32 results
Search Results
2. COMBINED ALGORITHMS FOR DETERMINING THE INITIAL SOLUTION OF DISCRETE OPTIMIZATION PROBLEMS.
- Author
-
Yukhimenko, B. I., Volkova, N. H., and Kozina, Yu. Yu.
- Subjects
- *
GREEDY algorithms , *ANT algorithms , *MATHEMATICAL ability , *KNAPSACK problems , *SIMULATED annealing , *ALGORITHMS , *COMPUTATIONAL complexity - Abstract
The problem of solving the task of discrete optimization is not completely solved. Lack of publications, scientific developments, algorithms and software products do not give the ability to transfer the mathematical apparatus of solving discrete optimization problems to the class P of computational complexity. All analytical and combinatorial algorithms for solving problems of linear and non-linear optimization are NP completeness. There are developments to improve the efficiency of robotic algorithms, they are filled with requests and actual ones. In this paper, it is proposed to use deterministic and probabilistic methods for forming a priority queue of decision vector components in order to assign positive values to them. After the formation of the variant of the solution, it is possible to vectorize as if the approached solution is taken away from the record value of the goal function, which in exact algorithms is like a solution, which results in a polyp. In this paper has a method for forming a priority line for concretizing the components of the solution vector. The basis of deterministic methods is the idea of a greedy algorithm. The location in the queue is determined by the value of the corresponding component of the cost vector. The appearance of the value of non-visibility in the system of restrictions increases the priority of the component. Behind such a way, another method of determination is modified. Probability assessment probability of priorities is based on the ideas of algorithms in an ant colony and simulated annealing. The scope of probability indicates the significance of the component - a contender for a positive value. A numerical example of a small variability of the task about a knapsack has been introduced, which demonstrates the imitation of a nearby solution. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. О явлении сверх-сходимости при разложениях по собственным функциям
- Author
-
Нерсесян, А. Б.
- Subjects
BOUNDARY value problems ,SMOOTHNESS of functions ,EIGENFUNCTIONS ,FOURIER series ,ALGORITHMS - Abstract
Copyright of National Academy of Sciences of Armenia Reports / Doklady Nacionalnaâ Akademiâ Nauk Armenii is the property of National Academy of Sciences of the Republic of Armenia and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
4. Influence of the Digital Environment on the Contemporary Worldview: Pro et Contra
- Author
-
Sergey V. Volodenkov, Sergey N. Fedorchenko, and Nikolai M. Pechenkin
- Subjects
worldview ,public consent ,value-semantic attitudes ,digital environment ,digital institutions ,algorithms ,technological determinism ,Political science - Abstract
Global technological transformations of key areas of life of contemporary society, the formation and active functioning of global and national digital institutions that influence current socio-political processes, and the digitalization of social relations form a demand for comprehensive scientific research on the processes of digital influence on the development and functioning of modern social systems. This article is aimed at considering the problem of the relationship between digital and worldview aspects of the functioning of modern societies. In connection with this, the research issue was to determine the degree and nature of the influence of digitalization processes, as well as directly the digital environment and institutions on the content aspects of the individual’s worldview. This research question is directly related to the study of the phenomenon of public consent in the context of the formation of digital polymentality. To answer the research question posed in the paper, the authors conducted a discourse analysis of the existing scientific literature on the relationship between digitalization and worldview in the pro et contra logic. An international expert study was also conducted, which made it possible to identify the main expert positions on the study, as well as the key risks, threats, and challenges in the field of preserving the traditional worldview and achieving public consent based on the unity of value-semantic and worldview ideas of individuals. The main conclusion of the paper is the fundamental ambiguity of the positions of scientists and experts, justified by the results of the study, in assessing the degree and nature of the influence of digitalization, the digital environment and institutions on the content parameters of the worldview of a modern person, as well as the ambiguity of the value-semantic attitudes formed and maintained in the digital environment.
- Published
- 2023
- Full Text
- View/download PDF
5. МАТЕМАТИЧЕСКИЕ МЕТОДЫ И МОДЕЛИ ИЗУЧЕНИЯ КОРРУПЦИИ В ОРГАНИЗАЦИОННЫХ СИСТЕМАХ
- Author
-
Левин, В. И.
- Subjects
CORRUPTION ,MATHEMATICAL models ,INFORMATION processing ,PROBLEM solving ,EXPERT systems ,ALGORITHMS - Abstract
Copyright of Radio Electronics, Computer Science, Control is the property of Zaporizhzhia National Technical University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
6. КУЛЬТУРНАЯ ИНФОРМАЦИЯ В РОМАНЕ А. С. ПУШКИНА «ЕВГЕНИЙ ОНЕГИН»: СТРАТЕГИИ И СПОСОБЫ РЕТРАНСЛЯЦИИ В ПОРТУГАЛЬСКИХ ПЕРЕВОДАХ .
- Author
-
Данилова, Василиса and Тивьяева, Ирина
- Subjects
TRANSLATING & interpreting ,FICTION ,ALGORITHMS ,VOCABULARY ,CULTURE - Abstract
Copyright of Foreign Language Teaching is the property of Az Buki National Publishing House and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
7. РОЗРОБКА АВТОМАТИЗОВАНОЇ СИСТЕМИ РЕЦЕНЗУВАННЯ СТАТЕЙ ДЛЯ НАУКОВОГО ЖУРНАЛУ
- Author
-
Шеремет, Г. О.
- Subjects
ALGORITHMS ,DIGITAL technology ,AUTHOR-editor relationships ,DATABASE design ,INTELLECTUAL property - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
8. AN APPROACH TO THE ELIMINATION OF CONFLICTS IN MULTI-AGENT SYSTEMS BASED ON DIJKSTRA'S ALGORITHM.
- Author
-
Penko, V. G., Penko, O. V., and Kogan, V. V.
- Subjects
- *
MULTIAGENT systems , *ALGORITHMS , *DISTRIBUTED algorithms - Abstract
The task of path finding by an agent is one of the basic tasks and is of great practical importance. As a rule, this is an optimization task that is solved in the space of the state graph in order to minimize the length of the path. Such a task becomes more difficult and becomes even more popular if it is solved on the basis of one graph space by several agents. In this case, another practically important optimization parameter appears, which is expressed by the number of conflicts between agents. Such an abstract formulation of the task has numerous variants of formalization and a large number of approaches to its solution. In this paper, the main element of the approach is the application of the classic Dijkstra algorithm, which is executed sequentially by each agent. When finding the shortest route, each agent modifies the graph space in such a way as to reduce the probability of conflicts with subsequent agents. This approach is original and a number of computational experiments were performed to verify it using software developed for this purpose. The experiments that were conducted demonstrate the adequate behavior of the main algorithm. The work analyzes the limitations inherent in the proposed approach within the framework of the abstract formulation of the task. The directions of further development of the basic approach have been determined. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Применение трехмерного геометрико-морфометрического анализа для изучения артефактов каменного века.
- Author
-
Шалагина, А. В., Колобова, К. А., Чистяков, П. В., and Кривошапкин, А. И.
- Subjects
THREE-dimensional modeling ,MULTIVARIATE analysis ,NATURAL history ,CAVES ,ALGORITHMS ,GRAVETTIAN culture ,ARCHAEOLOGICAL assemblages ,MESOLITHIC Period - Abstract
Copyright of Stratum Plus Journal is the property of P.P. Stratum plus and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
10. МОДИФІКАЦІЯ МЕТОДУ ХЕШ-СТЕГАНОГРАФІЇ, ЗАСНОВАНОГО НА ПЕРЕДАЧІ ПОСЛІДОВНОСТІ ЦИФРОВИХ ЗОБРАЖЕНЬ
- Author
-
Зоріло, В. В., Лебедєва, О. Ю., and Бохонько, М. В.
- Subjects
IMAGE analysis ,TEXT messages ,DIGITAL images ,CRYPTOGRAPHY ,ALGORITHMS ,HASHING - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
11. ОПТИМИЗАЦИЯ СТРУКТУРЫ И АЛГОРИТМА РАБОТЫ ВЫСОКОЧУВСТВИТЕЛЬНОЙ МУЛЬТИСЕНСОРНОЙ СИСТЕМЫ С ИМПЕДАНСНЫМИ ПРЕОБРАЗОВАТЕЛЯМИ
- Author
-
Мельник, В. Г., Борщев, П. И., Василенко, А. Д., and Слицкий, А. В.
- Subjects
TRANSDUCERS ,ELECTRODYNAMICS ,DETECTORS ,ALGORITHMS ,RESEARCH institutes - Abstract
Copyright of Sensor Electronics & Microsystems Technologies / Sensorna Elektronika i Microsystemni Tekhnologii is the property of I. I. Mechnikov Odessa National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
- Full Text
- View/download PDF
12. Intellectual Property Ownership of AI-Generated Content
- Author
-
A. Kirakosyan
- Subjects
copyright ,patents ,artificial intelligence ,algorithms ,ai-generated works ,public domain ,protection of intellectual property rights ,Law - Abstract
Until recently, intellectual creativity was considered as an exclusively human phenomenon and intellectual property legislation was built on the basis of motivating and enhancing human inventiveness. This self-evident assumption is being challenged due to the development of artificial intelligence technologies in the recent decades. In this article author analyzes some aspects of intellectual property law development, including the possibility of recognizing an artificial intelligence as a creator of intellectual activity results. The author examines the legal status of artificial intelligence under Armenian law and foreign intellectual property legislation, analyzes existing approaches to the legal regime and intellectual property ownership of objects created with the help of artificial intelligence. The paper aims to determine the proper right holder to content generated by artificial intelligence and formulate some policy prospects of artificial intelligence regulation. The methodological basis of the research includes general scientific and special legal methods. The author places particular emphasis on the dogmatic (doctrinal) research methods, which made it possible to analyze existing approaches to protection of intellectual property rights. The research is also based on the comparative legal method and analytical legal method of commenting current law of Armenia and foreign countries. The results of the study allow author to substantiate that the actual right holder to the content produced by the neural network is the programmer of the underlying algorithm system. The author concludes that the construction of a solid legislative system should be carried out taking into account the specifics of the areas of application of artificial intelligence, ensuring a balance between the interests of individuals, society and the state related to the development of innovative technology.
- Published
- 2024
- Full Text
- View/download PDF
13. ВИЯВЛЕННЯ ЧАСТИН ЦИФРОВОГО ЗОБРАЖЕННЯ, ЗМЕНШЕНИХ ПІСЛЯ ФАЛЬСИФІКАЦІЇ
- Author
-
Гулич, В. В., Зоріло, В. В., and Лебедєва, О. Ю.
- Subjects
- *
DATA integrity , *INFORMATION technology security , *FALSIFICATION , *DIGITAL images , *ALGORITHMS - Abstract
At a time when the use of digital content in all spheres of life is constantly growing, the ability to verify the authenticity of digital files, in particular digital images, is extremely important in protecting information from integrity violations. In the information war, photo fakes are always used to achieve certain, often criminal, goals. Both society as a whole and individuals must take care of information security and protect their information space from unverified information. Modern methods of detecting violations of the integrity of graphic information to some extent address some issues of information security, however, they are not universal and often require development, improvement, additional research and so on. Thus, existing methods for detecting such a common method of image falsification as scaling are effective only in cases where the falsified part is enlarged, however, when reducing part of the image, they are not effective. Moreover, in open printing the problem of detecting reduced scalable parts of the image is not covered. Therefore, the aim of this work is to increase the efficiency of scaling detection as digital image falsification by developing an algorithm for detecting scaling with a negative coefficient. In this paper, the method of error level analysis is adapted to detect reduced parts of the digital image. The efficiency of the adapted method in terms of errors of the 1st and 2nd kind was: errors of the 1st kind - 2%, 2nd kind - 7%. In addition, it has been found that this method is also effective in detecting simultaneously scalable (reduced) and moved parts of a digital image. This method detects artifacts (errors) in the digital image, which occur when reducing its part - the falsified area has a higher high-frequency component than the rest of the image, which is amplified under the influence of compression after saving the falsification in a lossy format. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. IMAGE-BASED DEFECT ANALYSIS FOR 3D-PRINTED ITEM SURFACE USING MACHINE LEARNING METHODS
- Author
-
Daniil V. Izmailov, Daniil A. Drygin, and Ksenia V. Ezhova
- Subjects
3d-printing ,technical vision system ,machine learning ,support vector machine ,algorithms ,defects detecting ,quality monitoring ,extrusion ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Subject of Research. Defect detection is an actual and challenging task in the field of additive technologies. This process enables the user to save time and reduce the consumption of material. Also, it prevents the further possible faults and defects. On that account, an automation of surface control process in 3D-printing is an essential step not only for large manufacturing companies but also for private users. The paper proposes an image-based method for quality control of a 3D-printed product by applying machine learning algorithms. Method. 3D-printed item images were taken and processed on an experimental setup composed of a camera and a single board microcomputer. The paper presents a defect detecting method based on development of image preprocessing algorithms and further machine learning by applying support vector machine method. Main Results. The presented method enables the user to find and identify “over-extrusion” and “under-extrusion” defects with high precision on the surface of the manufactured items. Practical Relevance. The developed method is intended to provide practical benefits for the private users of 3D-printing devices and companies manufacturing or applying these devices. There are the following advantages of the method application: the 3D-printing parameters are easy to be set, the reports about the product and its features are saved, the solutions to any problem occurred during printing are simple and fast. The developed method of visual quality control of the 3D-printed item surface can be significantly helpful to the expansion of automation possibilities for fast prototyping processes and take 3D-printing process to a new level.
- Published
- 2020
- Full Text
- View/download PDF
15. PEIV模型参数估计理论及其应用研究进展.
- Author
-
王乐洋 and 邹传义
- Subjects
- *
GLOBAL Positioning System , *ALGORITHMS , *PARAMETER estimation , *LEAST squares , *COVARIANCE matrices , *ELECTRONIC data processing , *BIG data , *KALMAN filtering - Abstract
Objectives: Partial errors⁃in⁃variables (PEIV) model is a more general form of errors in variables (EIV) model. It has been widely used in the data processing of global navigation satellite system (GNSS), coordinate conversion, deformation monitoring and data fitting in the past ten years.Methods: First, the development history of PEIV model is reviewed. Then, five core problems of PEIV model are summarized and analyzed, including parameter estimation algorithm, precision estimation, random model estimation, expansion algorithm and data processing application. Finally, the applications of PEIV model are outlined. Results: We point out three questions for further research, including how to process big data by PEIV parameter estimation method, how to correct the bias of weighted total least squares(WTLS) adjustment by sampling method, and how to derive the formula of higher order parameter estimation covariance matrix are.Conclusions: This review paper aims to further promote the development of surveying and mapping da⁃ ta processing and provide readers with suggestions and references. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
16. Algorithms for Converting Finite Automata Corresponding to Infinite Iterative Trees
- Author
-
Mikhail Abramyan and Boris Melnikov
- Subjects
algorithms ,formal languages ,iterations of languages ,binary relations ,infinite trees ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we work with some different variants of finite automata, each of which corresponds to an infinite iterative tree constructed for some given morphism. At the same time, each of the automata constructed for a given morphism describes the main properties of this morphism. Besides, in each case (i.e., for each variant of the automaton), the following “inverse problem” also arises: to describe the morphism (or simply specify a pair of languages) for which such a given automaton is obtained. We present a computer program for constructing one such automaton, so-called PRI automaton. After that, we consider a detailed example of a PRI automaton for a pair of different languages. Continuing to consider this example, we use the last automaton to perform usual transformations described and repeatedly applied in our previous publications, i.e., the determination and canonization of the mirror automaton for possible application of the results obtained in the algorithm for minimizing nondeterministic automata. In the considered situation, such a minimal automaton is another automaton constructed on the basis of a given morphism tree, a nondeterministic automaton, the so-called NSPRI# automaton, and we also show the equality of these automata (which implies the equivalence of PRI and NSPRI#) in the paper by an example. Based on the NSPRI# automaton, a non-deterministic NSPRI automaton is constructed using a trivial (but non-equivalent) transformation; a detailed study of this automaton is expected in future publications. Examples of PRI and NSPRI# automata for pairs of matching languages are also of interest, we also give one such example in this paper.
- Published
- 2021
- Full Text
- View/download PDF
17. УНИФИЦИРОВАННЫЕ МОДЕЛИ ЭЛЕМЕНТОВ СИСТЕМ ЭЛЕКТРОСНАБЖЕНИЯ НА ОСНОВЕ УРАВНЕНИЙ В ФАЗНЫХ КООРДИНАТАХ
- Author
-
Веприк, Ю. Н. and Небера, О. А.
- Subjects
ALGORITHMS ,ELECTRIC equipment ,MACHINE tools ,ELECTRIC transients ,COMPUTER simulation - Abstract
Copyright of Electrical Engineering & Electromechanics is the property of National Technical University, Kharkiv Polytechnic Institute and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
18. A FUZZY-MEASUREMENT ALGORITHM FOR ASSESSING THE IMPACT OF ELECTROMAGNETIC FIELDS ON HEALTH.
- Author
-
MILIĆ, Saa D., VULEVIĆ, Branislav D., and STOJIĆ, Djordje M.
- Subjects
- *
ELECTROMAGNETIC fields , *FUZZY logic , *FUZZY systems , *ALGORITHMS , *ELECTROMAGNETIC measurements - Abstract
Ill this paper wc propose a novel fuzzy-measurement algorithm for the assessment of the impact of electromagnetic fields on human health. The algorithm was developed to unify complex and diverse measuring mctjiodologics, standards and fuzzy logic control into a single entity - a comprehensive methodology for the assessment of the impact of electromagnetic fields on humans. The algorithm will enable multiple criteria automated assessment based on measurement results and the existing electromagnetic field standards, guidelines and recommendations in order to avoid potential subjectivity and varied approach. Wc have therefore considered two classes of fuzzy logic systems (Type-1 and Typc-2) and developed a graphic model intended for scenarios where expert opinions differ and where such a difference might significantly affect the assessment. The fuzzy model was developed on the principles of the proposed algorithm and this resulted in a unique procedure for the assessment of all types of electromagnetic fields on human health. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. Методика определения индукции управляющего магнитного поля в зоне ванны при дуговой сварке
- Author
-
Размышляев, А. Д., Выдмыш, П. А., and Агеева, М. В.
- Subjects
- *
CALCINATION (Heat treatment) , *ELECTRIC welding , *ELECTROMAGNETIC induction , *MAGNETIC field effects , *ALGORITHMS , *INDUCTION heating - Abstract
It is shown that at the present time the calculation methods, which allow determining induction in the weld pool zone, which is generated by two-rod devices for input of transverse magnetic field during arc welding. However, these methods are extremely difficult to use. In this paper, the calculation methods for determining numerical values of the induction components of a transverse magnetic field in the weld pool were proposed. The methods are based on the use of experimental data on the value of the induction generated by the transverse magnetic field input device in the weld pool zone at different value of rod crosssections of these input devices. The calculation expressions and an algorithm for their use are proposed to determine the magnetic field induction components in the indicated zone. The satisfactory convergence of the calculated data with the experimental ones is shown. The methods are recommended for using in arc surfacing and welding of products of materials which are not ferromagnetics. 8 Ref., 6 Fig. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
20. POLITICAL SUBJECTIVITY OF TRANSNATIONAL DIGITAL CORPORATIONS
- Author
-
Andrey A. Cheban
- Subjects
algorithms ,corporate power ,political subjectivity ,network effects ,digital platforms ,Political science - Abstract
Aim. To define political subjectivity of transnational digital corporations in the modern world.Methodology. Network effects arising within the framework of the modern digital platforms functioning are the subject of research. The paper analyzes such effects of the modern communicative space as “digital capsules”, deplatforming, avatarization and the power of algorithms. The special status and definition of the political subjectivity of transnational digital corporations are highlighted.Results. It has been concluded that the algorithms that perform functions on platforms have a significant impact on the communication and information space, while they are not a self-sufficient political entity.Research implications. The author's definition of the political subjectivity of digital corporations is presented, examples of influence on platforms by state institutions are given, scenarios for the development of political subjectivity in digital platforms are considered.
- Published
- 2023
21. Construction of movement trajectories for objects based on the Dubins car problem, taking into account constant external influences
- Author
-
Sergey P. Khabarov and Maria L. Shilkina
- Subjects
dubins path ,algorithms ,optimal control ,waypoint navigation ,unmanned aerial vehicles ,shortest path ,optimization ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper considers an approach in terms of optimal speed problem for Dubins cars to the formation of control trajectories of moving objects (airplanes, ships), that have control restrictions, under external influences that are constant in magnitude and direction and constant control values at each part of the trajectory. Instead of solving the Pontryagin maximum principle, it is proposed to use a simple comparison of possible control strategies in order to determine the best among them in terms of speed. For each strategy, the calculation of control switching points on the trajectory is based on minimizing the difference between the specified coordinates of the endpoint and the coordinates of the point at which the trajectory comes, depending on the choice of the parameters of two intermediate control switching points. The problem of finding the best speed trajectory for an object from one point to another is solved using the Dubins approach, and their coordinates and heading angles are given for both points. All calculations were carried out taking into account wind and water disturbances, which are constant in magnitude and direction and distort the trajectory. The problem of finding the Dubins paths is reduced to finding the parameters of two intermediate points at which the control changes. Different possibilities for changing controls are considered, taking into account the existing restrictions. The lengths of the trajectories are calculated and the best travel time is selected. The proposed method considers several trajectories acceptable in terms of constraints, taking into account the external influences, from which the optimal path is selected by comparison. Having multiple feasible strategies is beneficial when choosing a trajectory depending on the environment. Instead of solving the problem of nonlinear optimization of the Pontryagin maximum principle, a simple comparison of possible control strategies is used in order to determine the best among them in terms of speed, each of the possible strategies is sought from the condition of minimizing the residual of the analytical solution and the boundary condition at the end of the trajectory. When searching for possible trajectories, control constraints, the influence of external influences, that are constant in magnitude and direction, and the constancy of the control value at each part of the trajectory are taken into account. And all these factors make it possible to sufficiently and adequately simulate the movement of the ship. Physically, restrictions on control (turning radius) are associated with a limited steering angle. Restrictions can be associated not only with restrictions on the turning radius, but also with geographical features of a specific area: for unmanned aerial vehicles this may be due to the buildings and terrain, and for ships this may be due to the coastline, shoals, islands, etc. In this regard, it may turn out that the solution found optimal in terms of speed cannot be realizable in practice. Then the method proposed in the work has the ability to choose another trajectory among the less optimal in terms of speed.
- Published
- 2022
- Full Text
- View/download PDF
22. Machine learning based on laboratory data for disease prediction
- Author
-
A. V. Gusev, R. E. Novitskiy, A. A. Ivshin, and A. A. Alekseev
- Subjects
artificial intelligence ,prediction ,great obstetrical syndromes ,preeclampsia ,machine learning ,neural networks ,algorithms ,risk factors ,Therapeutics. Pharmacology ,RM1-950 ,Economics as a science ,HB71-74 - Abstract
Objective: to review domestic and foreign literature on the issue of machine learning methods applied in medical information systems (MIS), to analyze the accuracy and efficiency of the technologies under study, their advantages and disadvantages, the possibilities of implementation in clinical practice.Material and methods. The literature search was performed in the PubMed/MEDLINE databases covering the period from 2000 to 2020 (using groups of keyphrases: "machine learning", "laboratory data", "clinical events", "prediction diseases"), CyberLeninka ("machine learning", "laboratory data", "clinical events", "prediction diseases" Russian keyphrases combinations) and Papers With Code ("clinical events", "prediction diseases", "electronic health record"). After reviewing the full text of 30 literature sources that met the selection criteria, the 19 most relevant articles were selected.Results. An analysis of sources that describe the application of artificial intelligence techniques to obtain predictive analytics, taking into account information about patients, such as demographic, anamnestic, and laboratory data, the data of instrumental studies, information about existing and former diseases available in MIS, was performed. The existing ways of predicting adverse medical outcomes using machine learning methods were considered. Information about the significance of the used laboratory data for constructing high-precision predictive mathematical models is presented.Conclusion. Implementation of machine learning algorithms in MIS seems to be a promising tool for effective prediction of adverse medical events for wide application in real clinical practice. It corresponds to the global trend in the development of personalized medicine based on the calculation of individual risk. There is an increase in the activity of research in the field of predicting noncommunicable diseases using artificial intelligence technologies.
- Published
- 2022
- Full Text
- View/download PDF
23. Geometric approach to the solution of the Dubins car problem in the formation of program trajectories
- Author
-
Sergey P. Khabarov and Maria L. Shilkina
- Subjects
dubins car ,trajectory ,algorithms ,optimal control ,conjugation curves ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper considers an approach to the formation of control program trajectories of moving objects (UAVs, ships) as a solution to the optimal problem in terms of Dubins path search. Instead of directly solving the Pontryagin’s maximum principle, it is proposed to use a simple analysis of possible control strategies in order to determine among them the optimal one in terms of time spent on a trajectory. The problem of finding the shortest trajectory of movement of an object from one point to another is solved, and for both points their coordinates and heading angles at these points are given, as well as three absolute values of the circulation radii corresponding to the given control signals on each of the three sections of the trajectory. The problem of finding the Dubins curves is reduced to determining the parameters of two intermediate points at which the control changes. All possible directions of control change options are considered, taking into account the existing constraints, also the lengths of the corresponding motion trajectories are calculated, and the optimal one is selected. The problem of constructing a trajectory is solved as well, which ensures a smooth conjugation of two linear fragments of trajectories and passes through the point of their intersection. The solution of the optimal trajectory problem using the Dubins car gives a single trajectory. In contrast to this, the proposed method considers several trajectories admissible by the constraints, from which the optimal one is selected by exhaustive search. The presence of several feasible strategies gives advantages for each specific situation of choosing a trajectory depending on the environment. Instead of directly solving the Pontryagin’s maximum principle and constructing a three-dimensional optimal trajectory, the authors used a simple analysis of possible control strategies in order to determine among them the optimal one in terms of elapsed time. The approach was motivated by the limited number of possible control strategies for Dubins paths, as well as the simplicity of analytical calculations for each of them, which allows performing these calculations in real time. The high speed of calculations for the problem of determining the optimal trajectory is due to the fact that the proposed method does not require complex calculations to solve the problem of nonlinear optimization, which follows from the Pontryagin’s principle.
- Published
- 2021
- Full Text
- View/download PDF
24. УПРАВЛЕНИЕ КАЧЕСТВОМ УСЛУГ В СЕТЯХ СЛЕДУЮЩЕГО ПОКОЛЕНИЯ С ИСПОЛЬЗОВАНИЕМ МЕТОДОВ НЕЧЕТКОЙ ЛОГИКИ
- Author
-
Князева, Н. А. and Кальченко, А. С.
- Abstract
Copyright of Refrigeration Engineering & Technology is the property of Odesa National University of Technology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
- Full Text
- View/download PDF
25. Religious and Ethical Issues of Artificial Intelligence: Expert Assessments and the Vatican Position
- Author
-
A. A. Abramov
- Subjects
artificial intelligence ,algorithms ,ethics ,robot technology ,vatican ,roman catholic church ,morals ,human dignity ,Philosophy. Psychology. Religion - Abstract
The paper is dedicated to the emergence of progressive artificial intelligence technologies and its relations to the human nature and soul, as viewed by experts and in such specific community as the church. We seem now to be entering a new phase of the comprehension of the moral aspects of the introduction of artificial intelligence (AI) into the life of different societies. The romantic period of high expectations and excessive anxiety is replaced by the growing understanding of the complexity of the man‒machine interaction, which implies the intersection moral, legal, political and utilitarian dimensions of both a person and an artifact. The problematic issues are now more obvious, clear and difficult, as the disciplinary boundaries are revealed and highlighted. Among the crucial issues one should mention deficiencies in definitions; weakness of research optics and the vision that would be friendly to other areas of study or practice. This also includes the issues of integral assessment of the existing dangers, difficulties in describing the mechanisms of fulfilling both ethical and technically viable requirements. As scientific knowledge accumulates, both the benefits of introducing AI technologies into everyday life and previously underestimated new threats become more obvious. These societal and humanitarian ones include, in particular, social turbulence, neuroticism, digital crimes and crimes associated freedom abuses and losses of identity. Over the past few years, state and non-governmental institutions have proposed different approaches to determining what is included in the moral core of the problem under consideration. The efforts of many, if not most, of them turn out to be compromised by suspicions in willful intents. In this context, the broad consensus with the key agent facilitators is required, and the role such actors play in providing social stability is indisputable. One of the key roles in offering society the broadest vision on the anthropocentric development and AI progress belongs to the Roman Catholic Church. The Vatican’s quest to unite philosophers, AI developers, and religious leaders to address the ethical challenges of designing and implementing robotics is becoming an important element of the Christian witness in a world that is consider ed irrevocably secularized by many.
- Published
- 2020
- Full Text
- View/download PDF
26. PROCESS CHARACTERISTICS ESTIMATION IN WEB APPLICATIONS USING K-MEANS CLUSTERING
- Author
-
Victor V. Evstratov and Mikhail S. Ananyevskiy
- Subjects
clustering ,k-means ,k-means algorithm ,clustering quality assessment ,entropy ,machine learning ,algorithms ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Subject of Research. The paper presents the study of estimation problem of process characteristics for the particular case of user’s activity prediction in computer online games. Various machine learning methods are considered, and the advantages of clustering-based approaches are identified. The variety of metrics for the estimation of clustering quality is studied. Method. A clustering-based approach to estimation of process characteristics was developed on the base of a hypothesis proposed during the preliminary analysis of user’s activity data. Data on activity of users with the known predicted values was collected. Each user was represented as a pair of vectors: the first vector corresponded to his first days of activity, and the second one corresponded to the days with predicted performance. The vectors representing user’s activity in the first days were used as training data for the K-means algorithm. A developed entropy-like loss function was used to find a value of K suitable for the problem under consideration. The clusters were matched with vectors of predicted process characteristics averaged over all users in the cluster. These matches were used as the prediction of new users’ characteristics. Main Results. An approach to the determination of the suitable number of clusters is proposed, taking into account the specifics of the considered data. Numerical experiment is carried out, demonstrating the applicability of the developed method. Practical Relevance. The proposed approach application allows for the simultaneous prediction of multiple characteristics of online-game users, and, therefore, for solution of various planning and analytics problems during online-game development. For example, the method developed in the present work was used to analyze the development payback of new game elements, and to predict server load in order to increase available computational resources beforehand. The advantages of the developed method include no need for expert tagging of the training set and relatively low computational cost due to the low computational complexity of the proposed loss function used to estimate the hyperparameter K.
- Published
- 2020
- Full Text
- View/download PDF
27. Chiral Fermions Algorithms In Lattice QCD
- Author
-
Dafina Xhako and Rudina Zeqirllari
- Subjects
algorithms ,chiral ,critical-slowing ,fermions ,lattice ,QCD ,Physics ,QC1-999 - Abstract
The theory that explains the strong interactions of the elementary particles, as part of the standard model, it is the so-called Quantum Chromodynamics (QCD) theory. In regimes of low energy this theory it is formulated and solved in a lattice with four dimensions using numerical simulations. This method it is called the lattice QCD theory. Quark propagator it the most important element that is calculated because it contains the physical information of lattice QCD. Computing quark propagator of chiral fermions in lattice means that we should invert the chiral Dirac operator, which has high complexity. In the standard inversion algorithms of the Krylov subspace methods, that are used in these kinds of simulations, the time of inversion is scaled with the inverse of the quark mass. In lattice QCD simulations with chiral fermions, this phenomenon it is knowing as the critical slowing-down problem. The purpose of this work is to show that the preconditioned GMRESR algorithm, developed in our previous work, solves this problem. The preconditioned GMRESR algorithm it is developed in U(1) group symmetry using QCDLAB 1.0 package, as good “environment” for testing new algorithms. In this paper we study the escalation of the time of inversion with the quark mass for this algorithm. It turned out that it is a fast inversion algorithm for lattice QCD simulations with chiral fermions, that “soothes” the critical slowing-down of standard algorithms. The results are compared with SHUMR algorithm that is optimal algorithm used in these kinds of simulations. The calculations are made for 100 statistically independent configurations on 64 x 64 lattice gauge U(1) field for three coupling constant and for some quark masses. The results showed that for the preconditioned GMRESR algorithm the coefficient k, related to the critical slowing down phenomena, it is approximately - 0.3 compared to the inverse proportional standard law (k = -1) that it is scaled SHUMR algorithm, even for dense lattices. These results make more stable and confirm the efficiency of our algorithm as an algorithm that avoid the critical slowing down phenomenon in lattice QCD simulations. In our future studies we have to develop the preconditioned GMRESR algorithm in four dimensions, in SU (3) lattice gauge theory.
- Published
- 2019
- Full Text
- View/download PDF
28. The structure of urgent conditions of servicemen of the Armed Forces of Ukraine in modern conditions
- Author
-
M. I. Badiuk, O. O. Mykyta, I. P. Semeniv, M. M. Rygan, and V. V. Kosarchuk
- Subjects
emergencies ,wounds and injuries ,algorithms ,clinical protocols ,standard of care ,military personnel ,Ukraine ,Pathology ,RB1-214 - Abstract
Purpose: to study the structure of urgent conditions of servicemen with combat injuries and diseases in modern conditions in order to substantiate the development of promising algorithms and medical aid protocols adapted to NATO standards.Materials and methods. The paper presents the results of analysis of the structure and nature of urgent conditions of modern combat pathology and diseases among military personnel who were on treatment at the National Military Medical Clinical Center “Main Military Clinical Hospital” from 1999 to 2018 (191 731 disease histories).Results. The article analyzes the structure of emergency conditions for servicemen of the Armed Forces of Ukraine, who were admitted the National Military Medical Clinical Center “MMCH” in the period from 1999 to 2013 compared with the corresponding indicators for 2014–2017 years. The trends in the dynamics of the indicators of the structure of emergency conditions of servicemen with injuries (including combat ones) and diseases during the period of armed conflict compared to the previous period (1999–2013) were studied. The most urgent conditions of servicemen with combat trauma and serious illnesses are identified, which are the priority for the development and implementation of modern algorithms and protocols for the provision of medical assistance in combat conditions in the Armed Forces of Ukraine. A list of algorithms and protocols for the provision of medical assistance to servicemen of the Armed Forces of Ukraine under the main emergency conditions in today's conditions is proposed.Conclusions. The basic nosological forms of combat injuries and illnesses of military personnel are established in which emergencies are formed: the ХІХ class – injuries and head and brain injuries (27.3 %), abdominal injuries (18.2 %), chest injuries and ribs (12.9 %); X class – pneumonia (75.9 %); ІX class – strokes (40.1 %), myocardial infarction (30.1 %) and hypertensive disease (12.5 %). The main classes, whose nosological forms are accompanied by severe and extremely serious conditions, are the ХІХ class – traumas, poisonings and some other consequences of external causes (48.5 %), class X – respiratory diseases (12.1 %), class IX – Diseases of the circulatory system (7.4 %) and class V – disorders of the psyche and behavior (6.1 %). Identified urgent conditions of servicemen, arising from appropriate nosological forms and included in the described classes of diseases, are priority for the development of priority algorithms and protocols for the provision of medical assistance to servicemen in combat conditions according to NATO standards.
- Published
- 2018
- Full Text
- View/download PDF
29. Dynamic-signature-based user authentication using a fuzzy classifier
- Author
-
Ilya Hodashinsky, Evgeny Kostyuchenko, Konstantin Sarin, Aleksandr Anfilofev, Marina Bardamova, Sergey Samsonov, and Igor Filimonenko
- Subjects
pattern recognition ,information processing ,algorithms ,feature selection ,fuzzy classifier ,signature recognition ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
Dynamic signature verification is one of the most fast, intuitive, and cost effective tools for user authentication. Dynamic signature recognition uses multiple characteristics in the analysis of an individual’s handwriting. Dynamic characteristics include the velocity, acceleration, timing, pressure, and direction of the signature strokes, all analyzed in the x, y, and z directions. In this paper, the constant term and the first seven harmonics of the Fourier series expansion of the signature were used as features. The authentication systems development includes the following stages: preprocessing, feature selection, classification. Binary metaheuristic algorithms and deterministic algorithms are used to select attributes. The classification was carried out using a fuzzy classifier. The fuzzy classifiers parameters were tuned using continuous metaheuristic algorithms. The efficiency of the authentication system was verified on the author's database. The database contains 280 original variants of the signature of one author and 1281 variants of counterfeit signatures of seven authors. To assess the statistical significance of differences in the accuracy and error rates of the fuzzy classifiers formed by metaheuristic algorithms, the Mann-Whitney (-Wilcoxon) U-test to compare medians and the Kruskal-Wallis test were used.
- Published
- 2018
- Full Text
- View/download PDF
30. Images analysis for automatic volcano visibility estimation
- Author
-
Alexandr Kamaev, Igor Urmanov, Aleksei Sorokin, Dmitry Karmanov, and Sergey Korolev
- Subjects
image analysis ,algorithms ,edge detection ,parametric edges ,volcano ,edge matching ,video surveillance ,visibility analysis ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
In this paper, a method for estimating the volcano visibility in the images is presented. This method includes algorithms for analyzing parametric edges of objects under observation and frequency characteristics of the images. Procedures for constructing parametric edges of a volcano and their comparison are considered. An algorithm is proposed for identifying the most persistent edges for a group of several reference images. The visibility of a volcano is estimated by comparing these edges to those of the image under analysis. The visibility estimation is maximized with respect to a planar shift and rotation of the camera to eliminate their influence on the estimation. If the image quality is low, making it hardly suitable for further visibility analysis, the estimation is corrected using an algorithm for analyzing the image frequency response represented as a vector of the octave frequency contribution to the image luminance. A comparison of the reference frequency characteristics and the characteristics of the analyzed image allows us to estimate the contribution of different frequencies to the formation of volcano images. We discuss results of the verification of the proposed algorithms performed using the archive of a video observation system of Kamchatka volcanoes. The estimates obtained corroborate the effectiveness of the proposed methods, enabling the non-informative imagery to be automatically filtered off while monitoring the volcanic activity.
- Published
- 2018
- Full Text
- View/download PDF
31. MULTIFREQUENCY ALGORITHMS FOR DETERMINING THE MOISTURE CONTENT OF LIQUID EMULSIONS BY THE METHOD OF RESONANCE DIELCOMETRY.
- Author
-
Korobko, A. A.
- Subjects
ALGORITHMS ,LIQUID dielectrics ,MATHEMATICAL models - Abstract
Copyright of Electrical Engineering & Electromechanics is the property of National Technical University, Kharkiv Polytechnic Institute and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
- Full Text
- View/download PDF
32. COMPENSATION FOR DELAYS AND LOSSES OF PACKAGES IN DYNAMIC ONLINE GAMES.
- Author
-
Alexeev, A. and Sinitsyna, R.
- Abstract
A couple of decades ago, data rates on the network were measured in kilobytes per second, and even then, online game developers had some problems with the packet loss and transmission delays. Now the transfer rate is hundreds of times higher, and the problem of delay compensation is even more relevant. For many dynamic online games, a transmission delay of as little as 20 ms can be quite noticeable, negatively affecting the gameplay and emotions of the game, which can repel players. The problem is exacerbated by the fact that along with the need to compensate for the time of delivery of packets, on the client side there are other non-network factors that are beyond the control of developers, which make the total delay 5-10 ms longer. Because of this, the desire to get rid of network delays as much and as well as possible becomes a necessity, and developers are forced to look for optimal ways to solve this problem. The problem statement is as follows: to review the causes of delays in online games and possible solutions, as well as the advantages and disadvantages of certain approaches. The problem is considered at the 4 levels of the TCP / IP network model, as well as at the application level. The approaches are given for the most commonly used protocols for each layer, but basic ideas can be easily transferred to other implementations. The main causes of delays under consideration: propagation delay, router queue delay, transmission delay, and processing delays. This article shows the impact of network delays on the online games and the ways to compensate for them, along with the theory of data transmission protocols in the network and the ways to solve the problems that arise in the development of algorithms. Recommendations for solving the compensation problem can be taken into account when designing and launching online shooters, strategies, etc. Thanks to the given receptions it is possible to minimize the general delay on the transfer of packets in a network, thanks to which the game on the client looks as if the player plays in the Single Player mode. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.