Anatoliy Sachenko

Anatoliy Sachenko
Ternopil National Economic University · Department of Information Computer Systems and Control

Doctor of Engineering

About

84
Publications
7,588
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
402
Citations
Introduction

Publications

Publications (84)
Article
An important component of the computer systems of medical diagnostics in dermatology is the device for recognition of visual images (DRVI), which includes identification and segmentation procedures to build the image of the object for recognition. In this study, the peculiarities of the application of detection, classification and vector-difference...
Chapter
A model of matrix stochastic game for decision making in conditions of uncertainty is developed. A Q-learning method is proposed for solving a stochastic game with a priori unknown payoff matrices. The formulation of the game problem is performed, the Markov recurrent method and the algorithm for its solution are described. The results of computer...
Article
Full-text available
This paper presents a power-oriented monitoring of clock signals that is designed to avoid synchronization failure in computer systems such as FPGAs. The proposed design reduces power consumption and increases the power-oriented checkability in FPGA systems. These advantages are due to improvements in the evaluation and measurement of corresponding...
Chapter
The article describes a method for detecting solar panels in satellite imagery. Due to the growing popularity of this technology, problems associated with the maintenance of solar panels are also becoming relevant. Many service companies are interested in obtaining information about potential customers. Thus, the analysis of photographs in order to...
Chapter
A method for forming a short-term HR project based on machine learning has been developed. The proposed method enables to reduce the HR time spent as well as the cost of recruiters. A paper presents a smart chatbot, which conducts an interview with a potential team member. Chatbot acts as an HR, which after the interview transmits data to the datab...
Article
The three-stage approach for missing data imputation in Big data interface is proposed in the paper. The first stage includes designing the Big data model in the task of missing data recovery, which enables to process the structured and semistructured data. The next stage is developing the method of missing data recovery based on functional depende...
Chapter
A module for assessing the investment risks of a virtual IT company has been developed. It enables to reduce the time spent on assessing the inves-tor’s risks of a virtual IT company. A detailed justification of each selected risk parameter that influences on the success of the investment project of the virtual IT Company has done. A developed algo...
Chapter
This article examines and analyzes the use of the word2vec method for solving semantic coding problems. The task of semantic coding has acquired particular importance with the development of search system. The relevance of such technologies is associated primarily with the ability to search in large-volume databases. Based on the obtained practical...
Chapter
An increase of the automated video surveillance system operational performance was proposed by reducing the amount of data using the contour inflection points for object identification. The authors developed a structural statistic method to identify facial images. It allowed obtaining a set of vectors that consist of inflection points of every hier...
Chapter
The 3D character development process is long, heavy and requires a high level of professional skills. For today, traditional approaches require from the developer a lot of time, resources and high-professional skills for making a 3D character model. To facilitate this work, we propose the approach with using the textures maps module. This module in...
Chapter
The paper proposes the architecture of a distributed malware detection system based on decentralized architecture in local area computer networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of the components of the system is the sam...
Conference Paper
The smart data integration approach is proposed to compose data and knowledge of the different nature, origin, formats and standards. This approach is based on the selective goal driven ontology learning. The automated planning paradigm in a combination with a value of the perfect information approach is proposed to be used for evaluating the knowl...
Conference Paper
Over the past few decades, the application of Artificial Immune Systems (AIS) and Artificial Neural Networks (ANN) has been growing rapidly in different domains. We sincerely believe that integration of these both techniques can allow constructing the Intelligent Cyber Defense System. In this paper an original method for detecting the network attac...
Conference Paper
Full-text available
At present the deep neural network is the hottest topic in the domain of machine learning and can accomplish a deep hierarchical representation of the input data. Due to deep architecture the large convolutional neural networks can reach very small test error rates below 0.4% using the MNIST database. In this work we have shown, that high accuracy...
Conference Paper
This paper presents the approach to research integrated drone-based systems for post emergency monitoring of NPPs as systems with a multi-level degradation. Reliability block diagrams of the systems are built. Degradation levels, conditions which determine them and formulae for calculating the reliability functions of the systems on these levels ar...
Conference Paper
In this paper, a concept of designing the post-emergency system for monitoring the equipment and territory of nuclear power plant after a severe accident was developed. Power and communications network lines are found out as the most vulnerable ones during the accident monitoring, and selfdescriptiveness and survivability and veracity are recognize...
Conference Paper
The paper presents a technique for error correction based on modular correcting codes, providing error correction in two information symbols using a single control character. The algorithms of error detection and correction and decoder structure have been developed. The proposed technique of detecting errors based on modular correcting codes is cha...
Article
Mostly the dynamics of controlled objects is described by nonlinear equalizations. For nowadays the methodology of neural networks is engaged into designing the systems controlling nonlinear objects. These nonlinearities can be taken into account by nonlinear functions of the activation. Neural networks methodology brings some intelligence to the d...
Conference Paper
Full-text available
Implementation of WSN based on the proposed concept will simplify the process of recovery and scaling of network and improve network survivability due to the backup of important segments of distributed processor.
Conference Paper
This article show the results of the synthesis of the ultraviolet measurement system using photodiode. It was synthesized the generalized structure of the system and the scheme of its measurement channels. The measurement accuracy is increased by transition to individual conversion functions as a photodiode as well as measurement scheme. It is also...
Conference Paper
In this paper are considering the design steps of a mobile sensors network for ionizing radiation sources detection. As a result of analysis and modeling, the optimal network topology that consists of a number of mobile robots with a set of sensors, was obtained. The mobile robot architecture and the control strategy model in the form of Hopfield n...
Conference Paper
The algorithm of the program was created to approximate the output signal of multisensor (MS) using the functional dependency of MS output voltage from MS operating frequency for a fixed thickness of tested films, the output voltage of the MS film thickness at a fixed frequency. The MS data obtained by sine wave eddy current measurement. It is inve...
Article
Full-text available
The WSN standard IEEE802.15.4 basically uses the unlicensed frequency of 2,4 GHz for data transmission in a variety of devices, standards and applications: IEEE802.11, Bluetooth and etc. In this paper we proposed modified correction codes – based on Residue Number System – to improve the data transmission robustness in WSN. These codes are characte...
Conference Paper
Full-text available
This paper describes the mobile Ad-Hoc (wireless) network (MANET) for emergency scenarios in nuclear power plant (NPP). Authors proposed the system with such properties as flexibility and a self-forming and self-healing network topology that dynamically adjusts to the moving configuration per each intermediate routing node. It is also proposed to i...