Issue 4 (214), article 1

DOI:https://doi.org/10.15407/kvt214.04.004

Cybernetics and Computer Engineering, 2023, 4(214)

Gladun A.Y.1, PhD (Engineering), Associate Professor,
Leading Researcher of the Department of Complex Research 
of Information Technologies and Systems,
https://orcid.org/0000-0002-4133-8169,
e-mail: glanat@yahoo.com

Rogushina J.V.2, PhD (Phys.-Math.), Associate Professor,
Senior Researcher of the Automated Information Systems Department,
https://orcid.org/0000-0001-7958-2557,
e-mail: ladamandraka2010@gmail.com

Pryima S.M.3, DSc (Pedagogy), Professor,
Professor of the Computer Science Department,
https://orcid.org/0000-0002-2654-5610,
e-mail: pryima.serhii@tsatu.edu.ua

1International Research and Training Center for Information
Technologies and Systems of the National Academy of Sciences
of Ukraine and the Ministry of Education and Science of Ukraine,
40, Acad. Glushkov av., Kyiv, 03187, Ukraine

2Institute of Software Systems of National Academy of Sciences of Ukraine,
40, Acad. Glushkov av., Kyiv, 03187, Ukraine

3Dmytro Motornyi Tavria State Agrotechnological University,
66, Zhukovskogo street, Zaporizhzhia, 72312, Ukraine

COMPLEX INFORMATION OBJECTS REPOSITORY AS A COMPONENT OF THE SEMANTIC ANALYTIC-INFORMATION WEB-ORIENTED SYSTEMS DEVELOPMENT

Introduction.  The paper examines the issue of reusing ontological knowledge in semantic analytical and informational web-oriented systems and analyzes the problems that arise in the process of searching for and exporting such knowledge from external ontologies. It proposes to create a repository of complex information objects, which should expand the functionality of services provided by ontology repositories, and provide opportunities to search for elements of such ontologies at the content level, taking into account the semantics of the relationships between them. The work states the basic requirements for such a repository, analyzes the technologies that can be used to replenish it, and offers some examples of areas of its practical use. The proposed approach consideres on a practical example of the creation of a semantic directory for finding educational materials, which is oriented towards functioning in an open web environment and exporting information from external sources. The prototype of the system is implemented on the basis of the semantic extension of wiki technology, and the elements of the structure of complex information objects processed in the system are obtained from relevant external ontologies.

The purpose of the paper is to develop algorithms and methods of using formalized ontological knowledge of the subject area for the creation of applied semantically oriented information and analytical systems, to export knowledge from external ontologies, to create a repository of complex information objects with extended functionality of services.

The results. Development of the concept of a repository of complex information objects for applied systems of artificial intelligence, which provides a search for instances of various ontological classes connected by certain types of semantic relations. Improvement of existing functionalities of ontology repositories due to export of knowledge about the structure of CIO from external sources of knowledge and semantically marked documents. The developed algorithms and methods of creating repositories of complex information objects make it possible to analyze complex collections of different classes of information objects, interconnected by relationships, restrictions and rules for semantic analytical and informational web-oriented systems. The basic requirements for the repository are formed and the method of its replenishment is presented. The obtained results make it possible to create original intelligent information systems for artificial intelligence in the field of big data processing, cyber security, competence analysis when creating professional groups for the implementation of an innovative project, human resources management, finance and business, for companies that work with dynamically changing content of documents (jurisprudence , standardization, state authorities), national security, defense and military spheres.

Conclusions.  The proposed original approach, algorithms and method for improving the repository of complex information objects, expanding its functionality and ensuring its replenishment due to the export of knowledge from external sources (Wikipedia, encyclopedias, dictionaries, repositories of scientific publications, directories) and semantically marked documents and tracking dynamic changes occurring in these sources and documents. A prototype of the semantic web-oriented system “e-Textbook” is created, which ensures the selection of relevant textbooks for teachers and students of educational institutions for work programs of educational disciplines. The application of ontologies and data in the “e-Textbook” system based on the semantic analysis of metadata and the determination of the semantic similarity of structural data models (ontologies, data) and the formation of a ranked set of related ontologies to solve the tasks.

Keywords: wiki, knowledge-oriented information resource, ontology, formal ontology model, intelligent information system, ontology repository, complex information object.

Download full text!

REFERENCES

1 Rogushina J.V. , Gladun A.Ya. The use of ontologycal knowledge for multi-criteria comparison of complex information objects. Problems of programming. 2022, N2-3. P. 249-259. URL: pp.isofts.kiev.ua/ojs1/article/view/526/523. pp 2022.03-04.249 (In Ukrainian)
https://doi.org/10.15407/pp2022.03-04.249

2 Guarino N. Formal Ontology and Information Systems. Formal Ontology in Information Systems. Proceedings of FOIS’98, by N. Guarino (ed.). Trento. Italy, Amsterdam, IOS-Press. 1998. P. 3-15 https://klevas.mif.vu.lt/~donatas/Vadovavimas/Temos/OntologiskaiTeisingas KoncepcinisModeliavi-mas/papildoma/Guarino98-Formal%20Ontology%20and% 20Informa-tion%20Systems.pdf

3 Rogushina J.V. Classification of means and methods of the Web semantic retrieval. Problems of programming. 2017. № 1. P. 30-50. (In Ukrainian)
https://doi.org/10.15407/pp2017.01.030

4 Rogushina J., Priyma S. Use of competence ontological model for matching of qualifications // Chemistry: Bulgarian Journal of Science Education, Volume 26, Number 2, 2017. P.216-228. http://elar.tsatu.edu.ua/bitstream/123456789/ 3181/1/2.pdf.

5 Gladun A.Ya., Rogushina J.V. Ontologies repository as a method to knowledge reusage for information objects recognition. Ontology of design, № 1 (7), 2013. P. 35-50.

6 FAIR_data. https://en.wikipedia.org/wiki/FAIR_data.

7 Rogushina, Y. V. (2023). Use of ontologies and semantic mediawiki for representation and retrieval of scientific data in the FAIR paradigm. CEUR Workshoop Proceedings. Vol. 2866. P. 61-73.
https://doi.org/10.30525/978-9934-26-277-7-200

8 Bassiliades N. EvdoGraph: A Knowledge Graph for the EVDOXUS Textbook Management Service for Greek Universities. Accepted for presentation at, 15th International Conference on Knowledge Engineering and Ontology Development (KEOD 2023), 13-15 Nov 2023, Rome, Italy. https://intelligence.csd.auth.gr/wp-content/uploads/2023/08/EvdoGraph-CR.pdf
https://doi.org/10.5220/0012153600003598

9 Bizer, C., Heath, T., & Berners-Lee, T. (2023). Linked data-the story so far. Linking the World’s Information: Essays on Tim Berners-Lee’s Invention of the World Wide Web (pp. 115-143).
https://doi.org/10.1145/3591366.3591378

10 Wylot M., Hauswirth M., Cudré-Mauroux P., Sakr, S. RDF data storage and query processing schemes: A survey. ACM Computing Surveys (CSUR). 2018, 51(4), 1-36.
https://doi.org/10.1145/3177850

11 Antoniou G., Van Harmelen F. Web ontology language: Owl. Handbook on ontologies. Springer Berlin Heidelberg, 2004, pp. 67-92.
https://doi.org/10.1007/978-3-540-24750-0_4

12 Hogan A., Blomqvist E., Cochez M., D’amato C., Melo G., Gutierrez C., Zimmermann A. Knowledge graphs. ACM Computing Surveys. 2022, 54(4), pp. 1-37.
https://doi.org/10.1145/3447772

13 Yu, L., & Yu, L. (2011). Linked open data. A Developer’s Guide to the Semantic Web. 2011, pp. 409-466.
https://doi.org/10.1007/978-3-642-15970-1_11

14 Bizer C., Heath T., Berners-Lee T. Linked datathe story so far. International journal on semantic web and information systems. 2009, 5(3), pp. 1-22.
https://doi.org/10.4018/jswis.2009081901

15 Stancin K., Poscic P., Jaksic D. Ontologies in education – state of the art. Education and Information Technologies. 2020, 25(6), pp. 5301-5320.
https://doi.org/10.1007/s10639-020-10226-z

16 Färber M. The Microsoft Academic Knowledge Graph: A Linked Data Source with 8 Billion Triples of Scholarly Data. ISWC 2019, LNCS. 11779, pp. 113-129. Springer.
https://doi.org/10.1007/978-3-030-30796-7_8

17 Jaradeh M. Y., Oelen A., Farfar K. E., Prinz M., D’Souza J., Kismihók G., Auer S. Open research knowledge graph: Next generation infrastructure for semantic scholarly knowledge. KCAP 2019 (pp. 243-246). ACM.
https://doi.org/10.1145/3360901.3364435

18 Abu-Salih, B. Domain-specific knowledge graphs: A survey. Journal of Network and Computer Applications. 2021, 185.
https://doi.org/10.1016/j.jnca.2021.103076

19 Vandenbussche P.-Y., Atemezing G. A., Poveda-Villalón M., Vatant B. Linked Open Vocabularies (LOV): A gateway to reusable semantic vocabularies on the Web. Semantic Web. 2017, 8(3), pp. 437-452.
https://doi.org/10.3233/SW-160213

20 Corson-Rikert J., Mitchell S., Lowe B., Rejack N., Ding Y., Guo C. The VIVO Ontology. VIVO, Synthesis Lectures on Data, Semantics, and Knowledge. 2012, pp. 15-33. Springer, Cham.
https://doi.org/10.1007/978-3-031-79435-3_2

21 Demartini G., Enchev I., Gapany J., Cudré-Mauroux P. The Bowlogna ontology: Fostering open curricula and agile knowledge bases for Europe’s higher education landscape. Semantic Web. 2013. 4(1), pp. 53-63.
https://doi.org/10.3233/SW-2012-0064

22 ESCO (the European Multilingual Classifier of Skills, Competences, Qualifications and Occupations. https://ec.europa.eu/esco/portal/home.

23 Vrandečić D., Krötzsch K. Wikidata: a free collaborative knowledgebase. Communications ACM. 2014, 10, pp. 78-85.
https://doi.org/10.1145/2629489

Received 30.08.2023

Issue 4 (214)

DOI:https://doi.org/10.15407/kvt214.04

View web version

TABLE OF CONTENTS:

Informatics and Information Technologies:

Gladun A.Ya., Rogushina J.V., Pryima S.M.
Complex Information Objects Repository as a Component of the Semantic Analitic-Information Web-Oriented Systems Development

Popov I.V., Lakhtyr D.A.
Algorithms and Methods for Surface Recunstruction of Freeform Shape Infrastructure Objects for Building Information Modelling

Melnychenko A.S., Vodolazskyi Ye. V.
Texture Missing Parts Generation Based on Image Statistical Analysis

Intelligent Control and Systems:

Aralova N.I., Radziejowski P.A., Radziejowska M.P., Aralova A.A.
Itelligent Decision-Making Support Technologies Regarding the Optimization of the Physical Training of Military Servicemen

Medical and Biological Cybernetics:

Kutsiak O.A., Vovk M.I., Matsaienko A.M.
Information Technology for Efficient Recovery/Correction of Muscle Activities for Motor Task Performance

Information Notices. Prominent Scientists of Ukraine:

V.I. Grytsenko: The foundation and development of information technologies

Issue 3 (213), article 5

DOI:https://doi.org/10.15407/kvt213.03.069

Cybernetics and Computer Engineering, 2023, 3(213)

Kalnysh V.V., DSc (Biology), Professor,
Professor of the Department of Aviation, Marine Medicine and Psychophysiology
https://orcid.org/0000-0002-5033-6659,
e-mail: vkalnysh@ukr.net

Ukrainian Military Medical Academy
45/1,b 33, Knyaz Ostrozki st., Kyiv, 01011, Ukraine

INFORMATIONAL APPROACHES TO THE ANALYSIS OF THE INFLUENCE OF PSYCHO-EMOTIONAL STRESS ON THE STATE OF THE WORKING POPULATION AND MILITARY PERSONNEL OF UKRAINE

Introduction. The increased psycho-emotional stress significantly affects the working capacity of the population and the fighting capacity of military personnel, which indirectly affects the level of well-being of the entire population of Ukraine. Therefore, assessing the psycho-emotional stress on the working population and comparing it with indicators in other countries of the world will contribute to the development of adequate measures to reduce it. 

The purpose of the paper is to identify the prerequisites for the formation of stress reactions in the working population and military personnel in the event of hostilities escalation in our country, using informational approaches to the analysis of the psycho-emotional stress impact on the condition of the working population and military personnel of Ukraine. 

The results. The analysis of data from publicly available information sources made it possible to show that a significant degree of the psycho-emotional state of military personnel is formed on the basis of a high background level of stress load of the working population, which had a significant impact in the last decade. This was objectively reflected in the natural reduction of the country’s population, significant distortion of the structure of its traumatism and became the cause of informational and material transformations in the population. It was established that the index of population stress (IPS) used in the analysis, which assesses the asymmetry of deaths of persons of different sexes in their life activities, naturally increased during the period of intensive socio-economic transformations in Ukraine. The analysis of IPS dynamics showed that the working population can be divided into a separate group, where the socio-economic status influence on psycho-emotional stress in the population can be monitored to a greater extent. It is shown that IPS levels are unevenly distributed in different countries of the world. Among these countries, Ukraine is characterized by a high asymmetry in the mortality ratio of men and women. Based on the theory of sex’s asymmetry V.A. Geodakyan explained some mechanisms of balancing the mortality of men and women of working age. Approaches to the development of timely administrative state decisions by implementing monitoring of the psycho-emotional stress of the working population are proposed. 

Conclusions. The used index of population stress makes it possible to monitor the dynamics of the psycho-emotional stress transformation of the working population and, indirectly, of military personnel. Ukraine belongs to the countries with a “high” level of the population stress index, which indicates the existence of ultra-intensive transformations in the livelihood of its citizens. Organizational measures that will contribute to the development of adequate management solutions to normalize the psycho-emotional stress level of the working population and military personnel are proposed.

Keywords: information approaches, population stress index, psycho-emotional stress, structure of traumatism, socio-psychological processes, working population, military person.
Download full text!

REFERENCES

1. Newport F. Americans’ Confidence in Institutions Edges Up. Gallup. 2017. June 26. URL: https://news.gallup.com/poll/212840/americans-confidence-institutions-edges.aspx.

2. Paterson P. Measuring Military Professionalism in Partner Nations: Guidance for Security Assistance Officials Journal of Military Ethics, 2019, 18.2, pp. 145-163.
https://doi.org/10.1080/15027570.2019.1638461

3. Raudeliūnienė J., Tuncikienė Ž., Petrusevicius R. Competency assessment of professional military service in lithuanian armed forces. Journal of Security and Sustainability Issues. 2013, V. 3(1), pp. 61-71.
https://doi.org/10.9770/jssi.2013.3.1(7)

4. Kalnysh V., Nahorna A. Psychoemotional strain and phenomenon of “men and women mortality ratio” in the age aspect. J. of ecology and health. 2011, no 5, pp. 230-236.

5. Dicker D., Nguyen G., Abate D., Abate K.H., Abay S.M., Abbafati C., Abbasi N., Abbastabar H., Abd-Allah F., Abdela J., Abdelalim A. Global, regional, and national age-sex-specific mortality and life expectancy, 1950-2017: a systematic analysis for the Global Burden of Disease Study 2017. The Lancet, 2018, 392(10159), pp. 1684-1735.

6. Statistical yearbook of Ukraine for 2019. Under the editorship I.E. Werner. K.: State Statistics Service. 2020, 463 p. (in Ukrainian).

7. Nagorna A.M., Kalnysh V.V., Radionov M.O., Kononova I.G. Industrial injuries in Ukraine: epidemiological analysis and challenges of time. Environment and health. No.: 2 (107), 2023, pp. 4-15(in Ukrainian).
https://doi.org/10.32402/dovkil2023.02.004

8. Human Development Indices and Indicators. 2018. Statistical Update. https://hdr.undp.org/system/files/documents/2018humandevelopmentstatisticalupdatepdf.pdf

9. Kotsan I. Ya., Lozhkin G. V., Mushkevich M. I. Psychology of human health. Lutsk: RVV – Vega. Lesia Ukrainka Volyn National University, 2011, 430 p. (in Ukrainian)/

10. 10.Kalnysh V., Nahorna A. Psychoemotional strain and phenomenon of “men and women mortality ratio” in the age aspect. J. of ecology and health. 2011, no 5, p. 230-236.

11. Geodakyan V. A. Sexual dimorphism. In: Evolution and morphogenesis. (Mlikovsky J., Novak V. J. A., eds.), Academia, Praha, 1985, p. 467-477.

12. Vigen Geodakian Two Sexes. Why? The Evolutionary Theory of Sex. Wilmington, 2012, 246 p.

Received 06.06.2023

Issue 3 (213), article 4

DOI:https://doi.org/10.15407/kvt213.03.053

Cybernetics and Computer Engineering, 2023, 3(213)

Kozak L.M., DSc (Biology), Senior Researcher,
Leading Researcher, Medical Information Systems Department
https://orcid.org/0000-0002-7412-3041,
e-mail: lmkozak52@gmail.com

Kovalenko O.S., DSc (Medicine), Professor,
Head of Medical Information Systems Department
https://orcid.org/0000-0001-6635-0124,
e-mail: askov49@gmail.com

Surovtsev I.V., DSc (Engineering), Senior Researcher,
Head of the Ecological Monitoring Digital Systems Department
https://orcid.org/0000-0003-1133-6207,
e-mail: igorsur52@gmail.com

International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and Ministry of Education and Science of Ukraine,
40, Acad. Glushkova av., Kyiv, 03187, Ukraine

BASIC COMPONENTS OF THE SOFTWARE MODULES CONSTRUCTION FOR OBTAINING, STORING AND EXCHANGING MEDICAL AND ENVIRONMENTAL INFORMATION

Introduction. Currently, the exchange of medical information between healthcare facilities, data repositories, various mobile devices operating in a mobile medicine or telemedicine environment and patients is becoming increasingly important. 

Digital transformation in healthcare includes the use of electronic health records (EHR) in practical medicine, the information technologies creation for processing complex medical information using artificial intelligence, the telemedicine systems construction and the development of medical devices, software modules and mobile applications that completely change of the interaction between medical care providers, and the way of decisions regarding physicians` plans for diagnosis, treatment, rehabilitation, and disease prevention. 

Currently, in order to increase the effectiveness of preventive measures against a wide range of diseases, there is an urgent need to develop environmental control systems and devices built using modern wireless technologies, cloud services and mobile communication systems. 

The purpose of the paper is to analyze the main requirements and components of information flows for obtaining and exchanging digital medical and environmental data and implement them in information and software modules for obtaining, saving and exchanging this information for further analysis. 

The results. Today, all health information operations directly depend on the level of interoperability in the healthcare industry, that is, the ability of different information systems, devices and applications to access, exchange, integrate and share data in a coordinated way to ensure timely and seamless information exchange and optimize the process of providing medical care. 

To ensure the appropriate level of interoperability, a set of characteristics has been formed for each subject/object of interaction, consistent with its role function in the process of medical data exchange. An adaptive architecture of the digital medicine ecosystem has been developed, which enables the integration of data exchange tasks between participants using web services. 

According to the target function, several groups of information flows are identified, which are implemented during the interaction of the main participants in the provision of medical care: patient — physician, patient — health facilities, physician — physician. Based on taking into account the role and ways of transferring personal medical information between participants, an algorithm for the exchange of personal medical data was created. 

The selected basic characteristics of the digital medical data exchange process and the requirements for the structure and functions of the information and software tools supporting this process are implemented in the information and software modules for saving and exchanging clinical information. 

Conclusions. Software modules should implement one of the main functions of the digital medicine ecosystem and environmental monitoring — obtaining, storing and exchanging digital medical data that circulates between ecosystem participants. The main feature of such exchange and storage is the implementation of the principles of interoperability, which makes it possible to quickly and efficiently perform similar functions. and environmental monitoring — receiving, saving 

The developed information and software modules of various purposes implement the methodology of activities in the digital medicine ecosystem with various software applications to create a unified information environment with the placement of a database on the health status of patients on any storage, in particular, cloud storage.

Keywords: digital medicine ecosystems, electronic medical records, disease risks, determination of concentrations of toxic chemicals, interoperability, information flows, data analysis methods, information and software modules, measurement sensors. 
Download full text!

REFERENCES

1 Draft global strategy on digital health 2020-2025. July 2020 by WHO. URL: https://www.who.int/docs/default-source/documents/gs4dhdaa2a9f352b0445bafbc79ca 799dce 4d.pdf (Accessed 2021-may-20).

2 Vial G. Understanding digital transformation: A review and a research agenda. Journal of Strategic Information Systems, 2019, 28 (2), pp. 118-144.
https://doi.org/10.1016/j.jsis.2019.01.003

3 R. Agarwal, G. Guodong, C. DesRoches, A.K. Jha The digital transformation of healthcare: Current status and the road ahead. Information Systems Research. 21 (4) (2010), pp. 796-809.
https://doi.org/10.1287/isre.1100.0327

4 I.C. Marques, J.J. Ferreira Digital transformation in the area of health: Systematic review of 45 years of evolution. Health and Technology. 10 (2020), pp. 575-586.
https://doi.org/10.1007/s12553-019-00402-8

5 P. Reddy, S. Brahm Digitalisation: The future of healthcare. Journal of Business Management. (11) (2016), pp. 126-135.

6 Kovalenko O.S., Kozak L.M., Najafian Tumajani M., Romanyuk O.O. Experience and Prospects of Creating Medical Information Systems and Information Technologies to Support Medical Care. Cybernetics and Computer Engineering. 2022, 1(207), pp. 59-73. (in Ukrainian)
https://doi.org/10.15407/kvt207.01.059

7 Romaniuk, O. O., Kozak, L. M., and Kovalenko, O. S. Formation of Interoperable Digital Medicine Information Environment: Personal Medical Data. Sci. innov. 2021, V. 17, no. 5, pp. 50-62.

8 Tortorella G.L., Fogliatto F.S., Tlapa Mendoza D., Pepper M., Capurro D. Digital transformation of health services: a value stream-oriented approach. Int J Prod Res. (2022) 2022:1-15. 10.1080/00207543.2022.2048115

9 Pappas I.O., Mikalef P., Giannakos M.N., Krogstie J., Lekakos G. Big data and business analytics ecosystems: paving the way towards digital transformation and sustainable societies. Inform Syst e-Buss Manag. 2018, 16:479-91. 10.1007/s10257-018-0377-z
https://doi.org/10.1007/s10257-018-0377-z

10 Gopal G., Suter-Crazzolara C., Toldo L., Eberhardt W. Digital transformation in healthcare-architectures of present and future information technologies. Clin Chem Lab Med (CCLM). (2019) 57:328-35. 10.1515/cclm-2018-0658
https://doi.org/10.1515/cclm-2018-0658

11 Ricciardi W, Pita Barros P, Bourek A, Brouwer W, Kelsey T, Lehtonen L, et al.. How to govern the digital transformation of health services. Eur J Public Health. (2019) 29(Supplement_3):7-12. 10.1093/eurpub/ckz165
https://doi.org/10.1093/eurpub/ckz165

12 Natakusumah K, Maulina E., Muftiadi A., Purnomo M. Digital transformation of health quality services in the healthcare industry during disruption and society 5.0 era. Front Public Health. 2022
https://doi.org/10.3389/fpubh.2022.971486

10: 971486. Published online 2022 Aug 4. doi: 10.3389/fpubh.2022.971486
https://doi.org/10.3389/fpubh.2022.971486

13 Lisky I. How digital medicine is changing the field of health.care.https://nv.ua/ukr/opinion/ onlayn-konsultaciji-yake-maybutnye-u-cifrovoji-medicini-novini-ukrajini-50106243.html (in Ukrainian)

14 P.C. Verhoef, T. Broekhuizen, Y. Bart, A. Bhattacharya, J.Q. Dong, N. Fabian, M. Haenlein. Digital transformation: A multidisciplinary reflection and research agenda. Journal of Business Research. Vol 122, January 2021, Pages 889-901.
https://doi.org/10.1016/j.jbusres.2019.09.022

15 Digital medicine and integration of modern medical technologies. URL: https://www.medintegro.com.ua/cifrova-medycyna/ (in Ukrainian)

16 Challenges of digital transformation of the healthcare system of Ukraine (eHealth). URL: https://blogs.pravda.com.ua/authors/badikov/5ee39c2943d7d/ (in Ukrainian)

17 Hermes S., Riasanow T., Clemons E.K., Bohm M., Krcmar H. The digital transformation of the healthcare industry: exploring the rise of emerging platform ecosystems and their influence on the role of patients. Bus Res. (2020) 13:1033-69. 10.1007/s40685-020-00125-x
https://doi.org/10.1007/s40685-020-00125-x

18 Kraus S., Schiavone F., Pluzhnikova A., Invernizzi A.C. Digital transformation in healthcare: Analyzing the current state-of-research. Journal of Business Research. Vol. 123, February 2021, pp. 557-567. https://doi.org/10.1016/j.jbusres.2020.10.030
https://doi.org/10.1016/j.jbusres.2020.10.030

19 Davis S, Roudsari A, Raworth R, Courtney KL, MacKay L. Shared decision- making using personal health record technology: a scoping review at the crossroads. J Am Med Inform Assoc. 2017, Jul 01;24(4):857-866.
https://doi.org/10.1093/jamia/ocw172

20 Surovtsev I.V., Velykyi P.Y., Galimova V.M., Sarkisova M.V. Ionometric method for determination of concentrations of microelements in research of digital medicine. Cybernetics and Computer Engineering. 2020, No. 4 (220), 25-43. https://doi.org/10.15407/kvt202.04.025
https://doi.org/10.15407/kvt202.04.025

21 Khan F.S., Soiland-Reyes S., Sinnott R.O., Lonie A., Goble C., Crusoe M.R. Sharing interoperable workflow provenance: A review of best practices and their practical application in CWLProv. Giga Science. 2019, no.8, pp.1-27.
https://doi.org/10.1093/gigascience/giz095

22 Managing Existing Patient Records in the Transition to EHRs in Physician Practices. URL: https://library.ahima.org/doc?oid=101080

23 Kaufmann M.J. Managing Electronic Health Record Security. March 25, 2021. URL: https://saviynt.com/managing-electronic-health-record-security/

24 EMR Management System: 5 Ways to Efficiently Manage EHR Data URL: https://www.mediquant.com/emr-management-system/

25 Jauregui F. Syntactic and Semantic Interoperability. URL: https://www.electrosoft-inc.com/electroblog/syntactic-and-semantic-interoperability

26 Technical Interoperability. URL: https://joinup.ec.europa.eu/collection/nifo-national-interoperability-framework-observatory/glossary/term/technical-interoperability

27 Hare V. What Is Interoperability and Why Is It Important? URL: https://www.tokenex.com/ blog/what-is-interoperability-and-why-is-it-important/

28 Kovalenko O.S., Mishchenko R.F., Kozak L.M. Transformation of Clini-cal Decision Support Systems into FHIR Structures to Ensure Quality of Medical Care. Cybernetics and Computer Engineering. 2019, 4(198), pp. 78-94.
https://doi.org/10.15407/kvt198.04.078

29 Kryvova O.A., Kozak L.M. Information Technology for Classification of Donosological and Pathological States Using the Ensemble of Data Mining Methods. Cybernetics and Computer Engineering. 2021, 1(203), pp. 77-96.
https://doi.org/10.15407/kvt203.01.077

Received 29.04.2023

Issue 3 (213), article 3

DOI:https://doi.org/10.15407/kvt213.03.036

Cybernetics and Computer Engineering, 2023, 3(213)

Revunova E.G., DSc (Engineering),
Leading Researcher of Neural Information Processing Technologies Department
https://orcid.org/0000-0002-3053-7090,
e-mail: egrevunova@gmail.com

International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and the Ministry of Education and Science of Ukraine,
40, Acad. Glushkova av., Kyiv, 03187, Ukraine

RANDOMIZED MATRIX CALCULATIONS AND SINGULAR VALUE DECOMPOSITION FOR THE EFFECTIVE JAMMING CANCELLATION IN RADIOLOCATION SYSTEMS

Introduction. Impact of the jamming leads to the high losses since it decreases effectiveness of radiolocation systems, anti-aircraft missile systems and communication systems. Strategies of forming and setting of the jamming are improving and the power of the jamming increases. In this regard, it is important to improve jamming cancellation systems.  

The task of the improvement for based on matrix calculations methods of the jamming cancellation is actual considering the breakthrough development of the computational methods which allows realization by digital circuit engineering. These include the most modern machine learning algorithms aimed at solving signal processing tasks.  

The requirement of the stable operation is important for the jamming cancellation systems under conditions of uncertainty. Other demand is an operation in the real time and a simple hardware implementation.  

The purpose of the paper is to increase the efficiency of the jamming cancellation in the antenna system (under conditions of uncertainty) based on the new randomized computation methods and their realization by the matrix-processor architecture.  

Results. The approach based on singular value decomposition and random projection is proposed. It provides effective jamming cancellation in the antenna systems under conditions of uncertainty that is, the sample has small length, there is an own noise of the measuring system, the input-output transformation matrix have undefined numerical rank and there is no prior information about useful signal 

Conclusions. The increase of the efficiency of the jamming cancellation includes the increase of the stability and jamming cancellation coefficient, and the reduction of the computational complexity.  

The increase of the jamming cancellation coefficient is provided by use of stable discrete ill-posed inverse problems solution methods of the signal recovery based on random projection and singular value decomposition. The decrease of the computational complexity is achieved by the realization of random projection and singular value decomposition as the processor array which make parallel computations.

Keywords: jamming, discrete ill-posed problem, antenna system singular value decomposition, random projection.
Download full text!

REFERENCES

1 Monzingo R.A., Miller T.W. Introduction to Adaptive Arrays. John Wiley. Chichester, 1980, 541 p.

2 Schmidt R.O. Multiple Emitter Location and Signal Parameter Estimation. IEEE Trans. Antennas Propagation. 1986, Vol. 34, pp. 276-280.
https://doi.org/10.1109/TAP.1986.1143830

3 Schmidt R.O. A signal subspace approach to multiple emitter location spectral estimation. PhD thesis. Stanford University. 1981, 201 p.

4 Krim H., Viberg M. Two decades of array signal processing research: The parametric approach. IEEE Signal Processing Magazine. 1996, Vol. 13, N 4, pp. 67-94.
https://doi.org/10.1109/79.526899

5 Bartlett M.S. Smoothing periodograms from time series with continuous spectra. Nature. 1948, Vol. 161, pp. 686-687.
https://doi.org/10.1038/161686a0

6 Panahi A., Viberg M. Fast lasso based DOA tracking. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). 4th IEEE International Workshop. 2011, pp. 397-400.
https://doi.org/10.1109/CAMSAP.2011.6136036

7 Panahi A. Viberg M. A novel method of DOA tracking by penalized least squares. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). 5th IEEE International Workshop, 2013, pp. 61-64.
https://doi.org/10.1109/CAMSAP.2013.6714007

8 Zheng J.M., Kaveh M. Sparse Spatial Spectral Estimation: A Covariance Fitting Algorithm, Performance and Regularization. IEEE Trans. Signal Processing. 2013, Vol. 61, N. 11, pp. 2767-2777.
https://doi.org/10.1109/TSP.2013.2256903

9 Hu N., Ye Z.F., Xu X., Bao M. DOA estimation for sparse array via sparse signal reconstruction. IEEE Transactions on Aerospace and Electronic Systems. 2013, Vol. 49, N. 2, pp. 760-772.
https://doi.org/10.1109/TAES.2013.6494379

10 Hansen, P. Rank-deficient and discrete ill-posed problems. Numerical aspects of linear inversion. Philadelphia: SIAM. 1998, 247 p.
https://doi.org/10.1137/1.9780898719697

11 Sarlos T. Improved Approximation Algorithms for Large Matrices via Random Projections. Proc. of the 47th Annual IEEE Symposium on Foundations of Computer Science. 2006, pp. 143-152.
https://doi.org/10.1109/FOCS.2006.37

12 Woolfe F., Liberty E., Rokhlin V., Tygert M. A fast randomized algorithm for the approximation of matrices. Applied and Computational. Harmon. Anal. 2008, Vol. 25, pp. 335-366.
https://doi.org/10.1016/j.acha.2007.12.002

13 Rokhlin V., Szlam A., Tygert M. A randomized algorithm for principal component analysis. SIAM Journal Matrix Anal. Application. 2009, Vol. 31, pp. 1100-1124.
https://doi.org/10.1137/080736417

14 Martinsson P.G. A fast randomized algorithm for computing a hierarchically semiseparable representation of a matrix. SIAM Journal on Matrix Analysis and Applications. 2011, Vol. 32, N 4, pp. 1251-1274.
https://doi.org/10.1137/100786617

15 Woodruff D.P. Sketching as a tool for numerical linear algebra. Foundations and Trends in Theoretical Computer Science. 2014, Vol. 10, pp. 1-157.
https://doi.org/10.1561/0400000060

16 Revunova E. G., Tyshchuk A.V. A Model Selection Criterion for Solution of Discrete Ill-Posed Problems Based on the Singular Value Decomposition. The 7th International Workshop on Inductive Modelling (IWIM 2015). Kyiv-Zhukyn. July 20-24, 2015, pp. 43-47.

17 Revunova E.G. Model selection criteria for a linear model to solve discrete ill-posed problems on the basis of singular decomposition and random projection. Cybernetics and Systems Analysis. 2016, Vol. 52, N.4, pp.647-664.
https://doi.org/10.1007/s10559-016-9868-4

18 Revunova E.G. Analytical study of the error components for the solution of discreteill-posed problems using random projections. Cybernetics and Systems Analysis. 2015, Vol. 51, N. 6, pp. 978-991.
https://doi.org/10.1007/s10559-015-9791-0

19 Revunova E.G. Averaging over matrices in solving discrete ill-posed problems on the basis of random projection. Proc. CSIT 17. 2017, Vol. 1, pp. 473-478.
https://doi.org/10.1109/STC-CSIT.2017.8098831

20 Revunova E.G. Solution of the Discrete ill-posed problem on the basis of singular value decomposition and random projection. Advances in Intelligent Systems and Computing II. Cham: Springer. 2017, pp. 434-449.
https://doi.org/10.1007/978-3-319-70581-1_31

21 Revunova E.G. Increasing the accuracy of solving discrete ill-posed problems by the random projection method. Cybernetics and Systems Analysis. 2018, Vol. 54, N 5, pp. 842-852.
https://doi.org/10.1007/s10559-018-0086-0

22 Forsythe G.E., Henrici P. The cyclic Jacobi method for computing the principal values of a complex matrix. Trans. Amer. Math. Soc. 1960, Vol. 94, pp. 1-23.
https://doi.org/10.1090/S0002-9947-1960-0109825-2

23 Brent R.P., Luk F.T. The solution of singular-value and symmetric eigenvalue problems on multiprocessor arrays. SIAM J. Sci. and Stat. Comput. 1985, Vol. 6, pp. 69-84.
https://doi.org/10.1137/0906007

24 Brent R.P. Parallel algorithms for digital signal processing. Proceedings of the NATO Advanced Study Institute on Numerical Linear Algebra, Digital Signal Processing and Parallel Algorithms. Leuven, Belgium. 1988, pp. 93-110.
https://doi.org/10.1007/978-3-642-75536-1_5

25 Schreiber R. Solving eigenvalue and singular value problems on an undersized systolic array. SIAM Journal Sci. Stat. Comput. 1986, Vol. 7, N. 2, pp. 441-451.
https://doi.org/10.1137/0907029

Received 28.04.2023

Issue 3 (213), article 2

DOI:https://doi.org/10.15407/kvt213.03.020

Cybernetics and Computer Engineering, 2023, 3(213)

Yermakova I.I.1, DSc (Biology), Professor
Leading Researcher of the Department of Complex Research
of Information Technologies,
https://orcid.org/0000-0002-9417-1120,
e-mail: irena.yermakova@gmail.com

Nikolaienko A.Yu.2, PhD (Engineering),
Assistant of the Department of Software Systems and Technologies
of the Faculty of Information Technology,
https://orcid.org/0000-0002-2402-2947,
e-mail: n_nastja@ukr.net

Hrytsaiuk O.V.1, PhD Student,
Junior Researcher of the Department of Complex Research of Information Technologies,
https://orcid.org/0000-0002-9019-4894,
e-mail: olegva11@gmail.com

Kravchenko P.M.1,
Senior Engineer of the Department of Complex Research of Information Technologies,
https://orcid.org/0000-0001-8137-5063,
e-mail: paul.kravchenko@gmail.com

Dorosh O.I.1,
Researcher of the Department of Complex Research of Information Technologies,
https://orcid.org/0000-0003-2488-0500,
e-mail: olehdd@gmail.com

1International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and Ministry of Education and Science of Ukraine,
40, Acad. Glushkova av., Kyiv, 03187, Ukraine

2Taras Shevchenko National University of Kyiv,
60, Volodymyrska str., Kyiv, 01033, Ukraine

INFORMATION TECHNOLOGY FOR PREDICTING OF HUMAN THERMOPHYSIOLOGICAL STATE IN COLD WATER

Introduction. Cold water is extreme environment for humans, which is attributed to the high thermal conductivity and heat capacity of water. People whose activities involve prolonged exposure to water with a temperature below 25 °C are at risk of hypothermia. The average temperature of the ocean’s surface waters fluctuates between 15 °C and 17 °C. Therefore, it’s important to inform all individuals who work, travel, engage in sports or relax by the sea, lakes or rivers in any region of the world about the risk of hypothermia. 

As of today, there are numerous mobile applications in the field of healthcare, but there is a lack of technology capable of preemptively alerting individuals to adverse conditions in water environments and providing appropriate recommendations. 

The purpose of the paper is to assess the safety of human presence in cold water using mobile technologies and mathematical models of human physiological systems.  

Results. An informational technology for predicting of human thermophysiological state in cold water has been developed with a client-server architecture. A key feature of this technology is the inclusion of modern mathematical models of human thermoregulation and heat exchange on server, which enable the consideration of environmental characteristics, physical activity, protective clothing, immersion level, and duration of human exposure to water.  

Conclusions. The proposed informational technology allows for the early detection of potential risks of hypothermia and provides recommendations for maintaining human health during cold water exposure. The utilization of the developed informational technology can prove valuable in the realm of healthcare for evaluating physiological reserves of the body and determining a safe duration for human presence in cold water.  

Keywords: informational technology, human thermoregulation model, risks of health, mobile applications, water environment, physical activity, protective clothing.
Download full text!

REFERENCES

1 Yermakova I., Montgomery L. Predictive Simulation of Physiological Responses for Swimmers in Cold Water. 2018 IEEE 38th International scientific conference electronics and nanotechnology (ELNANO). Kyiv, April 24-26. 2018. P. 292-297.
https://doi.org/10.1109/ELNANO.2018.8477523

2 Tipton M.J., Brooks C.J. The Dangers of Sudden Immersion in Cold Water. Survival at Sea for Mariners, Aviators and Search and Rescue Personnel. Brussels, Belgium. 2008. Chapter 3. P. 1-10. ISBN 978-92-837-0084.

3 Locarnini M.M., MishonovA.V., Baranova O.K., Boyer T.P., Zweng M.M., Garcia H.E., Smolyar I. World Ocean Atlas 2018. NOAA Atlas NESDIS 81. 2018. Vol. 1: Temperature. 52 p.

4 Competition Regulations. World Aquatics. Version in force of 5th July 2023. 543 p. URL: https://www.worldaquatics.com/swimming/rules

5 Dorosh N.V., Boyko O.V., Ilkanych K.I., Zayachkivska O.S., Basalkevych O.Y., Yermakova I.I., Dorosh O.I. M-health technology for personalized medicine. Development and modernization of medical science and practice: experience of Poland and prospects of Ukraine: Collective monograph. Vol.1. Lublin: Izdevnieciba “Baltija Publishing”, 2017. P. 66-855.

6 Gritsenko V.I., Yermakova I.I., Bogationkova A.I., Dorosh O.I. Information Technologies For Personalized m-Health. Visnyk of the National Academy of Sciences of Ukraine. 2016. No 2. P. 87-90. (in Ukrainian).
https://doi.org/10.15407/visn2016.02.087

7 Raimundo D.W. SwitP: Mobile Application for Real-Time Swimming Analysis. Distributed Computing Group. 2020 22p.

8 Yermakova I.I., Bogatonkova A.I., Nikolaienko A.Yu., Tadeeva J.P., Hrytsaiuk O.V., Solopchuk J.M. M-Health Technology for the Forecast of the Human Condition in Extreme Environmental Conditions. Cybernetics and Computer Engineering. Kyiv. 2021. No 3 (205). P. 84-97. (in Ukrainian).
https://doi.org/10.15407/kvt205.03.084

9 Beachsafe Website & App. URL: https://www.surflifesaving.com.au/beach-safety/beachsafe-website/

10 Shearwater Cloud Version 2.2.0 for Desktop and Mobile. URL: https://www.shearwater.com/ announcements/shearwater-cloud-version-2-2-0-for-desktop-and-mobile-is-now-available/

11 Mobile operating systems’ market share worldwide from 1st quarter 2009 to 2nd quarter 2023. URL: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/

12 Android Developers. Guide to app architecture. URL: https://developer.android.com/ topic/architecture

13 Kostiuk Y. Shestak Y. The transport layer of the ISO/OSI model in computer networks. Commodities and markets. 2021. Vol. 40 (4). P. 49-58.
https://doi.org/10.31617/tr.knute.2021(40)05

14 Heron S. Advanced encryption standard (AES). Network Security. 2009. Vol. 2009 (12). P. 8-12.
https://doi.org/10.1016/S1353-4858(10)70006-4

15 Andriani R., Wijayanti S.E., Wibowo F.W. Comparision of AES 128, 192 and 256 bit algorithm for encryption and description file. In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). Yogyakarta, Indonesia. November 13-14. 2018. P. 120-124.
https://doi.org/10.1109/ICITISEE.2018.8720983

16 Sury O. Use of the SHA-256 Algorithm With RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. Request for Comments. 2012. Vol. 6594. 9 p.
https://doi.org/10.17487/rfc6594

17 Yermakova I.I., Montgomery L.D., Potter A.W. Mathematical model of human responses to open air and water immersion: Modeling human thermoregulatory responses. Journal of Sport and Human Performance. 2022. Vol. 10(1). P. 30-45.

18 Yermakova I.I., Nikolaienko A.Yu., Bogatonkova A.I., Tadeeva J.P. Multifunctional Information System for Modeling of Human Thermophysiological State in Extreme Environments. Cybernetics and Computer Engineering. Kyiv. 2022. No 1 (207). C. 32-45. (in Ukrainian).
https://doi.org/10.15407/kvt207.01.032

19 Boutelier C., Bougues L., Timbal J. Experimental study of convective heat transfer coefficient for the human body in water. Journal of Applied Physiology. 1977. Vol. 42. No 1. P. 93-100.
https://doi.org/10.1152/jappl.1977.42.1.93

20 Rostomily K.A., Jones D.M., Pautz C.M., Ito D.W., Buono M.J. Haemoconcentration, not decreased blood temperature, increases blood viscosity during cold water immersion. Diving Hyperb Med. 2020. Vol. 50(1). P. 24-27.
https://doi.org/10.28920/dhm50.1.24-27

Received 26.06.2023

Issue 3 (213), article 1

DOI:https://doi.org/10.15407/kvt213.03.004

Cybernetics and Computer Engineering, 2023, 3(213)

Kyyko V.M., PhD (Engineering), Senior Researcher of the Pattern Recognition Department, https://orcid.org/0009-0005-6605-0339,
e-mail: vkiiko@gmail.com,

Matsello V.V., PhD (Engineering), Head of the Pattern Recognition Department, https://orcid.org/0000-0001-7640-4077,
e-mail: matsello@gmail.com

International Research and Training Center for Information Technologies and Systems of the National Academy of Sciences of Ukraine and the Ministry of Education and Science of Ukraine, 40, Acad. Glushkova av., Kyiv, 03187, Ukraine

REAL-TIME TRACKING OF OBJECTS IN VIDEO BASED ON ADAPTIVE HISTOGRAM FEATURES

Introduction. Object tracking in video is one of the open problems in computer vision and has a wide range of practical applications. The main difficulties of this task are that the object in the process of tracking can significantly change its appearance due to changes in lighting conditions, size and orientation in space, as well as disappear from the field of view. Analysis of known algorithms shows that each of them does not fully ensure reliable tracking of objects under the above conditions. One approach to improving tracking reliability is to develop a means of using multiple algorithms that complement each other in their capabilities. 

The purpose of the paper is to develop an algorithm for long-term real-time tracking of objects in video based on the use of complementary features and algorithms to obtain more reliable tracking results in difficult conditions. 

The results. An algorithm for long-term real-time tracking of objects in video has been developed based on the combined use of two algorithms with complementary features and capabilities – the well-known KCF algorithm with HOG features of brightness gradients and the developed CH algorithm using HSV histogram features of color representations of the object and background. It is shown that the algorithm has wider possibilities for its use compared to KCF and CH filters. The developed algorithm was tested on video from the VOT (Visual Object Tracking) database. 

Conclusions. The developed algorithm ensures restoration of object localization after its disappearance from the field of view, as well as increasing the accuracy and reliability of localization in comparison with KCF and CH algorithms. Localization recovery is performed by searching for an object on an enlarged area of the image using KCF or another algorithm. The high-speed CH algorithm is used to preliminarily reduce the number of cells in the search area that can match the object and reduce its search time. Increasing the accuracy and reliability of localization is achieved by using a more informative criterion in the form of a weighted sum of the responses of two filters, as well as a more accurate definition of the rectangle bounding the object based on the segmentation of the color representation of the image.

Keywords: object tracking in video, KCF tracking algorithm, HOG features, histogram features of colors in the image.
Download full text!

REFERENCES

1 C. Bao, Y.Wu, H. Ling, and H. Ji. Real time robust l1 tracker using accelerated proximal gradient approach. In CVPR, pp.1830-1837, 2012.

2 B. Liu, J. Huang, L. Yang, and C. Kulikowski. Robust tracking using local sparse appearance model and k-selection. In CVPR, pp. 1313-1320, 2011.
https://doi.org/10.1109/CVPR.2011.5995730

3 J. F. Henriques, R. Caseiro, P. Martins, and J. Batista. High-speed tracking with kernelized correlation filters. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), vol. 37, no. 3, pp. 583-596, 2015.
https://doi.org/10.1109/TPAMI.2014.2345390

4 S. Hare, A. Saffari, and P. Torr. Struck: Structured output tracking with kernels. In IEEE Trans. on PAMI, Vol. 2, No 7, pp. 1-14, 2015.

5 M. Danelljan, F. S. Khan, M. Felsberg, and J. van de Weijer. Adaptive Color Attributes for Real-Time Visual Tracking. In Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), Columbus, OH, USA, 23-28 June 2014; pp. 1090-1097.
https://doi.org/10.1109/CVPR.2014.143

6 Weiwei Xing, Weibin Liu, Jun Wang, Shunli Zhang, Lihui Wang, Yuxiang Yang, Bowen Song. Visual Object Tracking from Correlation Filter to Deep Learning. Springer Nature, 2021, P. 193.
https://doi.org/10.1007/978-981-16-6242-3

7 L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, P.H. Torr. Staple: Complementary learners for real-time tracking. In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27-30 June 2016, pp. 1401-1409.
https://doi.org/10.1109/CVPR.2016.156

8 Zhou, H. Fu, S. You, and C. Kuo. Unsupervised lightweight single object tracking with UHP-SOT++. ArXiv: 2111.07548, 2021, P. 13.

9 M. Dunnhofer and C. Micheloni. CoCoLoT: Combining Complementary Trackers in Long-Term Visual Tracking, arXiv: 2205, 04261v1 [cs.CV] 9 May, 2022, P. 8.
https://doi.org/10.1109/ICPR56361.2022.9956082

10 Kyyko V.M., Matsello V.V. Object tracking by co-operative actions of background Control systems and machines, 2020. No 2, pp. 23-29. (In Ukrainian).
https://doi.org/10.15407/csc.2020.02.012

11 N. Dalal, B. Triggs. Histograms of oriented gradients for human detection. In Proc. of the IEEE Conf. on CVPR, San Diego, USA, 20-25 June 2005; pp. 886-893.

12 Felzenszwalb, P.F.; Girshick, R.B.; McAllester, D. Object detection discriminatively trained part-based models, IEEE Trans. PAMI. 2009 32, pp. 1627-1645.
https://doi.org/10.1109/TPAMI.2009.167

13 Schlesinger, M.I. Fast implementation of one class of linear convolution. Theoretical and applied questions of image recognition: Kiev: Institute of Cybernetics, 1991, pp. 61-69. (In Russian).

14 J. van de Weijer, C. Schmid, J. J. Verbeek, and D. Larlus. Learning color names for real-world applications. TIP, 18(7):1512-1524, 2009.
https://doi.org/10.1109/TIP.2009.2019809

15 T. Ojala, M. Pietika.inen, and T. Ma.enpa. Multiresolution Gray Scale and Rotation Invariant Texture Classification with Local Binary Patterns. IEEE Trans. PAMI, vol. 24, no. 7, pp. 971-987, July 2002.
https://doi.org/10.1109/TPAMI.2002.1017623

16 Chao Ma, Xiaokang Yang, Chongyang Zhang1, and Ming-Hsuan Yang. Long-term Correlation Tracking. IEEE Conf. On Computer Vision and Pattern Recognition (CVPR), 2015, pp. 5388-5396.

17 Schlesinger, M.I. Pattern recognition as an implementation of a certain subclass of thought processes. Control systems and machines, 2017. No 2, pp. 20-37. (In Russian).
https://doi.org/10.15407/usim.2017.02.020

18 Yuri Boykov, Gareth Funka-Lea. Graph Cuts and Efficient N-D Image Segmentation. Int. Journal of Computer Vision, Vol. 70, 2006, pp. 109-131.
https://doi.org/10.1007/s11263-006-7934-5

19 Q. Chen and V. Koltun. Fast mrf optimization with application to depth reconstruction. in Proc. of IEEE Conf. on Computer Vision and Pattern Recognition. 2014, pp. 3914-3921.
https://doi.org/10.1109/CVPR.2014.500

20 Nobuyuki Otsu. A threshold selection method from gray-level histograms. IEEE Trans. Sys., Man., Cyber. 9(1) 1979, pp. 62-66.
https://doi.org/10.1109/TSMC.1979.4310076

21 M. Everingham, L. J. V. Gool, C. K. I. Williams, J. M. Winn, and A. Zisserman. The pascal visual object classes (VOC) challenge. IJCV, vol. 88, no. 2, pp. 303-338, 2010.
https://doi.org/10.1007/s11263-009-0275-4

Received 23.06.2023

Issue 3 (213)

DOI:https://doi.org/10.15407/kvt213.03

View web version

TABLE OF CONTENTS:

Informatics and Information Technologies:

Kyyko V.M., Matsello V.V.
Real-Time Tracking of Objects in Video Based on Adaptive Histogram Features

Yermakova I.I., Nikolaienko A.Yu., Hrytsaiuk O.V., Kravchenko P.M., Dorosh O.I.
Information Technology for Predicting of Human Thermophysiological State in Cold Water

Intelligent Control and Systems:

Revunova E.G.
Randomized Matrix Calculations and Singular Value Decomposition for the Effective Jamming Cancellation in Radiolocation Systems

Medical and Biological Cybernetics:

Kozak L.M., Kovalenko O.S., Surovtsev I.V.
Basic Components of the Software Modules Construction for Obtaining, Storing and Exchanging Medical and Environmental Information

Kalnysh V.V.
Informational Approaches to the Analysis of the Influence of Psycho-Emotional Stress on the State of the Working Population and Military Personnel of Ukraine

Issue 2 (212), article 5

DOI:https://doi.org/10.15407/kvt212.02.080

Cybernetics and Computer Engineering, 2023, 2(212)

FAINZILBERG L.S.1,2 DSc. (Engineering), Professor,
Chief researcher of Intelligent Automatic Systems Department1,
Professor of the Department of Biomedical Cybernetics2,
https://orcid.org/ 0000-0002-3092-0794,
e-mail: fainzilberg@gmail.com

KHARCHENKO A.R.2,
Student Faculty of Biomedical Engineering,
e-mail: kharchenko.anastasia@lll.kpi.ua

1 International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and Ministry of Education and Science of Ukraine,
40, Acad. Glushkov av., Kiyv, 03187, Ukraine

2 National Technical University of Ukraine
“Ihor Sikorsky Kyiv Polytechnic Institute»
37, Peremogy av., Kiyv, 03056, Ukraine

REMOTE MONITORING OF HEARING FROM THE POSITION OF PERSONALIZED MEDICINE

Introduction. At the current stage of society’s development, an increasing number of people suffer from hearing loss. Hearing plays an important role in the combat fitness of the military. Hearing loss can be prevented by regular testing. But in field conditions, it is impossible to conduct an audiometric study based only on standard methods.

The purpose of this paper is the development of methods for hearing loss evaluation based on tonal threshold audiometry using the client-server system, which provides remote communication between a patient and a doctor.

Methods. To check the hearing ability, the results of the current audiogram are compared with the users personal norm. In case of deviation from the norm the doctor is notified. He uses this information system to adjust the treatment.

Results. Developed information technology provides the opportunity of remote monitoring of the hearing condition and correction of treatment. It is demonstrated that the determination of the patient’s personal norm can be carried out by calculating the median from the user’s audiograms obtained with a smartphone and head phones.

Conclusions. The information system, which ensures the implementation of the proposed procedures, can be used on a mid-range smartphone running the Android operating system.

Keywords: audiogram, population and personal hearing norms, client-server information technology.

Download full text!

REFERENCES
1 World Health Organization. Hearing screening considerations for implementation. 54 p.

2 Larry Medwetsky. Understanding the Fundamentals of the Audiogram. So What?. Convention “Hearing Loss Association of America”. URL: https://www.hearingloss.org/wp-content/ uploads/HLM_JulAug2014_LarryMedwetsky_Audiogram1.pdf?pdf=2014-hlm-ja-lmedwetsky.

3 National Health and Nutrition Examination Survey (NHANES). Audiometry procedures manual. 2003. 111 p.

4 Varfolomieiev, A., Lysenko, O. An improved algorithm of median flow for visual object tracking and its implementation on ARM platform. Jourmal Real-Time Image Process. 2016. 11. pp. 527-534.
https://doi.org/10.1007/s11554-013-0354-1

5 Bisgaard, Nikolai & Vlaming, Marcel & Dahlquist, Martin. Standard Audiograms for the IEC 60118-15 Measurement Procedure. Trends in amplification. 2010. No. 14. pp. 113-20.
https://doi.org/10.1177/1084713810379609

6 Lin, Y., Abdulla, W.H. Principles of Psychoacoustics. In: Audio Watermark. Springer, Cham. 2015.
https://doi.org/10.1007/978-3-319-07974-5

7 “AURORA Hearing Rehabilitation Center” LLC Medical Center. Audiogram – what is it?. URL: https://aurora.ua/articles/audiohrama-shcho-tse-take/. (in Ukrainian).

8 Health and Safety Authority (HSA). Guidelines on Hearing Checks and Audiometry Under the Safety, Health and Welfare at Work (General Application) Regulations 2007, Control of Noise at Work. 2007.

9 Paul J. Govaerts. Audiometric Tests and Diagnostic Workup. 2003. pp. 33-48.
https://doi.org/10.1201/9780203913062.ch2

10 Soer M. Pure tone audiometry. Open access guide to audiology and hearing aids for otolaryngologists. 2014.

11 Occupational Safety and Health Administration (OSHA). Hearing Conservation. 2002.

12 Bright K., Eichwald J., Hall J. and al. Childhood Hearing Screening. American Academy of Audiology. 2011.

13 Stavrakas M., Kyriafinis G., Tsalighopoulos M. Diagnosis and Evaluation of hearing loss. Digital Tools for Computer Music Production and Distribution. Hershey, PA: IGI Global. 2016. pp. 31-50.
https://doi.org/10.4018/978-1-5225-0264-7.ch002

14 Minnesota department of health. Hearing Screening Training Manual. 2022.

15 Lysenko O. M. Portable multifunctional system of objective auditory screening based on modern DSP and “network-on-crystal” technologies. Science and innovation of KPI named after Igor Sikorsky. 2014. (in Ukrainian).

16 Melo I., Silva A., Camargo A. and al. Accuracy of smartphone-based hearing screening tests: a systematic review. Systematic Review. SciELO. 2021. No 34.
https://doi.org/10.1590/2317-1782/20212020380

17 Potgieter J., Swanepoel W., Myburgh H. and al. Development and validation of a smartphone-based digits-in-noise hearing test in south african english. International Journal of Audiology. 2016. No 55.
https://doi.org/10.3109/14992027.2016.1172269

18 Leonidas A., Paulina T., Ruben C., Altamirano C, Sebastian F.. Methods used in mobile applications for the diagnosis of hearing loss: A systematic mapping study. KnE Engineering. 2020. pp. 89-107.

19 Sousa K., Swanepoel W., Moore D., Smits C. A Smartphone National Hearing Test: Performance and Characteristics of Users. American Journal of Audiology. 2018. No 27. pp. 448-454.
https://doi.org/10.1044/2018_AJA-IMIA3-18-0016

20 Khazan A., Luberadzka D., Rivilla D. and al. Home-Based Audiometry With a Smartphone App: Reliable Results?. American Journal of Audiologia. 2021. No 31. pp. 914-922.
https://doi.org/10.1044/2022_AJA-21-00191

21 Yesantharao L., Donahue M., Smith A. and al. Virtual audiometric testing using smartphone mobile applications to detect hearing los. Investigative Otolaryngology. 2002.
https://doi.org/10.1002/lio2.928

22 Mahomed-Asmail F., Swanepoel W.. Mobile phone audiometry. Open access guide to audiology and hearing aids for otolaryngologists. 2013.

23 Patel K., Thibodeau L., McCullough D. and al. Development and Pilot Testing of Smartphone-Based Hearing Test Application. International Journal of Environmental Research and Public Health. 2021.
https://doi.org/10.3390/ijerph18115529

24 MWM Mustafa. High-Rated Hearing Test Android Mobile Applications: Are they Appropriate for Action?. Otolaryngology Open Access Journal. 2022. No 7.
https://doi.org/10.23880/ooaj-16000249

25 Bright T., Pallawela T. Validated Smartphone-Based Apps for Ear and Hearing Assessments: A Review. JMIR Rehabilitation and assistive technologies. 2016. No 2.
https://doi.org/10.2196/rehab.6074

26 Fainzilberg L.S. Generalized Approach to Building Computer’s Tools of Preventive Medicine for Home Using. International Scientific Technical Journal “Problems of Control and Informatics”. 2022. No 1. pp. 136-158.
https://doi.org/10.34229/1028-0979-2022-1-12

27 Mazur G. Digital Multimeter Principles. American Technical Publishers. 2010. 182 p.

28 Wang, M., Ai, Y., Han, Y. et al. Extended high-frequency audiometry in healthy adults with different age groups. Journal of Otolaryngology – Head & Neck Surg. 2021. No 50.
https://doi.org/10.1186/s40463-021-00534-w

29 Fainzilberg L., Kharchenko A. Determination of the Personal Hearing Standard in the Audiometer on a Smartphone. Proceedings of XI International Scientific and Practical Conference “Modern Scientific Research: Achievements, Innovations and Development Prospects” (Berlin, April 24-26, 2022). Berlin, Germany: MDPC Publishing, 2022, pp. 33-39.

Received 03.04.2023

Issue 2 (212), article 4

DOI:https://doi.org/10.15407/kvt212.02.052

Cybernetics and Computer Engineering, 2023, 2(212)

PANAGIOTIS KATRAKAZAS1, Ph.D.,
Research Area Manager,
ORCID 0000-0001-7433-786X,
e-mail: p.katrakazas@zelus.gr

THEODORA KALLIPOLITOU1,
Delivery Manager & Sustainability Expert,
ORCID 0000-0001-5059-4909,
e-mail: d.kallipolitou@zelus.gr

LEONIDAS KALLIPOLITIS2,
Chief Technology Officer,
ORCID 0000-0002-5689-298X,
e-mail: lkallipo@aegisresearch.eu

ILIAS SPAIS2, Ph.D.,
Senior Project Manager,
Researcher ID: 0000-0002-6167-3247,
e-mail: hspais@aegisresearch.eu

1Zelus P.C.,
Tatoiou 92, 14452, Metamorfosi, Athens, GR

2AEGIS IT Research GmbH,
25 Humboldt Str. Braunschweig, 38106, Germany

ANALYSIS AND DEFINITION OF NECESSARY MECHANISMS
TO ENSURE THE SECURITY AND PRIVACY OF DIGITAL HEALTH DATA UNDER A CYBERNETIC DIGITAL INVESTIGATION FRAMEWORK

Introduction: The recent scale-up of events caused after the Covid-19 pandemic and its subsequent healthcare crisis, highlights the digital forensics importance in a connected health ecosystem. It is therefore safe to assume that there is a growing interest in digital forensics and how they are applied within the existing healthcare ecosystem and under which concept, posing the main research question of the current study.

The purpose of the paper is to presente here focuses on defining and developing the necessary mechanisms to ensure the security and privacy of the data disseminated by existing research in both fields of digital health and cybersecurity. A cybernetics-inspired framework is structured based on existing practices and key gaps identified.

Results: Five electronic databases, namely Scopus, IEEEXplore, PubMed, DOAJ (Directory of Open Access Journals and arXiV were identified as the main data sources. A State-of-the-Art analysis has been performed to realize the limits of the devices and the machines (including the systems and their elements involved) in the healthcare domain, when these break down so that the investigation will teach us something new that is nontrivial. A highly relevant dimension in our approach for a digital forensics driven connected health landscape is based on rigorous and comprehensive feedback take-off methods, which are seemingly lacking.

Conclusion: The main point of our study is to show that while there might seem an immense multiplicity, a unity can be formulated and vice versa: where something appears as a unit, an unbounded plurality of conditions might be enclosed within it. Moving into a connected health future should be built upon existing accidents so as to mark the upcoming changes that would affect such a system.

Keywords: digital forensics, connected health, cybernetic digital investigation framework, cybersecurity.

Download full text!

REFERENCES
1. K. Colorafi, ‘Connected health: a review of the literature’, mHealth, vol. 2, p. 13, Apr. 2016,
https://doi.org/10.21037/mhealth.2016.03.09

2. C. Kuziemsky, R. M. Abbas, and N. Carroll, ‘Toward a Connected Health Delivery Framework’, in 2018 IEEE/ACM International Workshop on Software Engineering in Healthcare Systems (SEHS), May 2018, pp. 46-49.
https://doi.org/10.1145/3194696.3194703

3. C. S. Pattichis and A. S. Panayides, ‘Connected Health’, Front. Digit. Health, vol. 1, p. 1, 2019,
https://doi.org/10.3389/fdgth.2019.00001

4. C. Horan and H. Saiedian, ‘Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions’, J. Cybersecurity Priv., vol. 1, no. 4, Art. no. 4, Dec. 2021,
https://doi.org/10.3390/jcp1040029

5. S. Kumar, A. K. Bharti, and R. Amin, ‘Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions’, Secur. Priv., vol. 4, no. 5, p. e162, 2021,
https://doi.org/10.1002/spy2.162

6. N. J. Podlesny, A. V. D. M. Kayem, and C. Meinel, ‘Towards Identifying De-anonymisation Risks in Distributed Health Data Silos’, in Database and Expert Systems Applications, Cham, 2019, pp. 33-43.
https://doi.org/10.1007/978-3-030-27615-7_3

7. A. Adel, ‘A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach’, Forensic Sci., vol. 2, no. 1, Art. no. 1, Mar. 2022,
https://doi.org/10.3390/forensicsci2010009

8. M. J. Page et al., ‘The PRISMA 2020 statement: an updated guideline for reporting systematic reviews’, BMJ, vol. 372, p. n71, Mar. 2021.

9. A. Shaaban and N. Abdelbaki, ‘Comparison Study of Digital Forensics Analysis Techniques; Findings versus Resources’, Procedia Comput. Sci., vol. 141, pp. 545-551, Jan. 2018.
https://doi.org/10.1016/j.procs.2018.10.128

10. K. Hovhannisyan, P. Bogacki, C. A. Colabuono, D. Lofù, M. V. Marabello, and B. E. Maxwell, ‘Towards a Healthcare Cybersecurity Certification Scheme’, Jun. 2021.
https://doi.org/10.1109/CyberSA52016.2021.9478255

11. P. Kieseberg, B. Malle, P. Frühwirt, E. Weippl, and A. Holzinger, ‘A tamper-proof audit and control system for the doctor in the loop’, Brain Inform., vol. 3, no. 4, Art. no. 4, Dec. 2016.
https://doi.org/10.1007/s40708-016-0046-2

12. J. Priisalu and R. Ottis, ‘Personal control of privacy and data: Estonian experience’, Health Technol., vol. 7, no. 4, pp. 441-451, Dec. 2017.
https://doi.org/10.1007/s12553-017-0195-1

13. G. Grispos, W. B. Glisson, and K.-K. R. Choo, ‘Medical Cyber-Physical Systems Development: A Forensics-Driven Approach’, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Jul. 2017, pp. 108-113.
https://doi.org/10.1109/CHASE.2017.68

14. J. King, ‘Measuring the forensic-ability of audit logs for nonrepudiation’, in 2013 35th International Conference on Software Engineering (ICSE), May 2013, pp. 1419-1422.
https://doi.org/10.1109/ICSE.2013.6606732

15. R. A. Nabha and H. Sbeyti, ‘Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study’, in 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2020, pp. 1-7.
https://doi.org/10.1109/ISDFS49300.2020.9116449

16. G. Grispos and K. Bastola, ‘Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts’, in 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS), Jul. 2020, pp. 510-513.
https://doi.org/10.1109/CBMS49503.2020.00102

17. M. Savari, M. Montazerolzohour, and Y. E. Thiam, ‘Comparison of ECC and RSA algorithm in multipurpose smart card application’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 49-53.
https://doi.org/10.1109/CyberSec.2012.6246121

18. M. Savari, M. Montazerolzohour, and Y. E. Thiam, ‘Combining encryption methods in multipurpose smart card’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 43-48.
https://doi.org/10.1109/CyberSec.2012.6246120

19. M. Chernyshev, S. Zeadally, and Z. Baig, ‘Healthcare Data Breaches: Implications for Digital Forensic Readiness’, J. Med. Syst., vol. 43, no. 1, p. 7, Nov. 2018.
https://doi.org/10.1007/s10916-018-1123-2

20. V. Malamas, T. Dasaklis, P. Kotzanikolaou, M. Burmester, and S. Katsikas, ‘A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain’, in 2019 IEEE World Congress on Services (SERVICES), Jul. 2019, vol. 2642-939X, pp. 35-40.
https://doi.org/10.1109/SERVICES.2019.00021

21. H. F. Atlam, A. Alenezi, M. O. Alassafi, A. A. Alshdadi, and G. B. Wills, ‘Security, cybercrime and digital forensics for IoT’, in Intelligent Systems Reference Library, Springer International Publishing, 2019.
https://doi.org/10.1007/978-3-030-33596-0_22

22. K. Kumari, S. Saha, and S. Neogy, ‘Cost Based Model for Secure Health Care Data Retrieval’, in Security in Computing and Communications, vol. 969, S. M. Thampi, S. Madria, G. Wang, D. B. Rawat, and J. M. Alcaraz Calero, Eds. Singapore: Springer Singapore, 2019, pp. 67-75.
https://doi.org/10.1007/978-981-13-5826-5_5

23. A. Bruno and G. Cattaneo, ‘Experimental Analysis of the Pixel Non Uniformity (PNU) in SEM for Digital Forensics Purposes’, in Pervasive Systems, Algorithms and Networks, vol. 1080, C. Esposito, J. Hong, and K.-K. R. Choo, Eds. Cham: Springer International Publishing, 2019, pp. 313-320.
https://doi.org/10.1007/978-3-030-30143-9_26

24. S. Bindahman, N. Zakaria, and N. Zakaria, ‘3D body scanning technology: Privacy and ethical issues’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 150-154.
https://doi.org/10.1109/CyberSec.2012.6246113

25. J. P. van Zandwijk and A. Boztas, ‘The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence?’, Digit. Investig., vol. 28, pp. S126-S133, Apr. 2019.
https://doi.org/10.1016/j.diin.2019.01.021

26. A. Azfar, K.-K. R. Choo, and L. Liu, ‘Forensic Taxonomy of Popular Android mHealth Apps’, ArXiv150502905 Cs, May 2015, Accessed: Oct. 26, 2021. Online. Available: http://arxiv.org/abs/1505.02905

27. Z. A. Alhaboby et al., ‘Understanding the Cyber-Victimisation of People with Long Term Conditions and the Need for Collaborative Forensics-Enabled Disease Management Programmes’, in Cyber Criminology, H. Jahankhani, Ed. Cham: Springer International Publishing, 2018, pp. 227-250.
https://doi.org/10.1007/978-3-319-97181-0_11

28. I. Baggili, J. Oduro, K. Anthony, F. Breitinger, and G. McGee, ‘Watch What You Wear: Preliminary Forensic Analysis of Smart Watches’, in 2015 10th International Conference on Availability, Reliability and Security, Aug. 2015, pp. 303-311.
https://doi.org/10.1109/ARES.2015.39

29. G. Grispos, T. Flynn, W. Glisson, and K.-K. R. Choo, ‘Investigating Protected Health Information Leakage from Android Medical Applications’, ArXiv210507360 Cs, May 2021, Accessed: Oct. 27, 2021. Online. Available: http://arxiv.org/abs/2105.07360

30. H. Chi, ‘Integrate mobile devices into CS security education’, in Proceedings of the 2015 Information Security Curriculum Development Conference, New York, NY, USA, Oct. 2015, pp. 1-4.

31. C. Hassenfeldt, S. Baig, I. Baggili, and X. Zhang, ‘Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications’, in Proceedings of the 14th International Conference on Availability, Reliability and Security, New York, NY, USA, Aug. 2019, pp. 1-12.
https://doi.org/10.1145/3339252.3340515

32. M. Akour, S. Banitaan, H. Alsghaier, and K. A. Radaideh, ‘Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers’, in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2019, pp. 1-7.
https://doi.org/10.1109/ISDFS.2019.8757487

33. T. Flynn, G. Grispos, W. B. Glisson, and W. Mahoney, ‘Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack’, Jan. 2020, Accessed: Oct. 31, 2021. Online. Available: https://shsu-ir.tdl.org/handle/20.500.11875/3199
https://doi.org/10.24251/HICSS.2020.791

34. S. Kim, W. Jo, J. Lee, and T. Shon, ‘AI-enabled device digital forensics for smart cities’, J. Supercomput., Jul. 2021.
https://doi.org/10.1007/s11227-021-03992-1

35. F. Hantke and A. Dewald, ‘How can data from fitness trackers be obtained and analyzed with a forensic approach?’, in 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Sep. 2020, pp. 500-508.
https://doi.org/10.1109/EuroSPW51379.2020.00073

36. Á. MacDermott, S. Lea, F. Iqbal, I. Idowu, and B. Shah, ‘Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches’, in 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Jun. 2019, pp. 1-6.
https://doi.org/10.1109/NTMS.2019.8763834

37. Y. H. Yoon and U. Karabiyik, ‘Forensic Analysis of Fitbit Versa 2 Data on Android’, Electronics, vol. 9, no. 9, Art. no. 9, Sep. 2020.
https://doi.org/10.3390/electronics9091431

38. S. Kang, S. Kim, and J. Kim, ‘Forensic analysis for IoT fitness trackers and its application’, Peer–Peer Netw. Appl., vol. 13, no. 2, pp. 564-573, Mar. 2020,
https://doi.org/10.1007/s12083-018-0708-3

39. M. Siddiqi, S. T. Ali, and V. Sivaraman, ‘Forensic Verification of Health Data From Wearable Devices Using Anonymous Witnesses’, IEEE Internet Things J., vol. 7, no. 11, pp. 10745-10762, Nov. 2020.
https://doi.org/10.1109/JIOT.2020.2982958

40. N. Rahman and M. Thariq, ‘A digital evidence taxonomy of m-health apps in iot environment’, Jun. 2020.

41. N. Phumkaew and V. Visoottiviseth, ‘Android Forensic and Security Assessment for Hospital and Stock-and-Trade Applications in Thailand’, in 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE), Jul. 2018, pp. 1-6.
https://doi.org/10.1109/JCSSE.2018.8457347

42. Z. Zhou, A. Gaurav, B. B. Gupta, H. Hamdi, and N. Nedjah, ‘A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic’, Neural Comput. Appl., pp. 1-14, Sep. 2021.
https://doi.org/10.1007/s00521-021-06389-6

43. W. Zhuang, Y. Shen, L. Li, C. Gao, and D. Dai, ‘Develop an Adaptive Real-Time Indoor Intrusion Detection System Based on Empirical Analysis of OFDM Subcarriers’, Sensors, vol. 21, no. 7, Art. no. 7, Jan. 2021.
https://doi.org/10.3390/s21072287

44. C.-L. Hsu, W.-X. Chen, and T.-V. Le, ‘An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things’, Sensors, vol. 20, no. 22, Art. no. 22, Jan. 2020.
https://doi.org/10.3390/s20226471

45. N. H. N. Zulkipli, A. Alenezi, and G. B. Wills, ‘IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things’, presented at the 2nd International Conference on Internet of Things, Big Data and Security, Oct. 2021, pp. 315-324. Accessed: Oct. 27, 2021. Online. Available: https://www.scitepress.org/PublicationsDetail.aspx?ID=fpfedOeeepw=&t=1

46. L. Lao, Z. Li, S. Hou, B. Xiao, S. Guo, and Y. Yang, ‘A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling’, ACM Comput. Surv., vol. 53, no. 1, p. 18:1-18:32, Feb. 2020.
https://doi.org/10.1145/3372136

47. A. Kyaw, B. Cusack, and R. Lutui, ‘Digital Forensic Readiness In Wireless Medical Systems’, in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Nov. 2019, pp. 1-6.
https://doi.org/10.1109/ITNAC46935.2019.9078005

48. A. K. Kyaw, Z. Tian, and B. Cusack, ‘Design and Evaluation for Digital Forensic Ready Wireless Medical Systems’, in IoT Technologies for HealthCare, vol. 314, N. M. Garcia, I. M. Pires, and R. Goleva, Eds. Cham: Springer International Publishing, 2020, pp. 118-141.
https://doi.org/10.1007/978-3-030-42029-1_9

49. Z. Wu, X. Qi, G. Liu, L. Fang, J. Liu, and J. Cui, ‘An extend RBAC model for privacy protection in HIS’, in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Mar. 2018, pp. 1-6.

50. M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, ‘A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues’, IEEE Commun. Surv. Tutor., vol. 22, no. 2, pp. 1191-1221, 2020.
https://doi.org/10.1109/COMST.2019.2962586

51. A. Kumar and R. Kumar, ‘Privacy Preservation of Electronic Health Record: Current Status and Future Direction’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 715-739.
https://doi.org/10.1007/978-3-030-22277-2_28

52. X. Liu, X. Yuan, and J. Liu, ‘Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data’, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Aug. 2018, pp. 1664-1668.
https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247

53. E. Al Alkeem, C. Y. Yeun, and M. J. Zemerly, ‘Security and privacy framework for ubiquitous healthcare IoT devices’, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), Dec. 2015, pp. 70-75.
https://doi.org/10.1109/ICITST.2015.7412059

54. H. Qiu, M. Qiu, M. Liu, and G. Memmi, ‘Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0’, IEEE J. Biomed. Health Inform., vol. 24, no. 9, pp. 2499-2505, Sep. 2020.
https://doi.org/10.1109/JBHI.2020.2973467

55. P. Agbedanu and A. D. Jurcut, ‘BLOFF: A Blockchain based Forensic Model in IoT’, ArXiv210308442 Cs, pp. 59-73, 2021.
https://doi.org/10.4018/978-1-7998-7589-5.ch003

56. J. Yuan and Y. Tian, ‘Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset’, IEEE Trans. Cloud Comput., vol. 7, no. 02, pp. 568-579, Apr. 2019.
https://doi.org/10.1109/TCC.2017.2656895

57. I. Jayaraman and A. Stanislaus Panneerselvam, ‘A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud’, J. Ambient Intell. Humaniz. Comput., vol. 12, no. 5, pp. 4911-4924, May 2021.
https://doi.org/10.1007/s12652-020-01931-1

58. X. Feng, B. Onafeso, and E. Liu, ‘Investigating Big Data Healthcare Security Issues with Raspberry Pi’, in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Oct. 2015, pp. 2329-2334.
https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.344

59. X. Feng and Y. Zhao, ‘Digital Forensics Challenges to Big Data in the Cloud’, in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Jun. 2017, pp. 858-862.
https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.132

60. H. Nguyen et al., ‘Cloud-Based Secure Logger for Medical Devices’, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Jun. 2016, pp. 89-94.
https://doi.org/10.1109/CHASE.2016.48

61. A. Gehani, G. F. Ciocarlie, and N. Shankar, ‘Accountable clouds’, in 2013 IEEE International Conference on Technologies for Homeland Security (HST), Nov. 2013, pp. 403-407.
https://doi.org/10.1109/THS.2013.6699038

62. F. Khan, ‘A detailed study on Security breaches of Digital Forensics in Cyber Physical Systems’, in 2019 Sixth HCT Information Technology Trends (ITT), Nov. 2019, pp. 38-43.
https://doi.org/10.1109/ITT48889.2019.9075094

63. A. Abdullah, H. Kaur, and R. Biswas, ‘Universal Layers of IoT Architecture and Its Security Analysis’, in New Paradigm in Decision Science and Management, Singapore, 2020, pp. 293-302.
https://doi.org/10.1007/978-981-13-9330-3_30

64. J. Ibarra, H. Jahankhani, and J. Beavers, ‘Biohacking Capabilities and Threat/Attack Vectors’, in Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, H. Jahankhani, S. Kendzierskyj, N. Chelvachandran, and J. Ibarra, Eds. Cham: Springer International Publishing, 2020, pp. 117-131.
https://doi.org/10.1007/978-3-030-35746-7_7

65. B. Rappert, H. Wheat, and D. Wilson-Kovacs, ‘Rationing bytes: managing demand for digital forensic examinations’, Polic. Soc., vol. 31, no. 1, pp. 52-65, Jan. 2021.
https://doi.org/10.1080/10439463.2020.1788026

66. V. Kisekka and J. S. Giboney, ‘The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes’, J. Med. Internet Res., vol. 20, no. 4, p. e107, Apr. 2018.
https://doi.org/10.2196/jmir.9014

67. V. Kisekka, S. Goel, and K. Williams, ‘Disambiguating Between Privacy and Security in the Context of Health Care: New Insights on the Determinants of Health Technologies Use’, Cyberpsychology Behav. Soc. Netw., vol. 24, no. 9, pp. 617-623, Sep. 2021.
https://doi.org/10.1089/cyber.2020.0600

68. J. A. Hodges, ‘Forensically reconstructing biomedical maintenance labor: PDF metadata under the epistemic conditions of COVID-19’, J. Assoc. Inf. Sci. Technol., Apr. 2021.
https://doi.org/10.1002/asi.24484

69. S. Karakus and E. Avci, ‘Application of Similarity-Based Image Steganography Method to Computerized Tomography Images’, in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2019, pp. 1-4.
https://doi.org/10.1109/ISDFS.2019.8757521

70. J. Dalins, Y. Tyshetskiy, C. Wilson, M. J. Carman, and D. Boudry, ‘Laying foundations for effective machine learning in law enforcement. Majura – A labelling schema for child exploitation materials’, Digit. Investig., vol. 26, pp. 40-54, Sep. 2018.
https://doi.org/10.1016/j.diin.2018.05.004

71. K. C. Seigfried-Spellar, ‘Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations’, J. Police Crim. Psychol., vol. 33, no. 3, pp. 215-226, Sep. 2018.
https://doi.org/10.1007/s11896-017-9248-7

72. T. W. Jing and R. K. Murugesan, ‘Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology’, Commun. Comput. Inf. Sci., vol. 1347, pp. 674-684, 2021.
https://doi.org/10.1007/978-981-33-6835-4_44

73. A. Bruno, G. Cattaneo, U. Ferraro Petrillo, and P. Capasso, ‘PNU Spoofing: a menace for biometrics authentication systems?’, Pattern Recognit. Lett., vol. 151, pp. 3-10, 2021.
https://doi.org/10.1016/j.patrec.2021.07.008

74. N. Wiener, Cybernetics; or, Control and communication in the animal and the machine. New York: M.I.T. Press, 1961.
https://doi.org/10.1037/13140-000

75. R. GLANVILLE, ‘Cybernetics: Thinking Through the Technology’, in Traditions of Systems Theory, Routledge, 2013.

76. L. Helminger and C. Rechberger, ‘Multi-Party Computation in the GDPR’, Priv. Symp. 2022 – Data Prot. Law Int. Converg. Compliance Innov. Technol. DPLICIT, 2022.
https://doi.org/10.1007/978-3-031-09901-4_2

77. M. Roy, C. Chowdhury, and N. Aslam, ‘Security and Privacy Issues in Wireless Sensor and Body Area Networks’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 173-200.
https://doi.org/10.1007/978-3-030-22277-2_7

78. A. Vyas and S. Pal, ‘Preventing Security and Privacy Attacks in WBANs’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 201-225.
https://doi.org/10.1007/978-3-030-22277-2_8

Received 29.01.2023