http://ric.zntu.edu.ua/issue/feedRadio Electronics, Computer Science, Control2019-04-16T11:21:23+03:00Sergey A. Subbotinsubbotin.csit@gmail.comOpen Journal Systems<p dir="ltr" align="justify"><span><strong>Description:</strong> The scientific journal «Radio Electronics, Computer Science, Control» is an international academic peer-reviewed publication. It publishes scientific articles (works that extensively cover a specific topic, idea, question and contain elements of their analysis) and <span lang="EN">r</span><span lang="RU">eviews (works containing analysis and reasoned assessment </span><span lang="EN">of </span><span lang="RU">the author's original or </span><span lang="EN">published </span><span lang="RU">book)</span> that receive an objective review of leading specialists that evaluate substantially without regard to race, sex, religion, ethnic origin, nationality, or political philosophy of the author(s).<span id="result_box2" lang="en"><span class="hps"><br /> </span></span><strong>Founder and </strong></span><strong><span>Publisher</span></strong><span><strong>:</strong> <a href="http://zntu.edu.ua/zaporozhye-national-technical-university">Zaporizhzhya National Technical University</a><span lang="uk">.</span> </span><strong><span>Country:</span></strong><span> Ukraine<span lang="uk">.</span><span id="result_box1" lang="en"><span class="hps"><br /> </span></span><strong>ISSN</strong> 1607-3274 (print), ISSN 2313-688X (on-line).<span id="result_box3" lang="en"><span class="hps"><br /> </span></span><strong>Certificate of State Registration:</strong> КВ №6904</span><span lang="uk">. </span><span>The journal was registered by the State Committee for information policy, television and radio broadcasting of Ukraine in 29.01.2003.<span id="result_box4" lang="en"><span class="hps"><br /> </span></span>In accordance with the decision of the <span lang="en-us">P</span>residium of All-Ukrainian Certification Commission (<span lang="uk">№ </span>1-05/4 dated 05.26.2010<span lang="uk">) </span>the journal <span lang="en-us">"Radio Electronics, Computer Science, Control" was included </span>in the <strong>List of the <span lang="en-us">scientific specialized periodicals of </span>Ukrain<span lang="en-us">e</span></strong> where <span lang="en-us">the results of dissertations for PhD and D. Sc. </span>in <span lang="en-us">Technical Sciences</span>, Physics and Mathematics (with specialization in Radiophysics) may be published.</span><span><span id="result_box25" lang="en"><span class="hps"><br /> </span></span><span id="result_box26" lang="en"><span class="hps">By the Order of the Ministry of Education and Science of Ukraine from 12.21.2015 № 1328 "On approval of the decision of the Certifying Collegium of the Ministry on the activities of the specialized scientific councils dated 15 December 2015" journal is included in the <strong>List of scientific specialized periodicals of Ukraine</strong>, where the results of dissertations for Doctor of Science and Doctor of Philosophy in Mathematics and Technical Sciences may be published.</span></span><span id="result_box27" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Year of Foundation:</span></strong><span> 1999. </span><strong><span>Frequency :</span></strong><span> 4 times per year (before 2015 - 2 times per year).<span id="result_box6" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Volume</span></strong><span><strong>:</strong> up to 20 conventional printed sheets. </span><strong><span>Format:</span></strong><span> 60x84/8. <span id="result_box7" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Languages:</span></strong><span> English, Russian, Ukrainian.<span id="result_box8" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Fields of Science :</span></strong><span> Physics and Mathematics, Technical Sciences.<span id="result_box9" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Aim: </span></strong><span>serve to the academic community principally at publishing topical articles resulting from original research whether theoretical or applied in various aspects of academic endeavour<span lang="ru">.</span></span><span><strong><br /> </strong></span><strong> <span>Focus:</span></strong><span> fresh formulations of problems and new methods of investigation, help for professionals, graduates, engineers, academics and researchers disseminate information on state-of-the-art techniques according to the journal scope.<br /> <span> <strong>Scope:</strong></span> radio physics, micro-, nano- and radio electronics, computer hardware and software, computer networks and telecommunications, algorithm and programming theory, optimization and operations research, machine-machine and man-machine interfacing, mathematical modeling and computer simulation, data and signal processing, control in technical systems, artificial intelligence, including knowledge-based and expert systems, data mining, pattern recognition, artificial neural and neuro-fuzzy networks, fuzzy logics, swarm intelligence and multiagent systems, hybrid systems.</span><span><strong><br /> </strong></span> <span> <strong><span> Journal sections:</span></strong><span><span id="result_box10" lang="en"><span class="hps"><br /> </span></span></span></span> <span> - radiophysics;<span id="result_box11" lang="en"><span class="hps"><br /> </span></span>- radio electronics and telecommunications;<span id="result_box12" lang="en"><span class="hps"><br /> </span></span>- mathematical and computer modelling;<span id="result_box13" lang="en"><span class="hps"><br /> </span></span>- neuroinformatics and intelligent systems;<span id="result_box14" lang="en"><span class="hps"><br /> </span></span>- progressive information technologies;<span id="result_box15" lang="en"><span class="hps"><br /> </span></span>- theory and methods of automatic control;<span id="result_box16" lang="en"><span class="hps"><br /> </span></span>- control in technical systems.</span><span><span><span id="result_box17" lang="en"><span class="hps"><br /> </span></span><strong>Abstracting and Indexing:</strong> <strong>The journal is indexed in <a href="http://science.thomsonreuters.com/cgi-bin/jrnlst/jlresults.cgi?PC=MASTER&Full=Radio%20Electronics%20Computer%20Science%20Control" target="_blank">Thomson Reuters Web of Science</a></strong><span> (WoS) scientometric database</span><span>. </span> </span></span>The articles, published in the journal<span lang="en-us">,</span> are abstracted in leading international <span lang="en-us">and </span>national <strong>abstract<span lang="en-us">ig</span> journals</strong> and <strong>scientometric databases</strong>, and also are placed <span lang="en-us">to</span> the <strong>digital archives</strong> and <strong>libraries</strong> with free on-line<span lang="en-us"> access: Academic Keys, ACNP, ADAT, Akademik Dizin, ARDI, BASE, CiteFactor, CNKI, COPAC, CrossRref, DIIF, DOAJ, DOI, DRJI, EBSCO, eLibrary.ru, ETOC, Exlibris, EZB, GBV/GVK, GENERAL IMPACT FACTOR, GetInfo, GIF, Google Scholar, Impactfactor.pl, Index Copernicus, INSPEC, ISRA JIF, ISSN, JIFACTOR, Jour Informatics, Journalindex.net, JournalTOCs, Konferencii.ru, MIAR, OAIster, OAJI, Open Science Directory, Openaccessarticles, Openaire, Perechen-izdaniy.ru, PUBGET, Research Bible, ROAD, Scholar Steer, Sciary, SHERPA/RoMEO, SIS, SJIF, SJournals, SSM, UIF, WorldCat, WorldWideScience, ZDB, VINITI, Djerelo, UINC, Ukraininca Naukova, Ulrich’s Periodical Directory, Universia, URAN, V. I. Vernadsky National Library of Ukraine, and others which are listed and described <a href="/about/editorialPolicies#custom-0">here</a>.</span></p><p dir="ltr" align="justify"><span><span><strong>Editorial board: </strong><em>Editor in chief</em> - <span><span>S. A. Subbotin</span></span> , D. Sc., Professor; <em>Deputy Editor in Chief</em> - D. M. Piza, D. Sc., Professor. The <em>members</em> of Editorial Board are listed <a href="/about/editorialTeam">here</a>.<span id="result_box19" lang="en"><span class="hps"><br /> </span></span><strong>Publishing and processing fee:</strong> Articles are published and peer-reviewed <strong>free of charge</strong>.<span id="result_box20" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Authors Copyright: </span></strong><span>The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions. The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles. The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС-BY.<span id="result_box21" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Authors Responsibility:</span></strong><span> Submitting the article to the journal, authors hereby assume full responsibility for the copyright compliance of other individuals and organizations, the accuracy of citations, data and illustrations, nondisclosure of state and industrial secrets, express their consent to transfer for free to the publisher the right to publish, to translate into foreign languages, to store and to distribute the article materials in any form. Authors who have scientific degrees, submitting the article in the journal, thereby giving their consent to free act as reviewers of other authors articles at the request of the journal editor within the established deadlines. The articles submited to the journal must be original, new and interesting to the reader audience of the journal, have reasonable motivation and aim, be previously unpublished and not be considered for publication in other journals. Articles should not contain trivial and obvious results, make unwarranted conclusions and repeat conclusions of already published studies.<span id="result_box22" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Readership: </span></strong><span>scientists, university faculties, postgraduate and graduate students, practical specialists.<span id="result_box23" lang="en"><span class="hps"><br /> </span></span></span><strong> <span>Publicity and Accessing Method :</span></strong><span> <strong>Open Access</strong> on-line for full-text publications<span id="result_box24" lang="en"><span class="hps">.</span></span></span></span></p><p dir="ltr" align="justify"><span><strong><span style="font-size: small;"> <img src="http://journals.uran.ua/public/site/images/grechko/1OA1.png" alt="" /> <img src="http://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="" /></span></strong></span></p>http://ric.zntu.edu.ua/article/view/162660PROXIMATE TESTING METHOD OF MOISTURE MEASUREMENT FOR SUBSTANCES OF DIELECTRIC NATURE2019-04-16T11:17:52+03:00O. V. ZabolotnyiZabolotnyi@gmail.com<p>Contest. Variable chemical composition of the materials under research is a reason for so-called “type uncertainty” appearance, because the result of moisture measurement strongly depends from initial dielectric permittivity (type) of a material, and dielectric permittivity can be significantly different not only for different materials, but for different varieties of the same material. Development of new and modification of existing moisture measurement methods and development of new instrumental and secondary transducers is a problem of current importance for increasing the accuracy of moisture measurement.<br />Objective. The purpose of this work is reduction the error of moisture measurement for bulk and liquid materials by new methods and means of moisture measurement development.<br />Methods. A new method of moisture measurement had been developed with two additive, two multiplicative and two complementary testing influences on the sample under research. It foresees getting seven readings of a capacitance that should be plugged into the formula of a testing algorithm to get the moisture value. The method allowed to reduce material’s type influence on the result of moisture measurement and to increase accuracy of measurements. To make a new method of moisture measurement proximate, special instrument transducer had been developed. It allows simulation of additive testing influences on the material by using flat conductive plates of a certain thickness, introduced directly into a space between the electrodes.<br />Results. The main purpose of experiments was to prove the capability of the new method of moisture measurement to work with experimental values of capacitances. New instrument and secondary transducers had been developed for that purposes. Obtained results helped to see that new testing algorithm has good conditionality when working with real values of capacitances with natural random variation.<br />Conclusions. As a result we could see that maximal absolute error does not overcome 1.3 % of moisture content. It shows that substitution the direct adding of water with metallic plates does not decrease conditionality of calculated moisture value results, obtained using the new method of moisture measurement.</p>Copyright (c) 2019 O. V. Zabolotnyihttp://ric.zntu.edu.ua/article/view/163044METHODOLOGY OF JUSTIFICATION THE TYPE AND EVALUATION OF QUALITY GROUP SEARCH OF DEFECTS IN THE REPAIR RADIO-ELECTRONIC MEANS2019-04-16T11:17:58+03:00V. P. RomanenkoRomanenko@gmail.comL. N. SakovichSakovich@gmail.comY. V. RyzhovRyzhov@gmail.comS. E. GnatyukGnatyuk@gmail.comI. Y. RozumRozum@gmail.com<p>Context. Radioelectronic devices are continuously complicated, which complicates the process of restoring their efficiency, when the diagnosis consumes the largest labor costs and time. Therefore, the promising direction of increasing the efficiency of the renewal of modern electronic means is to improve diagnostic support.<br />Objective. The purpose of the article is to increase the efficiency of diagnostic provision of radio electronic means at the expense of a reasonable choice of the type of group search of defects.<br />Method. In the work analytical studies of conditional algorithms of diagnosis with the use of graph theory theory, probability theory and the theory of discrete search – a scientific discipline that studies the diagnostic process when restoring the efficiency of complex technical objects with varying degrees of damage through research and optimization of procedures and algorithms for detection of a priori – in unknown number of elements with given properties on the finite structurally-bounded set according to some criterion.<br />Results. The method of choosing the type of algorithm of group search of defects at given restrictions and assumptions on the criterion of minimum labor costs on the basis of generalization of the graph-analytical model of group search of defects with quantitative estimation of probabilistic, time and cost indicators of the quality of the process of diagnosing radioelectronic devices with different degree of damage, which allows to pre-substantiate the most appropriate algorithm for group defects search for use in the development of diagnostic support for modern radio ectronic means.<br />Conclusions. For the first time, various types of group search of defects with a quantitative estimation of the efficiency of their use depending on the features of radio-electronic means and the conditions for their restoration of efficiency are considered in a complex way.</p>Copyright (c) 2019 V. P. Romanenko, L. N. Sakovich, Y. V. Ryzhov, S. E. Gnatyuk, I. Y. Rozumhttp://ric.zntu.edu.ua/article/view/163077NUMERICAL ANALYSIS OF SLOW STEADY AND UNSTEADY VISCOUS FLOW BY MEANS OF R-FUNCTIONS METHOD2019-04-16T11:18:04+03:00A. V. ArtiukhArtiukh@gmail.comS. N. LamtyugovaLamtyugova@gmail.comM. V. SidorovSidorov@gmail.com<p>Context. This article is devoted to the linear problem of the steady and unsteady flows of a viscous incompressible fluid.<br />Objective. The purpose of this paper is to compare the previously developed methods of numerical analysis of the steady and unsteady flows of a viscous incompressible fluid.<br />Method. The flow of a viscous incompressible fluid can be described by the system of nonlinear Navier-Stokes equations. The variables of this system are velocity, pressure, density, volume forces, and fluid viscosity. Using the stream function, the Navier-Stokes equations can be transformed to the initial-boundary problem with the differential equation of the fourth order. To solve the problem the structural variational method of R-functions and Ritz method (steady problem) or Galerkin method (unsteady problem) are used. The R-functions method allows satisfying the boundary conditions accurately and transforming them to the homogeneous,<br />which are the prerequisite for application of Ritz or Galerkin method. The problem transforms to the solving the system of linear algebraic equations or the system of ordinary differential equations for steady and unsteady flows respectively. The matrices elements are the scalar products in the norms of the corresponding differential operators. Numerical integration was made by means of Gaussian quadratures with 16 points. Solutions of the system of linear algebraic equations and the system of ordinary differential equations were found with the help of the Gauss method and the Runge-Kutta method with an automatic step-size control<br />respectively. The existence of a unique solution of the problems is proved.<br />Results. The computational experiments for the problem of flows of a viscous incompressible fluid for the different rectangular domains carried out.<br />Conclusions. The conducted experiments have confirmed that the stream function, the flow velocity, and other flow characteristics are converging to the steady state when the time is increasing. This allows us to say that the obtained methods work as expected. The further research may be devoted to the comparison of the solution methods for the non-linear problems.</p>Copyright (c) 2019 A. V. Artiukh, S. N. Lamtyugova, M. V. Sidorovhttp://ric.zntu.edu.ua/article/view/163296METHOD OF REDUCTION MODEL FOR CALCULATION OF ELECTROSTATIC FIELDS OF ELECTRONIC OPTICS SYSTEMS2019-04-16T11:18:11+03:00L. I. MochuradMochurad@gmail.com<p>Context. The rapid development of nanotechnology puts forward new requirements for electronic optics systems. In modern electron-optical systems, a significant amount of complex electrodes with a geometric symmetry is observed. When calculating the electrostatic fields of the corresponding systems require high accuracy of calculations. This can be achieved by developing new and<br />improving existing algorithms for calculating potential fields.<br />Objective. The goal of the work is to develop the method for reducing the model for calculating the electrostatic fields of modern systems of electronic optics.<br />Method. In order to confirm the efficiency of the proposed method, the finding of the parameters of the electrostatic field of a particular model system is considered. It is shown that the configuration of surfaces of electrodes has an Abelian cyclic group of symmetry of the fourth order. Fourier transform matrix for this group is found. It was succeeded, using the method of reduction of<br />the model, to base the apparatus of group theory on the basis of the system of four integral equations to a sequence of four independent integral equations, where integration is carried out on ¼ of the aggregate boundary surface. The maximum (repeated) consideration of the existing symmetry of the boundary surface in the mathematical modeling of the electrostatic field allows, in turn,<br />to significantly reduce the order of the model – to go to the integration, for example, 1/16, 1/64 of the boundary surface.<br />Results. In work, without decreasing the universality, on the example of a particular model system, the calculation of parameters of the electrostatic field was carried out. For the visual representation of which surfaces of equal potential are used. The results of numerical simulation are given at a different variation of the known potential values on the boundary surfaces of the electrodes. The obtained results can be used for the design of modern electronic optics systems.<br />Conclusions. The method of reduction of the model for calculating the electrostatic fields of electron-optical systems is based on the boundary integral equations of the theory of potentials in combination with the apparatus of group theory, which, unlike existing methods, allows to simplify the procedure of numerical analysis of electrostatic field parameters maximally taking into account the available symmetry in geometry boundary surfaces, avoid numerical instability of calculations and get higher accuracy of calculations. The class of electronic optics systems that allow mathematical modeling based on the method of integral equations is expanded.</p><p> </p>Copyright (c) 2019 L. I. Mochuradhttp://ric.zntu.edu.ua/article/view/163321FORECASTING INDIVIDUAL RESOURCE OF TECHNICAL SYSTEMS2019-04-16T11:18:18+03:00V. V. NahornyiNahornyi@gmail.comE. A. LavrovLavrov@gmail.comY. I. ChybiriakChybiriak@gmail.com<p>Context. The article describes the results of research into the development of a new methodology for forecasting the individual resource of technical systems, which is a topical, but still not solved, problem, especially for small-series or single objects of control. This circumstance determines the relevance of the material presented in the article.<br />Objective. The goal of the work is the development of a new methodology for forecasting the individual resource of technical systems, including unique and small-series ones.<br />Method. A new methodology for forecasting the individual resource of technical systems is proposed, which is based on the identification of the trend model of the monitored parameter, performed on the basis of the results of regular monitoring of the technical condition of various industrial equipment, including small-series or manufactured in single copies. One of the coefficients of the model, which is determined in the identification process, is numerically equal to the predicted resource. Based on the known value of the resource and the measured value of the control parameter, the value of the linguistic variable is calculated, the results of comparison of which with the standard set of verbal quantities – “terms” – determine the degree of criticality of the technical condition of the equipment under control. Results. The methodology of forecasting an individual resource and evaluating the technical condition of industrial equipment, including unique and small-series equipment based on this degree of criticality, was implemented in the software product and used in assessing the degree of criticality of a hydro turbine – a typical representative of small-series products. Conclusions. The conducted experiments confirmed the expected effectiveness of the methodology for forecasting the individual resource and the efficiency of the software created on its basis, which makes it possible to recommend the methodology and software product for practical use in solving problems of forecasting the resource and diagnosing the technical condition of various industrial equipment. Prospects for further research consist in the hardware implementation based on stationary, mobile and embedded control systems developed methodology for forecasting the individual resource of mechanical systems.</p>Copyright (c) 2019 V. V. Nahornyi, E. A. Lavrov, Y. I. Chybiriakhttp://ric.zntu.edu.ua/article/view/163425METHOD OF TWO-SIDED APPROXIMATIONS OF THE SOLUTION OF THE FIRST BOUNDARY VALUE PROBLEM FOR NONLINEAR ORDINARY DIFFERENTIAL EQUATIONS BASED ON THE GREEN’S FUNCTION USE2019-04-16T11:18:27+03:00M. V. SidorovSidorov@gmail.com<p>Context. The questions of constructing a two-sided iterative process for finding a positive solution of the first boundary value problem for an ordinary second-order differential equation on the basis of the method of Green’s functions are considered. The object of the study is the first boundary value problem for an ordinary second-order differential equation The purpose of the paper is to develop a method of twosided approximations of the problem solution by using the methods of the nonlinear operators theory in semi-ordered spaces.<br />Method. With the Green’s function help the original nonlinear boundary value problem for an ordinary differential equation is replaced by an equivalent integral equation, considered in the space of continuous functions, which is semi-ordered by means of the cone of nonnegative functions. The integral equation is represented as a nonlinear operator equation with a heterotone operator. For this equation a strongly invariant conic segment, the ends of which serve as initial approximations for two iterative sequences, is sought. The first of the sequences,<br />monotonically increasing, approximates the exact solution of the problem from below, and the second one, monotonically decreasing, approximates<br />it from above. Two conditions for the existence of a unique positive solution of the boundary value problem under consideration and two-sided convergence of successive approximations to it are given. General recommendations on the construction of a strongly invariant conic segment are also given. The developed method has a simple computational implementation and a posteriori error estimate, convenient for use in practice.<br />Results. The developed method was programmed and investigated in solving test problems. The results of the computational experiment are illustrated graphically and with the help of tables.<br />Conclusions. The conducted experiments have confirmed the efficiency and effectiveness of the developed method and allow to recommend it for use in practice for solving the problems of mathematical modeling of nonlinear processes. The prospects for further research may include the development of two-sided methods for solving problems for partial differential equations and non-stationary problems using semi-discrete methods (for example, the Rothe’s method of lines).</p>Copyright (c) 2019 M. V. Sidorovhttp://ric.zntu.edu.ua/article/view/163430RESEARCH OF QUEUEING SYSTEMS WITH SHIFTED ERLANGIAN AND EXPONENTIAL INPUT DISTRIBUTIONS2019-04-16T11:18:36+03:00V.N. TarasovTarasov@gmail.comN. F. BakharevaBakhareva@gmail.com<p>Context. In queuing theory, the study of G/G/1 systems is particularly relevant due to the fact that until now there is no solution in the final form<br />in the general case. The problem of the derivation in closed form of the solution for the average waiting time in the queue for ordinary systems with<br />erlangian and exponential input distributions and for the same systems with shifted distributions is considered.<br />Objective. Obtaining a solution for the main system characteristic – the average waiting time for queue requirements for three types of queuing<br />systems of type G/G/1 with conventional and shifted erlangian and exponential input distributions.<br />Method. To solve this problem, we used the classical method of spectral decomposition of the solution of Lindley integral equation, which allows<br />one to obtain a solution for average the waiting time for systems under consideration in a closed form. The method of spectral decomposition of<br />the solution of Lindley integral equation plays an important role in the theory of systems G/G/1. For the practical application of the results obtained,<br />the well-known method of moments of probability theory is used.<br />Results. The spectral decompositions of the solution of the Lindley integral equation for the three kinds of systems were first obtained with the<br />help of which the calculated expressions for the average waiting time in the queue for the above systems in a closed form were derived.<br />Conclusions. The introduction of the time shift parameter in the laws of input flow distribution and service time for the systems under consideration<br />turns them into systems with a delay with a shorter waiting time. This is due to the fact that the time shift operation reduces the coefficient of<br />variation in the intervals between the receipts of the requirements and their service time, and as is known from queuing theory, the average wait time<br />of requirements is related to these coefficients of variation by a quadratic dependence. The system with erlangian input distributions of the second<br />order is applicable only at a certain point value of the coefficients of variation of the intervals between the receipts of the requirements and their service<br />time. The same system with shifted distributions allows us to operate with interval values of coefficients of variations, which expands the scope<br />of these systems. Similarly the situation and with the shifted exponential distributions is. In addition, the shifted exponential distribution contains two<br />parameters and allows one to approximate arbitrary distribution laws using the first two moments. This approach allows us to calculate the average<br />latency for these systems in mathematical packages for a wide range of traffic parameters. All other characteristics of the systems are derived from the<br />waiting time. The method of spectral decomposition of the solution of the Lindley integral equation for the systems under consideration makes it<br />possible to obtain a solution in a closed form and these solutions are published for the first time.</p>Copyright (c) 2019 V.N. Tarasov, N. F. Bakharevahttp://ric.zntu.edu.ua/article/view/163652IMPLEMENTATION OF DBSCAN CLUSTERING ALGORITHM WITHIN THE FRAMEWORK OF THE OBJECTIVE CLUSTERING INDUCTIVE TECHNOLOGY BASED ON R AND KNIME TOOLS2019-04-16T11:18:45+03:00S. BabichevBabichev@gmail.comS. VyshemyrskaVyshemyrska@gmail.comV. LytvynenkoLytvynenko@gmail.com<p>Context. The problem of the data clustering within the framework of the objective clustering inductive technology is considered. Practical implementation of the obtained hybrid model based on the complex use of R and KNIME tools is performed. The object of the study is the hybrid model of the data clustering based on the complex use of both DBSCAN clustering algorithm and the<br />objective clustering inductive technology.<br />Objective. The aim of the work is the creation of the hybrid model of the objective clustering based on DBSCAN clustering algorithm and its practical implementation on the basis of the complex use of both R and KNIME tools.<br />Method. The inductive methods of complex systems modelling have been used as the basis to determine the optimal parameters of DBSCAN clustering algorithm within the framework of the objective clustering inductive technology. The practical<br />implementation of this technology involves: the use of two equal power subsets, which contain the same quantity of pairwise similar objects; calculation of the internal and the external clustering quality criteria; calculation of the complex balance criterion, maximum value of which corresponds to the best clustering in terms of the used criteria. Implementation of this process involves two main<br />stages. Firstly, the optimal values of the EPS parameter were determined at each step within the range of the minPts value changes. The charts of the complex balance criterion versus the EPS value were obtained for each minPts value as the results of this stage implementation. Then, the analysis of the obtained intermediate results was performed in order to determine the optimal solution,<br />which corresponds to both the maximum value of the complex balance criterion on the one side and the aims of the current clustering on the other side.<br />Results. The developed hybrid model has been implemented based on software KNIME with the use of plugins, which have been<br />written in software R. The efficiency of the model was tasted with the use of the different data: low dimensional data of the computing school of East Finland University; Fisher’s iris; gene expression profiles of the patients, which were investigated on lung cancer.<br />Conclusions. The results of the simulation have shown high efficiency of the proposed method. The studied objects were distributed into clusters correctly in all cases. The proposed method allows us to decrease the reproducibility error, since the solution concerning determination of the clustering algorithm optimal parameters was taken based on both the clustering results obtained on<br />equal power subsets separately and the difference of the clustering results obtained on the two equal power subsets. </p>Copyright (c) 2019 S. Babichev, S. Vyshemyrska, V. Lytvynenkohttp://ric.zntu.edu.ua/article/view/163661NEURO-FUZZY FORECASTING OF NON-LINEAR PROCESSES OF BLAST FURNACE PRODUCTION2019-04-16T11:18:49+03:00O. V. HerasinaHerasina@gmail.comO. Yu. HusievHusiev@gmail.comV. I. KorniienkoKorniienko@gmail.com<p>Context. Neuro-fuzzy forecasting of the chemical composition of cast iron at the blast furnace output to improve the quality of blast furnace production control is considered.<br />Objective. The aim of the work is to reduce the errors of forecasting non-linear processes of blast-furnace production.<br />Method. It was proposed to use neural-fuzzy adaptive filter-approximators for forecasting non-linear processes of blast-furnace production (in the form of: Adaptive neuro-fuzzy inference system, fuzzy algorithm of subtractive clustering and fuzzy C-means clustering algorithm), which realize sequential and step-by-n step integration of current information. To optimize these filters for real processes, their parameters are identified by the accuracy criterion on the training and verification sequences.<br />Results. As a result of the simulation of neural-fuzzy forecasting of the content of the chemical composition of cast iron at the blast furnace output, it was found that the best accuracy is provided by a fuzzy filter with subtractive clustering with sequential integration of the current data. At the same time, the forecast error is 4.2%, and the time for finding the optimal solutions does not<br />introduce time restrictions on the application of this approach in blast-furnace production. The adequacy of the data was confirmed.<br />Conclusions. Neural-fuzzy filters allow to increase the accuracy of the forecast of non-linear processes of blast furnace smelting and, due to this, to improve the quality of management of the production of cast iron. Further research should be directed to the development of automatic control systems for non-linear processes of blast-furnace production.</p>Copyright (c) 2019 O. V. Herasina, O. Yu. Husiev, V. I. Korniienkohttp://ric.zntu.edu.ua/article/view/163670VORONOI-BASED SKELETONIZATION ALGORITHM FOR SEGMENTING THE NETWORK OF BIOLOGICAL NEURONS2019-04-16T11:18:53+03:00D. V. KotsurKotsur@gmail.comV. M. TereshchenkoTereshchenko@gmail.com<p>Context. The problem of automated processing and analysis of microscopy image data is of high relevance due to its extreme impact on the research and recent developments in the field of biology and medicine. Efficient image processing algorithms facilitate the development of new medical diagnostic tools and therapy processes. They help us to broaden our knowledge of underlying<br />mechanisms and processes inside living organisms. The primal focus of this paper is the processing of the microscopy images of the biological neural network. This aims to facilitate further studies of biological neural network that would lead to the development of better methods for diagnosis, prevention and cure of the related deceases.<br />Objective. The goal of the work is to development of an efficient image processing algorithm for segmenting the network of biological neurons based on the fluorescent microscopy image data.<br />Method. The introduced algorithm for segmenting the network of biological neurons comprises several steps. Firstly, we apply image processing routines, which aim to enhance the quality of the image data and extract the contours of the biological neural network. Then we construct the skeleton of the network applying the Voronoi diagram for line segments extracted from the object’s contours. We employ Voronoi skeleton to identify the cellular somas and differentiate them from axons and dendrites.<br />Results. The developed Voronoi-based algorithm allows us to segment individual neurons, localize their somas, axons and dendrites and extract graph representation of the neural network. The underlying Voronoi diagram data structure allows us to compute such graph efficiently in O(N log N) operations (where N is a number of contour points). The proposed segmentation method was<br />implemented in the C++/Python programming language and evaluated on the fluorescent images from CellImageLibrary (CIL).<br />Conclusions. The proposed segmentation method aims to facilitate studies of biological neural networks. It computes segmentation of the network of biological neurons in O(N log N) operations using the Voronoi diagram data structure. This data structure, in turn, gives us an attributed graph representation of the segmented network. Therefore, classical graph processing algorithms can be<br />applied to analyze the neural and compute such network’s characteristics as the number of connections between individual neurons, the shortest signal transduction path between two neurons, etc.</p>Copyright (c) 2019 D. V. Kotsur, V. M. Tereshchenkohttp://ric.zntu.edu.ua/article/view/163787A MODEL AND TRAINING ALGORITHM OF SMALL-SIZED OBJECT DETECTION SYSTEM FOR A COMPACT AERIAL DRONE2019-04-16T11:18:58+03:00V. V. MoskalenkoMoskalenko@gmail.comA. S. MoskalenkoMoskalenko@ukr.netA. G. KorobovKorobov@gmail.comM. O. ZaretskyZaretsky@gmail.com<p>Context. Lightweight model and effective training algorithm of on-board object detection system for a compact drone are developed. The object of research is the process of small object detection on aerial images under computational resource constraint and uncertainty caused by small amount of labeled training data. The subject of the research are the model and training algorithm for detecting small objects on aerial imagery.<br />Objective. Goal of the research is developing efficient model and training algorithm of object detection system for a compact aerial drone under conditions of restricted computing resources and the limited volume of the labeled training set.<br />Methods. The four-stage training algorithm of the object detector is proposed. At the first stage, selecting the type of deep convolutional neural network and the number of low-level layers that is pre-trained on the ImageNet dataset for reusing takes place. The second stage involves unsupervised training of high-level convolutional sparse coding layers using modification of growing neural gas to automatically determine the required number of neurons and provide optimal distributions of the neurons over the data. Its application makes it possible to utilize the unlabeled training datasets for the adaptation of the high-level feature description to the domain application area. At the third stage, there are reduction of output feture map using principan component analysis and building of decision rules. In this case, output feature map is formed by concatenation of feature maps from different level of deep network using upscaling upper maps to uniform shape for each channel. This approach provides more contextual information for efficient recognition of small objects on aerial images. In order to build classifier of output feature map pixels is proposed to use boosted<br />information-extreme learning. Besides that, the extreme learning machine is used to build of regression model for predict bounding box of detected object. Last stage involves fine-tuning of high-level layers of deep network using simulated annealing metaheuristic algorithm in order to approximating the global optimum of complex criterion of training efficiency of detection model.<br />Results. The results obtained on open datasets testify to the suitability of the model and training algorithm for practical usage. The proposed training algorithm utilize 500 unlabeled and 200 labeled training samples to provide 96% correctly detection of objects on the images of the test dataset.<br />Conclusions. Scientific novelty of the paper is a new model and training algorithm for object detection, which enable to achieve high confidence of recognition of small objects on aerial images under computational resource constraint and limited volume of the labeled training set. Practical significance of the paper results consists in the developed model and training algorithm made it possible to reduce requirements for size of labeled training set and computation resources of on-board detection system of aerial drone in training and inference modes.</p>Copyright (c) 2019 V. V. Moskalenko, A. S. Moskalenko, A. G. Korobov, M. O. Zaretskyhttp://ric.zntu.edu.ua/article/view/163808DECISION TREE CONSTRUCTION FOR THE CASE OF LOW-INFORMATIVE FEATURES2019-04-16T11:19:04+03:00S. A. Subbotinsubbotin.csit@gmail.com<p>Context. The problem of automating the decision tree construction is addressed. The object of study is a decision tree. The subject of study is the methods of decision tree building.<br />Objective. The purpose of the work is to create a method for constructing models based on decision trees for data samples that are characterized<br />by sets of individually low-informative features.<br />Method. A method for decision tree constructing is proposed, which for a given sample determines the individual informativeness of features relatively to the output feature, and also evaluates the relationship of input features with each other as their individual informativity pairwise relatively to each other, at the step of forming the next node the method selects as a candidate feature the feature that gives the best partition in the whole set of features, after which it sequentially searches among all the features that are not selected for this node the one that<br />is individually most closely related with the selected candidate, then for the set of selected features, iterating through the available transformations from a given set, determines the quality of the partition for each transformation, selects the best transformation and adds it to the node. When forming the next node, the method tends to single out a group of the most closely interrelated features, the conversion of which into a scalar value will provide the best partitioning of a subsample of instances hit into this node. This makes possible to reduce the size of the model and the branching of the tree, speed up the calculations in recognizing instances based on the model, as well as improve the generalizing properties of the model and its interpretability. The proposed method allows using the constructed decision tree to assess the feature significance.Results. The developed method is implemented as software and investigated at signal represented by a set of individually lowinformative readings classification problem solving. Conclusions. The experiments have confirmed the efficiency of the proposed software and allow recommending it for use in practice in solving problems of diagnostics and automatic classification by features. The prospects for further research may consist in the creation of parallel methods for constructing decision trees based on the proposed method, optimization of its software implementations, and also in an experimental study of the proposed method on a wider set of practical problems </p>Copyright (c) 2019 S. A. Subbotinhttp://ric.zntu.edu.ua/article/view/163815MODELING THE SECURITY POLICY OF THE INFORMATION SYSTEM FOR CRITICAL USE2019-04-16T11:19:14+03:00O. V. BisikaloBisikalo@gmail.comV. V. KovtunKovtun@gmail.comM. S. YukhimchukYukhimchuk@gmail.com<p>Context. Compared to universal information systems, the information system for critical use has a simplified structure of the information environment and specific requirements regarding the volumes and nature of information resources. This fact allows us to refuse excessive detail and to narrow the simulation object to the process of forming a security policy for an information system for critical use, an adequate problem description of which is achievable under the condition of a rational choice of the mathematical apparatus.<br />Objective. Synthesis of mathematical apparatus for the complex unified description of static and dynamic, controlled by integrity and authenticity, processes in the information system for critical use in its hierarchical representation.<br />Method. In the article new complex mathematical models of processes of information processing and access separation to it are obtained, which, in contrast to the existing ones, describe in the framework of the mathematical apparatus of E-networks mechanisms for protecting the environment and resources of the information system for critical use and allow to quantify the integrity of its<br />information resources. The mathematical models of the synthesis of the policy of safe information processes interaction in the information system for critical use are developed, which allow guaranteeing the observance of local security policies on the various structural elements of the system and integrating them into the global security policy, observing a single discretionary policy everywhere in the system.<br />Results. The practical consequence of the obtained theoretical results is the methods of optimizing the operation of the data processing and the access separation units, which are responsible in the information system for critical use for controlling the information integrity and the authenticity of access to it, respectively. In particular, the model of security policy of a information system for critical use adapted for practical application, a method for dynamically information integrity controlling with a corresponding criterion based on the mathematical apparatus of semi-Markov networks for a comprehensive stochastic description of discrete states of the information integrity control at selected hierarchical levels of the system during the continuous discretionary access. The method allows us to select the maximum allowable values of information integrity control coefficients at the sub-levels of the OSI application level allocated in the information system for critical use based on the pre-set amount of the size of controlled information, the speed of information integrity control and the maximum period of the system is in the appropriate state. Also describes a method for controlling access to information processes that are described by superblocks on the E-network representation<br />of the ISCU using sets of classifiers integrated into each block of the superblock that capture the fact of exceeding the corresponding thresholds by weighted degrees of identity of the attributes of the object that wants to access, which allows us to classify the identified information threat and initiate the corresponding reaction described in the system security policy. The analysis of the<br />results of the experiments allowed to obtain optimal parameters of groups of classifiers, which, in the framework of global, local and discretionary security policies, prevent the unauthorized access to system information resources or attempts to violate their integrity.<br />Conclusions. The article presents for the first time the mathematical model of the information system of critical use, in which, unlike the existing ones, a single approach has been introduced to describe information processes within the global, discretionary and local security policies with an attachment to the hierarchical structure of the information system, which allows analysis and synthesis<br />of functions services supporting user roles based on the object-relational model of organization of information resources of the system, to perform their integration, induction and ensure compatibility within a single security policy, to control the information and the authenticity of static and dynamic access to it.</p>Copyright (c) 2019 O. V. Bisikalo, V. V. Kovtun, M. S. Yukhimchukhttp://ric.zntu.edu.ua/article/view/163820THE IDEALIZED MODELS OF SOFTWARE SYSTEMS REENGINEERING2019-04-16T11:19:20+03:00S. S. VelykodniyVelykodniy@gmail.com<p>Content. Software systems are used in a variety of branches of life and human activities, but they are most widely used in industries where it is necessary to work with many routine operations – this applies to industry, production, transportation, training and info communications. Of course, in the process of exploiting these systems there is an evolutionary aging of the different types of security. This trend leads to a deterioration of high-speed, information-communication, graphic, time and other characteristics, up to the complete failure of the software system. The subject of the article is aimed to the design of ergative systems, project management and programs for re-designing or improving these systems. Reengineering allows the system to evolve, by making positive changes<br />to its structure in order to improve operational characteristics and technical support.<br />Objective. To form a representation of the estimation of resource cost parameters for the reengineering of software systems with the help of a mathematical tools for describing design models.<br />Method. The idea of the article is based on the Boehm method and the principles of building an Archimedes spiral. Author’s research led to the idea of combining Boehm and Archimedes structures, adapting them to the software engineering methodology and transferring them to a cylindrical coordinate system. The basis of the obtained models is laid spiral principle of the organization of the reference.<br />Results. The article deals with the process of creating and visualizing mathematical models in relation to the process of reengineering software systems. Transactions with these models can occur in projections of time and cost, in the isometric projection of software components, and in the logarithmic projection of lines of software code.<br />Conclusions. For the first time, idealized models of reengineering have been formed, which will allow to increase the accuracy of cost estimation from the redesign of software systems. The model of cost visualization for reprogramming of software systems has been improved, which will increase the efficiency of forecasting the order of expenses. For the first time dependencies were obtained<br />on the construction of the graphical cost model trajectory from the introduced reengineering automation coefficient and the similarity coefficient of the components that would make changes to the configuration of the model. The proposed idealized models for reengineering of software system security are evolutionary spirals, which are constructed in a cylindrical coordinate system. Reengineering, which will be accomplished with the help of developed idealized reengineering models, will not only reduce the cost of reprogramming<br />software systems, but also increase the efficiency of technical support, increase the life cycle of software systems which are already in service and overcome the contradictions between the rapid pace of development of science, technology and processes of designing new software systems.</p>Copyright (c) 2019 S. S. Velykodniyhttp://ric.zntu.edu.ua/article/view/163864PROBLEM STATEMENTS OF DATA PROCESSING BASED ON CRITERION OF MINIMUM EXTENT2019-04-16T11:19:33+03:00S. M. VovkVovk@gmail.com<p>Context. In order to process the data containing anomalous values as well as to obtain the sparse solutions or solutions with small extent, the requirement to minimize the extent of the function used to find solution can be used. In this paper the object of the study is the process of setting the data processing problems on the basis of this requirement, which is further referred to as the criterion of minimum extent.<br />Objective. The goal of this work is the development of an approach to the formulation of the data processing problems based on criterion of minimum extent. <br />Method. On the basis of minimum extent criterion, a new approach is proposed. This approach allows to formulate the data approximation problem as well as the inverse problem with a direct linear operator and with a solution of small extent or with a sparse solution in conditions that the initial data contain noise and anomalous values. The statement of the approximation problem is obtained<br />by setting a parametric data model and applying the criterion of minimum extent to the solution residual. The statement of the inverse problem is obtained by applying the criterion of minimum extent to the solution of the problem and to the solution residual. The special cases of this statement are presented and it is noted that this statement generalizes the statement of the Tikhonov regularization<br />problem. The proposed problem statements are formulated as minimization problems for the corresponding functionals constructed on the basis of the “superset” of cost functions. In the general case, the indicated functionals are neither convex nor unimodal, and their minimization can be a laborious task.<br />Results. The proposed problem statements generalize those that are performed on the basis of the least squares criterion and/or least modules criterion. Numerical simulation of the problem of approximation by a linear function of noisy data in the presence of impulsive noise, as well as in the presence of an interfering fragment of exponential function, confirmed the feasibility of the proposed statement and its effectiveness. Numerical simulation of the inverse problem, corresponded to the overdetermined system of linear algebraic equations with gross errors in its right-hand side and sparse solution, also confirmed the feasibility of using the criterion<br />of minimum extent for its formulation.<br />Conclusions. The problem statement of data processing which is based on the criterion of minimum extent is expedient under conditions when the part of the data is roughly distorted and/or when the desired solution has a small extent. The statements based on the criterion of minimum extent allow us to expand the range of the problems to be solved.</p>Copyright (c) 2019 S. M. Vovkhttp://ric.zntu.edu.ua/article/view/163884THE METHOD OF MULTIVARIATE STATISTICAL ANALYSIS OF THE TIME MULTIVARIATE CRITICAL QUALITY ATTRIBUTES OF MANUFACTURE PROCESS WITH THE DATA FACTORIZATION2019-04-16T11:19:42+03:00Ye. V. HavrylkoHavrylko@gmail.comO. A. KurchenkoKurchenko@gmail.comI. V. TereshchenkoTereshchenko@gmail.comA. I. TereshchenkoTereshchenko@ukr.net<p>Context. This paper presents a method for solving the problem of product’s quality assurance at the stage of the initial<br />manufacture process design in accordance with the process-analytical technology for the design of modern certified manufacturing –<br />QbD. The method uses the information technologies of multivariate statistical analysis (MSA) to evaluate the influence of time<br />multivariate critical process parameters (CPPs) on the time product critical quality attributes (CQAs). Preparatory transformation of<br />clusters of critical process (manufacture process) parameters into factors of product critical quality attributes was carried out.<br />Objective. To disclose the method of multivariate statistical analysis for assessing the character and features of the influence of time multivariate critical process parameters on time multivariate critical quality attributes at the design stage of the manufacture process.<br />Method. The method consistently uses: statistical procedures of exploratory multivariate data analysis; transformation the homogeneous observed values matrices of CPPs and product CQAs into data frame (table) with factorized data; construction the regression trees of multivariate CPPs with a multivariate responses (CQAs). The method is implemented the R language packages software.<br />Results. Factorized time multivariate CPPs make it possible to use methods of multivariate statistical analysis for evaluating the influence of CPPs factors on the time multivariate CQAs.<br />Conclusions. This method of statistical analysis, together with statistical multivariate canonical analysis, represents an up-to-date information technology for detailed estimation the influence of time multivariate CPPs objects and some CPPs components on CQAs.</p>Copyright (c) 2019 Ye. V. Havrylko, O. A. Kurchenko, I. V. Tereshchenko, A. I. Tereshchenkohttp://ric.zntu.edu.ua/article/view/163888DENIABLE ENCRYPTION BASED ON HYBRID CRYPTOGRAPHIC SYSTEMS USING2019-04-16T11:20:09+03:00A. V. GalchenkoGalchenko@gmail.comS. V. ChoporovChoporov@gmail.com<p>Context. Unauthorized access to well-protected information and telecommunication systems is a topical problem in the information security field [1]. For this problem solving, it is proposed to use the deniable encryption mechanisms, which allows its<br />managers to object to the existence of data, ensure their confidentiality and protect the information managers from brute force using by the intruders to obtain key information, during the unauthorized access to information. The article outlines the approach to the use of the existing deniable encryption algorithms for the protection of large data arrays.<br />Objective. The main purpose of this researching is a hypothesis test that it’s possibile to use deniable encryption algorithms for large data arrays protection, because all algorithms in this direction are asymmetric and not adapted to work with “big data”. Method. The test of hypothesis is carried out by additional data processing units using in the output deniable encryption algorithm with public key, which based on the extended cryptographic scheme of Rabin [2] and whose structure and features are most suitable for verifying this hypothesis put forward by the author. Results. According to the experiments result, the authors proposed a prototype of deniable encryption algorithm with block encryption of data implemented, which also preserves the deniability mechanism features from the original deniable encryption algorithm. Besides, all changes in algorithm which were proposed by the authors provide the productivity increasing compared with existing approaches [3–6]. Conclusions. Authors have solved a problem of using the existing deniable encryption algorithms, for the large data arrays security, for example for the deniable encryption algorithm with open key, which based on the Rabin extended cryptographic scheme. The proposed approach of the hybrid algorithm constructing with deniable mechanism demonstrates not only the preservation of the basic algorithm properties, but also good performance of the any size data block encrypting ability. Proposed algorithm allows to solve not only the problem of ensuring data confidentiality during the unauthorized access to them, but also makes its suitable for practical using.</p>Copyright (c) 2019 A. V. Galchenko, S. V. Choporovhttp://ric.zntu.edu.ua/article/view/164029ANALYTICAL MODEL OF RANDOM MULTIPLE ACCESS PROTOCOL PREDICTIVE P-PERSISTENT CSMA2019-04-16T11:20:19+03:00S. A. DadenkovDadenkov@gmail.com<p>Context. New model and quantification method of probable and time characteristics of information-control network with carrier sense random multiple access protocol and predicting network load of predictive p-persistent CSMA had been created. The object of the research was the process of information exchange in Fieldbus-networks LonWorks, BacNet with the analyzed protocol.<br />Objective. The aim of the research is to increase the accuracy of quantitative estimates of the characteristics of time and delivery reliability of information messages in the network with the analyzed protocol.<br />Method. The method of probability theory has been used there to solve the problem of creating a new correct model. The analysis of the functioning principles of the predictive p-persistent CSMA protocol is performed and the parameters influencing its work are set (on the example of the LonTalk stack). A graph of states and transitions of the protocol model describing the principles of<br />transmission of information messages over a network with a software communication medium, considering the allocated significant network and protocol parameters. A method for calculating the graph is offered and new analytical relations are obtained to estimate the main model probabilistic and temporal characteristic: the average delay time of message transmission, the average load of the communication channel, the probability of successful/unsuccessful transmission and data loss in the network.<br />Results. The developed model and method of quantitative assessment of probabilistic and temporal characteristics of data transmission in a network with multiple access protocol predictive p-persistent CSMA. The results are mostly differ from analogs by correct accounting of sporadic and diverse network load by the node delivery services.<br />Conclusions. The held experiments have confirmed the work capacity of the proposed mathematical support and allow to recommend it for solving the assessment characteristics problems of information exchange in the design of analyzed networks with given probabilistic and temporal characteristics.</p>Copyright (c) 2019 S. A. Dadenkovhttp://ric.zntu.edu.ua/article/view/164062CONSTRUCTION OF A NEUROET NETWORK EXPERT SYSTEM FOR PROCESSING NAVIGATION DATA IN CONDITIONS RIVER е-NAVIGATION2019-04-16T11:20:23+03:00V. V. PaninPanin@gmail.comV. V. DoroninDoronin@gmail.comO. M. SpiianSpiian@gmail.com<p>Context. The diagnostics automatisation problem of network anomalies during navigation data processing from gauging stations to electronic chart system under river e-navigation was studied. The object of the study is a process of diagnostic in the dynamic expert system. The purpose of the research is creating of automated troubleshooting system with a help of neural system.<br />Method. The diagnostic automatisation method of network anomalies with context-based intelligent navigation data processing usage was suggested. The main idea consists in modern data processing methods usage in the neural system. These methods are based on the fuzzy logic algorithm. Neural networks can be in operation during parameter fluctuations, that come from gauging stations. The cluster-rules set is displayed in the fuzzy neural system structure. There is no need to download all sample specifications in the electronic mapping system or to re-check the sample, it helps to speed up the process of network synthesis. In<br />the navigation data processing system were used different expert systems and neural networks. Data processing system should find network anomalies and propose the ways of their decision size, the method allows to get different levels of sample specification. The method allows to minimize network error in the synthesized model. In addition to fractal method, also had been proposed a method for unknown regularities between the input and output data coming from the gauging stations. That is, the neural network can determine which signals are non-informative. With a help of input data classification from the gauging stations based on Kokhonen`s system, the space of the data stream splits into clusters of the same size and shape. By changing the cluster size, the method allows to<br />get different levels of sample specification. The procedure of input signals classification helps to predict the increasing or decreasing of differential corrections towards depth, and recognize information from gauging stations. The method determines the encoding and decoding of navigation parameters by specifying the parametric function of the triangular shape. The rules formed by an expert<br />knowledge were established. In order to keep intellectual system under current conditions should be used neural dynamic expert system model including use case. The mechanism of automated solution based on the search use case algorithm is defined. If there are not any use cases, the task solves with a help of neural network rules. The network nodes are neurons – particular facts that are<br />consequences of use case. Links between nodes of the network implement the rules. That is, a multilayer neural network of facts and rules is built up.<br />Results. The experimental indexes of network anomalies during data processing from the gauging stations were followed up.<br />Conclusions. The automatisation problem of network diagnostic anomalies with a help of flexible fuzzy neural network was solved. The conducted experiments confirmed the efficiency of the proposed methods. Further research may consist in the creation of an instrumental navigation method (river e-navigation).</p>Copyright (c) 2019 V. V. Panin, V. V. Doronin, O. M. Spiianhttp://ric.zntu.edu.ua/article/view/164080METHOD OF THE INTELLIGENT SYSTEM CONSTRUCTION OF AUTOMATIC CONTROL OF UNMANNED AIRCRAFT APPARATUS2019-04-16T11:20:43+03:00R. O. BieliakovBieliakov@gmail.comH. D. RadzivilovRadzivilov@gmail.comO. D. FesenkoFesenko@gmail.comV. V. VasylchenkoVasylchenko@gmail.comO. G. TsaturianTsaturian@gmail.comA. V. ShyshatskyiShyshatskyi@gmail.comV. P. RomanenkoRomanenko@gmail.com<p>Context. Military conflicts of the late XX – early XXI centuries are characterized by the using of a large number of new weapons, which allowed the warring parties to distance themselves as far as possible from the direct collision with each other. Unmanned aircraft apparatus (UAA) have become one of the latest weapons on the battlefield, which during military conflicts were proven to be more effective than manned planes, in conducting air reconnaissance and other combat tasks, as well as strike at the enemy. One of the ways to increase the efficiency of UAA is to increase the level of technical excellence of their control systems. Creating new approaches for designing navigation systems for unmanned aerial vehicles particular, based on a free-form inertial navigation system, is an urgent task, as it will allow automatic control of the UAA flight route in the absence of corrective signals from the global satellite navigation system.<br />Objective. The purpose of this work is to develop a methodology for managing an unmanned aerial apparatus using an intelligent automatic control system. This technique will minimize the error of a free inertial navigation system due to the using of a fuzzy neural network system. The algorithm of the proposed method of constructing the intellectual system of automatic control of UAA navigation<br />system using the fuzzy neural network apparatus in the MatLab 7 software environment was developed. A neural network training was conducted in the Python 3.6 software environment (Jupyter-notebook), as well as testing the UAA model in the robot operational system (ROS) simulator environment for comparison with existing methods.<br />Method. To achieve this goal, the following methods were used: intelligent systems, the theory of automatic control, pseudospectral method; methods based on the genetic algorithm and apparatus of the fuzzy neural network.<br />Results. The method of constructing the intelligent system of automatic control of an unmanned aerial apparatus for minimizing the error of a free-form inertial navigation system due to the application of the neural network has been developed. The work of the intellectual system of automatic control of the UAA navigational system using the neural network in the MatLab software environment<br />based on the proposed implementation algorithm were tested. The possibility of practical application of the obtained results and comparison with traditional methods were investigated. Conclusions. The technique of the intelligent automatic control of UAA shows an advantage in comparison with the known methods without correcting signals from the global navigation satellite system.</p>Copyright (c) 2019 R. O. Bieliakov, H. D. Radzivilov, O. D. Fesenko, V. V. Vasylchenko, O. G. Tsaturian, A. V. Shyshatskyi, V. P. Romanenkohttp://ric.zntu.edu.ua/article/view/164086MODERNIZATION OF LUENBERGER OBSERVER FOR CONTROL SYSTEM OF HERMETIC COMPRESSOR ELECTRIC DRIVE2019-04-16T11:20:50+03:00A. Y. BukarosBukaros@gmail.comO. A. OnyshchenkoOnyshchenko@gmail.comP. N. MontikMontik@gmail.comV. L. MalyshevMalyshev@gmail.comV. N. BukarosBukaros@gmail.com<p>Context. The analysis of existing systems of sensorless control of hermetic compressor electric drives is carried out. The main requirements for control systems of automated electric drives of small refrigerating units’ hermetic compressors<br />are determined. The topology of the adaptive Luenberger observer, which allows real-time estimation of the current value of the rotational speed and load torque on the shaft of the hermetic compressor electric motor, is proposed.<br />Objective. The object of the study is the coordinates observer as a part of control system of the hermetic compressor electric drive. The purpose of the work is to develop a mathematical model of the coordinates observer as a part of control<br />system of the hermetic compressor electric drive.<br />Method. Based on the linearized model of a three-phase induction motor, the Luenberger observer is synthesized by the modal method with the distribution of the roots of the characteristic polynomial according to the standard linear<br />Bessel form.<br />Results. The characteristic polynomial of the observer is obtained and the coefficients of the Luenberger matrix and the mean geometric root of the characteristic polynomial are calculated. To ensure the necessary accuracy the structure of the observer on the basis of the complete mathematical model of a three-phase induction motor executed in the fixed coordinate system is proposed. In the Matlab/Simulink simulation environment an imitation model of the Luenberger observer, which includes a complete mathematical model of the hermetic compressor electric motor in the fixed coordinate system, is constructed. By means of simulation modeling the work of the projected Luenberger observer is studied using the example of the modernized three-phase induction motor of the domestic refrigerator’s hermetic compressor. Conclusions. The efficiency of the proposed method for identifying the rotational speed and the load torque of the compressor motor by the adaptive observer based on the calculation of the motor’s electromagnetic moment from the<br />measured data of the phase voltage and current sensors is confirmed. The error of the researching observer does not exceed 0.5% at the rotation speed and 10% at the load torque. The obtained structure of the adaptive Luenberger observer<br />makes it possible to build closed control systems for the electric drive of a small refrigerating unit’s hermetic compressor.</p>Copyright (c) 2019 A. Y. Bukaros, O. A. Onyshchenko, P. N. Montik, V. L. Malyshev, V. N. Bukaroshttp://ric.zntu.edu.ua/article/view/164266ROBUST CONTROL OF LASER ACTUATOR FOR TECHNICAL VISION SYSTEM2019-04-16T11:20:58+03:00A. G. GurkoGurko@gmail.com<p>Context. The SLAM problem solving for an autonomous mobile robot requires efficient technical means for surrounding terrain scanning with the purpose of its mapping and obstacles detecting. As such means, laser scanning systems are widely used both independently and in combination with other tools as a part of a uniform technical vision system of a mobile robot. One of the problems<br />with a technical vision systems operation is the ability to detect relatively small obstacles, which requires scanning of a limited sector within the field of view or even focusing on a specific point of space. This study is devoted to the issue of improving the reliability of obstacles detecting within the robot field of view by improving the laser actuator of the technical vision system.<br />Objective. The objective of the work is to the reliability increasing of obstacles detection within the robot technical vision system field of view due to the robust control of the actuators of the positioning system of the laser.<br />Method. The classical PD-controller for the laser positioning actuator, which meets the requirements for the quality of the transient process, has been synthesized. The evaluation of robust properties of the obtained control system showed both a significant dependence of the actuator dynamic properties on the variation of the values of the actuator model parameters and the potential possibility<br />of its time response increasing. With the help of the MATLAB Robust Control Toolbox, the controller gains have been redefined to ensure the robust properties<br />of the control system. The analysis of the influence of parametric uncertainties of the actuator model on the system dynamic properties is conducted.<br />Results. A robust PD-controller for the laser beam positioning system actuator for the technical vision system has been synthesized. It combines the simplicity of the implementation of a classic controller with a weak sensitivity to the uncertainties presence.<br />Conclusions. The using of the controller at the mobile robot laser technical vision system will increase the reliability of obstacle detection and, as a result, the accuracy of mapping of a limited sector within the robot field of view under the conditions of the parametric uncertainty of the actuator model.</p>Copyright (c) 2019 A. G. Gurkohttp://ric.zntu.edu.ua/article/view/164273OPTIMIZATION OF RELIABILITY OF COMPLEX NON-REPETITIVE SYSTEMS2019-04-16T11:21:12+03:00A. I. KosolapKosolap@gmail.comA. A. DovgopolayaDovgopolaya@gmail.com<p>Context. In this paper we consider problems of optimizing the reliability of complex non-repairable systems. Such systems consist of a set of interrelated elements. Optimizing the reliability of such systems is a complex computational problem and requires the development of new methods.<br />Objective. Construction of mathematical models of complex non-repetitive systems and development of effective methods for optimization their reliability.<br />Method. We use the method of exact quadratic regularization to solve problems of optimizing the reliability of complex systems. Precise quadratic regularization allows us to transform multiextremal problems of optimizing the reliability of complex systems to the problem of maximizing the norm of a vector on a convex set. We use the effective primal-dual interior point method and the dichotomy method to solve the transformed problem. The method of exact quadratic regularization made it possible to significantly expand the classes of solvable optimization problems for the reliability of complex systems. This is confirmed by comparative numerical<br />experiments.<br />Results. Comparative numerical experiments show that the method of exact quadratic regularization is more efficient than existing methods for solving this class of problems. This method allows you to extend classes of problems optimizing the reliability of complex systems for which it allows you to find optimal solutions.<br />Conclusions. We proposed an effective method for optimizing complex non-repetitive systems, this method showed the best numerical results.</p>Copyright (c) 2019 A. I. Kosolap, A. A. Dovgopolayahttp://ric.zntu.edu.ua/article/view/164343AN OPTIMAL TWO-STAGE ALLOCATION OF MATERIAL FLOWS IN A TRANSPORT-LOGISTIC SYSTEM WITH CONTINUOUSLY DISTRIBUTED RESOURCE2019-04-16T11:21:21+03:00S. A. UsUs@gmail.comL. S. KoriashkinaKoriashkina@gmail.comO. D. StaninaStanina@gmail.com<p>Context. The object of the research is a two-stage process of material flows allocation in the transport-logistic system, the structural elements of which are enterprises that collect a resource, is been distributed in a certain territory (centers of the first stage), and the enterprises that consume or process this resource. A mathematical model of such process is a two-stage problem of the optimal partitioning of a continual set with the locating of subset centers under additional constraints presented in the paper. <br />Objective. The goal of the work is to ensure the reduction of transport costs in the organization of multi-stage production, the raw material resource of which is distributed in some territory, through the development of appropriate mathematical apparatus and software. The urgency of the work is explained by one of the most pronounced tendencies in extracting and processing branches of industry and agriculture, namely, the creation of territorially-distributed multilevel companies that include dozens of large enterprises and carry out a full cycle of production from raw material harvesting with its integrated use and the product manufacturing to its<br />transportation to end consumers.<br />Method. Mathematical apparatus for two-stage problems of optimal partitioning of sets with additional couplings was developed using the basic concepts of the theory of continuous linear problems of optimal set partitioning, duality theory, and methods for solving linear programming problems of transport type. The research shows that the formulation of a multi-stage transport-logistic problem in a continuous variant (in the form of an infinite-dimensional optimization problem) is expedient when the number of resource suppliers is limited but very large. The application of the developed mathematical apparatus makes it possible to find the<br />optimal solution of the two-stage allocation-distribution problem in an analytic form (the analytic expression includes parameters that are the optimal solution of the auxiliary finite-dimensional optimization problem with a nondifferentiable objective function). The proposed iterative algorithm for solving the formulated problem bases on modification of Shor’s r-algorithm and the method of potentials for solving the transport problem.<br />Results. Developed mathematical models, methods and algorithms for solving continuous multi-stage problems for locating enterprises with a continuously distributed resource can be used to solve a wide class of continuous linear location-allocation problems. The presented methods, algorithms and software allow solving several practical problems connected, for example, with the strategic planning in the production, social and economic fields. The theoretical results obtained are been brought to the level of specific recommendations that can be used by state-owned and private enterprises in solving logistics tasks related to the organization<br />of collection of a certain resource and its delivery to processing points, as well as further transportation of the product received to places of destination.<br />Conclusions. The results of the computational experiments testify to the correctness of the developed algorithms operation for solving two-stage optimal set partitioning problems with additional couplings. Furthermore, it is confirmed the feasibility of formulating such problems when it is necessary to determine the location of new objects in a given territory, considering the multistage<br />raw material resource distribution process. Further research is subject to the theoretical justification of the convergence of the iterative process realized in the proposed algorithm for solving continuous problems of OPS with additional couplings. In future, the development of software to solve such problems with the involvement of GIS-technologies is planned. </p>Copyright (c) 2019 S. A. Us, L. S. Koriashkina, O. D. Stanina