Industry 4.0, Vol. 5 (2020), Issue 1, pg(s) 48-51

    The article is a continuation and a generalisation of a series of copyright publications on the problem of choosing a higher education institution by entrants and their parents. Instead, the article emphasises the need to consider the interests of both parties: the entrants and the legal entities that act as investors of the educational process with the intention of getting a specialist for their organisation (enterprises, institutions) in the future. At the same time, an important aspect is the use of the proposed indicators by the university as a provider of educational services.


    An approach of FRA and its use for UFV supported manufacturing

    Machines. Technologies. Materials., Vol. 13 (2019), Issue 10, pg(s) 437-438

    While many modern industries are tending to use UFV (unmanned flying vehicles) in a near future, there are also many problems of yet unknown procedures to make possible the usage of such UFV. In a current age of aviation development there is an approach of FRA (free routing area) utilization to support growing congestion of many flying vehicles in air space. From our prospective, those manufacturing implementing “Industry 4.0” ideas are expected to use UFV to support supply chains. Hence, both problems and solution approaches to support many aircraft in airspace and to control airspace congestion within safe boundaries can be used also in a local scale of UFV supported manufacturing. This research paper is focused on problems and ability to build routes within FRA and analysis of possible use of known approaches to solve similar problems of modern automated manufacturing.


    The approach to cut relevant airspace area for flights planning and automated routing

    Industry 4.0, Vol. 4 (2019), Issue 5, pg(s) 220-222

    Airspace is now one of the most frequently mentioned environments when discussing technologies of autonomous or unmanned vehicles or machines. There is a number of technologies developed to support unmanned flying vehicles (UFV) and so called air drones. The actual influence of such kind of machines on transport industry is crucial. It is also obvious, that many modern military operations involve UFV with built-in AI or remote control. Nevertheless, one of important problems for any flying vehicle (aircraft or drone either) is to plan the most suitable route satisfying all necessary primary and collateral requirements: reach destination, consume minimum fuel or energy, follow the safest areas, avoid adverse circumstances etc. Among the tasks to build the effective route for the flight we find an important problem to cut a relevant area in airspace to perform route search. This research is dedicated to discuss and ground the basics of a reliable approach to solve this problem.

  • Air space routing and flights planning: A problem statement and discussion of approaches to solution

    Mathematical Modeling, Vol. 2 (2018), Issue 4, pg(s) 139-142

    Air routing has become an important problem of recent years. Wide implementation of idea to use a free routing airspace (FRA) over the Europe and idea of exploiting FRA as a main airspace management resource to reduce air traffic problems revealed a necessity of a new look to a routing problem. Many previous solutions relied on predefined topology of airways and ability to exploit welldeveloped methods known in graph theory. Meanwhile the problem was current due to many factors needed to be involved in the airspace as a 3D-space: air management restrictions and different air spaces regulation rules, weather conditions, danger areas, aircraft’s characteristics, pilots’ preferences, etc. Moreover, the appearance of FRA has made it inappropriate to use previous algorithms. Most of these algorithms required a definite topology with known routing points connected with predefined edges, while the FRA may have only border points to fly into or fly out of the area and no definite edges inside. The task of constructing the route became the same difficult as obvious: any pilot can fly directly through the FRA, but the route should be built and confirmed prior to a take-off. Problem comes even more evident if considered for the unmanned flying vehicles (UFV) and the need for robots or AI systems to solve the routing problem by itselves. As a topping of the complexity of the problem, one may consider the upcoming difficulties of airspace congestion in FRA. Despite the problem is known for areas close to airports, it is still current to plan routes avoiding flights conflicts in the air and to avoid FRA high congestion. There are different researches on some particular problems and some approaches to solve these problems. Nevertheless, there is no complex problem statement yet. This research was focused on need of understanding the full scope of problems for air routing to understand the ability to build an efficient solution for the problem as a whole.

  • International comparison of university education quality on the base of modeling value index

    Industry 4.0, Vol. 4 (2019), Issue 1, pg(s) 41-45

    The article is dedicated to studying and comparing the indicators used to evaluate the educational activities quality of universities from various countries. In particular, the indicators of tuition fees, and expenses for the separate indices of inputs for educational activities are being investigated. The ratio of universities tuition fees to incomes of the educational services consumers is being simulated.

  • Approach analysis to prevent steganography data flows as a corporate security breaches

    Security & Future, Vol. 2 (2018), Issue 4, pg(s) 180-182

    Once the steganography was invented, it still remains one of the most effective ways to hide information in publicly accessed data sources. Many applications of different steganography techniques were known since WWII, but there are no yet any good approach to detect whether there is a hidden message in some data source (image etc.) while it is not expected to be found. This may also cause a fundamental security breach in corporate security systems. In the era of Facebook, Instagram and many other social networks with a huge amount of images and photos it seems obvious to use steganography applications for the purpose of security breach. A saboteur or a spy can use any image from social networks to disclose corporate sensitive data or to exchange hidden messages. That is why steganography detection should be considered as a necessary tool to prevent security breaches and sensitive data leaks. This research is focused on analysis of current approaches in problem of steganography detection. Mainly the approaches to detect steganography in images were discussed.



    Industry 4.0, Vol. 3 (2018), Issue 2, pg(s) 94-96

    Due to intentions of Ukrainian economy to join European Union there are many threats and opportunities on the way. Ukraine has a number of industries producing goods, products and services needed in Europe. The growth of economic ties with EU makes Ukrainian manufactures stronger and has become a question of key importance during last decade. Meantime, Ukraine remains within rather tense conditions of technological lag but with some promising abilities in agriculture and food industries supplemented with a great potential in area of information technologies. This distinctive combination of abilities make it feasible for Ukraine both to become a strong partner for EU and to do a great leap of industrial progress within “Industry 4.0” concept. Nevertheless, one of crucial problems for Ukraine is to build an innovative infrastructure to meet requirements of intellectual transport system conforming to EU “Industry 4.0”. This research paper is focused on discussion of these new features of transport industry and opportunities for Ukraine to make its transport industry a leading advantage for the whole economy. Those drastic changes in Ukrainian transport would procure an excellence for other industries implementing “Industry 4.0”, the same as to become a test ground and an exclusive source of experience for EU on “Industry 4.0” implementation.



    Mathematical Modeling, Vol. 1 (2017), Issue 3, pg(s) 121-122

    Fast growing market of IoT devices revealed a number of complex problems. Among these problems, there is a problem of data losses caused by data package losses or delays while its transition from sensor to server. As anticipated, there are a number of businesses relying on easy opportunity to build real-time monitoring systems using modern software and IoT hardware solutions. Although the growing reliability of contemporary communication networks one can find the problem of making decision about lost or delayed data packages. Current research is dedicated to building an algorithm for compensation of gaps in data series to support real-time monitoring systems with appropriate artificially generated values. Cases of applicability of the algorithm were also studied and discussed.



    Industry 4.0, Vol. 3 (2018), Issue 1, pg(s) 20-22

    Many contemporary IoT systems do produce a large scale of data. While a new portions of data come to data storage (database etc.) all the previously stored data become obsolete. Most of such obsolete data become excessive and can be needed only to see general trends or anomalies. This research offers an algorithm of data aggregation to minimize the amount of stored obsolete data according to defined business rules. Some modifications of algorithm are discussed to fit different kind of business requirements. There is also a comparison of two methods of data merge in algorithm, quantization and clustering, was made.