Сучасні інформаційні системи
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/62915
Офіційний сайт http://ais.khpi.edu.ua/
У журналі публікуються результати досліджень з експлуатації та розробки сучасних інформаційних систем у різних проблемних галузях.
Рік заснування: 2017. Періодичність: 4 рази на рік. ISSN 2522-9052 (Print)
Новини
Включений до "Переліку наукових фахових видань України, в яких можуть публікуватися результати дисертаційних робіт на здобуття наукових ступенів доктора і кандидата наук" (технічні науки) наказом Міністерства освіти і науки України від 04.04.2018 № 326 (додаток 9, п. 56).
Переглянути
Документ A method of protecting information in cyber-physical space(Національний технічний університет "Харківський політехнічний інститут", 2023) Dzheniuk, Nataliia; Yevseiev, Serhii; Lazurenko, Bogdan; Serkov, Oleksandr; Kasilov, OlegThe subject of the study is the processes of ensuring the reliability and security of information in cyber-physical space. The objective is to develop recommendations for the implementation of a method of information security in cyber-physical space. The development is based on the technology of ultra-wideband signals circulating in wireless communication channels. The task is to ensure the stable and reliable operation of the airborne wireless mobile communication network, which is the main component of cyberspace and its most vulnerable link to destructive influences. Methods used: methods of analytical modelling and time-position pulse coding. The following results were obtained. It is shown that in order to ensure high quality of wireless network operation, it is necessary to expand its bandwidth, which is limited by the physical resource of the radio frequency spectrum. It is proposed to overcome this contradiction by applying the technology of ultra-wideband signals, the base of which is much larger than one. In this case, the information signal is emitted without a carrier frequency simultaneously in the entire frequency band, provided that the signal level is lower than the noise level. The method of positional-time coding is used, in which each information bit is encoded by hundreds of ultra-short chip pulses arriving in a certain sequence. In such wireless communication systems, the use of autocorrelation reception of modulated ultra-wideband signals is proposed. A comparative analysis has shown that the wireless network with the best reliability and noise immunity is the one where the time separation of the reference and information signals is applied. During the first half of the bit interval, the switch closes the transmitter output directly to the ultra-wideband signal generator, forming a reference signal. In the middle of the bit interval, the switcher switches the output to one of two possible positions depending on the signal "zero" or "one", forming the information part of the signal. Conclusions. Systems with autocorrelation reception and separate transmission of reference and information signals provide a high level of structural signal concealment, as well as reliable transmission of digital information, especially in conditions of interference.Документ A novel autism spectrum disorder detection using multi-label graph convolutional network with label attentive neighborhood convolution(Національний технічний університет "Харківський політехнічний інститут", 2024) Vankara, Jayavani; Krishna, Muddada Murali; Nandhini, Sekharamahanti S.; Sagiraju, Hima KeerthiDue to the lack of precise medical testing for autism, such as blood tests to detect the illness, diagnosing autism spectrum disorder (ASD) has proven to be challenging. The prevalence of restrictive and/or repetitive behaviors and difficulties and impairments in social communication are hallmarks of autism spectrum disorders. This behavioral condition has been identified. Doctors assess the child's developmental history and behavior to make a diagnosis. Через відсутність точних медичних тестів на аутизм, таких як аналізи крові для виявлення захворювання, діагностика розладу спектру аутизму (РАС) виявилася складною. Поширеність обмежувальної та/або повторюваної поведінки, а також труднощі та порушення соціального спілкування є характерними ознаками розладів аутистичного спектру. Цей поведінковий стан було виявлено. Лікарі оцінюють історію розвитку та поведінку дитини, щоб поставити діагноз.Документ A system for monitoring the progress of rehabilitation of patients with musculoskeletal disorder(Національний технічний університет "Харківський політехнічний інститут", 2024) Barkovska, Olesia; Oliinyk, Dmytro; Sorokin, Anton; Zabroda, Ivan; Sedlaček, PeterThe work is devoted to the development of a system for monitoring the rehabilitation process of patients with musculoskeletal disorders, as well as identifying possible postural distortions in both children and adults based on anthropometric data, which confirms the relevance and practical significance of the work during the period of military operations in Ukraine and a large number of people with musculoskeletal injuries. The paper proposes a model of a system consisting of two subsystems: a subsystem for collecting pododynamic parameters based on a dynamic baropodometric platform and a visual posture monitoring subsystem. The combination of different gait and posture analysis methods in a single system provides high diagnostic and prognostic value. The main purpose of the proposed system is to monitor the progress of patient rehabilitation using hardware and computer-optical diagnostic methods without radiation exposure with the ability to easily transport the created system, the possibility of high-precision diagnostics in real time, as well as the ability to store and analyze changes in the musculoskeletal system over time. For the collection and analysis of pododynamometric parameters, computer data visualization methods, methods of statistical and dynamic data analysis, and data segmentation methods were used. To collect and analyze anthropometric parameters, methods of detecting objects in the image, methods of computer classification, segmentation and image processing, methods of analyzing graphic information were used. In addition, the paper researches the influence of marker characteristics (shape, color model of representation) and lighting conditions during the acquisition of kinematic parameters on the accuracy of marker detection for further determination of the angles of the pelvis and shoulder line.Документ Acceleration of boolean gene regulatory networks analysis using FPGA(Національний технічний університет "Харківський політехнічний інститут", 2023) Vasylchenkov, Oleg; Salnikov, Dmytro; Karaman, DmytroGene expression does not occur arbitrarily and spontaneously, it obeys certain patterns that can be expressed as a connected graph or network. The disclosure of these patterns requires a large amount of experimental research and accumulation of necessary statistical information. Then this information is subjected to mathematical processing, which involves significant computing resources and takes a lot of time. Boolean networks are often used as the basis for building mathematical models in those calculations. Recently, models based on Boolean networks have increasingly grown in size and complexity causing increased demands on traditional software solutions and computing tools. Field-programmable gate arrays (FPGAs) are a powerful and reconfigurable platform for implementing efficient and high-performance computing. The use of FPGA will significantly speed up the process of calculating sequential chains of gene states, both through the use of hardware acceleration in the calculation of logical dependencies, and through the implementation of an array of parallel computing cores, each of which can perform its own individual task. Another solution that can significantly simplify the work of researchers of gene regulation networks is the creation of a universal computing architecture that will allow dynamic reconfiguration of its internal structure when the task or logical dependencies for the current Boolean network change. Such a solution will relieve the researcher of the need to perform the entire set of actions for the technological preparation of a new FPGA configuration, from making changes to the HDL code that describes the network to uploading the updated configuration to the hardware accelerator. The article discusses how to use FPGA for the implementation and modeling of arbitrary Boolean networks, describes the concept of a universal reconfigurable architecture of a logical dependency calculating core for an arbitrary Boolean network and proposes a practical implementation of such a calculating core for modeling gene regulation networks.Документ Acousto-optical receiver of an obstruction passive radar system(Національний технічний університет "Харківський політехнічний інститут", 2023) Rustamov, Asad; Kerimov, Yashar; Mammedov, Ahmed; Binnatov, Mehman; Katekhliyev, VusalThe subject of research in the article is the passive radar system of a warship. The purpose of the work was to review the characteristics use of the acousto-optical receiver in the new passive radar system of the warship, to investigate the peculiarities of acoustooptic effect and the relevant synthesis of methods and tools for measuring the photodetector photoelectric characteristics and, in addition, to investigate the energy-and-geometric parameters of laser radiation Justification. It is shown that the transition, impulse and frequency characteristics are taken as the main means to determine the operating and technical parameters of the acousto-optical delay line. It is not possible to unambiguously extrapolate these characteristics to the known models of the characteristics of the acousto-optic radar receiver created on AODL. Research results. In the context of this postulate, mathematical models of the main characteristics of AODL were developed. On the basis of the synchronous compensation pulse obstacles applied to the passive radar acousto-optic receiver on military ships, the full compensation of the obstacles is determined for the effective reception of signals from the acousto-optic receiver. In radar stations (radar), the main attention is focused on the statistical properties of the useful signal and passive obstacles, the speed (frequency) of the signal passing through the passive obstacle and the space-time differences. The recommendations. These features are recommended to be used only in special cases where the target is outside the reflectors for informational duration, amplitude and differences between passive obstacles, obstacle silencing and signal separation. Conclusion. Applying the full attenuation of the band filter and synphase barrier organizers, whose frequency characteristics do not depend on the tuning frequency, it is possible to provide full compensation of obstacles during the effective reception of signals by the acousto-optic receiver in the passive radar system of warships based on the proposed method for high resistance to obstacles, pulse obstacle compensation.Документ Adaptive resource allocation method for data processing and security in cloud environment(Національний технічний університет "Харківський політехнічний інститут", 2023) Petrovska, Inna; Kuchuk, HeorhiiSubject of research: methods of resource allocation of the cloud environment. The purpose of the research: to develop a method of resource allocation that will improve the security of the cloud environment. At the same time, effective data processing should be achieved. Method characteristics. The article discusses the method of adaptive resource allocation in cloud environments, focusing on its significance for data processing and enhanced security. A notable feature of the method is the consideration of external influences when calculating the characteristics of cloud resource requests and predicting resource requests based on a time series test. The main idea of this approach lies in the ability to intelligently distribute resources while considering real needs, which has the potential to optimize both productivity and confidentiality protection simultaneously. Integrating adaptive resource allocation methods not only improves data processing efficiency in cloud environments but also strengthens mechanisms against potential cyber threats. Research results. To ensure timely resource allocation, the NSGA-II algorithm has been enhanced. This allowed reducing the resolution time of multi-objective optimization tasks by 5%. Additionally, research results demonstrate that effective utilization of various types of resources on a physical machine reduces resource losses by 1.2 times compared to SPEA2 and NSGA-II methods.Документ Advanced information technologies (C4ISR) in the peacekeeping field service(Національний технічний університет "Харківський політехнічний інститут", 2024) Hordiichuk, Valerii; Snitsarenko, Petro; Andriianova, Nina; Molodetskyi, Bohdan; Kapran, YevheniiUsing and developing advanced information technologies are significant in the peacekeeping field service, as it could positively affect on mission implementation, decision-making, and even save lives. The purpose of the research is to analyze progressive field mission information technologies used in peace and security operations. Methods: the study is based on the use of empirical scientific methods of observation and study, based on the experience of personal participation in a UN peacekeeping mission, as well as general scientific methods, methods of OSINT analysis, etc. The tasks of the study are to analyze and summarize the main advanced technological solutions implemented in the activities of UN field peacekeeping missions in the area of C4ISR (the concept of command, control, communications, computers, intelligence, surveillance and reconnaissance). Стаття присвячена вивченню досвіду застосуванняпередових інформаційних технологій в польових миротворчих місіях ООН (тактичний рівень військового управління), зокрема на предмет можливості використання в бойових операціях в інтересах національної безпеки та оборони. Метою дослідження є аналіз передових інформаційних технологій, які використовуються в польових місіях операцій з підтримання миру і безпеки. Методи. Дослідження базується на використанні загальнонаукових методів досліджень: як емпіричних (спостереження, опис) за досвідом особистої участі авторів в миротворчих місіях ООН, так і загальнотеоретичних(аналіз, синтез, узагальнення, класифікація тощо). Завдання дослідження полягає в аналізі та узагальненні основних передових технологічних рішень, реалізованих у діяльності польових миротворчих місій ООН у сфері C4ISR (концепціякомандування, управління, зв’язку, комп’ютеризації, розвідки та ситуаційної обізнаності).Документ Advantages and drawbacks of two-step approach to providing desired parameters in lossy image compression(Національний технічний університет "Харківський політехнічний інститут", 2024) Li, Fangfang; Abramov, Sergey; Dohtiev, Ihor; Lukin, VladimirThe object of the study is the process of lossy image compression. The subject of the study is the two-step approach to providing desired parameters (quality and compression ratio) for different coders. The goals of the study are to review advantages of the two-step approach to lossy compression, to analyze the reasons of drawbacks, and to put forward possible ways to get around these shortcomings. Methods used: linear approximation, numerical simulation, statistical analysis. Results obtained: 1) the considered approach main advantage is that, in most applications, it provides substantial improvement of accuracy of providing a desired value of a controlled compression parameter after the second step compared to the first step; 2) the approach is quite universal and can be applied for different coders and different parameters of lossy compression to be provided; 3) the main problems and limitations happen due to the use of linear approximation and essential difference in behavior of rate/distortion curves for images of different complexity; 4) there are ways to avoid the approach drawbacks that employ adaptation to image complexity and/or use certain restrictions at the second step. Conclusions: based on the results of the study, it is worth 1) considering more complex approximations of rate-distortion curves; 2) paying more attention to adequate and fast algorithms of characterizing image complexity before compression; 3) using quality metrics that have quasi-linear rate/distortion curves for a given coder.Документ Algorithms for finding non-intersecting roads on images(Національний технічний університет "Харківський політехнічний інститут", 2023) Goyushova, Ulviyya MalikResearch relevance The use of GPS for UAVs to determine their current coordinates (navigation) leads to a number of problems. The development and improvement of the autonomous navigation method without the use of GPS is an actual issue, and this issue is considered in the article. The subject of study in the article is the issue of UAVs navigation based on video images. The purpose of work to develop an algorithm for autonomous navigation of UAVs that requires less resources. The following tasks are solved in the article: software modules are developed based on image processing algorithms; suitable model for invariant identification of curves was studied and applied. The following results were obtained: an algorithm was developed for the invariant identification of winding roads (curves) without intersections from different angles; developed software modules have been tested in the Republic of Azerbaijan on the basis of a map of the region called "Agsu Pass". Conclusions: the application of the method proposed in the article will enable rotation-invariant autonomous navigation of UAVs using less resources.Документ Analysis of marсovian systems with a given set of selected states(Національний технічний університет "Харківський політехнічний інститут", 2022) Raskin, Lev; Sukhomlyn, Larysa; Korsun, RomanAnalysis of stationary Marcovian systems is traditionally performed using systems of linear Kolmogorov differential equations. Such systems make it possible to determine the probability of the analyzed system being in each of its possible states at an arbitrary time. This standard task becomes more complicated if the set of possible states of systems is heterogeneous and some special subset can be distinguished from it, in accordance with the specifics of the system functioning. Subject of the study is technology development for such systems analysis. In accordance with this, the purpose of the work is to find the distribution law of the random duration of such a system's stay on a set of possible states until it falls into a selected subset of these states. Method for solving the problem is proposed based on splitting the entire set of possible states of the system into two subsets. The first of them contains a selected subset of states, and the second contains all the other states of the system. Now a subset of states is allocated from the second subset, from which a direct transition to the states of the first subset is possible. Next, a system of differential equations describing the transitions between the formed subsets is formed. The solution of this system of equations gives the desired result – distribution of the random duration of the system's stay until the moment of the first hit in the selected subset of states. The method allows solving a large number of practical problems, for example, in the theory of complex systems reliability with many different failure states. In particular, finding the law of the uptime duration distribution, calculating the average duration of uptime.Документ Analysis of text augmentation algorithms in artificial language machine translation systems(Національний технічний університет "Харківський політехнічний інститут", 2023) Havrashenko, Anton; Barkovska, OlesiaThe work is devoted to the development of an organizational model of the machine translation system of artificial languages. The main goal is the analysis of text augmentation algorithms, which are significant elements of the developed machine translation system at the stage of improvement of new dictionaries created on the basis of already existing dictionaries. In the course of the work was developed a model of the machine translation system, created dictionaries based on texts and based on already existing dictionaries using augmentation methods such as back translation and crossover; improved dictionary based on algorithms of n-grams, Knuth-Morris-Pratt and word search in the text (such as binary search, tree search, sqrt decomposition). In addition, the work implements the possibility of using the prepared dictionary for translation. Obtained results can improve existing systems of machine translation of the text of artificial languages. Practical significance of this work is the analysis and improvement of text augmentation algorithms by changing the prefix tree type. Compared to the conventional algorithm, the improved algorithm reduced the memory usage by almost 13 times, which allows it to be used on much larger test data. This was achieved by changing the internal system of the node of the prefix tree from constant references to an expandable list.Документ Analysis of the sound event detection methods and systems(Національний технічний університет "Харківський політехнічний інститут", 2022) Kovalenko, Andriy; Poroshenko, AntonDetection and recognition of loud sounds and characteristic noises can significantly increase the level of safety and ensure timely response to various emergency situations. Audio event detection is the first step in recognizing audio signals in a continuous audio input stream. This article presents a number of problems that are associated with the development of sound event detection systems, such as the deviation for each environment and each sound category, overlapping audio events, unreliable training data, etc. Both methods for detecting monophonic impulsive audio event and polyphonic sound event detection methods which are used in the state-of-the-art sound event detection systems are presented. Such systems are presented in Detection and Classification of Acoustic Scenes and Events (DCASE) challenges and workshops, which take place every year. Beside a majority of works focusing on the improving overall performance in terms of accuracy many other aspects have also been studied. Several systems presented at DCASE 2021 task 4 were considered, and based on their analysis, there was a conclusion about possible future for sound event detection systems. Also the actual directions in the development of modern audio analytics systems are presented, including the study and use of various architectures of neural networks, the use of several data augmentation techniques, such as universal sound separation, etc.Документ Application of association rules for formation of public (administrative) services portfolio(Національний технічний університет "Харківський політехнічний інститут", 2022) Гавриленко, Олена Валеріївна; Хоменко, Олександр Миколайович; Жураковська, Оксана Сергіївна; Коган, Алла Вікторівна; Піскун, Андрій Михайлович; Халус, Олена АндріївнаThe formation of complex services is carried out exclusively according to the principle of association based on a life (business) event or situation. But as practical experience shows, users often request several services at the same time, and these services are not connected by one life event. This can be seen if you analyze the statistical data on service delivery by service delivery centers. The application of intelligent data analysis allows to reveal the hidden relationship between services. Based on this, a new principle of combining services was formulated. The object of research is the process of forming a portfolio of services based on association rules. An algorithm for forming a portfolio and providing recommendations for a decision-maker has been developed. Recommendations are presented in the form of sets of services that can be included in a portfolio. The application of this principle will allow to expand the set of complex services due to new portfolios. This will simplify and improve the service delivery process for both authorities and users.Документ Application of heterogeneous ensembles in problems of computer system state identification(Національний технічний університет "Харківський політехнічний інститут", 2023) Hornostal, Oleksii; Gavrylenko, SvitlanaThe object of the study is the process of identifying anomalies in the operation of a computer system (CS). The subject of the study is ensemble methods for identifying the state of the CS. The goal of the study is to improve the performance of ensemble classifiers based on heterogeneous models. Methods used: machine learning methods, homogeneous and heterogeneous ensemble classifiers, Pasting and Bootstrapping technologies. Results obtained: a comparative analysis of the use of homogeneous and heterogeneous bagging ensembles in data classification problems was carried out. The effectiveness of various approaches to the selection of base ensemble classifiers has been studied. A method for identifying the state of a computer system, based on the heterogeneous bagging ensemble was proposed. Experimental studies made it possible to confirm the main theoretical assumptions, as well as evaluate the efficiency of the constructed heterogeneous ensembles. Conclusions. Based on the results of the study, the method for constructing a heterogeneous bagging ensemble classifier, which differs from known methods in the procedure for selecting base models was proposed. It made possible to increase the classification accuracy. Further development of this research could include the creating and integration of dissimilarity metrics as well as other quantitative metrics for a more accurate and balanced base model selection procedure, which would further improve the performance of the computer system state classifier.Документ Applying edge computing in the execution IoT operative transactions(Національний технічний університет "Харківський політехнічний інститут", 2024) Kuchuk, Nina; Kashkevich, Svitlana; Radchenko, Viacheslav; Andrusenko, Yuliia; Kuchuk, HeorhiiTopicality. IoT information processing is usually performed in a cloud environment. However, this creates problems associated with delays in data transfer to the cloud. It is especially important to reduce these delays when processing operational IoT transactions. This can be achieved by transferring part of the calculations to IoT peripheral devices. However, it is necessary to take into account the specific features of embedded IoT systems. The subject of study in the article is methods for transferring the load to IoT peripheral devices. The purpose of the article is to reduce the execution time of operational IoT transactions by increasing the efficiency of the system infrastructure by transferring part of the computing load to IoT peripheral devices. Актуальність. Обробка інформації ІоТ зазвичай виконується у хмарному середовищі. Але при цьому виникають проблеми, пов’язані з затримками при передачі даних до хмари. Особливо важливо зменшити ці затримки при обробці оперативних транзакцій ІоТ. Це можливо здійснити за рахунок перенесення частини обчислень на периферійні пристрої ІоТ. Але при цьому треба враховувати специфічні особливості вбудованих систем ІоТ. Предметом вивченняв статті є методи перенесення навантаження на периферійні пристрої ІоТ. Метою статтіє зменшення часу виконання оперативних транзакцій ІоТ за рахунок підвищення ефективності інфраструктури системи шляхом перенесення частини обчислювального навантаження на периферійні пристрої ІоТ.Документ Assessing and forecasting the state of deteriorating systems with the use of modified regression polynomials on the basis of functional approximation of their coefficients(Національний технічний університет "Харківський політехнічний інститут", 2023) Raskin, Lev; Sukhomlyn, Larysa; Sokolov, Dmytro; Vlasenko, VitaliiObject of research is technical state of deteriorating systems whose operating conditions depend on a large number of interacting factors. The caused inhomogeneity of the sample of initial data on the technical state leads to impossibility of correct use of traditional methods of assessing the state of a system (meaning methods using mathematical tools of regression analysis). Subject of research is developing a method for constructing a regression polynomial based on the results of processing a set of controlled system parameters. Non-linearity of the polynomial describing the evolution of the technical state of real systems leads to an increase in the number of regression polynomial coefficients subject to estimation. The problem is further complicated by the growing number of factors affecting the technical state of the system. In these circumstances, the so-called occurs. Goal the research consists in developing a method for constructing an approximation polynomial that describes evolution of the system state in a situation where the volume of the initial data sample is insufficient for correct estimating coefficients of this polynomial. The results obtained. The paper proposes a method for solving the given problem, based on implementation of a two-stage procedure. At the first stage a functional description of the approximation polynomial coefficients is performed; and this radically reduces the number of regression polynomial parameters to be estimated. This polynomial is used for preliminary estimation of its coefficients with the aim of filtering out insignificant factors and their interactions. At the second stage, parameters of the truncated polynomial are estimated by means of using standard technologies of mathematical statistics. Two approaches to constructing a modified polynomial have been studied: the additive one and the multiplicative one. It has been shown that the additive approach is, on average, an order of magnitude more effective than the multiplicative one.Документ Audio event analysis method in network-based audio analytics systems(Національний технічний університет "Харківський політехнічний інститут", 2024) Poroshenko, Anton; Kovalenko, AndriyRelevance. In the rapidly evolving field of network-based audio analytics systems, the detection and analysis of audio events play a crucial role across various applications, including security, healthcare, and entertainment. Subject. This paper examines a method for recognizing audio events in network-based audio analytics systems, including preprocessing, sound separation, and the creation of machine learning models for analyzing audio signals. Objective. The objective is to develop and improve integrated methods for analyzing audio signals in network-based audio analytics systems to enhance the accuracy, speed, and reliability of data analysis. Methods. The proposed approach uses a modified ResNet architecture for multi-event classification and a convolutional neural network for separating sound sources in multi-channel recordings. У стрімко розвиваючійся сфері мережевих систем аудіоаналітики виявлення та аналіз аудіоподій відіграють вирішальну роль у різних галузях, включаючи безпеку, охорону здоров'я та розваги. Предмет. У цій статті розглядається метод розпізнавання аудіоподій у мережевих системах аудіоаналітики, включаючи попередню обробку, поділ звуків і створення моделей машинного навчання для аналізу аудіосигналів. Мета. Метою є розробка та вдосконалення інтегрованих методів аналізу аудіосигналів у мережевих системах аудіоаналітики для підвищення точності, швидкості та надійності аналізу даних. Методи. Запропонований підхід використовує модифіковану архітектуру ResNet для класифікації кількох аудіоподій і згорткову нейронну мережу для розділення звукових джерел у багатоканальних записах.Документ Biometric authentication utilizing convolutional neural networks(Національний технічний університет "Харківський політехнічний інститут", 2023) Datsenko, Serhii; Kuchuk, HeorhiiCryptographic algorithms and protocols are important tools in modern cybersecurity. They are used in various applications, from simple software for encrypting computer information to complex information and telecommunications systems that implement various electronic trust services. Developing complete biometric cryptographic systems will allow using personal biometric data as a unique secret parameter instead of needing to remember cryptographic keys or using additional authentication devices. The object of research the process of generating cryptographic keys from biometric images of a person's face with the implementation of fuzzy extractors. The subject of the research is the means and methods of building a neural network using modern technologies. The purpose of this paper to study new methods for generating cryptographic keys from biometric images using convolutional neural networks and histogram of oriented gradients. Research results. The proposed technology allows for the implementation of a new cryptographic mechanism - a technology for generating reliable cryptographic passwords from biometric images for further use as attributes for access to secure systems, as well as a source of keys for existing cryptographic algorithms.Документ Comparative analysis of spectral anomalies detection methods on images from on-board remote sensing systems(Національний технічний університет "Харківський політехнічний інститут", 2024) Hurin, Artem; Khudov, Hennadii; Kostyria, Oleksandr; Maslenko, Oleh; Siadrystyi, SerhiiThe subject matter of the article is methods of detecting spectral anomalies on images from remote sensing systems. The goal is to conduct a comparative analysis of methods for detecting spectral anomalies on images from remote sensing systems. The tasks are: analysis of the main methods of detecting spectral anomalies on images from remote sensing systems; processing of images from remote sensing systems using basic methods of detecting spectral anomalies; comparative assessment of the quality of methods for detecting spectral anomalies on images from remote monitoring systems. The methods used are: methods of digital image processing, mathematical apparatus of matrix theory, methods of mathematical modeling, methods of optimization theory, analytical and empirical methods of image comparison. The following results are obtained. The main methods of detecting spectral anomalies on images from remote sensing systems were analyzed. Processing of images from remote sensing systems using the basic methods of detecting spectral anomalies was carried out. A comparative assessment of the quality of methods for detecting spectral anomalies on images from remote monitoring systems was carried out. Conclusions. The spectral difference of the considered methods is revealed by the value of information indicators -Euclidean distance, Mahalanobis distance, brightness contrast, and Kullback-Leibler information divergence. Mathematical modeling of the considered methods of detecting spectral anomalies of images with a relatively “simple” and complicated background was carried out.It was established thatwhen searching for a spectral anomaly on an image with a complicated background, the method based on the Kullback-Leibler divergence can be more effective than the other considered methods, but is not optimal. When determining several areas of the image with high divergence indicators, they should be additionally investigated using the specified methods in order to more accurately determine the position of the spectral anomaly. Предметом вивчення в статті є методи виявлення спектральних аномалій на зображеннях з систем дистанційного зондування. Метоює проведення порівняльного аналізу методів виявлення спектральних аномалій на зображеннях з систем дистанційного зондування. Завдання:аналіз основних методів виявлення спектральних аномалій на зображеннях з систем дистанційного зондування; обробка зображень з систем дистанційного зондування основними методами виявлення спектральних аномалій; порівняльна оцінка якості методів виявлення спектральних аномалій на зображеннях з систем дистанційного моніторингу. Використовуваними методамиє: методи цифрової обробки зображень, математичний апарат теорії матриць, методи математичного моделювання, методи теорії оптимізації, аналітичні та емпіричні методи порівняння зображень. Отримані такі результати. Проведено аналіз основних методів виявлення спектральних аномалій на зображеннях з систем дистанційного зондування. Проведена обробка зображеньз систем дистанційного зондування основними методами виявлення спектральних аномалій. Проведена порівняльна оцінка якості методів виявлення спектральних аномалій на зображеннях з систем дистанційного моніторингу. Висновки. Спектральна відмінність розглянутих методів виявляється за значенням інформаційних показників –відстані Евкліда, відстані Махаланобіса, контрасту яскравості та інформаційної дивергенції Кульбака-Лейблера. Проведено математичне моделювання розглянутих методів виявлення спектральних аномалій зображень з відносно “простим” та ускладненим фоном. Встановлено, що при проведенні пошуку спектральної аномалії на зображенні з ускладненим фоном метод на основі дивергенції Кульбака-Лейблера може бути більш ефективним за інші розглянуті методи, але не є оптимальним. При визначенні декількох ділянок зображення з високими показниками дивергенції слід додатково їх дослідити із застосуванням визначених методів з метою більш точного визначення положення спектральної аномалії.Документ Comparative analysis of the efficiency of various energy storages(Національний технічний університет "Харківський політехнічний інститут", 2023) Hasanov, Arif; Hashimov, Elshan; Zulfugarov, BakirResearch relevance This article presents a mathematical solution to the issue of a comparative analysis of various types of energy storage devices and determining the most efficient type of energy storage device for use on an industrial scale. The subject of the study in the article is the most important parameters of seven types of energy storages, the use of which is spreading in the world. The purpose of the work is to obtain an answer to the following question: which of the ubiquitous different types of energy storages is most likely to be the most efficient for the future industrial energy supply? The following tasks are solved in the article: 1) generalization of the collected data; 2) analysis (evaluation) of data using mathematical methods of data analysis. The following research methods are used: comparison, abstraction, axiomatic, analysis, synthesis, formalization and induction. The following results were obtained: among the analyzed energy storages, the best result was shown by a mechanical potential (gravitational) energy storage. Conclusions: If it is planned to use energy storages on an industrial scale in various fields, it should be recognized as expedient to give preference to gravitational devices.