The article is devoted to the development and research the unmanned aerial vehicle safe flight trajectory calculation and adjustment process imitation model. The main distinguishing feature of the presented model is taking into account the signals of radar stations during the determination and adjustment the location of the aerial vehicle in the case of an autonomous flight and adapting the route based on possible obstacles and deviations. This will improve the safety of the unmanned aerial vehicle flight trajectory. Main studies of path planning methods approaches are analyzed. It was concluded that two-dimensional representation and visualization has disadvantages. Based on disadvantages, the three-dimensional calculated trajectory visualization of a flight mission by an unmanned aerial vehicle simulation model is developed. The simulation model combines the solution of following subtasks: a) modeling a three-dimensional environment with obstacles; b) building an unmanned aerial vehicle trajectory in such environment with avoidance the obstacles. Missions simulation is performed based on developed software system, sequentially, step by step. The following results of the simulation are achieved: 1) a special graphical interface for entering input data and displaying the results is developed; 2) the subsystem for simulation the space for performing a flight task taking into account the location and signals of external influences (for example, radar stations) was developed; 3) the subsystem for flight trajectory simulation calculation and visualization is developed. The software system is built using Delphi based on modular basis. The functional software system structure and the order of each functional module operation are described in article. The system’s graphical interface structure is discussed separately. An example of calculating and adjusting the safe flight trajectory of an unmanned aerial vehicle is illustrated.
Робота присвячена питанню використання нечіткої моделі для оцінки ризиків інформаційної безпеки та підтримки рівня захищеності ERP-систем. Розглянуто вимоги до інформаційної безпеки ERP-систем та проаналізовано проблеми їх безпеки та вразливості. Визначено основні фактори, що впливають на оцінку ризиків.. Зважаючи на якісний, неточний та значною мірою не визначений, або неповний характер інформації про більшість факторів, запропоновано використання лінгвістичного підходу для їх опису. Такий підхід забезпечує можливість отримання кількісного опису елементів моделі за умов наявності лише нечіткої інформації про значення факторів ризику інформаційної безпеки і дозволяє спростити подальший процес ранжування факторів ризиків та чисельного розрахунку значень їх наслідків. Розроблена нечітка продукційна модель оцінки ризиків інформаційної безпеки ERP-систем, що дозволяє виконувати оцінку ризику за чотирма факторами: цінність ресурсу, вплив наслідку на ресурс, ймовірність виникнення загрози та вразливість ресурсу. База нечітких продукційних правил має структуру MISO. Зазначену модель реалізовано з використанням пакету прикладних програм MATLAB та пакету розширення Fuzzy Logic Toolbox. Для нечіткого виведення використано алгоритм Сугено. Результати моделювання процесу отримання оцінок ризиків інформаційної безпеки та аналізу отриманих результатів продемонстрували достатньо високу точність запропонованої моделі у порівнянні з експертними оцінками. Запропоновані підходи щодо оцінки ризиків можуть бути використані як для оцінки конкретних видів ризиків інформаційної безпеки ресурсів ERP-системи, так і загального ризику інформаційної безпеки ERP-системи. Ключові слова: ERP-система, загрози інформаційної безпеки, ризики інформаційної безпеки, нечітка модель, продукційна модель, нечітке логічне виведення.
The paper considers the problem of modeling the movement of customers in retail space under conditions of social distancing, which is caused by the requirements to prevent infection and further spread of the coronavirus infection COVID-19. A discrete model of a retail space, a model of a customer, a model of customers' movement according to the principles of functioning of a two-dimensional cellular automaton without memory have been developed. The retail space model allows to take into account the key objects of a retail space such as a supermarket/hypermarket: racks, cash desks, entrance, exit from the premises. In contrast to the classical models of representing a person using cellular automata, the customers' model ensures that social distance is taken into account by expanding the Moore neighborhood to about 2. In this case, the Moore neighborhood of order 1 is used to directly move the cell of the automaton representing the customer, and the cells of the neighborhood of order 2 are used to determining compliance with social distancing restrictions. The model of the customer behavior takes into account real-life situations: just like people, the cells of an automaton can “violate” the rules of social distancing. The set of rules for the customer's model is based on the general strategy of bypassing the retail space and contains additional restrictions regarding conflict situations for violating social distance, as well as a description of behavior in normal traffic and movement in the event of extreme situations. These models are implemented in software, which allows to control the settings of the simulation parameters. Heatmaps are used to visually represent the simulation results, showing the zones of pollution and zones of violation of social distance. The simulation results show that even with a slight increase in the probability of customers violating social distance, the number of distance violation cases grows exponentially.
The model of support of processes of development of intelligent decision-making support systems (IDMSS) is presented. The model contains a description of methods and tools to support the processes of development of IDMSS, the structure of the repository of decision-making methods, architecture and methodology of development of a typical IDMSS. The methodology is based on such principles: use of existing solutions, scalability, accessibility, independence from the subject area, informativeness. Adherence to these principles is ensured by the use of ontological, microservice and framework approaches, as well as approaches to rapid prototyping and methodology of flexible software development. The main methodological provisions of using the model are based on elements of Web technologies and development of information and analytical resources. The means of support of IDMSS development processes are described in detail – ontology of the field of knowledge “Decision-making support”, information-analytical resource, repository of decision-making support methods (DMS), methods of IDMSS development. As a framework of IDMSS it is offered to use an information-analytical resource which is constructed on the basis of ontology of subject area and methods of the used technology. With the help of services connected to the resource, which implement the stored DMS methods, the functionality of the developed IDMSS is provided. The language of descriptive logic is used to describe the model of complex support. Architectural solutions for which the developer and user interface are deployed in a separate container are presented. A solution for storing content and ontologies of the subject area in the repository with the organization of access through services is proposed.
Code on the outputs of adder binary numbers described as the remainder of the sum the initial data on the adder module is equal to output carry weight. An original technique for synthesizing a way of operands representation in the addition and subtraction schemes of integers in a code with a negative zero was developed, which is based on the representation the source data in the form a remainder on the adder module. A method of computer representation for integer numbers is proposed, in which the codes of posi-tive and negative numbers are formed by the same procedure. The property of duality the addition and sub-traction operations on the initial data in the code with a negative zero have justified analytically. Areas of allowable results values for the correct input data addition and subtraction operations are determined. It is identified combination of the adder output signals, which determine the presence and polarity the adder bit grid overflow. It is shown that designed fixing scheme bit grid overflow of adder outputs invariant with re-spect to operations of addition and subtraction of source data with a negative zero code. For the analytical description of arithmetic operations on integer numbers represented with the proposed encoding method, a technique of calculating the sum and difference of numbers using the biased supplementary code has been proposed. Analytically substantiated, that the technique makes the scheme of the operational adder homoge-neous. The rules for establishing the correctness of the addition and subtraction operations of the integers given in the proposed encoding form are given. For true values of the initial arguments, the sums and the differences codes ranges are obtained, and the rules for positive and negative overflows identification are proposed. The original usage of a common numerical bias during the operands encoding, that evinces itself in the advantages of basic computer operations technical implementation, predetermines positive properties in practical implementations of more complex arithmetical actions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.