Vadym Shkarupylo

Vadym Shkarupylo
National University of Life and Environmental Sciences of Ukraine · Computer Systems and Networks

Doctor of Philosophy

About

48
Publications
22,018
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
170
Citations
Citations since 2017
42 Research Items
165 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040

Publications

Publications (48)
Article
Full-text available
This paper proposes an open ontology for self-sustainable human settlements in an effort to set the common language for modelling self-sustainable systems and address the issues regarding heterogeneity of physical devices, protocols, software components, data and message formats and other relevant factors, which proved to be unavoidable in implemen...
Book
Монографію присвячено дослідженням розвитку спеціалізованих засобів математичного і комп’ютерного моделювання, інформаційно-технологічного забезпечення автоматизації процесів підготовки і прийняття рішень відповідними системами організаційного управління структурними елементами енергосистеми та енергоринку із розвинутими засобами змістовної обробки...
Chapter
The chapter is devoted to the analysis of model checking technique applicability in energetics scenarios. A review of model checking technique application taking place in safety–critical scenarios has been conducted. Proven and widely adopted TLC checker has been considered as an instrument for design solutions verification. To this end, the Tempor...
Book
Проведено порівняльний аналіз методів та засобів формальної верифікації, застосовуваних у процесі розроблення систем критичного призначення, зокрема – на етапі проєктування названого процесу. За результатами проведеного аналізу запропоновано і викладено комплексний підхід, що полягає у здійсненні контролю показників і функціональних, і нефункціонал...
Book
Виконано огляд архітектури, структури та функцій автоматизованих систем підтримки ринку електричної енергії України. Зокрема розглянуто склад та функції систем підтримки процесів торгівлі електричною енергією в Україні. Відображено особливості взаємодії таких систем із системами моніторингу, технологічного управління та комерційного обліку. Наведен...
Article
In this paper, the question on the expediency of checking the model, the model checking method is applied to, is discussed. To this end, corresponding technique has been proposed. Named technique is based on differentiation between the concepts of analytical plane of model perception and the concepts of corresponding implementation plane. The techn...
Article
Full-text available
Context. The problem of QoS based Web service from the list of Web services with equal or similar functionality was considered. This task is an essential part of the processes of finding, discover, matching and using Web services on the Internet due to the numerous offerings of Web services with equal or similar functionality. The reasonable select...
Article
У наш час парадигма інтернету речей здобуває більш широке роз- повсюдження. Прикладна її реалізація в глобальному масштабі потребує залучення спеціалізованих технологій та засобів. Один із напрямів, що потребує опрацювання, є забезпечення сумісності компонентів відповідних систем. Цю роботу присвячено розвитку вказаного напряму. Для цього у роботі...
Article
Service-oriented architecture (SOA) and Internet services technologies offer advanced solutions for creating distributed business processes and applications. At the same time, services must be available to a growing number of users and satisfy their requirements for both functional and non-functional properties of services. The problem of services...
Article
Full-text available
In the modern information infrastructure, Web services have a very important role. Web services are one of the main tools for information creation, delivery and processing in society and economic life; for the formation and further evolution of the information space. Among the existing and constantly growing number of Web services, in a natural obj...
Article
Full-text available
The problem of combinatorial optimization in relation to the choice of location of power supplies in solving the problem of development of urban power distribution networks is considered. Two methods of placing power supplies and securing consumers for them have been developed to solve this problem. The first developed method is to place power supp...
Article
Full-text available
The objective of this article is to experimentally test for the automatic control of the magnetic separator efficiency of the magnetic product. The developed process depends on the fact that the electromotive force in electric coil located on the pole of the magnetic system of the separation depends on its efficiency with the magnetic product. A fu...
Article
This paper is devoted to applying the LSP method for Web service selection based on quality characteristics and the user’s preferences. The purpose of this work is to develop an approach for the Web service selection, which, based on a reasonable choice of Web service quality attributes and the use of the LSP method, allows for a deeper considerati...
Article
Full-text available
This paper is about building a prototype of vehicle ignition using fingerprint sensor. This system can prevent the vehicles from being stolen. It is developed to control the ignition of the vehicle through the fingerprint scanner. This system consists of GSM SIM 900 that connects to the Arduino which is the microcontroller of the project. To make s...
Article
Full-text available
This paper entitled Development of Smart Dustbin by Using Apps. Arduino as a controller between ultrasonic sensors, buzzer, led, fan and WiFi Module. This system implemented so that cleaning department management or cleaners can be aware with the overflow of rubbish of a dustbin at certain place. It is very useful in daily life and important for al...
Article
Full-text available
New technology applications in managing human living styles, workplaces including residences have led to the discovery of different methods of interacting and controlling both users and the buildings. This piece of research work proposed a simpler system for users' interaction with home appliances, using Bluetooth technology for operation support....
Article
Full-text available
Research and development advancements in the area of Vehicle Door Security using Smart Tag and Fingerprint System. Fingerprint biometric is one of the popular, ubiquitous, reliable, economical and efficient biometric technologies. Due to its versatility, fingerprint biometric is applicable. Fingerprint is popular because of its universality, unique...
Article
Full-text available
Modern approaches to distributed software systems engineering are tightly bounded with formal methods usage. The effective way of certain method application can leverage significant outcome, in terms of corresponding time costs reduction for instance. To this end the TLC model checker has been considered – with respect to TLA+ specifications with c...
Conference Paper
Full-text available
The approach to Software-defined Network topology verification on a basis of Temporal Logic of Actions usage has been proposed. For this purpose the concept of "action" has been utilized. The Kripke structure has been used to analytically represent and describe the specified concepts. The proposed approach makes it possible to easily reconfigure th...
Article
Full-text available
The scale and the complexity of modern network solutions built upon the promising and popular paradigm of the Internet of Things brings to the table the vital need for novel approaches to these solutions designing. To foster the further developments in this direction, the stratified model of the Internet of Things infrastructure has been proposed....
Article
Full-text available
The comparative analysis of existing timesheet systems for creating a number of requirements to own solution has been conducted. Software requirements specification for working time control and accounting system (time tracking) has been created. The dependencies between the components of proposed solution have been analyzed. For this purpose, the E...
Article
Full-text available
The stratified approach to software defined networks simulation has been proposed. It is based on Discrete Event System Specification formalism, atomic and coupled models concepts usage. The approach is aimed at simulation within the Windows environment, with an accent on the easiness of model reconfiguration. The proposed approach is also devoted...
Conference Paper
Full-text available
The approach for Composite Web Services validation has been proposed. It's based on DEVS-formalism usage, which provides the ability to conduct validation by way of simulation. The WS-BPEL-description has been considered as an input data. The Temporal Logic of Actions (TLA) has been chosen to check the description. The proposed approach provides th...
Article
Full-text available
This paper presents the investigation and comparison of TLC model checking method (TLA Checker) properties. There are two different approaches to method usage which are considered. The first one consists of a transition system states attendance by breadth-first search (BFS), and the second one by depth-first search (DFS). The Kripke structure has b...
Conference Paper
A technique of DEVS-driven (Discrete Event System Specification) distributed software systems validation has been proposed. As a case study the Composite Web Service usage scenario has been considered. There are have been considered two approaches to Composite Web Service validity checking - testing-driven one and the approach based on DEVS-driven...
Article
Full-text available
Abstract. Nowadays Web Services usage is represented by a plethora of specific domains. Such situation causes the necessity of standardized applicable approaches and methods existence. To this end the analysis of the most wellgrounded reviews, devoted to Web Services discovery and selection approaches and methods, has been conducted. Those approach...
Article
Full-text available
A technique for Composite Web Services validity checking has been proposed. It is based on discrete-event DEVS-models synthesis, which provides the ability to conduct the automated validation by way of simulation during the design process. Temporal Logic of Actions has been chosen as the basis for input data – formal specification of Composite Web...

Network

Cited By

Projects

Projects (2)
Project
The main goal of the project is, design and development of RF and Microwave Components like Microstrip Antennas, UWB Antennas, Flexible Antennas, Wearable Antennas, Transparent Antennas, RF Sensors, Microwave Filters and Resonators, Flexible RFID Tags, RFID Sensors and so on ...
Project
Creation of professional community in IoT, robotics, computer networks and microcontrollers. The project ensures adaptation of academic programs to the needs of the European labor market, thus enhancing the opportunities of academic and labor abundant.