification of correctness of the entered data, that allows to work with him to the people with minimum skills and without the special knowledge. Software was worked out adaptive, that allows to work with him from any device that has the set web-browser. Due to development of one main file in programming of JavaScript language, him it easily to integrate and use in the prepared decisions on different languages both in web-additions and in programmatic provided, for example in C# or C++. It allows to inculcate the use of programmatic means with the minimum charges of money and time. Due to application of the worked out system of imitation design of travelling motion on crossing efficiency of functioning of the managed crossing will considerably increase with a traffic-light type adjusting.
{"title":"OBJECT-ORIENTED IMPLEMENTATION OF A WEB APPLICATION FOR TRAFFIC SIMULATION","authors":"Yu.V. Ulianovska, A.D. Firsov, M.F. Mormul, D.O. Pikulin","doi":"10.31649/1999-9941-2023-57-2-78-86","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-78-86","url":null,"abstract":"Work is devoted the development of web-appendix for the imitation design of municipal travelling motion on crossing. As on this time a transport system dissatisfies on 100% of demand through the moral ramshackleness and existence of many factors that influence on her, and that it is difficult constantly to take into account a man, an actual task is automation of process of design of transport streams by software development on the basis of modern web technologies. The classes of primary and necessary data are in-process analyzed, boolean variables, classes of necessary functions. The program is worked out in programming of JavaScript language, experimental calculations are done. In the total it is worked out web-appendix, that simplifies research of transport areas due to an imitation design, that allows to perfect monitoring of the travelling crossing and promote them carrying capacity. web-appendix has a simple intuitively-clear interface and does verification of correctness of the entered data, that allows to work with him to the people with minimum skills and without the special knowledge. Software was worked out adaptive, that allows to work with him from any device that has the set web-browser. Due to development of one main file in programming of JavaScript language, him it easily to integrate and use in the prepared decisions on different languages both in web-additions and in programmatic provided, for example in C# or C++. It allows to inculcate the use of programmatic means with the minimum charges of money and time. Due to application of the worked out system of imitation design of travelling motion on crossing efficiency of functioning of the managed crossing will considerably increase with a traffic-light type adjusting.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134883907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-50-57
O.Y. Nedosnovanyi, O.I. Cherniak, V.V. Golinko
The article is devoted to a comparative analysis of cloud services for processing geographic data. It describes in detail the services - Google Cloud, Amazon Web Services and Microsoft Azure - that provide tools for storing, processing and analyzing large amounts of geographic data. The article also describes the parameters of geoinformation services, the access algorithm, and examples of program code for processing satellite data. The article describes such opportunities and limitations of using cloud services as automation, security and scalability. The conclusions and recommendations for further development of geographic information systems based on cloud services are provided. Services. Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) offer a variety of geodata storage solutions. These solutions include object storage, such as Amazon S3, Azure Blob Storage, and Google Cloud Storage, as well as geospatial databases, such as Amazon RDS, Azure Cosmos DB, and Google Cloud Firestore. In addition, each of these services provides a set of services for analyzing and processing geographic information data. For example, AWS offers services such as Amazon Athena, Amazon Redshift, and AWS Glue, which allow you to run SQL queries, conduct analytics, and integrate geodata with other services. Azure offers services such as Azure SQL Database, Azure Databricks, and HDInsight, which provide capabilities for processing and analyzing geographic data. GCP also provides services such as BigQuery, Dataflow, and Dataproc, which allow you to perform analytical operations and process large amounts of geodata. Support for integration with various geo-tools is important for analysis, such as AWS, Amazon Location Service, Amazon Ground Truth, and Amazon Rekognition, which allow you to work with geodata at different levels of complexity. Azure has Azure Maps, which provides services for geocoding, routing, and visualization of geodata. GCP also offers Google Maps Platform, which provides extensive integration with geographic technologies such as routing, geocoding, and map visualization. All these processes will allow for more efficient data processing. Keywords: cloud technologies,
{"title":"COMPARATIVE ANALYSIS OF CLOUD SERVICES FOR GEOINFORMATION DATA PROCESSING","authors":"O.Y. Nedosnovanyi, O.I. Cherniak, V.V. Golinko","doi":"10.31649/1999-9941-2023-57-2-50-57","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-50-57","url":null,"abstract":"The article is devoted to a comparative analysis of cloud services for processing geographic data. It describes in detail the services - Google Cloud, Amazon Web Services and Microsoft Azure - that provide tools for storing, processing and analyzing large amounts of geographic data. The article also describes the parameters of geoinformation services, the access algorithm, and examples of program code for processing satellite data. The article describes such opportunities and limitations of using cloud services as automation, security and scalability. The conclusions and recommendations for further development of geographic information systems based on cloud services are provided. Services. Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) offer a variety of geodata storage solutions. These solutions include object storage, such as Amazon S3, Azure Blob Storage, and Google Cloud Storage, as well as geospatial databases, such as Amazon RDS, Azure Cosmos DB, and Google Cloud Firestore. In addition, each of these services provides a set of services for analyzing and processing geographic information data. For example, AWS offers services such as Amazon Athena, Amazon Redshift, and AWS Glue, which allow you to run SQL queries, conduct analytics, and integrate geodata with other services. Azure offers services such as Azure SQL Database, Azure Databricks, and HDInsight, which provide capabilities for processing and analyzing geographic data. GCP also provides services such as BigQuery, Dataflow, and Dataproc, which allow you to perform analytical operations and process large amounts of geodata. Support for integration with various geo-tools is important for analysis, such as AWS, Amazon Location Service, Amazon Ground Truth, and Amazon Rekognition, which allow you to work with geodata at different levels of complexity. Azure has Azure Maps, which provides services for geocoding, routing, and visualization of geodata. GCP also offers Google Maps Platform, which provides extensive integration with geographic technologies such as routing, geocoding, and map visualization. All these processes will allow for more efficient data processing. Keywords: cloud technologies,","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-87-92
E. O. Bashkov, D. T. Obidnyk
Graphic images are formed using graphic primitives. These are the smallest, indivisible from the point of view of application programs, graphic elements used as the basis for building more complex images. Among the graphic primitives, the segments of straight lines, for the formation of which provides linear interpolation, have the highest specific weight. The performance of forming a graphic scene depends on the time of vector generation, therefore the question of increasing the performance of linear interpolation is relevant, especially for dynamic images. With the use of matrix screens and matrix executive bodies in registration devices, the possibility of one-stroke reproduction of row or column elements appears, which allows you to significantly increase the speed of these devices. This mode of operation is promising. Its organization requires the development of interpolation methods that allow in one interpolation cycle to receive the increment code in a row or column (code interpolation). A coded linear interpolation method is proposed, the feature of which is determined in each interpolation clock of digital segments, which includes the number of increments of the same type with the same ordinate (abscissa). For this cycle, prepare for interpolation a larger increment of the line segment to a smaller one. In the future, this ratio and the remainder of the division are used to determine digital segments. In the proposed method, the remainder of the division of a larger increment by a smaller one is accumulated, which is equal to the smaller increment. This allows you to eliminate the accumulation of error and ensure that the end point of the straight line segment is reached. The maximum interpolation error in this case does not exceed half of the discretization step, which is due to the symmetry of the error. The code linear interpolation algorithm is proposed. The research carried out in the work can be used to build high-performance computer graphics tools.
{"title":"VECTORS CODE LINEAR INTERPOLATION METHOD FOR FORMING LINE SEGMENTS","authors":"E. O. Bashkov, D. T. Obidnyk","doi":"10.31649/1999-9941-2023-57-2-87-92","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-87-92","url":null,"abstract":"Graphic images are formed using graphic primitives. These are the smallest, indivisible from the point of view of application programs, graphic elements used as the basis for building more complex images. Among the graphic primitives, the segments of straight lines, for the formation of which provides linear interpolation, have the highest specific weight. The performance of forming a graphic scene depends on the time of vector generation, therefore the question of increasing the performance of linear interpolation is relevant, especially for dynamic images. With the use of matrix screens and matrix executive bodies in registration devices, the possibility of one-stroke reproduction of row or column elements appears, which allows you to significantly increase the speed of these devices. This mode of operation is promising. Its organization requires the development of interpolation methods that allow in one interpolation cycle to receive the increment code in a row or column (code interpolation). A coded linear interpolation method is proposed, the feature of which is determined in each interpolation clock of digital segments, which includes the number of increments of the same type with the same ordinate (abscissa). For this cycle, prepare for interpolation a larger increment of the line segment to a smaller one. In the future, this ratio and the remainder of the division are used to determine digital segments. In the proposed method, the remainder of the division of a larger increment by a smaller one is accumulated, which is equal to the smaller increment. This allows you to eliminate the accumulation of error and ensure that the end point of the straight line segment is reached. The maximum interpolation error in this case does not exceed half of the discretization step, which is due to the symmetry of the error. The code linear interpolation algorithm is proposed. The research carried out in the work can be used to build high-performance computer graphics tools.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-13-24
Y. V. Baryshev, N. R. Kondratenko, V. V. Kazmirevskyi, T. G. Kyrylashchuk
A method of type-2 fuzzy sets implementation for critical systems’ modeling and state assessment tasks with uncertain input data is proposed. It is shown that the basis for solving the modeling task is designing of a fuzzy logic system with interval membership functions of type-2. The paper presents the task of further developing the process of estimating the interval output of a fuzzy system with experts involvement. An approach based on fuzzy sets is proposed for solving the task of critical systems’ modeling and states assessment. Using the example of energy grid systems, where a high degree of uncertainty is present, it is shown that the main factors that influence the appearance of uncertainty in the initial data set of such systems are caused by the lack of sufficient information in the open print and the high variability of threats under the influence of the growing pace of digitalization of business processes. An analysis of expert evaluations of the interval output of fuzzy systems based on examples of modeling complex objects in various fields of application is given. The first example demonstrates the results of modeling in the field of natural sciences with uncertain initial data for assessing the prospects of an artesian well, where the final assessment is made by an expert. The second example demonstrates the implementation of the interval fuzzy model in the task of social orientation, where the problem of recruiting personnel in social groups from the point of view of professional suitability is modeled. The third task refers to modeling in the field of medical diagnosis of diseases of the endocrine system. Evaluation by experts of the results of interval fuzzy modeling in this field makes it possible to determine the state of a person's disease for endocrine pathology and prescribe timely treatment. The given examples of evaluating the interval output of a fuzzy system, taking into account the opinion of experts, confirm the possibilities for making decisions that are adequate for the subject area in the conditions of uncertain input data. Prospects for the application of the proposed models for the problems of cyber security of critical systems are given.
{"title":"TYPE-2 FUZZY SETS IN THE TASKS OF MODELLING AND ESTIMATING OF CRITICAL SYSTEMS’S STATES WITH UNCERTAIN INPUT DATA AND THE USAGE OF EXPERTS","authors":"Y. V. Baryshev, N. R. Kondratenko, V. V. Kazmirevskyi, T. G. Kyrylashchuk","doi":"10.31649/1999-9941-2023-57-2-13-24","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-13-24","url":null,"abstract":"A method of type-2 fuzzy sets implementation for critical systems’ modeling and state assessment tasks with uncertain input data is proposed. It is shown that the basis for solving the modeling task is designing of a fuzzy logic system with interval membership functions of type-2. The paper presents the task of further developing the process of estimating the interval output of a fuzzy system with experts involvement. An approach based on fuzzy sets is proposed for solving the task of critical systems’ modeling and states assessment. Using the example of energy grid systems, where a high degree of uncertainty is present, it is shown that the main factors that influence the appearance of uncertainty in the initial data set of such systems are caused by the lack of sufficient information in the open print and the high variability of threats under the influence of the growing pace of digitalization of business processes. An analysis of expert evaluations of the interval output of fuzzy systems based on examples of modeling complex objects in various fields of application is given. The first example demonstrates the results of modeling in the field of natural sciences with uncertain initial data for assessing the prospects of an artesian well, where the final assessment is made by an expert. The second example demonstrates the implementation of the interval fuzzy model in the task of social orientation, where the problem of recruiting personnel in social groups from the point of view of professional suitability is modeled. The third task refers to modeling in the field of medical diagnosis of diseases of the endocrine system. Evaluation by experts of the results of interval fuzzy modeling in this field makes it possible to determine the state of a person's disease for endocrine pathology and prescribe timely treatment. The given examples of evaluating the interval output of a fuzzy system, taking into account the opinion of experts, confirm the possibilities for making decisions that are adequate for the subject area in the conditions of uncertain input data. Prospects for the application of the proposed models for the problems of cyber security of critical systems are given.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-63-77
O.K. Teslenko, M.Y. Bondarchuk
The most crucial aspects of permutations are their speed and ease of implementation. This article examines the implementation of arbitrary bitness permutations in computer engineering using a particular class of combination structures with linear complexity, namely, combined cascades of structural units. The reflection formed by this linear structure is identical to that of the corresponding Mealy finite state machine, which allows for the exploration of the properties of structural units and the cascade in the context of the theory of digital automata. The purpose of this permutation is to convert large volumes of data using hardware or software quickly and simply that can be used in various research fields. The paper investigates the bijectivity and equivalence of the reflection and presents an algorithm for constructing finitestate machines for both direct and inverted permutations, along with examples of state and output table construction. The article also provides examples of hardware implementation using field-programmable gate arrays and estimates the size of state and output tables for software implementation. The theoretical speed of bijective reflection transformations is calculated for both field-programmable gate arrays and software implementation, and the paper compares the speed of software implementations based on combined and one-dimensional cascades of constructive units. The practical verification of processing speed is made with software implementation. Finally, the article proposes areas of application for this arbitrary bitness permutation.
{"title":"IMPLEMENTATION OF ARBITRARY BITNESS PERMUTATIONS BASED ON COMBINED CASCADES OF STRUCTURAL UNITS","authors":"O.K. Teslenko, M.Y. Bondarchuk","doi":"10.31649/1999-9941-2023-57-2-63-77","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-63-77","url":null,"abstract":"The most crucial aspects of permutations are their speed and ease of implementation. This article examines the implementation of arbitrary bitness permutations in computer engineering using a particular class of combination structures with linear complexity, namely, combined cascades of structural units. The reflection formed by this linear structure is identical to that of the corresponding Mealy finite state machine, which allows for the exploration of the properties of structural units and the cascade in the context of the theory of digital automata. The purpose of this permutation is to convert large volumes of data using hardware or software quickly and simply that can be used in various research fields. The paper investigates the bijectivity and equivalence of the reflection and presents an algorithm for constructing finitestate machines for both direct and inverted permutations, along with examples of state and output table construction. The article also provides examples of hardware implementation using field-programmable gate arrays and estimates the size of state and output tables for software implementation. The theoretical speed of bijective reflection transformations is calculated for both field-programmable gate arrays and software implementation, and the paper compares the speed of software implementations based on combined and one-dimensional cascades of constructive units. The practical verification of processing speed is made with software implementation. Finally, the article proposes areas of application for this arbitrary bitness permutation.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134883155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-43-49
T. B. Martyniuk, O. V. Voytsekhovska, M. A. Ochkurov, O. Y. Voinalovych
particularly acute solution to the problem of functional control exists to ensure immunity not only during the transmission of data arrays, but also during the activation of control devices as part of on-board systems of mobile vehicles. So, in control devices, firstly, it is necessary to catch the moment of the occurrence of the so-called «race signals» that can cause it to fail, and secondly, to correct this erroneous situation in real time to ensure the efficient operation of the entire system. In this sense, it is important to analyze the properties of control in those methods of information coding used in the process of abstract synthesis of control devices of a specific type. The article considers the option of using a unit positional code for the synthesis of a control unit based on a microprogram R-automaton, the feature of which is the construction of its memory part on a shift register. Equidistance as a property of a unit positional code allows you to identify an erroneous situation, when instead of one single digit, there are two neighboring single digits in the code word. Such a situation is a sign of an error of the «race signals» type in the operation of the control device. The article proposes functional schemes of two nodes: an error detection node containing (N-1) AND elements and a multi-input OR element, and an error correction node containing (N-1) INEQUALITY elements, where N – is the bit number of the shift register. It is shown how these nodes are built into the microprogram R-automaton. At the same time, the appearance of the Error signal at the output of the error detection node is used to correct the error in the code combination at the outputs of the shift register. Therefore, such properties of a unit positional code as redundancy and equidistance allow to eliminate a failure in the operation of the control device based on the microprogram R-automaton, taking into account the representation specificity of neighboring code combinations of this code.
{"title":"PROPERTIES OF UNIT ENCODING OF INFORMATION IN THE CONTEXT OF FUNCTIONAL CONTROL","authors":"T. B. Martyniuk, O. V. Voytsekhovska, M. A. Ochkurov, O. Y. Voinalovych","doi":"10.31649/1999-9941-2023-57-2-43-49","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-43-49","url":null,"abstract":"particularly acute solution to the problem of functional control exists to ensure immunity not only during the transmission of data arrays, but also during the activation of control devices as part of on-board systems of mobile vehicles. So, in control devices, firstly, it is necessary to catch the moment of the occurrence of the so-called «race signals» that can cause it to fail, and secondly, to correct this erroneous situation in real time to ensure the efficient operation of the entire system. In this sense, it is important to analyze the properties of control in those methods of information coding used in the process of abstract synthesis of control devices of a specific type. The article considers the option of using a unit positional code for the synthesis of a control unit based on a microprogram R-automaton, the feature of which is the construction of its memory part on a shift register. Equidistance as a property of a unit positional code allows you to identify an erroneous situation, when instead of one single digit, there are two neighboring single digits in the code word. Such a situation is a sign of an error of the «race signals» type in the operation of the control device. The article proposes functional schemes of two nodes: an error detection node containing (N-1) AND elements and a multi-input OR element, and an error correction node containing (N-1) INEQUALITY elements, where N – is the bit number of the shift register. It is shown how these nodes are built into the microprogram R-automaton. At the same time, the appearance of the Error signal at the output of the error detection node is used to correct the error in the code combination at the outputs of the shift register. Therefore, such properties of a unit positional code as redundancy and equidistance allow to eliminate a failure in the operation of the control device based on the microprogram R-automaton, taking into account the representation specificity of neighboring code combinations of this code.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-93-98
N. Sachaniuk-Kavets’ka, O. Prozor, V. Khomyuk, R. Shevchuk
Effective and timely processing of information is one of the most important problems of creating means of its processing at the level of human perception and thinking. Analytical processing of digital signals in a graphical or purely digital representation is somewhat limited and does not take into account the dynamics of signals and messages. The classical apparatus of logic is insufficient to describe the dynamics of system behavior over time. Therefore, it is important to develop models of so-called Boolean differential calculus, as this approach is based on the general concept of changing the logical variable, which will lead to a universal, in terms of dynamics, system of concepts and operations. To facilitate the preprocessing of dynamic digital variables and signals, the logic-time function of multivalued logic can be used. The purpose of this article is a mathematical representation of the differentiation of logic-time functions of multi-valued logic in the index form of the record using the simulation of its scheme. The paper shows the expediency of the idea of replacing an arbitrary digital signal (variable) that changes over time with a logic-time function, which allows to facilitate the preliminary analytical processing of digital signals and variables using the properties of such functions. The article presents a new mathematical apparatus for describing logic-time functions of multivalued logic and individual operations on them using modeling of known implementation schemes. The paper considers the peculiarities of the derivative of the multivalued logical-time function (LMF), as one of the most used and basic operations used in the study of signals and images. Its characteristics and features are shown for functions presented in index form. The general expression of the derivative of the n order is obtained and it is shown that different logic-time functions can have the same derivative. The concepts of the left and right derivative of the LMF are introduced and the relationship between them is shown. The properties of the k derivative of the BLMF were considered and the expressions for the derivative conjunction and disjunction were obtained. A possible structural scheme of the differentiator is presented, which opens up the possibility of hardware processing of multi-valued LMFs.
{"title":"MATHEMATICAL DESCRIPTION OF THE DIFFERENTIATION OPERATION IN THE LOGICAL-TIME ENVIRONMENT","authors":"N. Sachaniuk-Kavets’ka, O. Prozor, V. Khomyuk, R. Shevchuk","doi":"10.31649/1999-9941-2023-57-2-93-98","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-93-98","url":null,"abstract":"Effective and timely processing of information is one of the most important problems of creating means of its processing at the level of human perception and thinking. Analytical processing of digital signals in a graphical or purely digital representation is somewhat limited and does not take into account the dynamics of signals and messages. The classical apparatus of logic is insufficient to describe the dynamics of system behavior over time. Therefore, it is important to develop models of so-called Boolean differential calculus, as this approach is based on the general concept of changing the logical variable, which will lead to a universal, in terms of dynamics, system of concepts and operations. To facilitate the preprocessing of dynamic digital variables and signals, the logic-time function of multivalued logic can be used. The purpose of this article is a mathematical representation of the differentiation of logic-time functions of multi-valued logic in the index form of the record using the simulation of its scheme. The paper shows the expediency of the idea of replacing an arbitrary digital signal (variable) that changes over time with a logic-time function, which allows to facilitate the preliminary analytical processing of digital signals and variables using the properties of such functions. The article presents a new mathematical apparatus for describing logic-time functions of multivalued logic and individual operations on them using modeling of known implementation schemes. The paper considers the peculiarities of the derivative of the multivalued logical-time function (LMF), as one of the most used and basic operations used in the study of signals and images. Its characteristics and features are shown for functions presented in index form. The general expression of the derivative of the n order is obtained and it is shown that different logic-time functions can have the same derivative. The concepts of the left and right derivative of the LMF are introduced and the relationship between them is shown. The properties of the k derivative of the BLMF were considered and the expressions for the derivative conjunction and disjunction were obtained. A possible structural scheme of the differentiator is presented, which opens up the possibility of hardware processing of multi-valued LMFs.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-99-108
D. V. Honcharenko, V. B. Mokin, D. P. Protsenko
This article analyzes and characterizes various aspects of constructing an information system for monitoring physical parameters based on Internet of Things (IoT) technology. The key components of such systems are thoroughly examined, including sensor utilization, selection of network technologies, and specialized IoT platforms. An analysis of modern LPWAN (Low-Power Wide Area Network) technologies such as LoRaWAN, Sigfox, and NB-IoT is conducted, outlining their main characteristics and features, including data transmission speed, network coverage range, and energy consumption levels. The structure and components of these network types are analyzed, and schematic representations highlighting their key differences are provided. Additionally, an analysis of available IoT platforms that facilitate data collection, processing, and analysis from sensors is carried out. The functional and integration capabilities of these platforms with LPWAN technologies are assessed. Expert evaluation criteria essential for comparing and selecting optimal technologies, protocols, and platforms are examined. The results are systematized into a weighted overall optimality criterion and tables with expert assessments for each type of LPWAN network technology. The problem of determining the optimal technology is formalized as a linear programming task. The automated solution to this problem is implemented using Python and the PuLP library. Examples of solving the task and selecting technologies for building an information system for monitoring physical parameters based on IoT technology under various conditions are presented. The results of the practical implementation of a temperature monitoring system in a scientific laboratory, developed using the findings of this article, are described. The main scientific achievement of this research is an improved method for multicriteria selection of optimal network technologies and IoT platforms for building an information system for monitoring physical parameters based on IoT technology. The practical value of the obtained results lies in the ability to construct an efficient monitoring information system that is optimal across multiple criteria. The obtained results enable an informed selection of LPWAN network technology and IoT platforms based on specific system requirements and needs. The developed Python code solution provides a practical tool for optimizing technology selection.
本文对基于物联网技术构建物理参数监测信息系统的各个方面进行了分析和描述。对这些系统的关键组件进行了彻底的检查,包括传感器的利用、网络技术的选择和专门的物联网平台。分析了LoRaWAN、Sigfox、NB-IoT等现代低功耗广域网(Low-Power Wide Area Network, LPWAN)技术,概述了其主要特点和特点,包括数据传输速度、网络覆盖范围、能耗水平等。分析了这些网络类型的结构和组成,并提供了突出其主要区别的示意图。此外,还对可用的物联网平台进行了分析,这些平台有助于从传感器收集、处理和分析数据。对这些平台与LPWAN技术的功能和集成能力进行了评估。专家评估标准必不可少的比较和选择最优的技术,协议和平台进行了审查。结果被系统化成一个加权的总体最优性准则和表格,其中包含对每种类型的LPWAN网络技术的专家评估。确定最优工艺的问题形式化为一个线性规划任务。这个问题的自动化解决方案是使用Python和PuLP库实现的。给出了在不同条件下基于物联网技术构建物理参数监测信息系统的任务解决和技术选择实例。本文描述了利用本文的发现开发的科学实验室温度监测系统的实际实施结果。本研究的主要科学成果是改进了基于物联网技术的多准则选择最优网络技术和物联网平台的方法,用于构建物联网物理参数监测信息系统。所得结果的实用价值在于能够构建一个跨多个准则最优的高效监测信息系统。获得的结果可以根据特定的系统要求和需求明智地选择LPWAN网络技术和物联网平台。开发的Python代码解决方案为优化技术选择提供了实用的工具。
{"title":"BUILDING AN INFORMATION SYSTEM FOR MONITORING PHYSICAL INDICATORS BASED ON THE INTERNET OF THINGS TECHNOLOGY","authors":"D. V. Honcharenko, V. B. Mokin, D. P. Protsenko","doi":"10.31649/1999-9941-2023-57-2-99-108","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-99-108","url":null,"abstract":"This article analyzes and characterizes various aspects of constructing an information system for monitoring physical parameters based on Internet of Things (IoT) technology. The key components of such systems are thoroughly examined, including sensor utilization, selection of network technologies, and specialized IoT platforms. An analysis of modern LPWAN (Low-Power Wide Area Network) technologies such as LoRaWAN, Sigfox, and NB-IoT is conducted, outlining their main characteristics and features, including data transmission speed, network coverage range, and energy consumption levels. The structure and components of these network types are analyzed, and schematic representations highlighting their key differences are provided. Additionally, an analysis of available IoT platforms that facilitate data collection, processing, and analysis from sensors is carried out. The functional and integration capabilities of these platforms with LPWAN technologies are assessed. Expert evaluation criteria essential for comparing and selecting optimal technologies, protocols, and platforms are examined. The results are systematized into a weighted overall optimality criterion and tables with expert assessments for each type of LPWAN network technology. The problem of determining the optimal technology is formalized as a linear programming task. The automated solution to this problem is implemented using Python and the PuLP library. Examples of solving the task and selecting technologies for building an information system for monitoring physical parameters based on IoT technology under various conditions are presented. The results of the practical implementation of a temperature monitoring system in a scientific laboratory, developed using the findings of this article, are described. The main scientific achievement of this research is an improved method for multicriteria selection of optimal network technologies and IoT platforms for building an information system for monitoring physical parameters based on IoT technology. The practical value of the obtained results lies in the ability to construct an efficient monitoring information system that is optimal across multiple criteria. The obtained results enable an informed selection of LPWAN network technology and IoT platforms based on specific system requirements and needs. The developed Python code solution provides a practical tool for optimizing technology selection.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.31649/1999-9941-2023-57-2-33-42
M. S. Mamuta, I. V. Kravchenko, O. D. Mamuta
In today's world of total digitization cyber security and safe work with data in cyberspace are the most important questions. Especially this is actual for Ukraine, where the number and power of cyberattacks has increased several times over the last year. Businesses that work with private customer data become especially vulnerable. Of course, the ideal option is to place such data on servers that don’t have Internet access. But according to the global trend of moving to the cloud, it is inevitable for private data as well. And so, there is a question of protecting private data in the cloud. To this end, cloud service providers offer services to create private subnets without Internet access. Therefore, the question of how to securely access data in such subnets become actual. One of the leader’s vendors in cloud servicing is Amazon with its Web Services. Amazon offers a Virtual Private Cloud service for setting up a virtual network. The article deals with the analysis of configuration features at the stage of creation of subnets with and without Internet access. The method of connection to a virtual server, located in a private subnet, using the Secure Shell network protocol was analyzed. However, this method has a number of disadvantages. It requires to launch an additional server and its administration. The method also has quite complex settings of the network and requires managing keys. Therefore, another method of connection to private EC2 instance was proposed. The method requires Amazon Systems Manager service, which provides secure access to data without creating additional server, is cost-effective and convenient. At the same time, all connections take place over a secure channel between the Systems Manager agent and the Amazon data center. Main setting’s features for the proposed method were considered.
在全面数字化的今天,网络安全和网络空间数据安全工作是最重要的问题。尤其是在乌克兰,网络攻击的数量和力量在去年增加了几倍。处理私人客户数据的企业尤其容易受到攻击。当然,理想的选择是将这些数据放在不能访问Internet的服务器上。但随着全球云化趋势的发展,私有数据也将不可避免。因此,有一个保护云中的私人数据的问题。为此,云服务提供商提供了创建不接入Internet的私有子网的服务。因此,如何安全地访问这些子网中的数据成为现实问题。在云服务领域领先的供应商之一是亚马逊的网络服务。亚马逊提供了虚拟私有云服务来建立虚拟网络。本文分析了在有Internet接入和没有Internet接入的情况下创建子网时的配置特点。分析了利用Secure Shell网络协议连接到位于私有子网中的虚拟服务器的方法。然而,这种方法有一些缺点。它需要启动一个额外的服务器及其管理。该方法也有相当复杂的网络设置,需要管理密钥。因此,提出了另一种连接到私有EC2实例的方法。该方法需要Amazon Systems Manager服务,该服务提供对数据的安全访问,而无需创建额外的服务器,具有成本效益和便利性。同时,所有连接都通过system Manager代理和Amazon数据中心之间的安全通道进行。考虑了所提方法的主要设置特征。
{"title":"METHODS OF CONNECTION TO AWS VIRTUAL SERVER LOCATED IN A PRIVATE SUBNET","authors":"M. S. Mamuta, I. V. Kravchenko, O. D. Mamuta","doi":"10.31649/1999-9941-2023-57-2-33-42","DOIUrl":"https://doi.org/10.31649/1999-9941-2023-57-2-33-42","url":null,"abstract":"In today's world of total digitization cyber security and safe work with data in cyberspace are the most important questions. Especially this is actual for Ukraine, where the number and power of cyberattacks has increased several times over the last year. Businesses that work with private customer data become especially vulnerable. Of course, the ideal option is to place such data on servers that don’t have Internet access. But according to the global trend of moving to the cloud, it is inevitable for private data as well. And so, there is a question of protecting private data in the cloud. To this end, cloud service providers offer services to create private subnets without Internet access. Therefore, the question of how to securely access data in such subnets become actual. One of the leader’s vendors in cloud servicing is Amazon with its Web Services. Amazon offers a Virtual Private Cloud service for setting up a virtual network. The article deals with the analysis of configuration features at the stage of creation of subnets with and without Internet access. The method of connection to a virtual server, located in a private subnet, using the Secure Shell network protocol was analyzed. However, this method has a number of disadvantages. It requires to launch an additional server and its administration. The method also has quite complex settings of the network and requires managing keys. Therefore, another method of connection to private EC2 instance was proposed. The method requires Amazon Systems Manager service, which provides secure access to data without creating additional server, is cost-effective and convenient. At the same time, all connections take place over a secure channel between the Systems Manager agent and the Amazon data center. Main setting’s features for the proposed method were considered.","PeriodicalId":479698,"journal":{"name":"Ìnformacìjnì tehnologìï ta kompʼûterna ìnženerìâ","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}