
Anatoliy SachenkoTernopil National Economic University · Department of Information Computer Systems and Control
Anatoliy Sachenko
Doctor of Engineering
About
107
Publications
10,186
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
575
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (107)
The influence of Internet marketing has grown so much that producers must now reconfigure their businesses from offline operation to online presence simply to meet user expectations. Thus, the development of an intelligent information system for product promotion online is quite relevant. It may lead to automatized selection of competing products a...
The application of a process model to investigate pine tree infestation caused by bark beetles is discussed. The analysis of this disease was carried out using spatial and spatio−temporal models of random point patterns. Spatial point patterns were constructed for remote sensing images of pine trees damaged by the apical bark beetle. The method of...
Cultural heritage is key to identity and development. Many valuable objects are affected by time, natural elements and financial lack. Innovative technologies are crucial for their preservation. The paper develops an information system based on augmented reality (AR) for the restoration of cultural heritage. This extends AURA's approach to preservi...
Typical structures of monitoring systems (MSs) that are used in urban complex objects (UCOs) (such as large industrial facilities, power facilities, and others) during the post-accident period are combined with the technologies of flying sensor networks (FSNets) and flying edge networks (FENets) (FSNets and FENets); cloud/fog computing and artifici...
Nowadays, the systems for visual information processing are significantly extending their application field. Moreover, an unsolved problem for such systems is that the classification procedure has often-conflicting requirements for performance and classification reliability. Therefore, the goal of the article is to develop the wavelet method for cl...
Within the framework of the Auralization of acoustic heritage sites using Augmented and Virtual Reality (AURA) project, the task was to develop the business models for potential products that would use the developed auralized 3D model. Accordingly, the purpose of the article is to analyze typical business models for the specified products with an a...
The conducted analysis showed the shortcomings of known techniques for measuring MCU (microprocessor systems and IoT modules - hereinafter MCU) current consumption. In order to improve self-powered systems, designed to perform complex algorithms (learning ANNs, searching for signatures of suspicious software code, etc.), it is necessary to minimize...
Nowadays, important mechanisms of study are content and techniques of its creation, the problem of influencing the target audience, which itself seeks to shape communication processes. Internet content occupies a position of powerful communication technology, which continues to grow rapidly and gain influence. Creating a large number of advertiseme...
Nowadays, important mechanisms of study are content and techniques of its creation, the problem of influencing the target audience, which itself seeks to shape communication processes. Internet content occupies a position of powerful communication technology, which continues to grow rapidly and gain influence. Creating a large number of advertiseme...
Authors developed an intelligent method of forming a consumer basket based on data from supermarket chains, which allows modifying the set of goods in the consumer basket and defining a living wage. The consumer basket is forming on a base of k-means clustering approach. The algorithmic structure of the proposed method is described. Experimental re...
The paper is devoted to the problem of checkability of circuits in FPGA components of safety-related systems, which are designed to operate in two modes: normal and emergency for providing their own functional safety and the safety of control facilities in order to prevent accidents and reduce losses in case of their occurrence. Functional safety i...
Advertising is a unique socio-cultural phenomenon: its formation is due to social, psychological, linguistic factors, features of the “aesthetic consciousness” of society and its cultural traditions. Advertising text – a special kind of text, it is a carrier and expression of information. It is important that the text is interesting to the desired...
This paper suggests a methodology (conception and principles) for building two-mode monitoring systems (SMs) for industrial facilities and their adjacent territories based on the application of unmanned aerial vehicle (UAV), Internet of Things (IoT), and digital twin (DT) technologies, and a set of SM reliability models considering the parameters o...
In order to save time and money for tourists, as well as taking into account their limited mobility in the conditions of Covid, the concept of an intelligent guide based on augmented reality (AR) is proposed. A UML method diagram and algorithm for communication of the system with the user with AR and voice control support have been developed, as we...
This paper considers the possibility of constructing a universal pulse generator based on TTL (transistor-transistor logic) elements, which provides pulses of a given duration at the time of entry to the input of the negative edge of the input start pulse (difference from logical unit to logical zero). The duration of the generated output pulse can...
An important component of the computer systems of medical diagnostics in dermatology is the device for recognition of visual images (DRVI), which includes identification and segmentation procedures to build the image of the object for recognition. In this study, the peculiarities of the application of detection, classification and vector-difference...
To simplify the work of creating a catalog of goods in the online store, the paper develops an neural network method of forming the items catalog of the online store based on neural network, based on which the site manager can automate the process of creating a catalog of goods, and thus reduce time on the formation of the catalog. The results of t...
A model of matrix stochastic game for decision making in conditions of uncertainty is developed. A Q-learning method is proposed for solving a stochastic game with a priori unknown payoff matrices. The formulation of the game problem is performed, the Markov recurrent method and the algorithm for its solution are described. The results of computer...
This paper presents a power-oriented monitoring of clock signals that is designed to avoid synchronization failure in computer systems such as FPGAs. The proposed design reduces power consumption and increases the power-oriented checkability in FPGA systems. These advantages are due to improvements in the evaluation and measurement of corresponding...
The article describes a method for detecting solar panels in satellite imagery. Due to the growing popularity of this technology, problems associated with the maintenance of solar panels are also becoming relevant. Many service companies are interested in obtaining information about potential customers. Thus, the analysis of photographs in order to...
A method for forming a short-term HR project based on machine learning has been developed. The proposed method enables to reduce the HR time spent as well as the cost of recruiters. A paper presents a smart chatbot, which conducts an interview with a potential team member. Chatbot acts as an HR, which after the interview transmits data to the datab...
The three-stage approach for missing data imputation in Big data interface is proposed in the paper. The first stage includes designing the Big data model in the task of missing data recovery, which enables to process the structured and semistructured data. The next stage is developing the method of missing data recovery based on functional depende...
A module for assessing the investment risks of a virtual IT company has been developed. It enables to reduce the time spent on assessing the inves-tor’s risks of a virtual IT company. A detailed justification of each selected risk parameter that influences on the success of the investment project of the virtual IT Company has done. A developed algo...
The paper presents a botnet detection approach for the distributed systems. It is based on the developed three level model, which includes botnet’s components: command and control center, control centers, basic elements of the botnet (bots). The novel framework provides the ability to detect known and unknown botnets, and consists of the host and t...
In this work, we draw attention to prediction of football (soccer) match winner. We propose the deep multilayer neural network based on elastic net regularization that predicts the winner of the English Premier League football matches. Our main interest is to predict the match result (win, loss or draw). In our experimental study, we prove that usi...
This article examines and analyzes the use of the word2vec method for solving semantic coding problems. The task of semantic coding has acquired particular importance with the development of search system. The relevance of such technologies is associated primarily with the ability to search in large-volume databases. Based on the obtained practical...
An increase of the automated video surveillance system operational performance was proposed by reducing the amount of data using the contour inflection points for object identification. The authors developed a structural statistic method to identify facial images. It allowed obtaining a set of vectors that consist of inflection points of every hier...
The 3D character development process is long, heavy and requires a high level of professional skills. For today, traditional approaches require from the developer a lot of time, resources and high-professional skills for making a 3D character model. To facilitate this work, we propose the approach with using the textures maps module. This module in...
The paper proposes the architecture of a distributed malware detection system based on decentralized architecture in local area computer networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of the components of the system is the sam...
The smart data integration approach is proposed to compose data and knowledge of the different nature, origin, formats and standards. This approach is based on the selective goal driven ontology learning. The automated planning paradigm in a combination with a value of the perfect information approach is proposed to be used for evaluating the knowl...