45 results
Search Results
2. COMBINED ALGORITHMS FOR DETERMINING THE INITIAL SOLUTION OF DISCRETE OPTIMIZATION PROBLEMS.
- Author
-
Yukhimenko, B. I., Volkova, N. H., and Kozina, Yu. Yu.
- Subjects
GREEDY algorithms ,ANT algorithms ,MATHEMATICAL ability ,KNAPSACK problems ,SIMULATED annealing ,ALGORITHMS ,COMPUTATIONAL complexity - Abstract
The problem of solving the task of discrete optimization is not completely solved. Lack of publications, scientific developments, algorithms and software products do not give the ability to transfer the mathematical apparatus of solving discrete optimization problems to the class P of computational complexity. All analytical and combinatorial algorithms for solving problems of linear and non-linear optimization are NP completeness. There are developments to improve the efficiency of robotic algorithms, they are filled with requests and actual ones. In this paper, it is proposed to use deterministic and probabilistic methods for forming a priority queue of decision vector components in order to assign positive values to them. After the formation of the variant of the solution, it is possible to vectorize as if the approached solution is taken away from the record value of the goal function, which in exact algorithms is like a solution, which results in a polyp. In this paper has a method for forming a priority line for concretizing the components of the solution vector. The basis of deterministic methods is the idea of a greedy algorithm. The location in the queue is determined by the value of the corresponding component of the cost vector. The appearance of the value of non-visibility in the system of restrictions increases the priority of the component. Behind such a way, another method of determination is modified. Probability assessment probability of priorities is based on the ideas of algorithms in an ant colony and simulated annealing. The scope of probability indicates the significance of the component - a contender for a positive value. A numerical example of a small variability of the task about a knapsack has been introduced, which demonstrates the imitation of a nearby solution. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. О явлении сверх-сходимости при разложениях по собственным функциям
- Author
-
Нерсесян, А. Б.
- Subjects
BOUNDARY value problems ,SMOOTHNESS of functions ,EIGENFUNCTIONS ,FOURIER series ,ALGORITHMS - Abstract
Copyright of National Academy of Sciences of Armenia Reports / Doklady Nacionalnaâ Akademiâ Nauk Armenii is the property of National Academy of Sciences of the Republic of Armenia and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
4. Influence of the Digital Environment on the Contemporary Worldview: Pro et Contra
- Author
-
Sergey V. Volodenkov, Sergey N. Fedorchenko, and Nikolai M. Pechenkin
- Subjects
worldview ,public consent ,value-semantic attitudes ,digital environment ,digital institutions ,algorithms ,technological determinism ,Political science - Abstract
Global technological transformations of key areas of life of contemporary society, the formation and active functioning of global and national digital institutions that influence current socio-political processes, and the digitalization of social relations form a demand for comprehensive scientific research on the processes of digital influence on the development and functioning of modern social systems. This article is aimed at considering the problem of the relationship between digital and worldview aspects of the functioning of modern societies. In connection with this, the research issue was to determine the degree and nature of the influence of digitalization processes, as well as directly the digital environment and institutions on the content aspects of the individual’s worldview. This research question is directly related to the study of the phenomenon of public consent in the context of the formation of digital polymentality. To answer the research question posed in the paper, the authors conducted a discourse analysis of the existing scientific literature on the relationship between digitalization and worldview in the pro et contra logic. An international expert study was also conducted, which made it possible to identify the main expert positions on the study, as well as the key risks, threats, and challenges in the field of preserving the traditional worldview and achieving public consent based on the unity of value-semantic and worldview ideas of individuals. The main conclusion of the paper is the fundamental ambiguity of the positions of scientists and experts, justified by the results of the study, in assessing the degree and nature of the influence of digitalization, the digital environment and institutions on the content parameters of the worldview of a modern person, as well as the ambiguity of the value-semantic attitudes formed and maintained in the digital environment.
- Published
- 2023
- Full Text
- View/download PDF
5. МАТЕМАТИЧЕСКИЕ МЕТОДЫ И МОДЕЛИ ИЗУЧЕНИЯ КОРРУПЦИИ В ОРГАНИЗАЦИОННЫХ СИСТЕМАХ
- Author
-
Левин, В. И.
- Subjects
CORRUPTION ,MATHEMATICAL models ,INFORMATION processing ,PROBLEM solving ,EXPERT systems ,ALGORITHMS - Abstract
Copyright of Radio Electronics, Computer Science, Control is the property of Zaporizhzhia National Technical University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
6. КУЛЬТУРНАЯ ИНФОРМАЦИЯ В РОМАНЕ А. С. ПУШКИНА «ЕВГЕНИЙ ОНЕГИН»: СТРАТЕГИИ И СПОСОБЫ РЕТРАНСЛЯЦИИ В ПОРТУГАЛЬСКИХ ПЕРЕВОДАХ .
- Author
-
Данилова, Василиса and Тивьяева, Ирина
- Subjects
TRANSLATING & interpreting ,FICTION ,ALGORITHMS ,VOCABULARY ,CULTURE - Abstract
Copyright of Foreign Language Teaching is the property of Az Buki National Publishing House and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
7. РОЗРОБКА АВТОМАТИЗОВАНОЇ СИСТЕМИ РЕЦЕНЗУВАННЯ СТАТЕЙ ДЛЯ НАУКОВОГО ЖУРНАЛУ
- Author
-
Шеремет, Г. О.
- Subjects
ALGORITHMS ,DIGITAL technology ,AUTHOR-editor relationships ,DATABASE design ,INTELLECTUAL property - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
8. AN APPROACH TO THE ELIMINATION OF CONFLICTS IN MULTI-AGENT SYSTEMS BASED ON DIJKSTRA'S ALGORITHM.
- Author
-
Penko, V. G., Penko, O. V., and Kogan, V. V.
- Subjects
MULTIAGENT systems ,ALGORITHMS ,DISTRIBUTED algorithms - Abstract
The task of path finding by an agent is one of the basic tasks and is of great practical importance. As a rule, this is an optimization task that is solved in the space of the state graph in order to minimize the length of the path. Such a task becomes more difficult and becomes even more popular if it is solved on the basis of one graph space by several agents. In this case, another practically important optimization parameter appears, which is expressed by the number of conflicts between agents. Such an abstract formulation of the task has numerous variants of formalization and a large number of approaches to its solution. In this paper, the main element of the approach is the application of the classic Dijkstra algorithm, which is executed sequentially by each agent. When finding the shortest route, each agent modifies the graph space in such a way as to reduce the probability of conflicts with subsequent agents. This approach is original and a number of computational experiments were performed to verify it using software developed for this purpose. The experiments that were conducted demonstrate the adequate behavior of the main algorithm. The work analyzes the limitations inherent in the proposed approach within the framework of the abstract formulation of the task. The directions of further development of the basic approach have been determined. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Применение трехмерного геометрико-морфометрического анализа для изучения артефактов каменного века.
- Author
-
Шалагина, А. В., Колобова, К. А., Чистяков, П. В., and Кривошапкин, А. И.
- Subjects
THREE-dimensional modeling ,MULTIVARIATE analysis ,NATURAL history ,CAVES ,ALGORITHMS ,GRAVETTIAN culture ,ARCHAEOLOGICAL assemblages ,MESOLITHIC Period - Abstract
Copyright of Stratum Plus Journal is the property of P.P. Stratum plus and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
10. МОДИФІКАЦІЯ МЕТОДУ ХЕШ-СТЕГАНОГРАФІЇ, ЗАСНОВАНОГО НА ПЕРЕДАЧІ ПОСЛІДОВНОСТІ ЦИФРОВИХ ЗОБРАЖЕНЬ
- Author
-
Зоріло, В. В., Лебедєва, О. Ю., and Бохонько, М. В.
- Subjects
IMAGE analysis ,TEXT messages ,DIGITAL images ,CRYPTOGRAPHY ,ALGORITHMS ,HASHING - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
11. ОПТИМИЗАЦИЯ СТРУКТУРЫ И АЛГОРИТМА РАБОТЫ ВЫСОКОЧУВСТВИТЕЛЬНОЙ МУЛЬТИСЕНСОРНОЙ СИСТЕМЫ С ИМПЕДАНСНЫМИ ПРЕОБРАЗОВАТЕЛЯМИ
- Author
-
Мельник, В. Г., Борщев, П. И., Василенко, А. Д., and Слицкий, А. В.
- Subjects
TRANSDUCERS ,ELECTRODYNAMICS ,DETECTORS ,ALGORITHMS ,RESEARCH institutes - Abstract
Copyright of Sensor Electronics & Microsystems Technologies / Sensorna Elektronika i Microsystemni Tekhnologii is the property of I. I. Mechnikov Odessa National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
- Full Text
- View/download PDF
12. Intellectual Property Ownership of AI-Generated Content
- Author
-
A. Kirakosyan
- Subjects
copyright ,patents ,artificial intelligence ,algorithms ,ai-generated works ,public domain ,protection of intellectual property rights ,Law - Abstract
Until recently, intellectual creativity was considered as an exclusively human phenomenon and intellectual property legislation was built on the basis of motivating and enhancing human inventiveness. This self-evident assumption is being challenged due to the development of artificial intelligence technologies in the recent decades. In this article author analyzes some aspects of intellectual property law development, including the possibility of recognizing an artificial intelligence as a creator of intellectual activity results. The author examines the legal status of artificial intelligence under Armenian law and foreign intellectual property legislation, analyzes existing approaches to the legal regime and intellectual property ownership of objects created with the help of artificial intelligence. The paper aims to determine the proper right holder to content generated by artificial intelligence and formulate some policy prospects of artificial intelligence regulation. The methodological basis of the research includes general scientific and special legal methods. The author places particular emphasis on the dogmatic (doctrinal) research methods, which made it possible to analyze existing approaches to protection of intellectual property rights. The research is also based on the comparative legal method and analytical legal method of commenting current law of Armenia and foreign countries. The results of the study allow author to substantiate that the actual right holder to the content produced by the neural network is the programmer of the underlying algorithm system. The author concludes that the construction of a solid legislative system should be carried out taking into account the specifics of the areas of application of artificial intelligence, ensuring a balance between the interests of individuals, society and the state related to the development of innovative technology.
- Published
- 2024
- Full Text
- View/download PDF
13. ВИЯВЛЕННЯ ЧАСТИН ЦИФРОВОГО ЗОБРАЖЕННЯ, ЗМЕНШЕНИХ ПІСЛЯ ФАЛЬСИФІКАЦІЇ
- Author
-
Гулич, В. В., Зоріло, В. В., and Лебедєва, О. Ю.
- Subjects
DATA integrity ,INFORMATION technology security ,FALSIFICATION ,DIGITAL images ,ALGORITHMS - Abstract
Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
14. ESTIMATION OF FLOW ACCUMULATION UNCERTAINTY BY MONTE CARLO STOCHASTIC SIMULATIONS.
- Author
-
Nenad Višnjevac, Željko Cvijetinović, Branislav Bajat, Boris Radić, Ratko Ristić, and Vukašin Milčanović
- Subjects
FLUID flow ,GEOGRAPHIC information systems ,MONTE Carlo method ,SIMULATION methods & models ,STOCHASTIC analysis ,ALGORITHMS - Abstract
Very often, outputs provided by GIS functions and analysis are assumed as exact results. However, they are influenced by certain uncertainty which may affect the decisions based on those results. It is very complex and almost impossible to calculate that uncertainty using classical mathematical models because of very complex algorithms that are used in GIS analyses. In this paper we discuss an alternative method, i.e. the use of stochastic Monte Carlo simulations to estimate the uncertainty of flow accumulation. The case study area included the broader area of the Municipality of Cacak, where Monte Carlo stochastic simulations were applied in order to create one hundred possible outputs of flow accumulation. A statistical analysis was performed on the basis of these versions, and the "most likely' version of flow accumulation in association with its confidence bounds (standard deviation) was created. Further, this paper describes the most important phases in the process of estimating uncertainty, such as variogram modelling and chooses the right number of simulations. Finally, it makes suggestions on how to effectively use and discuss the results and their practical significance. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
15. IMAGE-BASED DEFECT ANALYSIS FOR 3D-PRINTED ITEM SURFACE USING MACHINE LEARNING METHODS
- Author
-
Daniil V. Izmailov, Daniil A. Drygin, and Ksenia V. Ezhova
- Subjects
3d-printing ,technical vision system ,machine learning ,support vector machine ,algorithms ,defects detecting ,quality monitoring ,extrusion ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Subject of Research. Defect detection is an actual and challenging task in the field of additive technologies. This process enables the user to save time and reduce the consumption of material. Also, it prevents the further possible faults and defects. On that account, an automation of surface control process in 3D-printing is an essential step not only for large manufacturing companies but also for private users. The paper proposes an image-based method for quality control of a 3D-printed product by applying machine learning algorithms. Method. 3D-printed item images were taken and processed on an experimental setup composed of a camera and a single board microcomputer. The paper presents a defect detecting method based on development of image preprocessing algorithms and further machine learning by applying support vector machine method. Main Results. The presented method enables the user to find and identify “over-extrusion” and “under-extrusion” defects with high precision on the surface of the manufactured items. Practical Relevance. The developed method is intended to provide practical benefits for the private users of 3D-printing devices and companies manufacturing or applying these devices. There are the following advantages of the method application: the 3D-printing parameters are easy to be set, the reports about the product and its features are saved, the solutions to any problem occurred during printing are simple and fast. The developed method of visual quality control of the 3D-printed item surface can be significantly helpful to the expansion of automation possibilities for fast prototyping processes and take 3D-printing process to a new level.
- Published
- 2020
- Full Text
- View/download PDF
16. PEIV模型参数估计理论及其应用研究进展.
- Author
-
王乐洋 and 邹传义
- Subjects
GLOBAL Positioning System ,ALGORITHMS ,PARAMETER estimation ,LEAST squares ,COVARIANCE matrices ,ELECTRONIC data processing ,BIG data ,KALMAN filtering - Abstract
Copyright of Geomatics & Information Science of Wuhan University is the property of Geomatics & Information Science of Wuhan University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
17. Algorithms for Converting Finite Automata Corresponding to Infinite Iterative Trees
- Author
-
Mikhail Abramyan and Boris Melnikov
- Subjects
algorithms ,formal languages ,iterations of languages ,binary relations ,infinite trees ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we work with some different variants of finite automata, each of which corresponds to an infinite iterative tree constructed for some given morphism. At the same time, each of the automata constructed for a given morphism describes the main properties of this morphism. Besides, in each case (i.e., for each variant of the automaton), the following “inverse problem” also arises: to describe the morphism (or simply specify a pair of languages) for which such a given automaton is obtained. We present a computer program for constructing one such automaton, so-called PRI automaton. After that, we consider a detailed example of a PRI automaton for a pair of different languages. Continuing to consider this example, we use the last automaton to perform usual transformations described and repeatedly applied in our previous publications, i.e., the determination and canonization of the mirror automaton for possible application of the results obtained in the algorithm for minimizing nondeterministic automata. In the considered situation, such a minimal automaton is another automaton constructed on the basis of a given morphism tree, a nondeterministic automaton, the so-called NSPRI# automaton, and we also show the equality of these automata (which implies the equivalence of PRI and NSPRI#) in the paper by an example. Based on the NSPRI# automaton, a non-deterministic NSPRI automaton is constructed using a trivial (but non-equivalent) transformation; a detailed study of this automaton is expected in future publications. Examples of PRI and NSPRI# automata for pairs of matching languages are also of interest, we also give one such example in this paper.
- Published
- 2021
- Full Text
- View/download PDF
18. УНИФИЦИРОВАННЫЕ МОДЕЛИ ЭЛЕМЕНТОВ СИСТЕМ ЭЛЕКТРОСНАБЖЕНИЯ НА ОСНОВЕ УРАВНЕНИЙ В ФАЗНЫХ КООРДИНАТАХ
- Author
-
Веприк, Ю. Н. and Небера, О. А.
- Subjects
ALGORITHMS ,ELECTRIC equipment ,MACHINE tools ,ELECTRIC transients ,COMPUTER simulation - Abstract
Copyright of Electrical Engineering & Electromechanics is the property of National Technical University, Kharkiv Polytechnic Institute and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
19. ALGORITHMS FOR ASSOCIATIVE RULE MINING.
- Author
-
Bureva, Veselina
- Subjects
ALGORITHMS ,DATA mining ,OPEN source software ,DATABASES - Abstract
In the paper the associative analysis as a Data Mining technique is investigated. The properties of the algorithms for extracting the associative rules is analyzed and compared. The associative analysis is used for discovering and exploring hidden and interesting relationships between items in large amounts of data. The extracted patterns are presented in the form of association rules or sets of frequent items. The associative rules are represent in the form IF A then B. For studying of various algorithms is used open source software RapidMiner. [ABSTRACT FROM AUTHOR]
- Published
- 2013
20. ESTIMATION OF SCINTILLATION COORDINATES IN GAMMA-CAMERA DETECTOR USING SPLINE APPROXIMATION METHOD.
- Author
-
Plakhotnik, Vladimir and Malakhov, Oleg
- Subjects
SCINTILLATION cameras ,PHOTODETECTORS ,ALGORITHMS ,GEOMETRY ,IMAGE quality analysis - Abstract
Image formation in gamma-ray cameras is made by defining scintillation coordinates, produced by the absorption of gamma-quanta. By the present time different methods for scintillation coordinates defining have been developed based on previously measured and calculated amplitude-spatial features of a photodetector. The paper gives a method for estimating scintillation coordinates without any prior information. The method is based on approximation of the photodetecor response surface, located at the output window of permanent scintillation detector, on the scintillation light distribution function. For the approximation bicubic smoothing splines were used, which weight coefficients are set based on statistical features of measurement results. The paper proposes the approximation algorithm, taking into account geometry of photodetectors distribution at the output window of detector in the points of trigonal lattice. The algorithm can be applied in gamma cameras and other systems of gamma-rays imaging when using detectors such as gamma cameras. Relatively high computational intensiveness as compared to the Anger's method makes the proposed method more appropriate for off-line processing of accumulated data aimed at improving the image quality. [ABSTRACT FROM AUTHOR]
- Published
- 2013
21. ESTIMATION OF OPTIMAL SOUND-ABSORBING COVER FOR PREMISES WITH MULTI-TONE NOISE.
- Author
-
Mamontov, Alexander
- Subjects
MATHEMATICAL optimization ,PROBLEM solving research ,NONLINEAR programming ,ALGORITHMS ,COMPUTER software ,WORK environment - Abstract
Despite the wide spread of computing devices and mathematical optimization methods in various fields of knowledge, little attention is paid to optimization of solving the problems of labor safety. In the author's opinion the promising solution is developing the methods of sound-absorbing cover optimization based on non-linear programming, one of which has been the objective of the work. The method for estimation of the optimal cover in premises with multi-tone noise conditions is proposed in the paper. Different noise tones can be absorbed by different materials with the most suitable properties. The method is based on random selection of surface area values of different materials, with further selection of the optimal cover. The paper gives the estimation algorithm and the obtained results using the Mathcad computer program. The estimation results indicate the regularities of achieving the optimum and a significant economic effect. The proposed estimation method and algorithm can be used for taking labor safety measures for noise reduction, namely, sound-absorbing covers design for production facilities. The paper has a scientific novelty, based on random selection of materials surface area values, and practical significance based on economic effect and working conditions improvement. [ABSTRACT FROM AUTHOR]
- Published
- 2013
22. INFORMATION COGNITIVE MODEL OF TECHNOLOGICAL INTERDEPENDENCE OF MARINE TECHNICAL RECOURSES.
- Author
-
Rudnichenko, Nick D. and Vichuzhanin, Vladimir V.
- Subjects
MARINE equipment ,INFORMATION technology ,TECHNOLOGICAL complexity ,INTEGRATED circuit interconnections ,POWER plants ,RELIABILITY in engineering ,ALGORITHMS - Abstract
This paper contains the results of studies of the cognitive model developed information technology interdependence and interrelation of complex technical systems to assess their vulnerability. A general block diagram of a ship interconnectedness of complex technical systems. The interaction of ship power plant units, the power supply system of the ship and ship's auxiliary systems in extreme emergency situations. Based on the results of research developed an information processing model of cognitive functioning marine interdependence of complex technical systems. In accordance with the established algorithm vulnerability assessment information elements of the cognitive model calculated the coefficients of the structural vulnerability of its elements. The calculation results have allowed to identify the most critical elements of the model in terms of reliability. The results of research and development will improve the efficiency of operation of complex technical systems that provide high-quality prediction of the reliability of their operation in extreme emergency situations. [ABSTRACT FROM AUTHOR]
- Published
- 2013
23. STEGANALYSIS OF DIGITAL IMAGES THAT SAVED IN RANDOM FILE FORMATS.
- Author
-
Uzun, Illya A.
- Subjects
CRYPTOGRAPHY ,INFORMATION resources management ,DIGITAL images ,IMAGE processing ,ALGORITHMS - Abstract
This paper is devoted to steganalysis algorithm determining presence a secret message embedded into digital image which is stored in compressed or uncompressed form. The algorithm is based on the analysis of pairs of colors and uses the method of modifying the least significant bit. [ABSTRACT FROM AUTHOR]
- Published
- 2013
24. POINT PREDICTION ALGORITHM FOR STOCHASTIC PROCESSES IN AIRCRAFT COMMUNICATION NETWORKS.
- Author
-
Chirkov, Dmytro V. and Lipovsky, Valery G.
- Subjects
INFORMATION networks ,STOCHASTIC processes ,PREDICTIVE control systems ,ALGORITHMS ,TELECOMMUNICATION systems - Abstract
The paper focuses on general method of predictive control of modern multi-service networks, which is a major component includes algorithms for the identification of structural models of regular components (trends) of the observed processes. The general structure for predictive control of aircraft communication systems is described. The general view of the structural identification algorithm is discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2013
25. A FUZZY-MEASUREMENT ALGORITHM FOR ASSESSING THE IMPACT OF ELECTROMAGNETIC FIELDS ON HEALTH.
- Author
-
MILIĆ, Saa D., VULEVIĆ, Branislav D., and STOJIĆ, Djordje M.
- Subjects
ELECTROMAGNETIC fields ,FUZZY logic ,FUZZY systems ,ALGORITHMS ,ELECTROMAGNETIC measurements - Abstract
Copyright of Nuclear Technology & Radiation Protection is the property of Vinca Institute of Nuclear Sciences and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
26. Методика определения индукции управляющего магнитного поля в зоне ванны при дуговой сварке
- Author
-
Размышляев, А. Д., Выдмыш, П. А., and Агеева, М. В.
- Subjects
CALCINATION (Heat treatment) ,ELECTRIC welding ,ELECTROMAGNETIC induction ,MAGNETIC field effects ,ALGORITHMS ,INDUCTION heating - Abstract
Copyright of Automatic Welding / Avtomatitcheskaia Svarka is the property of International Association Welding (Paton Publishing House) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
- Full Text
- View/download PDF
27. POLITICAL SUBJECTIVITY OF TRANSNATIONAL DIGITAL CORPORATIONS
- Author
-
Andrey A. Cheban
- Subjects
algorithms ,corporate power ,political subjectivity ,network effects ,digital platforms ,Political science - Abstract
Aim. To define political subjectivity of transnational digital corporations in the modern world.Methodology. Network effects arising within the framework of the modern digital platforms functioning are the subject of research. The paper analyzes such effects of the modern communicative space as “digital capsules”, deplatforming, avatarization and the power of algorithms. The special status and definition of the political subjectivity of transnational digital corporations are highlighted.Results. It has been concluded that the algorithms that perform functions on platforms have a significant impact on the communication and information space, while they are not a self-sufficient political entity.Research implications. The author's definition of the political subjectivity of digital corporations is presented, examples of influence on platforms by state institutions are given, scenarios for the development of political subjectivity in digital platforms are considered.
- Published
- 2023
28. Construction of movement trajectories for objects based on the Dubins car problem, taking into account constant external influences
- Author
-
Sergey P. Khabarov and Maria L. Shilkina
- Subjects
dubins path ,algorithms ,optimal control ,waypoint navigation ,unmanned aerial vehicles ,shortest path ,optimization ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper considers an approach in terms of optimal speed problem for Dubins cars to the formation of control trajectories of moving objects (airplanes, ships), that have control restrictions, under external influences that are constant in magnitude and direction and constant control values at each part of the trajectory. Instead of solving the Pontryagin maximum principle, it is proposed to use a simple comparison of possible control strategies in order to determine the best among them in terms of speed. For each strategy, the calculation of control switching points on the trajectory is based on minimizing the difference between the specified coordinates of the endpoint and the coordinates of the point at which the trajectory comes, depending on the choice of the parameters of two intermediate control switching points. The problem of finding the best speed trajectory for an object from one point to another is solved using the Dubins approach, and their coordinates and heading angles are given for both points. All calculations were carried out taking into account wind and water disturbances, which are constant in magnitude and direction and distort the trajectory. The problem of finding the Dubins paths is reduced to finding the parameters of two intermediate points at which the control changes. Different possibilities for changing controls are considered, taking into account the existing restrictions. The lengths of the trajectories are calculated and the best travel time is selected. The proposed method considers several trajectories acceptable in terms of constraints, taking into account the external influences, from which the optimal path is selected by comparison. Having multiple feasible strategies is beneficial when choosing a trajectory depending on the environment. Instead of solving the problem of nonlinear optimization of the Pontryagin maximum principle, a simple comparison of possible control strategies is used in order to determine the best among them in terms of speed, each of the possible strategies is sought from the condition of minimizing the residual of the analytical solution and the boundary condition at the end of the trajectory. When searching for possible trajectories, control constraints, the influence of external influences, that are constant in magnitude and direction, and the constancy of the control value at each part of the trajectory are taken into account. And all these factors make it possible to sufficiently and adequately simulate the movement of the ship. Physically, restrictions on control (turning radius) are associated with a limited steering angle. Restrictions can be associated not only with restrictions on the turning radius, but also with geographical features of a specific area: for unmanned aerial vehicles this may be due to the buildings and terrain, and for ships this may be due to the coastline, shoals, islands, etc. In this regard, it may turn out that the solution found optimal in terms of speed cannot be realizable in practice. Then the method proposed in the work has the ability to choose another trajectory among the less optimal in terms of speed.
- Published
- 2022
- Full Text
- View/download PDF
29. Machine learning based on laboratory data for disease prediction
- Author
-
A. V. Gusev, R. E. Novitskiy, A. A. Ivshin, and A. A. Alekseev
- Subjects
artificial intelligence ,prediction ,great obstetrical syndromes ,preeclampsia ,machine learning ,neural networks ,algorithms ,risk factors ,Therapeutics. Pharmacology ,RM1-950 ,Economics as a science ,HB71-74 - Abstract
Objective: to review domestic and foreign literature on the issue of machine learning methods applied in medical information systems (MIS), to analyze the accuracy and efficiency of the technologies under study, their advantages and disadvantages, the possibilities of implementation in clinical practice.Material and methods. The literature search was performed in the PubMed/MEDLINE databases covering the period from 2000 to 2020 (using groups of keyphrases: "machine learning", "laboratory data", "clinical events", "prediction diseases"), CyberLeninka ("machine learning", "laboratory data", "clinical events", "prediction diseases" Russian keyphrases combinations) and Papers With Code ("clinical events", "prediction diseases", "electronic health record"). After reviewing the full text of 30 literature sources that met the selection criteria, the 19 most relevant articles were selected.Results. An analysis of sources that describe the application of artificial intelligence techniques to obtain predictive analytics, taking into account information about patients, such as demographic, anamnestic, and laboratory data, the data of instrumental studies, information about existing and former diseases available in MIS, was performed. The existing ways of predicting adverse medical outcomes using machine learning methods were considered. Information about the significance of the used laboratory data for constructing high-precision predictive mathematical models is presented.Conclusion. Implementation of machine learning algorithms in MIS seems to be a promising tool for effective prediction of adverse medical events for wide application in real clinical practice. It corresponds to the global trend in the development of personalized medicine based on the calculation of individual risk. There is an increase in the activity of research in the field of predicting noncommunicable diseases using artificial intelligence technologies.
- Published
- 2022
- Full Text
- View/download PDF
30. Geometric approach to the solution of the Dubins car problem in the formation of program trajectories
- Author
-
Sergey P. Khabarov and Maria L. Shilkina
- Subjects
dubins car ,trajectory ,algorithms ,optimal control ,conjugation curves ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The paper considers an approach to the formation of control program trajectories of moving objects (UAVs, ships) as a solution to the optimal problem in terms of Dubins path search. Instead of directly solving the Pontryagin’s maximum principle, it is proposed to use a simple analysis of possible control strategies in order to determine among them the optimal one in terms of time spent on a trajectory. The problem of finding the shortest trajectory of movement of an object from one point to another is solved, and for both points their coordinates and heading angles at these points are given, as well as three absolute values of the circulation radii corresponding to the given control signals on each of the three sections of the trajectory. The problem of finding the Dubins curves is reduced to determining the parameters of two intermediate points at which the control changes. All possible directions of control change options are considered, taking into account the existing constraints, also the lengths of the corresponding motion trajectories are calculated, and the optimal one is selected. The problem of constructing a trajectory is solved as well, which ensures a smooth conjugation of two linear fragments of trajectories and passes through the point of their intersection. The solution of the optimal trajectory problem using the Dubins car gives a single trajectory. In contrast to this, the proposed method considers several trajectories admissible by the constraints, from which the optimal one is selected by exhaustive search. The presence of several feasible strategies gives advantages for each specific situation of choosing a trajectory depending on the environment. Instead of directly solving the Pontryagin’s maximum principle and constructing a three-dimensional optimal trajectory, the authors used a simple analysis of possible control strategies in order to determine among them the optimal one in terms of elapsed time. The approach was motivated by the limited number of possible control strategies for Dubins paths, as well as the simplicity of analytical calculations for each of them, which allows performing these calculations in real time. The high speed of calculations for the problem of determining the optimal trajectory is due to the fact that the proposed method does not require complex calculations to solve the problem of nonlinear optimization, which follows from the Pontryagin’s principle.
- Published
- 2021
- Full Text
- View/download PDF
31. УПРАВЛЕНИЕ КАЧЕСТВОМ УСЛУГ В СЕТЯХ СЛЕДУЮЩЕГО ПОКОЛЕНИЯ С ИСПОЛЬЗОВАНИЕМ МЕТОДОВ НЕЧЕТКОЙ ЛОГИКИ
- Author
-
Князева, Н. А. and Кальченко, А. С.
- Abstract
Copyright of Refrigeration Engineering & Technology is the property of Odesa National University of Technology and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
- Full Text
- View/download PDF
32. USING OF THE COMPUTER ALGEBRA SYSTEMS IN THE ELEMENTARY NUMBER THEORY.
- Author
-
Bedratyuk, Leonid and Bedratyuk, Anna
- Abstract
Recently we have seen the active penetration of computer algebra systems to the educational process because it allows to form an innovative learning technologies. Almost every branch of mathematics the Maple developed the separate specialized package commands. However, currently these technologies, despite its effectiveness and visibility, for various reasons, are still not common in the classroom. The purpose of this article is to review basic information about the capabilities of computer algebra to solve some common problems of the elementary number theory, and which can be used to solve educational problems. The paper describes the package description commands NumberTheory of the computer algebra system Maple. The methods of solving some common problems in the number theory in Maple. Using discussed the team package Maple a teacher can illustrate the problem solving in the classroom for the subject of the elementary number theory [ABSTRACT FROM AUTHOR]
- Published
- 2013
33. EFFECT OF INDUSTRIAL EXPLOSIONS ON THE STABILITY IN ROCK MASS WITH CAVITIES.
- Author
-
Pasichnyk, Andriy
- Subjects
SEISMIC arrays ,ROCKS ,QUARRIES & quarrying ,MATHEMATICAL models ,SHEAR waves ,ALGORITHMS ,SEISMIC waves - Abstract
The paper substantiates the conditions of seismic stability in the rock mass with cavities, on which protected objects are located, under constant seismic effects of mass explosions in quarries. Based on the ray-tracing method, a mathematical model of the interaction between longitudinal and transverse waves with a spherical cavity has been developed. An algorithm has been elaborated for determining the total static and dynamic loads along the spherical cavity perimeter from seismic explosion waves falling on the interface. The regularities of joint action of static loads have been determined, when located above the objects cavity, with allowance for the effect of the mass of cavity ceiling, the mass of the protected object above it and dynamic loads in the rock mass, and under the plane wave front fall on the cavity from different directions. The dependences of the change of total stresses referred to the incident wave stress at the interface of the rock mass and the cavity depending on the coordinate on its surface have been set. It has been established that the most dangerous points of cavity surface, in which destruction is likely to occur, are the cases when the seismic wave front falls on the cavity from the bottom directions typical for blasting operations in deep quarries. Under the arbitrary angles of the wave incidence on the cavity the stresses rearrange along the perimeter, which under different circumstances might lead to the mass breach and the fall of the protected objects, located above it, under the ground. [ABSTRACT FROM AUTHOR]
- Published
- 2013
34. SINGULAR VECTORS SIGN-INSENSITIVE AS BASIS TO DEVELOPMENT COMPRESSIONSTABLE STEGANOGRAPHIC ALGORITHM.
- Author
-
Melnik, Margaret A.
- Subjects
COMPRESSION loads ,MATHEMATICAL singularities ,VECTORS (Calculus) ,CRYPTOGRAPHY ,ALGORITHMS - Abstract
The paper focuses on new steganographic algorithm development. Proposed algorithm is stable to compression, including high rate compression, and based on singular vectors insensitive of image matrix blocks which corresponding to maximal singular values. Algorithm is polynomial of degree 2. The results of numerical experiments confirm the efficiency of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2013
35. Religious and Ethical Issues of Artificial Intelligence: Expert Assessments and the Vatican Position
- Author
-
A. A. Abramov
- Subjects
artificial intelligence ,algorithms ,ethics ,robot technology ,vatican ,roman catholic church ,morals ,human dignity ,Philosophy. Psychology. Religion - Abstract
The paper is dedicated to the emergence of progressive artificial intelligence technologies and its relations to the human nature and soul, as viewed by experts and in such specific community as the church. We seem now to be entering a new phase of the comprehension of the moral aspects of the introduction of artificial intelligence (AI) into the life of different societies. The romantic period of high expectations and excessive anxiety is replaced by the growing understanding of the complexity of the man‒machine interaction, which implies the intersection moral, legal, political and utilitarian dimensions of both a person and an artifact. The problematic issues are now more obvious, clear and difficult, as the disciplinary boundaries are revealed and highlighted. Among the crucial issues one should mention deficiencies in definitions; weakness of research optics and the vision that would be friendly to other areas of study or practice. This also includes the issues of integral assessment of the existing dangers, difficulties in describing the mechanisms of fulfilling both ethical and technically viable requirements. As scientific knowledge accumulates, both the benefits of introducing AI technologies into everyday life and previously underestimated new threats become more obvious. These societal and humanitarian ones include, in particular, social turbulence, neuroticism, digital crimes and crimes associated freedom abuses and losses of identity. Over the past few years, state and non-governmental institutions have proposed different approaches to determining what is included in the moral core of the problem under consideration. The efforts of many, if not most, of them turn out to be compromised by suspicions in willful intents. In this context, the broad consensus with the key agent facilitators is required, and the role such actors play in providing social stability is indisputable. One of the key roles in offering society the broadest vision on the anthropocentric development and AI progress belongs to the Roman Catholic Church. The Vatican’s quest to unite philosophers, AI developers, and religious leaders to address the ethical challenges of designing and implementing robotics is becoming an important element of the Christian witness in a world that is consider ed irrevocably secularized by many.
- Published
- 2020
- Full Text
- View/download PDF
36. PROCESS CHARACTERISTICS ESTIMATION IN WEB APPLICATIONS USING K-MEANS CLUSTERING
- Author
-
Victor V. Evstratov and Mikhail S. Ananyevskiy
- Subjects
clustering ,k-means ,k-means algorithm ,clustering quality assessment ,entropy ,machine learning ,algorithms ,Optics. Light ,QC350-467 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Subject of Research. The paper presents the study of estimation problem of process characteristics for the particular case of user’s activity prediction in computer online games. Various machine learning methods are considered, and the advantages of clustering-based approaches are identified. The variety of metrics for the estimation of clustering quality is studied. Method. A clustering-based approach to estimation of process characteristics was developed on the base of a hypothesis proposed during the preliminary analysis of user’s activity data. Data on activity of users with the known predicted values was collected. Each user was represented as a pair of vectors: the first vector corresponded to his first days of activity, and the second one corresponded to the days with predicted performance. The vectors representing user’s activity in the first days were used as training data for the K-means algorithm. A developed entropy-like loss function was used to find a value of K suitable for the problem under consideration. The clusters were matched with vectors of predicted process characteristics averaged over all users in the cluster. These matches were used as the prediction of new users’ characteristics. Main Results. An approach to the determination of the suitable number of clusters is proposed, taking into account the specifics of the considered data. Numerical experiment is carried out, demonstrating the applicability of the developed method. Practical Relevance. The proposed approach application allows for the simultaneous prediction of multiple characteristics of online-game users, and, therefore, for solution of various planning and analytics problems during online-game development. For example, the method developed in the present work was used to analyze the development payback of new game elements, and to predict server load in order to increase available computational resources beforehand. The advantages of the developed method include no need for expert tagging of the training set and relatively low computational cost due to the low computational complexity of the proposed loss function used to estimate the hyperparameter K.
- Published
- 2020
- Full Text
- View/download PDF
37. Chiral Fermions Algorithms In Lattice QCD
- Author
-
Dafina Xhako and Rudina Zeqirllari
- Subjects
algorithms ,chiral ,critical-slowing ,fermions ,lattice ,QCD ,Physics ,QC1-999 - Abstract
The theory that explains the strong interactions of the elementary particles, as part of the standard model, it is the so-called Quantum Chromodynamics (QCD) theory. In regimes of low energy this theory it is formulated and solved in a lattice with four dimensions using numerical simulations. This method it is called the lattice QCD theory. Quark propagator it the most important element that is calculated because it contains the physical information of lattice QCD. Computing quark propagator of chiral fermions in lattice means that we should invert the chiral Dirac operator, which has high complexity. In the standard inversion algorithms of the Krylov subspace methods, that are used in these kinds of simulations, the time of inversion is scaled with the inverse of the quark mass. In lattice QCD simulations with chiral fermions, this phenomenon it is knowing as the critical slowing-down problem. The purpose of this work is to show that the preconditioned GMRESR algorithm, developed in our previous work, solves this problem. The preconditioned GMRESR algorithm it is developed in U(1) group symmetry using QCDLAB 1.0 package, as good “environment” for testing new algorithms. In this paper we study the escalation of the time of inversion with the quark mass for this algorithm. It turned out that it is a fast inversion algorithm for lattice QCD simulations with chiral fermions, that “soothes” the critical slowing-down of standard algorithms. The results are compared with SHUMR algorithm that is optimal algorithm used in these kinds of simulations. The calculations are made for 100 statistically independent configurations on 64 x 64 lattice gauge U(1) field for three coupling constant and for some quark masses. The results showed that for the preconditioned GMRESR algorithm the coefficient k, related to the critical slowing down phenomena, it is approximately - 0.3 compared to the inverse proportional standard law (k = -1) that it is scaled SHUMR algorithm, even for dense lattices. These results make more stable and confirm the efficiency of our algorithm as an algorithm that avoid the critical slowing down phenomenon in lattice QCD simulations. In our future studies we have to develop the preconditioned GMRESR algorithm in four dimensions, in SU (3) lattice gauge theory.
- Published
- 2019
- Full Text
- View/download PDF
38. The structure of urgent conditions of servicemen of the Armed Forces of Ukraine in modern conditions
- Author
-
M. I. Badiuk, O. O. Mykyta, I. P. Semeniv, M. M. Rygan, and V. V. Kosarchuk
- Subjects
emergencies ,wounds and injuries ,algorithms ,clinical protocols ,standard of care ,military personnel ,Ukraine ,Pathology ,RB1-214 - Abstract
Purpose: to study the structure of urgent conditions of servicemen with combat injuries and diseases in modern conditions in order to substantiate the development of promising algorithms and medical aid protocols adapted to NATO standards.Materials and methods. The paper presents the results of analysis of the structure and nature of urgent conditions of modern combat pathology and diseases among military personnel who were on treatment at the National Military Medical Clinical Center “Main Military Clinical Hospital” from 1999 to 2018 (191 731 disease histories).Results. The article analyzes the structure of emergency conditions for servicemen of the Armed Forces of Ukraine, who were admitted the National Military Medical Clinical Center “MMCH” in the period from 1999 to 2013 compared with the corresponding indicators for 2014–2017 years. The trends in the dynamics of the indicators of the structure of emergency conditions of servicemen with injuries (including combat ones) and diseases during the period of armed conflict compared to the previous period (1999–2013) were studied. The most urgent conditions of servicemen with combat trauma and serious illnesses are identified, which are the priority for the development and implementation of modern algorithms and protocols for the provision of medical assistance in combat conditions in the Armed Forces of Ukraine. A list of algorithms and protocols for the provision of medical assistance to servicemen of the Armed Forces of Ukraine under the main emergency conditions in today's conditions is proposed.Conclusions. The basic nosological forms of combat injuries and illnesses of military personnel are established in which emergencies are formed: the ХІХ class – injuries and head and brain injuries (27.3 %), abdominal injuries (18.2 %), chest injuries and ribs (12.9 %); X class – pneumonia (75.9 %); ІX class – strokes (40.1 %), myocardial infarction (30.1 %) and hypertensive disease (12.5 %). The main classes, whose nosological forms are accompanied by severe and extremely serious conditions, are the ХІХ class – traumas, poisonings and some other consequences of external causes (48.5 %), class X – respiratory diseases (12.1 %), class IX – Diseases of the circulatory system (7.4 %) and class V – disorders of the psyche and behavior (6.1 %). Identified urgent conditions of servicemen, arising from appropriate nosological forms and included in the described classes of diseases, are priority for the development of priority algorithms and protocols for the provision of medical assistance to servicemen in combat conditions according to NATO standards.
- Published
- 2018
- Full Text
- View/download PDF
39. Dynamic-signature-based user authentication using a fuzzy classifier
- Author
-
Ilya Hodashinsky, Evgeny Kostyuchenko, Konstantin Sarin, Aleksandr Anfilofev, Marina Bardamova, Sergey Samsonov, and Igor Filimonenko
- Subjects
pattern recognition ,information processing ,algorithms ,feature selection ,fuzzy classifier ,signature recognition ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
Dynamic signature verification is one of the most fast, intuitive, and cost effective tools for user authentication. Dynamic signature recognition uses multiple characteristics in the analysis of an individual’s handwriting. Dynamic characteristics include the velocity, acceleration, timing, pressure, and direction of the signature strokes, all analyzed in the x, y, and z directions. In this paper, the constant term and the first seven harmonics of the Fourier series expansion of the signature were used as features. The authentication systems development includes the following stages: preprocessing, feature selection, classification. Binary metaheuristic algorithms and deterministic algorithms are used to select attributes. The classification was carried out using a fuzzy classifier. The fuzzy classifiers parameters were tuned using continuous metaheuristic algorithms. The efficiency of the authentication system was verified on the author's database. The database contains 280 original variants of the signature of one author and 1281 variants of counterfeit signatures of seven authors. To assess the statistical significance of differences in the accuracy and error rates of the fuzzy classifiers formed by metaheuristic algorithms, the Mann-Whitney (-Wilcoxon) U-test to compare medians and the Kruskal-Wallis test were used.
- Published
- 2018
- Full Text
- View/download PDF
40. Images analysis for automatic volcano visibility estimation
- Author
-
Alexandr Kamaev, Igor Urmanov, Aleksei Sorokin, Dmitry Karmanov, and Sergey Korolev
- Subjects
image analysis ,algorithms ,edge detection ,parametric edges ,volcano ,edge matching ,video surveillance ,visibility analysis ,Information theory ,Q350-390 ,Optics. Light ,QC350-467 - Abstract
In this paper, a method for estimating the volcano visibility in the images is presented. This method includes algorithms for analyzing parametric edges of objects under observation and frequency characteristics of the images. Procedures for constructing parametric edges of a volcano and their comparison are considered. An algorithm is proposed for identifying the most persistent edges for a group of several reference images. The visibility of a volcano is estimated by comparing these edges to those of the image under analysis. The visibility estimation is maximized with respect to a planar shift and rotation of the camera to eliminate their influence on the estimation. If the image quality is low, making it hardly suitable for further visibility analysis, the estimation is corrected using an algorithm for analyzing the image frequency response represented as a vector of the octave frequency contribution to the image luminance. A comparison of the reference frequency characteristics and the characteristics of the analyzed image allows us to estimate the contribution of different frequencies to the formation of volcano images. We discuss results of the verification of the proposed algorithms performed using the archive of a video observation system of Kamchatka volcanoes. The estimates obtained corroborate the effectiveness of the proposed methods, enabling the non-informative imagery to be automatically filtered off while monitoring the volcanic activity.
- Published
- 2018
- Full Text
- View/download PDF
41. MULTIFREQUENCY ALGORITHMS FOR DETERMINING THE MOISTURE CONTENT OF LIQUID EMULSIONS BY THE METHOD OF RESONANCE DIELCOMETRY.
- Author
-
Korobko, A. A.
- Subjects
ALGORITHMS ,LIQUID dielectrics ,MATHEMATICAL models - Abstract
Copyright of Electrical Engineering & Electromechanics is the property of National Technical University, Kharkiv Polytechnic Institute and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2017
- Full Text
- View/download PDF
42. Mathematical foundations of metaphysics
- Author
-
Sergey M Krylov
- Subjects
algorithms ,general formal technology ,general system theory ,object properties ,object functionalities ,axiomatic of metaphysics ,Mathematics ,QA1-939 - Abstract
The paper deals with basic prerequisites for axiomatic of rigorous scientific metaphysics, which continues Aristotles ideas concerning science explaining furniture of the world. Such rigorous metaphysics could explain many global or local properties of various physical systems like proved mathematical theorems explain global and local properties of mathematical objects.
- Published
- 2012
43. DUAL THREE-PHASE MULTIINVERTER SYSTEM CONTROLLED BY SPECIALIZED ALGORITHMS OF SYNCHRONIZED PWM: MATLAB-BASED STEADY-STATE ANALYSIS.
- Author
-
Oleschuk, V., Prudeak, R., and Sizov, A.
- Subjects
INDUCTION motors ,SYNCHRONIZATION ,ELECTRIC inverters ,ALGORITHMS - Abstract
Algorithms of synchronized pulsewidth modulation (PWM), based on special space-vector-based control scheme (with the use of minimal number of voltage space vectors), have been applied for synchronous control of four neutral-point-clamped (NPC) inverters feeding six-phase (dual three-phase) drive on the base of asymmetrical open-end windings induction motor. It allows providing continuous synchronization and symmetry of the phase voltage of system during the whole control range for any ratio of voltage magnitudes of DC-sources, and for any configuration of DC-sources. Therefore, in this case four inverters of the system can be supplied by reduced number of insulated DC-sources (by one, or by two, or by three DC-sources instead of four DC-sources for standard system topology based on four two-level inverters). MATLAB- based simulations show behaviour of the system at steady-state control modes. References 11, table 1, figures 6. [ABSTRACT FROM AUTHOR]
- Published
- 2014
44. INFORMATION TECHNOLOGY FOR RECOGNITION OF THE NUMBER ON THE HOT METAL TRANSFER LADLE.
- Author
-
Sergienko, A. V. and Kargin, A. A.
- Subjects
INFORMATION technology ,IMAGE processing ,PROTOTYPES ,ALGORITHMS ,HAMMING distance - Abstract
The article describes the information technology for recognition of the number on the hot metal transfer ladle. Processing stages have been identified and described: preliminary processing, localization and number identification. The filtration and incomplete thresholding by means of global binarization with an automatic choice of a threshold have been analyzed. Localization is executed by a single linkage (the nearest neighbour) method with the modified windowing search algorithm. After localization area has been identified, a segment is generated. Identification is accomplished by means of a unique method, which is based on an indistinct representation of images and their comparison with indistinct standards. Combining in a characteristic point the segment which is being analyzed with a prototype segment kernels are formed. Those are then fractured into blocks. Based on these blocks two fuzzy sets are obtained -- one for the segment that is being analyzed and one for the prototype. For these sets the relative Hamming distance is then calculated. The calculated value shows the degree of similarity of the segments. During the tests it was proved that the Hamming distance for the segments with identical numbers is 0,01÷0,16, whereas for the segments with numbers of different ladles it is 0,26÷0,49, which is enough for a successful identification of a ladle by the image of its number. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
45. COMPENSATION FOR DELAYS AND LOSSES OF PACKAGES IN DYNAMIC ONLINE GAMES.
- Author
-
Alexeev, A. and Sinitsyna, R.
- Abstract
A couple of decades ago, data rates on the network were measured in kilobytes per second, and even then, online game developers had some problems with the packet loss and transmission delays. Now the transfer rate is hundreds of times higher, and the problem of delay compensation is even more relevant. For many dynamic online games, a transmission delay of as little as 20 ms can be quite noticeable, negatively affecting the gameplay and emotions of the game, which can repel players. The problem is exacerbated by the fact that along with the need to compensate for the time of delivery of packets, on the client side there are other non-network factors that are beyond the control of developers, which make the total delay 5-10 ms longer. Because of this, the desire to get rid of network delays as much and as well as possible becomes a necessity, and developers are forced to look for optimal ways to solve this problem. The problem statement is as follows: to review the causes of delays in online games and possible solutions, as well as the advantages and disadvantages of certain approaches. The problem is considered at the 4 levels of the TCP / IP network model, as well as at the application level. The approaches are given for the most commonly used protocols for each layer, but basic ideas can be easily transferred to other implementations. The main causes of delays under consideration: propagation delay, router queue delay, transmission delay, and processing delays. This article shows the impact of network delays on the online games and the ways to compensate for them, along with the theory of data transmission protocols in the network and the ways to solve the problems that arise in the development of algorithms. Recommendations for solving the compensation problem can be taken into account when designing and launching online shooters, strategies, etc. Thanks to the given receptions it is possible to minimize the general delay on the transfer of packets in a network, thanks to which the game on the client looks as if the player plays in the Single Player mode. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.