Issue 3 (213), article 3

DOI:https://doi.org/10.15407/kvt213.03.036

Cybernetics and Computer Engineering, 2023, 3(213)

Revunova E.G., DSc (Engineering),
Leading Researcher of Neural Information Processing Technologies Department
https://orcid.org/0000-0002-3053-7090,
e-mail: egrevunova@gmail.com

International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and the Ministry of Education and Science of Ukraine,
40, Acad. Glushkova av., Kyiv, 03187, Ukraine

RANDOMIZED MATRIX CALCULATIONS AND SINGULAR VALUE DECOMPOSITION FOR THE EFFECTIVE JAMMING CANCELLATION IN RADIOLOCATION SYSTEMS

Introduction. Impact of the jamming leads to the high losses since it decreases effectiveness of radiolocation systems, anti-aircraft missile systems and communication systems. Strategies of forming and setting of the jamming are improving and the power of the jamming increases. In this regard, it is important to improve jamming cancellation systems.  

The task of the improvement for based on matrix calculations methods of the jamming cancellation is actual considering the breakthrough development of the computational methods which allows realization by digital circuit engineering. These include the most modern machine learning algorithms aimed at solving signal processing tasks.  

The requirement of the stable operation is important for the jamming cancellation systems under conditions of uncertainty. Other demand is an operation in the real time and a simple hardware implementation.  

The purpose of the paper is to increase the efficiency of the jamming cancellation in the antenna system (under conditions of uncertainty) based on the new randomized computation methods and their realization by the matrix-processor architecture.  

Results. The approach based on singular value decomposition and random projection is proposed. It provides effective jamming cancellation in the antenna systems under conditions of uncertainty that is, the sample has small length, there is an own noise of the measuring system, the input-output transformation matrix have undefined numerical rank and there is no prior information about useful signal 

Conclusions. The increase of the efficiency of the jamming cancellation includes the increase of the stability and jamming cancellation coefficient, and the reduction of the computational complexity.  

The increase of the jamming cancellation coefficient is provided by use of stable discrete ill-posed inverse problems solution methods of the signal recovery based on random projection and singular value decomposition. The decrease of the computational complexity is achieved by the realization of random projection and singular value decomposition as the processor array which make parallel computations.

Keywords: jamming, discrete ill-posed problem, antenna system singular value decomposition, random projection.
Download full text!

REFERENCES

1 Monzingo R.A., Miller T.W. Introduction to Adaptive Arrays. John Wiley. Chichester, 1980, 541 p.

2 Schmidt R.O. Multiple Emitter Location and Signal Parameter Estimation. IEEE Trans. Antennas Propagation. 1986, Vol. 34, pp. 276-280.
https://doi.org/10.1109/TAP.1986.1143830

3 Schmidt R.O. A signal subspace approach to multiple emitter location spectral estimation. PhD thesis. Stanford University. 1981, 201 p.

4 Krim H., Viberg M. Two decades of array signal processing research: The parametric approach. IEEE Signal Processing Magazine. 1996, Vol. 13, N 4, pp. 67-94.
https://doi.org/10.1109/79.526899

5 Bartlett M.S. Smoothing periodograms from time series with continuous spectra. Nature. 1948, Vol. 161, pp. 686-687.
https://doi.org/10.1038/161686a0

6 Panahi A., Viberg M. Fast lasso based DOA tracking. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). 4th IEEE International Workshop. 2011, pp. 397-400.
https://doi.org/10.1109/CAMSAP.2011.6136036

7 Panahi A. Viberg M. A novel method of DOA tracking by penalized least squares. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). 5th IEEE International Workshop, 2013, pp. 61-64.
https://doi.org/10.1109/CAMSAP.2013.6714007

8 Zheng J.M., Kaveh M. Sparse Spatial Spectral Estimation: A Covariance Fitting Algorithm, Performance and Regularization. IEEE Trans. Signal Processing. 2013, Vol. 61, N. 11, pp. 2767-2777.
https://doi.org/10.1109/TSP.2013.2256903

9 Hu N., Ye Z.F., Xu X., Bao M. DOA estimation for sparse array via sparse signal reconstruction. IEEE Transactions on Aerospace and Electronic Systems. 2013, Vol. 49, N. 2, pp. 760-772.
https://doi.org/10.1109/TAES.2013.6494379

10 Hansen, P. Rank-deficient and discrete ill-posed problems. Numerical aspects of linear inversion. Philadelphia: SIAM. 1998, 247 p.
https://doi.org/10.1137/1.9780898719697

11 Sarlos T. Improved Approximation Algorithms for Large Matrices via Random Projections. Proc. of the 47th Annual IEEE Symposium on Foundations of Computer Science. 2006, pp. 143-152.
https://doi.org/10.1109/FOCS.2006.37

12 Woolfe F., Liberty E., Rokhlin V., Tygert M. A fast randomized algorithm for the approximation of matrices. Applied and Computational. Harmon. Anal. 2008, Vol. 25, pp. 335-366.
https://doi.org/10.1016/j.acha.2007.12.002

13 Rokhlin V., Szlam A., Tygert M. A randomized algorithm for principal component analysis. SIAM Journal Matrix Anal. Application. 2009, Vol. 31, pp. 1100-1124.
https://doi.org/10.1137/080736417

14 Martinsson P.G. A fast randomized algorithm for computing a hierarchically semiseparable representation of a matrix. SIAM Journal on Matrix Analysis and Applications. 2011, Vol. 32, N 4, pp. 1251-1274.
https://doi.org/10.1137/100786617

15 Woodruff D.P. Sketching as a tool for numerical linear algebra. Foundations and Trends in Theoretical Computer Science. 2014, Vol. 10, pp. 1-157.
https://doi.org/10.1561/0400000060

16 Revunova E. G., Tyshchuk A.V. A Model Selection Criterion for Solution of Discrete Ill-Posed Problems Based on the Singular Value Decomposition. The 7th International Workshop on Inductive Modelling (IWIM 2015). Kyiv-Zhukyn. July 20-24, 2015, pp. 43-47.

17 Revunova E.G. Model selection criteria for a linear model to solve discrete ill-posed problems on the basis of singular decomposition and random projection. Cybernetics and Systems Analysis. 2016, Vol. 52, N.4, pp.647-664.
https://doi.org/10.1007/s10559-016-9868-4

18 Revunova E.G. Analytical study of the error components for the solution of discreteill-posed problems using random projections. Cybernetics and Systems Analysis. 2015, Vol. 51, N. 6, pp. 978-991.
https://doi.org/10.1007/s10559-015-9791-0

19 Revunova E.G. Averaging over matrices in solving discrete ill-posed problems on the basis of random projection. Proc. CSIT 17. 2017, Vol. 1, pp. 473-478.
https://doi.org/10.1109/STC-CSIT.2017.8098831

20 Revunova E.G. Solution of the Discrete ill-posed problem on the basis of singular value decomposition and random projection. Advances in Intelligent Systems and Computing II. Cham: Springer. 2017, pp. 434-449.
https://doi.org/10.1007/978-3-319-70581-1_31

21 Revunova E.G. Increasing the accuracy of solving discrete ill-posed problems by the random projection method. Cybernetics and Systems Analysis. 2018, Vol. 54, N 5, pp. 842-852.
https://doi.org/10.1007/s10559-018-0086-0

22 Forsythe G.E., Henrici P. The cyclic Jacobi method for computing the principal values of a complex matrix. Trans. Amer. Math. Soc. 1960, Vol. 94, pp. 1-23.
https://doi.org/10.1090/S0002-9947-1960-0109825-2

23 Brent R.P., Luk F.T. The solution of singular-value and symmetric eigenvalue problems on multiprocessor arrays. SIAM J. Sci. and Stat. Comput. 1985, Vol. 6, pp. 69-84.
https://doi.org/10.1137/0906007

24 Brent R.P. Parallel algorithms for digital signal processing. Proceedings of the NATO Advanced Study Institute on Numerical Linear Algebra, Digital Signal Processing and Parallel Algorithms. Leuven, Belgium. 1988, pp. 93-110.
https://doi.org/10.1007/978-3-642-75536-1_5

25 Schreiber R. Solving eigenvalue and singular value problems on an undersized systolic array. SIAM Journal Sci. Stat. Comput. 1986, Vol. 7, N. 2, pp. 441-451.
https://doi.org/10.1137/0907029

Received 28.04.2023

Issue 3 (213), article 2

DOI:https://doi.org/10.15407/kvt213.03.020

Cybernetics and Computer Engineering, 2023, 3(213)

Yermakova I.I.1, DSc (Biology), Professor
Leading Researcher of the Department of Complex Research
of Information Technologies,
https://orcid.org/0000-0002-9417-1120,
e-mail: irena.yermakova@gmail.com

Nikolaienko A.Yu.2, PhD (Engineering),
Assistant of the Department of Software Systems and Technologies
of the Faculty of Information Technology,
https://orcid.org/0000-0002-2402-2947,
e-mail: n_nastja@ukr.net

Hrytsaiuk O.V.1, PhD Student,
Junior Researcher of the Department of Complex Research of Information Technologies,
https://orcid.org/0000-0002-9019-4894,
e-mail: olegva11@gmail.com

Kravchenko P.M.1,
Senior Engineer of the Department of Complex Research of Information Technologies,
https://orcid.org/0000-0001-8137-5063,
e-mail: paul.kravchenko@gmail.com

Dorosh O.I.1,
Researcher of the Department of Complex Research of Information Technologies,
https://orcid.org/0000-0003-2488-0500,
e-mail: olehdd@gmail.com

1International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and Ministry of Education and Science of Ukraine,
40, Acad. Glushkova av., Kyiv, 03187, Ukraine

2Taras Shevchenko National University of Kyiv,
60, Volodymyrska str., Kyiv, 01033, Ukraine

INFORMATION TECHNOLOGY FOR PREDICTING OF HUMAN THERMOPHYSIOLOGICAL STATE IN COLD WATER

Introduction. Cold water is extreme environment for humans, which is attributed to the high thermal conductivity and heat capacity of water. People whose activities involve prolonged exposure to water with a temperature below 25 °C are at risk of hypothermia. The average temperature of the ocean’s surface waters fluctuates between 15 °C and 17 °C. Therefore, it’s important to inform all individuals who work, travel, engage in sports or relax by the sea, lakes or rivers in any region of the world about the risk of hypothermia. 

As of today, there are numerous mobile applications in the field of healthcare, but there is a lack of technology capable of preemptively alerting individuals to adverse conditions in water environments and providing appropriate recommendations. 

The purpose of the paper is to assess the safety of human presence in cold water using mobile technologies and mathematical models of human physiological systems.  

Results. An informational technology for predicting of human thermophysiological state in cold water has been developed with a client-server architecture. A key feature of this technology is the inclusion of modern mathematical models of human thermoregulation and heat exchange on server, which enable the consideration of environmental characteristics, physical activity, protective clothing, immersion level, and duration of human exposure to water.  

Conclusions. The proposed informational technology allows for the early detection of potential risks of hypothermia and provides recommendations for maintaining human health during cold water exposure. The utilization of the developed informational technology can prove valuable in the realm of healthcare for evaluating physiological reserves of the body and determining a safe duration for human presence in cold water.  

Keywords: informational technology, human thermoregulation model, risks of health, mobile applications, water environment, physical activity, protective clothing.
Download full text!

REFERENCES

1 Yermakova I., Montgomery L. Predictive Simulation of Physiological Responses for Swimmers in Cold Water. 2018 IEEE 38th International scientific conference electronics and nanotechnology (ELNANO). Kyiv, April 24-26. 2018. P. 292-297.
https://doi.org/10.1109/ELNANO.2018.8477523

2 Tipton M.J., Brooks C.J. The Dangers of Sudden Immersion in Cold Water. Survival at Sea for Mariners, Aviators and Search and Rescue Personnel. Brussels, Belgium. 2008. Chapter 3. P. 1-10. ISBN 978-92-837-0084.

3 Locarnini M.M., MishonovA.V., Baranova O.K., Boyer T.P., Zweng M.M., Garcia H.E., Smolyar I. World Ocean Atlas 2018. NOAA Atlas NESDIS 81. 2018. Vol. 1: Temperature. 52 p.

4 Competition Regulations. World Aquatics. Version in force of 5th July 2023. 543 p. URL: https://www.worldaquatics.com/swimming/rules

5 Dorosh N.V., Boyko O.V., Ilkanych K.I., Zayachkivska O.S., Basalkevych O.Y., Yermakova I.I., Dorosh O.I. M-health technology for personalized medicine. Development and modernization of medical science and practice: experience of Poland and prospects of Ukraine: Collective monograph. Vol.1. Lublin: Izdevnieciba “Baltija Publishing”, 2017. P. 66-855.

6 Gritsenko V.I., Yermakova I.I., Bogationkova A.I., Dorosh O.I. Information Technologies For Personalized m-Health. Visnyk of the National Academy of Sciences of Ukraine. 2016. No 2. P. 87-90. (in Ukrainian).
https://doi.org/10.15407/visn2016.02.087

7 Raimundo D.W. SwitP: Mobile Application for Real-Time Swimming Analysis. Distributed Computing Group. 2020 22p.

8 Yermakova I.I., Bogatonkova A.I., Nikolaienko A.Yu., Tadeeva J.P., Hrytsaiuk O.V., Solopchuk J.M. M-Health Technology for the Forecast of the Human Condition in Extreme Environmental Conditions. Cybernetics and Computer Engineering. Kyiv. 2021. No 3 (205). P. 84-97. (in Ukrainian).
https://doi.org/10.15407/kvt205.03.084

9 Beachsafe Website & App. URL: https://www.surflifesaving.com.au/beach-safety/beachsafe-website/

10 Shearwater Cloud Version 2.2.0 for Desktop and Mobile. URL: https://www.shearwater.com/ announcements/shearwater-cloud-version-2-2-0-for-desktop-and-mobile-is-now-available/

11 Mobile operating systems’ market share worldwide from 1st quarter 2009 to 2nd quarter 2023. URL: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/

12 Android Developers. Guide to app architecture. URL: https://developer.android.com/ topic/architecture

13 Kostiuk Y. Shestak Y. The transport layer of the ISO/OSI model in computer networks. Commodities and markets. 2021. Vol. 40 (4). P. 49-58.
https://doi.org/10.31617/tr.knute.2021(40)05

14 Heron S. Advanced encryption standard (AES). Network Security. 2009. Vol. 2009 (12). P. 8-12.
https://doi.org/10.1016/S1353-4858(10)70006-4

15 Andriani R., Wijayanti S.E., Wibowo F.W. Comparision of AES 128, 192 and 256 bit algorithm for encryption and description file. In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). Yogyakarta, Indonesia. November 13-14. 2018. P. 120-124.
https://doi.org/10.1109/ICITISEE.2018.8720983

16 Sury O. Use of the SHA-256 Algorithm With RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. Request for Comments. 2012. Vol. 6594. 9 p.
https://doi.org/10.17487/rfc6594

17 Yermakova I.I., Montgomery L.D., Potter A.W. Mathematical model of human responses to open air and water immersion: Modeling human thermoregulatory responses. Journal of Sport and Human Performance. 2022. Vol. 10(1). P. 30-45.

18 Yermakova I.I., Nikolaienko A.Yu., Bogatonkova A.I., Tadeeva J.P. Multifunctional Information System for Modeling of Human Thermophysiological State in Extreme Environments. Cybernetics and Computer Engineering. Kyiv. 2022. No 1 (207). C. 32-45. (in Ukrainian).
https://doi.org/10.15407/kvt207.01.032

19 Boutelier C., Bougues L., Timbal J. Experimental study of convective heat transfer coefficient for the human body in water. Journal of Applied Physiology. 1977. Vol. 42. No 1. P. 93-100.
https://doi.org/10.1152/jappl.1977.42.1.93

20 Rostomily K.A., Jones D.M., Pautz C.M., Ito D.W., Buono M.J. Haemoconcentration, not decreased blood temperature, increases blood viscosity during cold water immersion. Diving Hyperb Med. 2020. Vol. 50(1). P. 24-27.
https://doi.org/10.28920/dhm50.1.24-27

Received 26.06.2023

Issue 3 (213), article 1

DOI:https://doi.org/10.15407/kvt213.03.004

Cybernetics and Computer Engineering, 2023, 3(213)

Kyyko V.M., PhD (Engineering), Senior Researcher of the Pattern Recognition Department, https://orcid.org/0009-0005-6605-0339,
e-mail: vkiiko@gmail.com,

Matsello V.V., PhD (Engineering), Head of the Pattern Recognition Department, https://orcid.org/0000-0001-7640-4077,
e-mail: matsello@gmail.com

International Research and Training Center for Information Technologies and Systems of the National Academy of Sciences of Ukraine and the Ministry of Education and Science of Ukraine, 40, Acad. Glushkova av., Kyiv, 03187, Ukraine

REAL-TIME TRACKING OF OBJECTS IN VIDEO BASED ON ADAPTIVE HISTOGRAM FEATURES

Introduction. Object tracking in video is one of the open problems in computer vision and has a wide range of practical applications. The main difficulties of this task are that the object in the process of tracking can significantly change its appearance due to changes in lighting conditions, size and orientation in space, as well as disappear from the field of view. Analysis of known algorithms shows that each of them does not fully ensure reliable tracking of objects under the above conditions. One approach to improving tracking reliability is to develop a means of using multiple algorithms that complement each other in their capabilities. 

The purpose of the paper is to develop an algorithm for long-term real-time tracking of objects in video based on the use of complementary features and algorithms to obtain more reliable tracking results in difficult conditions. 

The results. An algorithm for long-term real-time tracking of objects in video has been developed based on the combined use of two algorithms with complementary features and capabilities – the well-known KCF algorithm with HOG features of brightness gradients and the developed CH algorithm using HSV histogram features of color representations of the object and background. It is shown that the algorithm has wider possibilities for its use compared to KCF and CH filters. The developed algorithm was tested on video from the VOT (Visual Object Tracking) database. 

Conclusions. The developed algorithm ensures restoration of object localization after its disappearance from the field of view, as well as increasing the accuracy and reliability of localization in comparison with KCF and CH algorithms. Localization recovery is performed by searching for an object on an enlarged area of the image using KCF or another algorithm. The high-speed CH algorithm is used to preliminarily reduce the number of cells in the search area that can match the object and reduce its search time. Increasing the accuracy and reliability of localization is achieved by using a more informative criterion in the form of a weighted sum of the responses of two filters, as well as a more accurate definition of the rectangle bounding the object based on the segmentation of the color representation of the image.

Keywords: object tracking in video, KCF tracking algorithm, HOG features, histogram features of colors in the image.
Download full text!

REFERENCES

1 C. Bao, Y.Wu, H. Ling, and H. Ji. Real time robust l1 tracker using accelerated proximal gradient approach. In CVPR, pp.1830-1837, 2012.

2 B. Liu, J. Huang, L. Yang, and C. Kulikowski. Robust tracking using local sparse appearance model and k-selection. In CVPR, pp. 1313-1320, 2011.
https://doi.org/10.1109/CVPR.2011.5995730

3 J. F. Henriques, R. Caseiro, P. Martins, and J. Batista. High-speed tracking with kernelized correlation filters. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), vol. 37, no. 3, pp. 583-596, 2015.
https://doi.org/10.1109/TPAMI.2014.2345390

4 S. Hare, A. Saffari, and P. Torr. Struck: Structured output tracking with kernels. In IEEE Trans. on PAMI, Vol. 2, No 7, pp. 1-14, 2015.

5 M. Danelljan, F. S. Khan, M. Felsberg, and J. van de Weijer. Adaptive Color Attributes for Real-Time Visual Tracking. In Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), Columbus, OH, USA, 23-28 June 2014; pp. 1090-1097.
https://doi.org/10.1109/CVPR.2014.143

6 Weiwei Xing, Weibin Liu, Jun Wang, Shunli Zhang, Lihui Wang, Yuxiang Yang, Bowen Song. Visual Object Tracking from Correlation Filter to Deep Learning. Springer Nature, 2021, P. 193.
https://doi.org/10.1007/978-981-16-6242-3

7 L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, P.H. Torr. Staple: Complementary learners for real-time tracking. In Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27-30 June 2016, pp. 1401-1409.
https://doi.org/10.1109/CVPR.2016.156

8 Zhou, H. Fu, S. You, and C. Kuo. Unsupervised lightweight single object tracking with UHP-SOT++. ArXiv: 2111.07548, 2021, P. 13.

9 M. Dunnhofer and C. Micheloni. CoCoLoT: Combining Complementary Trackers in Long-Term Visual Tracking, arXiv: 2205, 04261v1 [cs.CV] 9 May, 2022, P. 8.
https://doi.org/10.1109/ICPR56361.2022.9956082

10 Kyyko V.M., Matsello V.V. Object tracking by co-operative actions of background Control systems and machines, 2020. No 2, pp. 23-29. (In Ukrainian).
https://doi.org/10.15407/csc.2020.02.012

11 N. Dalal, B. Triggs. Histograms of oriented gradients for human detection. In Proc. of the IEEE Conf. on CVPR, San Diego, USA, 20-25 June 2005; pp. 886-893.

12 Felzenszwalb, P.F.; Girshick, R.B.; McAllester, D. Object detection discriminatively trained part-based models, IEEE Trans. PAMI. 2009 32, pp. 1627-1645.
https://doi.org/10.1109/TPAMI.2009.167

13 Schlesinger, M.I. Fast implementation of one class of linear convolution. Theoretical and applied questions of image recognition: Kiev: Institute of Cybernetics, 1991, pp. 61-69. (In Russian).

14 J. van de Weijer, C. Schmid, J. J. Verbeek, and D. Larlus. Learning color names for real-world applications. TIP, 18(7):1512-1524, 2009.
https://doi.org/10.1109/TIP.2009.2019809

15 T. Ojala, M. Pietika.inen, and T. Ma.enpa. Multiresolution Gray Scale and Rotation Invariant Texture Classification with Local Binary Patterns. IEEE Trans. PAMI, vol. 24, no. 7, pp. 971-987, July 2002.
https://doi.org/10.1109/TPAMI.2002.1017623

16 Chao Ma, Xiaokang Yang, Chongyang Zhang1, and Ming-Hsuan Yang. Long-term Correlation Tracking. IEEE Conf. On Computer Vision and Pattern Recognition (CVPR), 2015, pp. 5388-5396.

17 Schlesinger, M.I. Pattern recognition as an implementation of a certain subclass of thought processes. Control systems and machines, 2017. No 2, pp. 20-37. (In Russian).
https://doi.org/10.15407/usim.2017.02.020

18 Yuri Boykov, Gareth Funka-Lea. Graph Cuts and Efficient N-D Image Segmentation. Int. Journal of Computer Vision, Vol. 70, 2006, pp. 109-131.
https://doi.org/10.1007/s11263-006-7934-5

19 Q. Chen and V. Koltun. Fast mrf optimization with application to depth reconstruction. in Proc. of IEEE Conf. on Computer Vision and Pattern Recognition. 2014, pp. 3914-3921.
https://doi.org/10.1109/CVPR.2014.500

20 Nobuyuki Otsu. A threshold selection method from gray-level histograms. IEEE Trans. Sys., Man., Cyber. 9(1) 1979, pp. 62-66.
https://doi.org/10.1109/TSMC.1979.4310076

21 M. Everingham, L. J. V. Gool, C. K. I. Williams, J. M. Winn, and A. Zisserman. The pascal visual object classes (VOC) challenge. IJCV, vol. 88, no. 2, pp. 303-338, 2010.
https://doi.org/10.1007/s11263-009-0275-4

Received 23.06.2023

Issue 3 (213)

DOI:https://doi.org/10.15407/kvt213.03

View web version

TABLE OF CONTENTS:

Informatics and Information Technologies:

Kyyko V.M., Matsello V.V.
Real-Time Tracking of Objects in Video Based on Adaptive Histogram Features

Yermakova I.I., Nikolaienko A.Yu., Hrytsaiuk O.V., Kravchenko P.M., Dorosh O.I.
Information Technology for Predicting of Human Thermophysiological State in Cold Water

Intelligent Control and Systems:

Revunova E.G.
Randomized Matrix Calculations and Singular Value Decomposition for the Effective Jamming Cancellation in Radiolocation Systems

Medical and Biological Cybernetics:

Kozak L.M., Kovalenko O.S., Surovtsev I.V.
Basic Components of the Software Modules Construction for Obtaining, Storing and Exchanging Medical and Environmental Information

Kalnysh V.V.
Informational Approaches to the Analysis of the Influence of Psycho-Emotional Stress on the State of the Working Population and Military Personnel of Ukraine

Issue 2 (212), article 5

DOI:https://doi.org/10.15407/kvt212.02.080

Cybernetics and Computer Engineering, 2023, 2(212)

FAINZILBERG L.S.1,2 DSc. (Engineering), Professor,
Chief researcher of Intelligent Automatic Systems Department1,
Professor of the Department of Biomedical Cybernetics2,
https://orcid.org/ 0000-0002-3092-0794,
e-mail: fainzilberg@gmail.com

KHARCHENKO A.R.2,
Student Faculty of Biomedical Engineering,
e-mail: kharchenko.anastasia@lll.kpi.ua

1 International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and Ministry of Education and Science of Ukraine,
40, Acad. Glushkov av., Kiyv, 03187, Ukraine

2 National Technical University of Ukraine
“Ihor Sikorsky Kyiv Polytechnic Institute»
37, Peremogy av., Kiyv, 03056, Ukraine

REMOTE MONITORING OF HEARING FROM THE POSITION OF PERSONALIZED MEDICINE

Introduction. At the current stage of society’s development, an increasing number of people suffer from hearing loss. Hearing plays an important role in the combat fitness of the military. Hearing loss can be prevented by regular testing. But in field conditions, it is impossible to conduct an audiometric study based only on standard methods.

The purpose of this paper is the development of methods for hearing loss evaluation based on tonal threshold audiometry using the client-server system, which provides remote communication between a patient and a doctor.

Methods. To check the hearing ability, the results of the current audiogram are compared with the users personal norm. In case of deviation from the norm the doctor is notified. He uses this information system to adjust the treatment.

Results. Developed information technology provides the opportunity of remote monitoring of the hearing condition and correction of treatment. It is demonstrated that the determination of the patient’s personal norm can be carried out by calculating the median from the user’s audiograms obtained with a smartphone and head phones.

Conclusions. The information system, which ensures the implementation of the proposed procedures, can be used on a mid-range smartphone running the Android operating system.

Keywords: audiogram, population and personal hearing norms, client-server information technology.

Download full text!

REFERENCES
1 World Health Organization. Hearing screening considerations for implementation. 54 p.

2 Larry Medwetsky. Understanding the Fundamentals of the Audiogram. So What?. Convention “Hearing Loss Association of America”. URL: https://www.hearingloss.org/wp-content/ uploads/HLM_JulAug2014_LarryMedwetsky_Audiogram1.pdf?pdf=2014-hlm-ja-lmedwetsky.

3 National Health and Nutrition Examination Survey (NHANES). Audiometry procedures manual. 2003. 111 p.

4 Varfolomieiev, A., Lysenko, O. An improved algorithm of median flow for visual object tracking and its implementation on ARM platform. Jourmal Real-Time Image Process. 2016. 11. pp. 527-534.
https://doi.org/10.1007/s11554-013-0354-1

5 Bisgaard, Nikolai & Vlaming, Marcel & Dahlquist, Martin. Standard Audiograms for the IEC 60118-15 Measurement Procedure. Trends in amplification. 2010. No. 14. pp. 113-20.
https://doi.org/10.1177/1084713810379609

6 Lin, Y., Abdulla, W.H. Principles of Psychoacoustics. In: Audio Watermark. Springer, Cham. 2015.
https://doi.org/10.1007/978-3-319-07974-5

7 “AURORA Hearing Rehabilitation Center” LLC Medical Center. Audiogram – what is it?. URL: https://aurora.ua/articles/audiohrama-shcho-tse-take/. (in Ukrainian).

8 Health and Safety Authority (HSA). Guidelines on Hearing Checks and Audiometry Under the Safety, Health and Welfare at Work (General Application) Regulations 2007, Control of Noise at Work. 2007.

9 Paul J. Govaerts. Audiometric Tests and Diagnostic Workup. 2003. pp. 33-48.
https://doi.org/10.1201/9780203913062.ch2

10 Soer M. Pure tone audiometry. Open access guide to audiology and hearing aids for otolaryngologists. 2014.

11 Occupational Safety and Health Administration (OSHA). Hearing Conservation. 2002.

12 Bright K., Eichwald J., Hall J. and al. Childhood Hearing Screening. American Academy of Audiology. 2011.

13 Stavrakas M., Kyriafinis G., Tsalighopoulos M. Diagnosis and Evaluation of hearing loss. Digital Tools for Computer Music Production and Distribution. Hershey, PA: IGI Global. 2016. pp. 31-50.
https://doi.org/10.4018/978-1-5225-0264-7.ch002

14 Minnesota department of health. Hearing Screening Training Manual. 2022.

15 Lysenko O. M. Portable multifunctional system of objective auditory screening based on modern DSP and “network-on-crystal” technologies. Science and innovation of KPI named after Igor Sikorsky. 2014. (in Ukrainian).

16 Melo I., Silva A., Camargo A. and al. Accuracy of smartphone-based hearing screening tests: a systematic review. Systematic Review. SciELO. 2021. No 34.
https://doi.org/10.1590/2317-1782/20212020380

17 Potgieter J., Swanepoel W., Myburgh H. and al. Development and validation of a smartphone-based digits-in-noise hearing test in south african english. International Journal of Audiology. 2016. No 55.
https://doi.org/10.3109/14992027.2016.1172269

18 Leonidas A., Paulina T., Ruben C., Altamirano C, Sebastian F.. Methods used in mobile applications for the diagnosis of hearing loss: A systematic mapping study. KnE Engineering. 2020. pp. 89-107.

19 Sousa K., Swanepoel W., Moore D., Smits C. A Smartphone National Hearing Test: Performance and Characteristics of Users. American Journal of Audiology. 2018. No 27. pp. 448-454.
https://doi.org/10.1044/2018_AJA-IMIA3-18-0016

20 Khazan A., Luberadzka D., Rivilla D. and al. Home-Based Audiometry With a Smartphone App: Reliable Results?. American Journal of Audiologia. 2021. No 31. pp. 914-922.
https://doi.org/10.1044/2022_AJA-21-00191

21 Yesantharao L., Donahue M., Smith A. and al. Virtual audiometric testing using smartphone mobile applications to detect hearing los. Investigative Otolaryngology. 2002.
https://doi.org/10.1002/lio2.928

22 Mahomed-Asmail F., Swanepoel W.. Mobile phone audiometry. Open access guide to audiology and hearing aids for otolaryngologists. 2013.

23 Patel K., Thibodeau L., McCullough D. and al. Development and Pilot Testing of Smartphone-Based Hearing Test Application. International Journal of Environmental Research and Public Health. 2021.
https://doi.org/10.3390/ijerph18115529

24 MWM Mustafa. High-Rated Hearing Test Android Mobile Applications: Are they Appropriate for Action?. Otolaryngology Open Access Journal. 2022. No 7.
https://doi.org/10.23880/ooaj-16000249

25 Bright T., Pallawela T. Validated Smartphone-Based Apps for Ear and Hearing Assessments: A Review. JMIR Rehabilitation and assistive technologies. 2016. No 2.
https://doi.org/10.2196/rehab.6074

26 Fainzilberg L.S. Generalized Approach to Building Computer’s Tools of Preventive Medicine for Home Using. International Scientific Technical Journal “Problems of Control and Informatics”. 2022. No 1. pp. 136-158.
https://doi.org/10.34229/1028-0979-2022-1-12

27 Mazur G. Digital Multimeter Principles. American Technical Publishers. 2010. 182 p.

28 Wang, M., Ai, Y., Han, Y. et al. Extended high-frequency audiometry in healthy adults with different age groups. Journal of Otolaryngology – Head & Neck Surg. 2021. No 50.
https://doi.org/10.1186/s40463-021-00534-w

29 Fainzilberg L., Kharchenko A. Determination of the Personal Hearing Standard in the Audiometer on a Smartphone. Proceedings of XI International Scientific and Practical Conference “Modern Scientific Research: Achievements, Innovations and Development Prospects” (Berlin, April 24-26, 2022). Berlin, Germany: MDPC Publishing, 2022, pp. 33-39.

Received 03.04.2023

Issue 2 (212), article 4

DOI:https://doi.org/10.15407/kvt212.02.052

Cybernetics and Computer Engineering, 2023, 2(212)

PANAGIOTIS KATRAKAZAS1, Ph.D.,
Research Area Manager,
ORCID 0000-0001-7433-786X,
e-mail: p.katrakazas@zelus.gr

THEODORA KALLIPOLITOU1,
Delivery Manager & Sustainability Expert,
ORCID 0000-0001-5059-4909,
e-mail: d.kallipolitou@zelus.gr

LEONIDAS KALLIPOLITIS2,
Chief Technology Officer,
ORCID 0000-0002-5689-298X,
e-mail: lkallipo@aegisresearch.eu

ILIAS SPAIS2, Ph.D.,
Senior Project Manager,
Researcher ID: 0000-0002-6167-3247,
e-mail: hspais@aegisresearch.eu

1Zelus P.C.,
Tatoiou 92, 14452, Metamorfosi, Athens, GR

2AEGIS IT Research GmbH,
25 Humboldt Str. Braunschweig, 38106, Germany

ANALYSIS AND DEFINITION OF NECESSARY MECHANISMS
TO ENSURE THE SECURITY AND PRIVACY OF DIGITAL HEALTH DATA UNDER A CYBERNETIC DIGITAL INVESTIGATION FRAMEWORK

Introduction: The recent scale-up of events caused after the Covid-19 pandemic and its subsequent healthcare crisis, highlights the digital forensics importance in a connected health ecosystem. It is therefore safe to assume that there is a growing interest in digital forensics and how they are applied within the existing healthcare ecosystem and under which concept, posing the main research question of the current study.

The purpose of the paper is to presente here focuses on defining and developing the necessary mechanisms to ensure the security and privacy of the data disseminated by existing research in both fields of digital health and cybersecurity. A cybernetics-inspired framework is structured based on existing practices and key gaps identified.

Results: Five electronic databases, namely Scopus, IEEEXplore, PubMed, DOAJ (Directory of Open Access Journals and arXiV were identified as the main data sources. A State-of-the-Art analysis has been performed to realize the limits of the devices and the machines (including the systems and their elements involved) in the healthcare domain, when these break down so that the investigation will teach us something new that is nontrivial. A highly relevant dimension in our approach for a digital forensics driven connected health landscape is based on rigorous and comprehensive feedback take-off methods, which are seemingly lacking.

Conclusion: The main point of our study is to show that while there might seem an immense multiplicity, a unity can be formulated and vice versa: where something appears as a unit, an unbounded plurality of conditions might be enclosed within it. Moving into a connected health future should be built upon existing accidents so as to mark the upcoming changes that would affect such a system.

Keywords: digital forensics, connected health, cybernetic digital investigation framework, cybersecurity.

Download full text!

REFERENCES
1. K. Colorafi, ‘Connected health: a review of the literature’, mHealth, vol. 2, p. 13, Apr. 2016,
https://doi.org/10.21037/mhealth.2016.03.09

2. C. Kuziemsky, R. M. Abbas, and N. Carroll, ‘Toward a Connected Health Delivery Framework’, in 2018 IEEE/ACM International Workshop on Software Engineering in Healthcare Systems (SEHS), May 2018, pp. 46-49.
https://doi.org/10.1145/3194696.3194703

3. C. S. Pattichis and A. S. Panayides, ‘Connected Health’, Front. Digit. Health, vol. 1, p. 1, 2019,
https://doi.org/10.3389/fdgth.2019.00001

4. C. Horan and H. Saiedian, ‘Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions’, J. Cybersecurity Priv., vol. 1, no. 4, Art. no. 4, Dec. 2021,
https://doi.org/10.3390/jcp1040029

5. S. Kumar, A. K. Bharti, and R. Amin, ‘Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions’, Secur. Priv., vol. 4, no. 5, p. e162, 2021,
https://doi.org/10.1002/spy2.162

6. N. J. Podlesny, A. V. D. M. Kayem, and C. Meinel, ‘Towards Identifying De-anonymisation Risks in Distributed Health Data Silos’, in Database and Expert Systems Applications, Cham, 2019, pp. 33-43.
https://doi.org/10.1007/978-3-030-27615-7_3

7. A. Adel, ‘A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach’, Forensic Sci., vol. 2, no. 1, Art. no. 1, Mar. 2022,
https://doi.org/10.3390/forensicsci2010009

8. M. J. Page et al., ‘The PRISMA 2020 statement: an updated guideline for reporting systematic reviews’, BMJ, vol. 372, p. n71, Mar. 2021.

9. A. Shaaban and N. Abdelbaki, ‘Comparison Study of Digital Forensics Analysis Techniques; Findings versus Resources’, Procedia Comput. Sci., vol. 141, pp. 545-551, Jan. 2018.
https://doi.org/10.1016/j.procs.2018.10.128

10. K. Hovhannisyan, P. Bogacki, C. A. Colabuono, D. Lofù, M. V. Marabello, and B. E. Maxwell, ‘Towards a Healthcare Cybersecurity Certification Scheme’, Jun. 2021.
https://doi.org/10.1109/CyberSA52016.2021.9478255

11. P. Kieseberg, B. Malle, P. Frühwirt, E. Weippl, and A. Holzinger, ‘A tamper-proof audit and control system for the doctor in the loop’, Brain Inform., vol. 3, no. 4, Art. no. 4, Dec. 2016.
https://doi.org/10.1007/s40708-016-0046-2

12. J. Priisalu and R. Ottis, ‘Personal control of privacy and data: Estonian experience’, Health Technol., vol. 7, no. 4, pp. 441-451, Dec. 2017.
https://doi.org/10.1007/s12553-017-0195-1

13. G. Grispos, W. B. Glisson, and K.-K. R. Choo, ‘Medical Cyber-Physical Systems Development: A Forensics-Driven Approach’, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Jul. 2017, pp. 108-113.
https://doi.org/10.1109/CHASE.2017.68

14. J. King, ‘Measuring the forensic-ability of audit logs for nonrepudiation’, in 2013 35th International Conference on Software Engineering (ICSE), May 2013, pp. 1419-1422.
https://doi.org/10.1109/ICSE.2013.6606732

15. R. A. Nabha and H. Sbeyti, ‘Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study’, in 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2020, pp. 1-7.
https://doi.org/10.1109/ISDFS49300.2020.9116449

16. G. Grispos and K. Bastola, ‘Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts’, in 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS), Jul. 2020, pp. 510-513.
https://doi.org/10.1109/CBMS49503.2020.00102

17. M. Savari, M. Montazerolzohour, and Y. E. Thiam, ‘Comparison of ECC and RSA algorithm in multipurpose smart card application’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 49-53.
https://doi.org/10.1109/CyberSec.2012.6246121

18. M. Savari, M. Montazerolzohour, and Y. E. Thiam, ‘Combining encryption methods in multipurpose smart card’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 43-48.
https://doi.org/10.1109/CyberSec.2012.6246120

19. M. Chernyshev, S. Zeadally, and Z. Baig, ‘Healthcare Data Breaches: Implications for Digital Forensic Readiness’, J. Med. Syst., vol. 43, no. 1, p. 7, Nov. 2018.
https://doi.org/10.1007/s10916-018-1123-2

20. V. Malamas, T. Dasaklis, P. Kotzanikolaou, M. Burmester, and S. Katsikas, ‘A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain’, in 2019 IEEE World Congress on Services (SERVICES), Jul. 2019, vol. 2642-939X, pp. 35-40.
https://doi.org/10.1109/SERVICES.2019.00021

21. H. F. Atlam, A. Alenezi, M. O. Alassafi, A. A. Alshdadi, and G. B. Wills, ‘Security, cybercrime and digital forensics for IoT’, in Intelligent Systems Reference Library, Springer International Publishing, 2019.
https://doi.org/10.1007/978-3-030-33596-0_22

22. K. Kumari, S. Saha, and S. Neogy, ‘Cost Based Model for Secure Health Care Data Retrieval’, in Security in Computing and Communications, vol. 969, S. M. Thampi, S. Madria, G. Wang, D. B. Rawat, and J. M. Alcaraz Calero, Eds. Singapore: Springer Singapore, 2019, pp. 67-75.
https://doi.org/10.1007/978-981-13-5826-5_5

23. A. Bruno and G. Cattaneo, ‘Experimental Analysis of the Pixel Non Uniformity (PNU) in SEM for Digital Forensics Purposes’, in Pervasive Systems, Algorithms and Networks, vol. 1080, C. Esposito, J. Hong, and K.-K. R. Choo, Eds. Cham: Springer International Publishing, 2019, pp. 313-320.
https://doi.org/10.1007/978-3-030-30143-9_26

24. S. Bindahman, N. Zakaria, and N. Zakaria, ‘3D body scanning technology: Privacy and ethical issues’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 150-154.
https://doi.org/10.1109/CyberSec.2012.6246113

25. J. P. van Zandwijk and A. Boztas, ‘The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence?’, Digit. Investig., vol. 28, pp. S126-S133, Apr. 2019.
https://doi.org/10.1016/j.diin.2019.01.021

26. A. Azfar, K.-K. R. Choo, and L. Liu, ‘Forensic Taxonomy of Popular Android mHealth Apps’, ArXiv150502905 Cs, May 2015, Accessed: Oct. 26, 2021. Online. Available: http://arxiv.org/abs/1505.02905

27. Z. A. Alhaboby et al., ‘Understanding the Cyber-Victimisation of People with Long Term Conditions and the Need for Collaborative Forensics-Enabled Disease Management Programmes’, in Cyber Criminology, H. Jahankhani, Ed. Cham: Springer International Publishing, 2018, pp. 227-250.
https://doi.org/10.1007/978-3-319-97181-0_11

28. I. Baggili, J. Oduro, K. Anthony, F. Breitinger, and G. McGee, ‘Watch What You Wear: Preliminary Forensic Analysis of Smart Watches’, in 2015 10th International Conference on Availability, Reliability and Security, Aug. 2015, pp. 303-311.
https://doi.org/10.1109/ARES.2015.39

29. G. Grispos, T. Flynn, W. Glisson, and K.-K. R. Choo, ‘Investigating Protected Health Information Leakage from Android Medical Applications’, ArXiv210507360 Cs, May 2021, Accessed: Oct. 27, 2021. Online. Available: http://arxiv.org/abs/2105.07360

30. H. Chi, ‘Integrate mobile devices into CS security education’, in Proceedings of the 2015 Information Security Curriculum Development Conference, New York, NY, USA, Oct. 2015, pp. 1-4.

31. C. Hassenfeldt, S. Baig, I. Baggili, and X. Zhang, ‘Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications’, in Proceedings of the 14th International Conference on Availability, Reliability and Security, New York, NY, USA, Aug. 2019, pp. 1-12.
https://doi.org/10.1145/3339252.3340515

32. M. Akour, S. Banitaan, H. Alsghaier, and K. A. Radaideh, ‘Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers’, in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2019, pp. 1-7.
https://doi.org/10.1109/ISDFS.2019.8757487

33. T. Flynn, G. Grispos, W. B. Glisson, and W. Mahoney, ‘Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack’, Jan. 2020, Accessed: Oct. 31, 2021. Online. Available: https://shsu-ir.tdl.org/handle/20.500.11875/3199
https://doi.org/10.24251/HICSS.2020.791

34. S. Kim, W. Jo, J. Lee, and T. Shon, ‘AI-enabled device digital forensics for smart cities’, J. Supercomput., Jul. 2021.
https://doi.org/10.1007/s11227-021-03992-1

35. F. Hantke and A. Dewald, ‘How can data from fitness trackers be obtained and analyzed with a forensic approach?’, in 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Sep. 2020, pp. 500-508.
https://doi.org/10.1109/EuroSPW51379.2020.00073

36. Á. MacDermott, S. Lea, F. Iqbal, I. Idowu, and B. Shah, ‘Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches’, in 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Jun. 2019, pp. 1-6.
https://doi.org/10.1109/NTMS.2019.8763834

37. Y. H. Yoon and U. Karabiyik, ‘Forensic Analysis of Fitbit Versa 2 Data on Android’, Electronics, vol. 9, no. 9, Art. no. 9, Sep. 2020.
https://doi.org/10.3390/electronics9091431

38. S. Kang, S. Kim, and J. Kim, ‘Forensic analysis for IoT fitness trackers and its application’, Peer–Peer Netw. Appl., vol. 13, no. 2, pp. 564-573, Mar. 2020,
https://doi.org/10.1007/s12083-018-0708-3

39. M. Siddiqi, S. T. Ali, and V. Sivaraman, ‘Forensic Verification of Health Data From Wearable Devices Using Anonymous Witnesses’, IEEE Internet Things J., vol. 7, no. 11, pp. 10745-10762, Nov. 2020.
https://doi.org/10.1109/JIOT.2020.2982958

40. N. Rahman and M. Thariq, ‘A digital evidence taxonomy of m-health apps in iot environment’, Jun. 2020.

41. N. Phumkaew and V. Visoottiviseth, ‘Android Forensic and Security Assessment for Hospital and Stock-and-Trade Applications in Thailand’, in 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE), Jul. 2018, pp. 1-6.
https://doi.org/10.1109/JCSSE.2018.8457347

42. Z. Zhou, A. Gaurav, B. B. Gupta, H. Hamdi, and N. Nedjah, ‘A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic’, Neural Comput. Appl., pp. 1-14, Sep. 2021.
https://doi.org/10.1007/s00521-021-06389-6

43. W. Zhuang, Y. Shen, L. Li, C. Gao, and D. Dai, ‘Develop an Adaptive Real-Time Indoor Intrusion Detection System Based on Empirical Analysis of OFDM Subcarriers’, Sensors, vol. 21, no. 7, Art. no. 7, Jan. 2021.
https://doi.org/10.3390/s21072287

44. C.-L. Hsu, W.-X. Chen, and T.-V. Le, ‘An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things’, Sensors, vol. 20, no. 22, Art. no. 22, Jan. 2020.
https://doi.org/10.3390/s20226471

45. N. H. N. Zulkipli, A. Alenezi, and G. B. Wills, ‘IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things’, presented at the 2nd International Conference on Internet of Things, Big Data and Security, Oct. 2021, pp. 315-324. Accessed: Oct. 27, 2021. Online. Available: https://www.scitepress.org/PublicationsDetail.aspx?ID=fpfedOeeepw=&t=1

46. L. Lao, Z. Li, S. Hou, B. Xiao, S. Guo, and Y. Yang, ‘A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling’, ACM Comput. Surv., vol. 53, no. 1, p. 18:1-18:32, Feb. 2020.
https://doi.org/10.1145/3372136

47. A. Kyaw, B. Cusack, and R. Lutui, ‘Digital Forensic Readiness In Wireless Medical Systems’, in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Nov. 2019, pp. 1-6.
https://doi.org/10.1109/ITNAC46935.2019.9078005

48. A. K. Kyaw, Z. Tian, and B. Cusack, ‘Design and Evaluation for Digital Forensic Ready Wireless Medical Systems’, in IoT Technologies for HealthCare, vol. 314, N. M. Garcia, I. M. Pires, and R. Goleva, Eds. Cham: Springer International Publishing, 2020, pp. 118-141.
https://doi.org/10.1007/978-3-030-42029-1_9

49. Z. Wu, X. Qi, G. Liu, L. Fang, J. Liu, and J. Cui, ‘An extend RBAC model for privacy protection in HIS’, in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Mar. 2018, pp. 1-6.

50. M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, ‘A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues’, IEEE Commun. Surv. Tutor., vol. 22, no. 2, pp. 1191-1221, 2020.
https://doi.org/10.1109/COMST.2019.2962586

51. A. Kumar and R. Kumar, ‘Privacy Preservation of Electronic Health Record: Current Status and Future Direction’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 715-739.
https://doi.org/10.1007/978-3-030-22277-2_28

52. X. Liu, X. Yuan, and J. Liu, ‘Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data’, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Aug. 2018, pp. 1664-1668.
https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247

53. E. Al Alkeem, C. Y. Yeun, and M. J. Zemerly, ‘Security and privacy framework for ubiquitous healthcare IoT devices’, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), Dec. 2015, pp. 70-75.
https://doi.org/10.1109/ICITST.2015.7412059

54. H. Qiu, M. Qiu, M. Liu, and G. Memmi, ‘Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0’, IEEE J. Biomed. Health Inform., vol. 24, no. 9, pp. 2499-2505, Sep. 2020.
https://doi.org/10.1109/JBHI.2020.2973467

55. P. Agbedanu and A. D. Jurcut, ‘BLOFF: A Blockchain based Forensic Model in IoT’, ArXiv210308442 Cs, pp. 59-73, 2021.
https://doi.org/10.4018/978-1-7998-7589-5.ch003

56. J. Yuan and Y. Tian, ‘Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset’, IEEE Trans. Cloud Comput., vol. 7, no. 02, pp. 568-579, Apr. 2019.
https://doi.org/10.1109/TCC.2017.2656895

57. I. Jayaraman and A. Stanislaus Panneerselvam, ‘A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud’, J. Ambient Intell. Humaniz. Comput., vol. 12, no. 5, pp. 4911-4924, May 2021.
https://doi.org/10.1007/s12652-020-01931-1

58. X. Feng, B. Onafeso, and E. Liu, ‘Investigating Big Data Healthcare Security Issues with Raspberry Pi’, in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Oct. 2015, pp. 2329-2334.
https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.344

59. X. Feng and Y. Zhao, ‘Digital Forensics Challenges to Big Data in the Cloud’, in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Jun. 2017, pp. 858-862.
https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.132

60. H. Nguyen et al., ‘Cloud-Based Secure Logger for Medical Devices’, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Jun. 2016, pp. 89-94.
https://doi.org/10.1109/CHASE.2016.48

61. A. Gehani, G. F. Ciocarlie, and N. Shankar, ‘Accountable clouds’, in 2013 IEEE International Conference on Technologies for Homeland Security (HST), Nov. 2013, pp. 403-407.
https://doi.org/10.1109/THS.2013.6699038

62. F. Khan, ‘A detailed study on Security breaches of Digital Forensics in Cyber Physical Systems’, in 2019 Sixth HCT Information Technology Trends (ITT), Nov. 2019, pp. 38-43.
https://doi.org/10.1109/ITT48889.2019.9075094

63. A. Abdullah, H. Kaur, and R. Biswas, ‘Universal Layers of IoT Architecture and Its Security Analysis’, in New Paradigm in Decision Science and Management, Singapore, 2020, pp. 293-302.
https://doi.org/10.1007/978-981-13-9330-3_30

64. J. Ibarra, H. Jahankhani, and J. Beavers, ‘Biohacking Capabilities and Threat/Attack Vectors’, in Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, H. Jahankhani, S. Kendzierskyj, N. Chelvachandran, and J. Ibarra, Eds. Cham: Springer International Publishing, 2020, pp. 117-131.
https://doi.org/10.1007/978-3-030-35746-7_7

65. B. Rappert, H. Wheat, and D. Wilson-Kovacs, ‘Rationing bytes: managing demand for digital forensic examinations’, Polic. Soc., vol. 31, no. 1, pp. 52-65, Jan. 2021.
https://doi.org/10.1080/10439463.2020.1788026

66. V. Kisekka and J. S. Giboney, ‘The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes’, J. Med. Internet Res., vol. 20, no. 4, p. e107, Apr. 2018.
https://doi.org/10.2196/jmir.9014

67. V. Kisekka, S. Goel, and K. Williams, ‘Disambiguating Between Privacy and Security in the Context of Health Care: New Insights on the Determinants of Health Technologies Use’, Cyberpsychology Behav. Soc. Netw., vol. 24, no. 9, pp. 617-623, Sep. 2021.
https://doi.org/10.1089/cyber.2020.0600

68. J. A. Hodges, ‘Forensically reconstructing biomedical maintenance labor: PDF metadata under the epistemic conditions of COVID-19’, J. Assoc. Inf. Sci. Technol., Apr. 2021.
https://doi.org/10.1002/asi.24484

69. S. Karakus and E. Avci, ‘Application of Similarity-Based Image Steganography Method to Computerized Tomography Images’, in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2019, pp. 1-4.
https://doi.org/10.1109/ISDFS.2019.8757521

70. J. Dalins, Y. Tyshetskiy, C. Wilson, M. J. Carman, and D. Boudry, ‘Laying foundations for effective machine learning in law enforcement. Majura – A labelling schema for child exploitation materials’, Digit. Investig., vol. 26, pp. 40-54, Sep. 2018.
https://doi.org/10.1016/j.diin.2018.05.004

71. K. C. Seigfried-Spellar, ‘Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations’, J. Police Crim. Psychol., vol. 33, no. 3, pp. 215-226, Sep. 2018.
https://doi.org/10.1007/s11896-017-9248-7

72. T. W. Jing and R. K. Murugesan, ‘Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology’, Commun. Comput. Inf. Sci., vol. 1347, pp. 674-684, 2021.
https://doi.org/10.1007/978-981-33-6835-4_44

73. A. Bruno, G. Cattaneo, U. Ferraro Petrillo, and P. Capasso, ‘PNU Spoofing: a menace for biometrics authentication systems?’, Pattern Recognit. Lett., vol. 151, pp. 3-10, 2021.
https://doi.org/10.1016/j.patrec.2021.07.008

74. N. Wiener, Cybernetics; or, Control and communication in the animal and the machine. New York: M.I.T. Press, 1961.
https://doi.org/10.1037/13140-000

75. R. GLANVILLE, ‘Cybernetics: Thinking Through the Technology’, in Traditions of Systems Theory, Routledge, 2013.

76. L. Helminger and C. Rechberger, ‘Multi-Party Computation in the GDPR’, Priv. Symp. 2022 – Data Prot. Law Int. Converg. Compliance Innov. Technol. DPLICIT, 2022.
https://doi.org/10.1007/978-3-031-09901-4_2

77. M. Roy, C. Chowdhury, and N. Aslam, ‘Security and Privacy Issues in Wireless Sensor and Body Area Networks’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 173-200.
https://doi.org/10.1007/978-3-030-22277-2_7

78. A. Vyas and S. Pal, ‘Preventing Security and Privacy Attacks in WBANs’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 201-225.
https://doi.org/10.1007/978-3-030-22277-2_8

Received 29.01.2023

Issue 2 (212), article 3

DOI:https://doi.org/10.15407/kvt212.02.033

Cybernetics and Computer Engineering, 2023, 2(212)

ARALOVA N.I.1, DSc (Engineering), Senior Researcher,
Senior Researcher of Optimization of Controlled Processes Department,
ORCID 0000-0002-7246-2736,
e-mail: aralova@ukr.net

RADZIEJOWSKI P.A.2, DSc (Biology), Professor
ORCID 0000-0001-8232-2705,
e-mail: p.radziejowski@wseit.edu.pl

RADZIEJOWSKA M.P.3, DSc (Biology).,
Professor of Faculty of Management,
Department of Innovations
and Safety Management Systems
ORCID 0000-0002-9845-390X,
e-mail: maria.radziejowska@pcz.pl

ARALOVA A.A.1, PhD (Mathematics)
Researcher of the Department of Methods for Discrete Optimization,
Mathematical Modelling and Analyses of Complex Systems
ORCID 0000-0001-7282-2036,
email: aaaralova@gmail.com

1 Institute of cybernetics of National Academy of Science of Ukraine,
40, Acad.Glushkov av., 03187, Kyiv, Ukraine

2 Kazimiera Milanowska College of Education and Therapy , Poznan, Poland

3 Czestochowa University of Technology
19b, Armii Krajowej str., 42-200, Częstochowa, Poland

APPLICATION OF THE MATHEMATICAL MODEL OF THE FUNCTIONAL BREATHING SYSTEM FOR OPTIMAL CONTROL OF THE TRAINING PROCESS OF HIGHLY QUALIFIED ATHLETES

Introduction. One of the most important tasks of sports training in modern sports of the highest achievements is the ability to control the state of the athlete’s body in the process of training and competitive activities. The use of a systematic approach in the training of highly qualified athletes, the system-forming factor in which is sports performance, presupposes the use of various non-traditional methods of improving the adaptation of athletes to the ever-increasing training loads. The development of methods and means for increasing physical performance and, in particular, in the practice of high-performance sports, is one of the most important principles of modern sports medicine. One of these methods is interval hypoxic training.

The purpose of the paper is to reveal the effectiveness of the process of adaptation to hypoxic hypoxia during the training process in the middle mountains and during the course of normobaric interval hypoxic training as a means of controlling the training process for increasing work capacity and improving the state of the functional respiratory system.

Methods. A system approach was used to assess the functional state of the respiratory system, combining instrumental examination with the subsequent use of mathematical models of the oxygen regimes of the body, predicting the state of functional respiratory system on the mathematical model of the respiratory system with optimal control, aerobic performance and working capacity.

Results. The combination of separate conducting of the IHT course and the traditional planned training process plays a significant role in the management of the training process because increases the effectiveness of the constructive effect of hypoxia

Separate use of hypoxic hypoxia and load hypoxia significantly increases the functional state of the respiratory system, increases aerobic performance and performance of athletes in comparison with the simultaneous effects of hypoxic hypoxia and load hypoxia during the training process in mid-altitude mountains.

Keywords: functional respiratory system, intermittent  hypoxic training, athletes’ performance, the effectiveness of the adaptation process of athletes, mathematical model of the respiratory system with optimal control.

Download full text!

REFERENCES

1. Kolchinskaya A.Z. Mechanisms of action of interval hypoxic training. Interval hypoxic training. (Efficiency. Mechanisms of action): Sat. scientific. tr. Kiev. 1992. 107-113.

2. Kolchinskaya A.Z., Tsyganova T.N., Ostapenko L.A. Normobaric interval hypoxic training in medicine and sports. M .: Medicine, 2003 408 p.

3. Nakamoto F.P., Ivamoto R.K., Andrade M.dos S., de Lira C.A., Silva B.M., da Silva A.C. Effect of Intermittent Hypoxic Training Followed by Intermittent Hypoxic Exposure on Aerobic Capacity of Long Distance Runners. J Strength Cond Res. 2016 Jun;30(6):1708-20.
https://doi.org/10.1519/JSC.0000000000001258

4. Sch!ö!ffel N., Senff T., Gerber A., de Roux A., Bauer T.T., Groneberg D.A. Normobare Hypoxie: Aktuelle Implikationen f!ü!r Pneumologie und Leistungsdiagnostik [Intermittent hypoxic training–the state of science]. Pneumologie. 2008 May;62(5):279-83. German.
https://doi.org/10.1055/s-2008-1038113

5. Serebrovskaya T.V. Intermittent hypoxia research in the former soviet union and the commonwealth of independent States: history and review of the concept and selected applications. High Alt Med Biol. 2002 Summer;3(2):205-21.
https://doi.org/10.1089/15270290260131939

6. Dufour S.P, Ponsot E., Zoll J., Doutreleau S., Lonsdorfer-Wolf E., Geny B., Lampert E., Fl!ü!ck M., Hoppeler H., Billat V., Mettauer B., Richard R., Lonsdorfer J. Exercise training in normobaric hypoxia in endurance runners. I. Improvement in aerobic performance capacity.!
!J Appl Physiol (1985). 2006 Apr;100(4):1238-48.
https://doi.org/10.1152/japplphysiol.00742.2005

7. Holliss B.A., Fulford J., Vanhatalo A., Pedlar C.R., Jones A.M. Influence of intermittent hypoxic training on muscle energetics and exercise tolerance. J Appl Physiol.(1985). 2013 Mar 1;114(5):611-9.
https://doi.org/10.1152/japplphysiol.01331.2012

8. Katayama K., Sato Y., Shima N., Qiu J.C., Ishida K., Mori S., Miyamura M. Enhanced chemosensitivity after intermittent hypoxic exposure does not affect exercise ventilation at sea level. Eur J Appl Physiol. 2002 Jun;87(2):187-91.
https://doi.org/10.1007/s00421-002-0594-4

9. Serebrovskaya T.V., Karaban I.N., Kolesnikova E.E., Mishunina T.M. Kuzminskaya L.A, Serbrovsky A.N., Swanson R.J. Human hypoxic ventilatory response with blood dopamine content under intermittent hypoxic training. Can J Physiol Pharmacol. 1999 Dec;77(12):967-73. PMID: 10606443.
https://doi.org/10.1139/y99-096

10. Foster G.E. McKenzie DC, Sheel AW. Effects of enhanced human chemosensitivity on ventilatory responses to exercise. Exp Physiol. 2006 Jan;91(1):221-8.
https://doi.org/10.1113/expphysiol.2005.032276

11. Katayama K., Shima N., Sato Y., Qiu J.C., Ishida K., Mori S., Miyamura M/. Effect of intermittent hypoxia on cardiovascular adaptations and response to progressive hypoxia in humans. High Alt Med Biol. 2001 Winter;2(4):501-8.
https://doi.org/10.1089/152702901753397063

12. Foster G.E., McKenzie D.C., Milsom W.K., Sheel A.W. Effects of two protocols of intermittent hypoxia on human ventilatory, cardiovascular and cerebral responses to hypoxia. J Physiol. 2005 Sep 1;567(Pt 2):689-99.
https://doi.org/10.1113/jphysiol.2005.091462

13. Schmidt W., Prommer N. Impact of alterations in total hemoglobin mass on VO 2max. Exerc Sport Sci Rev. 2010 Apr;38(2):68-75.
https://doi.org/10.1097/JES.0b013e3181d4957a

14. Burtscher M., Pachinger O., Ehrenbourg I., Mitterbauer G., Faulhaber M., P!ü!hringer R., Tkatchouk E. Intermittent hypoxia increases exercise tolerance in elderly men with and without coronary artery disease. Int J Cardiol. 2004 Aug;96(2):247-54.
https://doi.org/10.1016/j.ijcard.2003.07.021

15. Katayama K., Fujita H., Sato K., Ishida K., Iwasaki K., Miyamura M. Effect of a repeated series of intermittent hypoxic exposures on ventilatory response in humans. High Alt Med Biol. 2005 Spring;6(1):50-9.
https://doi.org/10.1089/ham.2005.6.50

16. Ponsot E., Dufour S.P., Zoll J., Doutrelau S., N’Guessan B., Geny B., Hoppeler H., Lampert E., Mettauer B., Ventura-Clapier R., Richard R. Exercise training in normobaric hypoxia in endurance runners. II. Improvement of mitochondrial properties in skeletal muscle. J Appl Physiol (1985). 2006 Apr;100(4):1249-57.
https://doi.org/10.1152/japplphysiol.00361.2005

17. Basset F.A., Joanisse D.R., Boivin F., St-Onge J., Billaut F., Dor!é! J., Chouinard R., Falgairette G., Richard D., Boulay M.R. Effects of short-term normobaric hypoxia on haematology, muscle phenotypes and physical performance in highly trained athletes. Exp Physiol. 2006 Mar;91(2):391-402.
https://doi.org/10.1113/expphysiol.2005.031682

18. Vogt M., Billeter R., Hoppeler H. Effect of hypoxia on muscular performance capacity: “living low–training high”. Ther Umsch. 2003 Jul;60(7):419-24. German.
https://doi.org/10.1024/0040-5930.60.7.419

19. Zoll J., Ponsot E., Dufour S., Doutreleau S., Ventura-Clapier R., Vogt M., Hoppeler H., Richard R., Fl!ü!ck M.Exercise training in normobaric hypoxia in endurance runners. III. Muscular adjustments of selected gene transcripts. J Appl Physiol (1985). 2006 Apr;100(4):1258-66.
https://doi.org/10.1152/japplphysiol.00359.2005

20. Krivoshchekin S.G., Divert V.E., Mel’nikov V.N., Vodianitski!ĭ! S.N., Girenko L.A. Comparative analysis of gas exchange and cardiorespiratory systems reactions to increasing normobaric hypoxia and physical load of swimmers and skiers. Fiziol Cheloveka. 2013 Jan-Feb;39(1):117-25. Russian.
https://doi.org/10.1134/S0362119712060072

21. Mucci P., Blondel N.., Fabre C., Nourry C., Berthoin S. Evidence of exercise-induced O2 arterial desaturation in non-elite sportsmen and sportswomen following high-intensity interval-training. Int J Sports Med. 2004 Jan;25(1):6-13.
https://doi.org/10.1055/s-2003-45225

22. Koehle M.S., Foster G.E., McKenzie D.C., Sheel A.W. Repeated measurement of hypoxic ventilatory response as an intermittent hypoxic stimulus. Respir Physiol Neurobiol. 2005 Jan 15;145(1):33-9.
https://doi.org/10.1016/j.resp.2004.09.004

23. Katayama K., Sato Y., Ishida K., Mori S., Miyamura M. The effects of intermittent exposure to hypoxia during endurance exercise training on the ventilatory responses to hypoxia and hypercapnia in humans. Eur J Appl Physiol Occup Physiol. 1998 Aug;78(3):189-94.
https://doi.org/10.1007/s004210050406

24. Park H.Y., Sunoo S., Nam S.S. The Effect of 4 Weeks Fixed and Mixed Intermittent Hypoxic Training (IHT) on Respiratory Metabolic and Acid-base Response of Capillary Blood During Submaximal Bicycle Exercise in Male Elite Taekwondo Players. J Exerc Nutrition Biochem. 2016 Dec 31;20(4):35-43.
https://doi.org/10.20463/jenb.2016.0035

25. Temme L.A., St Onge P., Adams M., Still D.L., Statz J.K., Williams S.T. A Novel, Inexpensive Method to Monitor, Record, and Analyze Breathing Behavior During Normobaric Hypoxia Generated by the Reduced Oxygen Breathing Device. Mil Med. 2017 Mar;182(S1):210-215.
https://doi.org/10.7205/MILMED-D-16-00053

26. Lippi G., Franchini M., Banfi G. Normobaric hypoxia and sports: the debate continues. Eur J Appl Physiol. 2011 Jan;111(1):159-60.
https://doi.org/10.1007/s00421-010-1630-4

27. Millet G. P., Brocherie F.. Hypoxic Training Is Beneficial in Elite Athletes. Medicine and Science in Sports and Exercise, American College of Sports Medicine (ACSM), 2020, 52 (2), pp.515- 518.10.1249/MSS.0000000000002142.
https://doi.org/10.1249/MSS.0000000000002142

28. Ambro!ż!y T., Maciejczyk M., Klimek AT., Wiecha S., Snopkowski P., Pa!ł!ka T., Jaworski J. , Ambro!ż!y D. , Rydzik !Ł!., Cynarski W. The Effects of Intermittent Hypoxic Training on Anaerobic and Aerobic Power in Boxers Int. J. Environ. Res. Public Health. 2020, 17(24). 9361.
https://doi.org/10.3390/ijerph17249361

29. Radziievs’ki!ĭ! P.O., Radziievs’ka M.P.Hypoxic training of high qualification sportsmen. Fiziol Zh. 2003;49(3):126-33. Ukrainian. PMID: 12918261.

30. Shatilo V.B., Korkushko O.V., Ischuk V.A., Downey H.F., Serebrovskaya T.V. Effects of intermittent hypoxia training on exercise performance, hemodynamics, and ventilation in healthy senior men. High Alt Med Biol. 2008 Spring;9(1):43-52.
https://doi.org/10.1089/ham.2007.1053

31. Park H.Y., Jung W.S., Kim J., Hwang H., Lim K. Efficacy of intermittent hypoxic training on hemodynamic function and exercise performance in competitive swimmers!
!J Exerc Nutrition Biochem. 2018 Dec 31;22(4):32-38.
https://doi.org/10.20463/jenb.2018.0028

32. Rodr!í!guez F.A., Truijens M.J., Townsend N.E., Stray-Gundersen J., Gore C.J., Levine B.D. Performance of runners and swimmers after four weeks of intermittent hypobaric hypoxic exposure plus sea level training. J Appl Physiol (1985). 2007 Nov;103(5):1523-35.
https://doi.org/10.1152/japplphysiol.01320.2006

33. Roels B., Thomas C., Bentley D.J., Mercier J., Hayot M., Millet G.J. Effects of intermittent hypoxic training on amino and fatty acid oxidative combustion in human permeabilized muscle fibers. Appl Physiol (1985). 2007 Jan;102(1):79-86.
https://doi.org/10.1152/japplphysiol.01319.2005

34. Desplanches D., Hoppeler H., Linossier M.T., Denis C., Claassen H., Dormois D., Lacour J.R., Geyssant A. Effects of training in normoxia and normobaric hypoxia on human muscle ultrastructure. Pflugers Arch. 1993 Nov;425(3-4):263-7.
https://doi.org/10.1007/BF00374176

35. Katayama K., Matsuo H., Ishida K., Mori S., Miyamura M. Intermittent hypoxia improves endurance performance and submaximal exercise efficiency. High Alt Med Biol. 2003 Fall;4(3):291-304.
https://doi.org/10.1089/152702903769192250

36. Holliss B.A., Burden R.J., Jones A.M., Pedlar C.R. Eight weeks of intermittent hypoxic training improves submaximal physiological variables in highly trained runners. J Strength Cond Res. 2014 Aug;2 8(8):2195-203.
https://doi.org/10.1519/JSC.0000000000000406

37. Debevec T., Amon M., Keramidas M.E., Kounalakis S.N., Pisot R., Mekjavic I.B. Normoxic and hypoxic performance following 4 weeks of normobaric hypoxic training. Aviat Space Environ Med. 2010 Apr;81(4):387-93.
https://doi.org/10.3357/ASEM.2660.2010

38. Czuba M., Bril G., P!ł!oszczyca K., Piotrowicz Z., Chalimoniuk M., Roczniok R., Zembro!ń!-!Ł!acny A., Gerasimuk D., Langfort J. Intermittent Hypoxic Training at Lactate Threshold Intensity Improves Aiming Performance in Well-Trained Biathletes with Little Change of Cardiovascular Variables. Biomed Res Int. 2019 Sep 25;2019:1287506.
https://doi.org/10.1155/2019/1287506

39. Nakamoto F.P., Ivamoto R.K., dos Andrade M. S., de Lira C.A., Silva B.M., da Silva A.C. Effect of Intermittent Hypoxic Training Followed by Intermittent Hypoxic Exposure on Aerobic Capacity of Long Distance Runners. J Strength Cond Res. 2016 Jun;30(6):1708-20. doi: 10.1519/JSC.0000000000001258.
https://doi.org/10.1519/JSC.0000000000001258

41. Haufe S., Wiesner S., Engeli S., Luft F.C., Jordan J. Influences of normobaric hypoxia training on metabolic risk markers in human subjects. Med Sci Sports Exerc. 2008 Nov;40(11):1939-44.
https://doi.org/10.1249/MSS.0b013e31817f1988

42. Ogawa T., Ohba K., Nabekura Y., Nagai J., Hayashi K., Wada H., Nishiyasu T. Intermittent short-term graded running performance in middle-distance runners in hypobaric hypoxia. Eur J Appl Physiol. 2005 Jun;94(3):254-61.
https://doi.org/10.1007/s00421-005-1322-7

43. Radziievs’ky!ĭ! P.O. Mechanisms of adaptation to intermittent hypoxic training course in sportsmen of high qualification. Fiziol Zh. 2005;51(2):90-5. Ukrainian. PMID: 15943237.

44. Katayama K., Sato K., Matsuo H., Ishida K., Mori S., Miyamura M. Effects of intermittent hypoxic training and detraining on ventilatory chemosensitive adaptations in endurance athletes. Adv Exp Med Biol. 2004;551:299-304.
https://doi.org/10.1007/0-387-27023-X_45

45. Poprz!ę!cki S., Czuba M., Zaj!ą!c A., Karpi!ń!ski J., Wilk R., Bril G., Maszczyk A., Toborek M. The blood antioxidant defence capacity during intermittent hypoxic training in elite swimmers. Biol Sport. 2016 Dec;33(4):353-360.
https://doi.org/10.5604/20831862.1221607

46. Sanchez A.M.J., Borrani F. Effects of intermittent hypoxic training performed at high hypoxia level on exercise performance in highly trained runners. J Sports Sci. 2018 Sep;36(18):2045-2052.
https://doi.org/10.1080/02640414.2018.1434747

47. Serebrovska T.V., Serebrovska Z.O., Egorov E. Fitness and therapeutic potential of intermittent hypoxia training: a matter of dose. Fiziol Zh. 2016;62(3):78-91.
https://doi.org/10.15407/fz62.03.078

48. Ji W., Wang L., He S., Yan L., Li T., Wang J., Kong A.T., Yu S., Zhang Y. Effects of acute hypoxia exposure with different durations on activation of Nrf2-ARE pathway in mouse skeletal muscle. PLoS One. 2018 Dec 4;13(12).
https://doi.org/10.1371/journal.pone.0208474

49. Toigo M., Jacobs R.A., Lundby C. Hypoxic training: effect on mitochondrial function and aerobic performance in hypoxia. Med Sci Sports Exerc. 2014 Oct;46(10):1936-45.
https://doi.org/10.1249/MSS.0000000000000321

50. Bakkman L., Sahlin K., Holmberg H.C., Tonkonogi M. . Quantitative and qualitative adaptation of human skeletal muscle mitochondria to hypoxic compared with normoxic training at the same relative work rate. Acta Physiol (Oxf). 2007 Jul;190(3):243-51. doi: 10.1111/j.1748-1716.2007.01683.x.
https://doi.org/10.1111/j.1748-1716.2007.01683.x

51. Shill D.D., Southern W.M., Willingham T.B., Lansford K.A. McCully K.K., Jenkins N.T. Mitochondria-specific antioxidant supplementation does not influence endurance exercise training-induced adaptations in circulating angiogenic cells, skeletal muscle oxidative capacity or maximal oxygen uptake. J Physiol. 2016 Dec 1;594(23):7005-7014.
https://doi.org/10.1113/JP272491

52. Robach P., Bonne T., Fl!ü!ck D., B!ü!rgi S., Toigo M., Jacobs R.A., Lundby C. Hypoxic training: effect on mitochondrial function and aerobic performance in hypoxia. Med Sci Sports Exerc. 2014 Oct;46(10):1936-45.
https://doi.org/10.1249/MSS.0000000000000321

53. Salvadego D., Keramidas M.E., K!ö!leg!å!rd R., Brocca L., Lazzer S., Mavelli I., Rittweger J., Eiken O., Mekjavic I.B., Grassi B. PlanHab* : hypoxia does not worsen the impairment of skeletal muscle oxidative function induced by bed rest alone. J Physiol. 2018 Aug;596(15):3341-3355.
https://doi.org/10.1113/JP275605

54. Serebrovskaya T.V., Xi L. Intermittent hypoxia training as non-pharmacologic therapy for cardiovascular diseases: Practical analysis on methods and equipment. Exp Biol Med (Maywood). 2016 Sep;241(15):1708-23.
https://doi.org/10.1177/1535370216657614

55. Saghiv M.S., Sagiv M.S. Basic Exercise Physiology. Clinical and Laboratory Perspective. Springer. 2020. 582.
https://doi.org/10.1007/978-3-030-48806-2

56. Bonetti D.L., Hopkins W.G. Sea-Level Exercise Performance Following Adaptation to Hypoxia. A Meta-Analysis. Sports Medicine, 2009. 39 (2). 107-127.
https://doi.org/10.2165/00007256-200939020-00002

57. Bonetti D.L., Hopkins W.G. Sea-level exercise performance following adaptation to hypoxia: a meta-analysis. Sports Med. 2009;39(2):107-27.
https://doi.org/10.2165/00007256-200939020-00002

58. Hamlin M.J., Lizamore C.A., Hopkins W.G. The Effect of Natural or Simulated Altitude Training on High-Intensity Intermittent Running Performance in Team-Sport Athletes: A Meta-Analysis. Sports Med. 2018 Feb;48(2):431-446. doi: 10.1007/s40279-017-0809-9. Erratum in: Sports Med. 2017 Nov 30;: PMID: 29129021.
https://doi.org/10.1007/s40279-017-0809-9

59. Humberstone-Gough C.E., Saunders P.U., Bonetti D.L., Stephens S., Bullock N., Anson J.M., Gore C.J. Comparison of live high: train low altitude and intermittent hypoxic exposure. J Sports Sci Med. 2013 Sep 1;12(3):394-401. PMID: 24149143; PMCID: PMC3772580

60. Cai M., Chen X., Shan J., Yang R., Guo Q., Bi X., Xu P., Shi X., Chu L., Wang L. Intermittent Hypoxic Preconditioning: A Potential New Powerful Strategy for COVID-19 Rehabilitation. Front Pharmacol. 2021 Apr 30;12:643619.
https://doi.org/10.3389/fphar.2021.643619

61. Aralova A.A., Aralova N.I., Klyuchko O.M., Mashkin V.I., Mashkina I.V. Information system for the examination of organism adaptation characteristics of flight crews’ personnel // Electronics and control systems .2018.2.106-113.
https://doi.org/10.18372/1990-5548.56.12944

62. Aralova N. I. Information technologies of decision making support for rehabilitation of sportsmen engaged in combat sport. J. Automation Information Sci. 2016, V. 3, P. 160-170.
https://doi.org/10.1615/JAutomatInfScien.v48.i6.70

63. Aralova N.I., Shakhlina L.Ya.-G., Futornyi S.M., Kalytka S.V. (2020) Information Technologies for Substantiation of the Optimal Course of Interval Hypoxic Training in Practice of Sports Training of Highly Qualified Sportswomen Journal of Automation and Information Sciences pp 41-55.
https://doi.org/10.1615/JAutomatInfScien.v52.i1.50

64. Aralova N.I.Integrated mathematical model of self-organization of functional systems of the organism for imitation viral diseases. Journal of Automation and Information Sciences . 2020. 4: 127-137. DOI: 10.1615/JAutomatInfScien.v52.i7.50 pages 52-62
https://doi.org/10.1615/JAutomatInfScien.v52.i7.50

65. Shakhlina L.Ya.-G. Aralova N.I. (2018) Forecasting the organism reaction of the athletes on inhibiting hypoxic mixtures on the mathematical model of the functional respiration system Kibernetika i vycislitelnaa tehnika 193: 64-82.
https://doi.org/10.15407/kvt192.03.064

66. Aralova N.I., Shakhlina L.Ya.-G. (2018) The mathematical models of functional self-organization of the human respiratory system with a change pf the hormonal states of organism. Journal of Automation and Information Sciences pages 49-59
https://doi.org/10.1615/JAutomatInfScien.v50.i5.50

67. Richardson A.J., Gibson O.R.. Simulated hypoxia does not further improve aerobic capacity during sprint interval training. J Sports Med Phys Fitness. 2015 Oct;55(10):1099-106.

68. Ferri A., Yan X., Kuang J., Granata C., Oliveira R.S.F., Hedges C.P., Lima-Silva A.E., Billaut F., Bishop D.J. Fifteen days of moderate normobaric hypoxia does not affect mitochondrial function, and related genes and proteins, in healthy men. Eur J Appl Physiol. 2021 Aug;121(8):2323-2336.
https://doi.org/10.1007/s00421-021-04706-4

69. Debevec T., Mekjavic I.B. Short intermittent hypoxic exposures augment ventilation but do not alter regional cerebral and muscle oxygenation during hypoxic exercise. Respir Physiol Neurobiol. 2012 Apr 30;181(2):132-42.
https://doi.org/10.1016/j.resp.2012.02.008

70. Julian C.G., Gore C.J., Wilber R.L., Daniels J.T., Fredericson M., Stray-Gundersen J., Hahn A.G., Parisotto R., Levine B.D. Intermittent normobaric hypoxia does not alter performance or erythropoietic markers in highly trained distance runners. J Appl Physiol (1985). 2004 May;96(5):1800-7.
https://doi.org/10.1152/japplphysiol.00969.2003

71. Onopchuk Yu.N. Homeostasis of functional respiratory system as a result of intersystem and system-medium informational interaction. Bioecomedicine. Uniform information space /Ed. by V.I. Gritsenko. Kiev.2001.59-84 (In Russian)

72. Onopchuk Yu.N. Homeostasis of the functional circulatory system as a result of intersystem and system-medium informational interaction. Bioecomedicine. Uniform information space / Ed. by V.I. Gritsenko.Kiev.2001.85-104 (In Russian)

73. Aralova N. I. Mathematical models of functional respiratory system for solving the applied problems in occupational medicine and sports. Saarbr!ü!cken: LAP LAMBERT Academic Publishing GmbH&Co, KG. 2019, 368 p. (In Russian). ISBN 978-613-4-97998-6

74. Shakhlina L.Ya.-G. The reaction of the body of female athletes to a decrease in the content of oxygen in inhaled air in different phases of the menstrual cycle. Sports medicine. 2008. No 1. P. 78-82. (In Russian)

75. Secondary tissue hypoxia. Ed. Kolchinskaya A.Z. K.: Nauk.Dumka.1983.253 p. (In Russian)

76. Mankovskaya I.M., Lyabah K.G. Oxygen transport in muscle tissue in the process of adaptation to hypoxic hypoxia. Cf. Experiment. Medicine and biology. 2002. 471. 295-306.
https://doi.org/10.1007/978-1-4615-4717-4_36

Received 10.02.2023

Issue 2 (212), article 2

DOI:https://doi.org/10.15407/kvt212.02.017

Cybernetics and Computer Engineering, 2023, 2(212)

Bondar S.O.,
Acting Head of Intelligent Control Department,
https://orcid.org/0000-0003-4140-7985
e-mail: seriybrm@gmail.com

Shepetukha Yu.M., PhD (Engineering), Senior Researcher,
Leading Researcher of the Intelligent Control Department
https://orcid.org/0000-0002-6256-5248
e-mail: yshep@meta.ua

International Research and Training Center for Information
Technologies and Systems of the National Academy of Science
and Ministry of Education and Science of Ukraine.
40, Acad. Glushkov ave., 03187, Kyiv, Ukraine

CHOOSING AN UNMANNED AIRCRAFT FOR IMPLEMENTATION THE METHOD OF COMBINED CONTROL OF ITS MOVEMENT WITH THE PURPOSE TO CREATE DIGITAL MODELS OF INFRASTRUCTURE OBJECTS

Introduction. Among the current tasks of digitization of built immovable infrastructure objects, the task of building digital models of external and internal parts of such objects, creating electronic passports of objects, SMART models of cities, etc. is highlighted. During the surveying of streets and objects to create digital models of cities and maintain a database of these objects, there is a need to use unmanned aerial vehicles (UAVs), but. not all types of aircraft are suitable for performing combined digitization tasks

The purpose of the paper is to justify of the type and model choice of an unmanned aerial vehicle as a means of creating digital models of the investigated infrastructure objects and the development of a method for combined control of the movement of such an apparatus to perform the tasks of obtaining visual data for the construction of digital 3D models of the investigated immovable infrastructure objects.

The results. In order to make a justified choice of the type of UAV as a tool for the implementation of digitalization tasks, an ontological model was built based on the defined technical and structural characteristics of various types of UAV. The analysis of the created ontological model made it possible to determine the hybrid type of UAV based on the largest number of relationships “type of UAV – task conditions” as links between technical characteristics and the possibility of flight modes with certain features of the digitalization tasks.

For the most common data collection tasks for the digitization of infrastructural objects, a method of combined UAV motion control has been developed, which combines the stages of sequential use of control of two hybrid UAV motion modes: helicopter and airplane, depending on the characteristics of the specific task.

Conclusions. The developed ontological model has a hierarchical nature and covers such structural elements as the type and subtype of an unmanned aerial vehicle, its technical and structural characteristics, possible flight modes and characteristics, types of digitization tasks, and relationships/connections between them. The analysis of the created ontological model and the results of simulations and test flights of the UAV made it possible to choose a hybrid type of UAV.

The developed method of combined UAV motion control is based on control models for the main channels, combines autonomous and operator control modes and provides for the sequential application of the capabilities of aircraft and helicopter flight modes, which provides the possibility of using different models of hybrid UAVs to perform the tasks of collecting visual data for construction digital models of immovable infrastructure objects.

Keywords: unmanned aerial vehicle, ontological model, combined control method, models for main control channels, visual data, digital object models.

Download full text! (ua)

REFERENCES
1. Reyes-Pena C., Tovar-Vidal M. Ontology: Components and Evaluation, a Review. Research in Computing Science , 2019, 148(3), pp. 257-265.
https://doi.org/10.13053/rcs-148-3-21

2. Hlomani, H., Stacey, D.: Approaches, methods, metrics, measures, and subjectivity in ontology evaluation: A survey. Semantic Web Journal, 2014, 1(5).

3. Martinez-Gil, J., Alba, E., Aldana-Montes, J.F. Optimizing ontology alignments by using genetic algorithms. In: Proceedings of the workshop on nature based reasoning for the semantic Web. Karlsruhe, Germany, 2008.

4. Bittner T. From Top-Level to Domain Ontologies: Ecosystem Classifications as a Case Study. Proceedings of 8th International Conference: Spatial Information Theory, , COSIT 2007, Melbourne, Australia, September 19-23, 2007, pp 61-77.
https://doi.org/10.1007/978-3-540-74788-8_5

5. Dwivedi S.R., Kumar A. Ontology Exemplification and Modeling for aSPOCMS in the Semantic Web. International Journal of Computer Information Systems and Industrial Management Applications, 2013, Vol.5, pp. 542-549;

6. Palagin O.V., Petrenko M.G. A model of the categorical level of the linguistic ontological picture of the world. Mathematical machines and systems. 2006. No. 3. P. 91-104. (in Ukrainian)

7. Ren, S., Lu, X., Wang, T. Application of ontology in medical heterogeneous data integration. In: Big Data Analysis (ICBDA), 2018 IEEE 3rd International Conference, pp. 150-155.
https://doi.org/10.1109/ICBDA.2018.8367667

8. Gritsenko V.I., Gladun A.Ya., Khala K.O., MARTINEZ-BEJAR R. Semantical Similarity Evaluation Method of Concepts for Comparison of Ontologies in Applied Problems of Artificial Intelligence. Cybernetics and Computer Engineering. 2021. N 3 (205), pp 5-25.
https://doi.org/10.15407/kvt205.03.005

9. Pidnebesna H., Stepashko V. Construction of an ontology as a metamodel of the inductive modeling subject area. Advanced Computer Inform. Technologies : ACIT-2018 : 8th intern. conf. : Ceske Budejovice, Czech Republic, June 1-3, 2018, pp. 137-140;

10. Pavlov A., Pidnebesna H., Stepashko V. Ontology application to construct inductive modeling tools with intelligent interface. Control Systems and Computers. 2020. No 4. pp. 44-55.
https://doi.org/10.15407/csc.2020.04.044

11. Stepashko V.S., Savchenko-Syniakova Ye.A., Pidnebesna H.A. Problem of Constructing an Ontological Metamodel of Iterative GMDH Algorithms. Cybernetics and Computer Engineering. 2022. No. 3 (209). pp. 21-33
https://doi.org/10.15407/kvt208.03.021

12. Resource Description Framework (RDF) https://www.w3.org/RDF/

13. Knowledge Interchange Format. URL: http://logic.stanford.edu/kif/dpans.html

14. A free, open-source ontology editor and framework for building intelligent systems. URL: https://protege.stanford.edu/

15. Ambite J.L., Chaudhri V.K., Fikes R., Jenkins Je., Mishra S., Muslea M., UribeT., Yang G. Design and implementation of the CALO query manager. Proceedings of the National Conference on Artificial Intelligence, 2006.

16. Beard R.W., McLain T.W. Small Unmanned Aircraft: Theory and Practice. Princeton University Press, 2012, 320 p.
https://doi.org/10.1515/9781400840601

17. Grytsenko V.I., Volkov O.E., Komar M.M., Bogachuk Y.P. Intellectualization of modern systems of automatic control of unmanned aerial vehicles. Cybernetics and Computer Engineering, 2018. No. 1 (191), pp. 45-59. (in Ukrainian)
https://doi.org/10.15407/kvt191.01.045

Received 16.05.2023

Issue 2 (212), article 1

DOI:https://doi.org/10.15407/kvt212.02.004

Cybernetics and Computer Engineering, 2023, 2(212)

BULGAKOVA O.S., Phd, Associate professor,
Associate professor of the Department of Applied Information Systems,
ORCID: 0000-0002-6587-8573,
e-mail: sashabulgakova2@gmail.com
Taras Shevchenko National University of Kyiv,
Bohdan Hawrylyshyn str. 24, Kyiv, 04116, Ukraine

MAKOVETSKYI M. Ye., MSc in Computer Science
of the Department of Applied Information Systems,
ORCID: 0009-0006-2169-8745,
e-mail: makovetskyi.mykyta@gmail.com
Taras Shevchenko National University of Kyiv,
Bohdan Hawrylyshyn str. 24, Kyiv, 04116, Ukraine

ZOSIMOV V.V., DSc (Engineering), Associate professor.,
Professor of the Department of Applied Information Systems,
ORCID: 0000-0003-0824-4168,
e-mail: zosimovv@gmail.com
Taras Shevchenko National University of Kyiv,
Bohdan Hawrylyshyn str. 24, Kyiv, 04116, Ukraine

APPROACH TO THE INTELLIGENT AGENTS APPLICATION IN E-COMMERCE SYSTEMS

Introduction. This paper presents the analyze of main consumer behavior models in modern e-commerce systems, such as electronic consumer decision process model, research online – purchase offline concept, also shown architectural solutions of e-commerce systems, including microservice architecture. Proposes the application of artificial intelligence (AI) based on large language models in e-commerce. The main functions of these models include text generation, acting as a 24/7 assistant, and analytics. Specifically, the user cases for store owners include the automatic generation of product descriptions, keywords, and categories, as well as analytics in areas such as customer feedback, user requests, searches, and shopping patterns.

The purpose of the paper is to consider the possibility of use intelligent agents such as chatbots in an e-commerce system to meet customer needs, increase sales and provide personalized information.

Results. The proposed approach demonstrate  that that AI models based on large language models can be applied to automate the generation of product descriptions, keywords, categories, and to gain insights into customer feedback, user requests, searches, and shopping patterns. In summary, this paper provides a comprehensive analysis of various consumer behavior models, architectural solutions, and the potential benefits of implementing AI-based solutions in the e-commerce industry.

Conclusions. The results of using intelligent agents in an e-commerce system include the ability to handle a large volume of customer queries simultaneously, provide support, and improve customer satisfaction and retention rates. The use of an intelligent agent in the sales process can also help to recommend products based on the customer’s preferences and browsing history, increasing the likelihood of a sale. The use of microservice architecture in a web application for an online store allows for independent scalability of components and the ability to build a system using different programming languages.

Keywords: e-trade, intelligent agents, consumer behavior model, e-commerce system.

Download full text!

REFERENCES

1 Liao C. Chen J. L. Enhancing consumer engagement in e-commerce websites: An integrated model of e-service quality, customer value, and switching costs. Journal of Retailing and Consumer Services. 2019, Vol. 50, pp. 23-32.

2 Berghausen E. M., Backhaus C. When do consumers choose same-day versus next-day delivery in online shopping? An investigation of the underlying decision-making processes. Journal of Retailing and Consumer Services. 2020, No 55, pp. 102-109.

3 Wagner T., Benlian A., Hess, T. The concept of digital affordances revisited: An exploratory study in the context of business-to-consumer electronic commerce. Journal of Business Research, 2019, 98, pp. 365-376.

4 Faradivah Dwi Azizah et al. Impulsive Buying Behavior: Implementation of IT on Technology Acceptance Model on E-Commerce Purchase Decisions. Golden Ratio of Marketing and Applied Psychology of Business, 2022, 2(1).
https://doi.org/10.52970/grmapb.v2i1.173

5 Se Hun, Lim.; Sukho, Lee., Dan J., Kim. Is Online Consumers’ Impulsive Buying Beneficial for E-Commerce Companies? An Empirical Investigation of Online Consumers’ Past Impulsive Buying Behaviors. Information systems management, 2017, Vol. 34(1), pp. 85-100.
https://doi.org/10.1080/10580530.2017.1254458

6 Wen, Chao. The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process as Applied in E-Commerce. Doctor of Philosophy (Management Science), 2012, P. 144.

7 “https://www.igi-global.com/affiliate/mehdi-khosrow-pourdba/24/” Mehdi Khosrow-Pour, D.B.A. Consumer Behavior, Organizational Development, and Electronic Commerce: Emerging Issues for Advancing Modern Socioeconomies. 2009.
https://doi.org/10.4018/978-1-60566-126-1

8 A. B. Ayoade., A. T. Adigun., B. A. Ojokoh. Towards a Platform-Based Ecosystem for e-Commerce. Proceedings of the 13th International Conference on ICT Applications and Management (ICTAM), 2021, pp. 66-75.

9 WooCommerce system. URL: https://woocommerce.com/

10 Shopify e-commerce system. URL: https://www.shopify.com/

11 OpenCart e-commerce system. URL: https://www.opencart.com/

12 Saleor e-commerce system. URL: https://quintagroup.com/cms/python/saleor

13 Understanding and Selecting a Tokenization Solution, 2020. URL: https://securosis.com.

14 JSON Web Tokens, 2021. jwt.io

15 Password stealing from HTTPS login page and CSRF protection bypass with reflected XSS, 2020. URL: https:// medium.com/@MichaelKoczwara/password-stealing-from-https-login-page-and-csrf-bypass-with-reflected-xss-76f56ebc4516

16 Cross-Site Request Forgery Prevention Cheat Sheet, 2021. URL: https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html

17 Bulgakova O., Mashkov V., Zosimov V., Popravkin P. Risk of Information Loss Using JWT Token CEUR Workshop Proceedings, 2021, 3101, pp. 292-299.

Received 27.02.2023

Issue 2 (212)

DOI:https://doi.org/10.15407/kvt212.02

View web version

TABLE OF CONTENTS:

Informatics and Information Technologies:

Bulgakova O.S., Makovetskyi M. Ye., Zosimov V.V.
Approach to the intelligent agents application in e-commerce systems

Bondar S.O., Shepetukha Y.M.
Choosing an Unmanned Aircraft for Implementation the Method of Combined Control of Its Movement with the Purpose to Create Digital Models of Infrastructure Objects

Intelligent Control and Systems:

Aralova N.I., Radziejowski P.A., Radziejowska M.P., Aralova A.A.
Application of the mathematical model of the functional breathing for optimal control of the training process of highly qualified athletes

Medical and Biological Cybernetics:

Panagiotis Katrakazas, Theodora Kallipolitou, Leonidas Kallipolitis, Ilias Spais
Analysis and definition of necessary mechanisms to ensure the security and privacy of digital health data under a cybernetic digital investigation framework

Fainzilberg L.S., Kharchenko A.R.
Remote monitoring of hearing from the position of personalized medicine