Перегляд за Автор "Gladka, Myroslava"
Зараз показуємо 1 - 5 з 5
- Результатів на сторінці
- Налаштування сортування
Документ A model of an IoT system based on RFID tags for mine defense under war conditions and in the post-war period(2023) Kolesnikova, Kateryna; Gladka, Myroslava; Kostikov, Mykola; Myronova, NataliaRadio frequency identification (RFID) technology is widely used in various industries, including logistics, retail, healthcare, and agriculture. In recent years, RFID has also been explored for military and civilian applications, especially in wartime. RFID tags can be used to protect military and civilian population during war by providing real-time tracking of people, vehicles and equipment. The use of RFID tags in the military and defense complex is gaining great popularity [1, 2, 3], however, the use of RFID tags for mine security has not yet been fully explored. A separate important task under war conditions is the mine defense of territories where combat actions are taking place. The use of various mines to create blocking effects from the enemy ensures the security of territories in wartime and postwar times. The use of mines for the security of territories is known as "mine defense". This includes the placement of mines or explosive devices in a certain area or around important objects in order to protect these objects from possible threats. The main aspects of using mines for the security of territories include: the creation of minefields (placement of mines or explosive devices in a certain area to create a minefield that can become an obstacle for potential invaders or enemies); creation of maps of minefields (designation of minefields to inform own troops and the civilian population about their presence and location, to avoid danger). It is important to note that the use of mines for the security of territories must comply with international norms and conventions regarding the prohibition of the use of anti-personnel mines, and must also comply with the principles of humanitarian law to protect the civilian population and minimize humanitarian consequences. The use of RFID tags on mines is a solution that fully ensures the implementation of these norms and conventions. This article considers the use of RFID tags in wartime, the advantages of using RFID technology for the implementation of mine defense of territories, the rules for the protection of RFID tags used to ensure the safety of the military and civilian population.Документ A model of the application of IoT devices based on RFID to ensure the safety of the military and civilian population under war conditions(2022) Gladka, Myroslava; Kuchansky, Alexander; Kostikov, Mykola; Lisnevskyi, RostyslavRadio-frequency identification (RFID) systems are becoming more popular in many fields where clear identification and affiliation of a specific person to a specific activity is important. These are various branches of industry, banking, the economic sector, medicine, etc. However, applying RFID technology to the protection and security of the military and civilian population in wartime has not yet gained widespread use. It is in the conditions of combat actions, where there is a need to identify each person, and their movement within the scope of military operations, conducting or participating in evacuation procedures, involvement in various types of military or humanitarian missions, prompt provision of medical assistance, etc. In all these situations, issues of identification are of vital importance, because not only security but also the lives of the military and civilian population may depend on it. The purpose of this study is to investigate the features and prove the advantages of using RFID technology in the conditions of martial law to ensure the safety of the health and life of the military and the civilian population. The paper considers the use of RFID tags to ensure the safety of movement, and personal identification for those who need medical assistance or are in danger on the territory of combat operations or occupied territories.Документ An IoT Solution: A Fitness Trainer(2021) Hladkyi, Yaroslav; Gladka, Myroslava; Kostikov, Mykola; Lisnevskyi, RostyslavAn IoT system of motion detection and control for fitness exercises can be urgent for people who do sports at home. Using such a system as a mobile application allows the user to get the assessment of technique when doing exercises demonstrating them in front of the smartphone camera, as well as recommendations which may help improve doing exercises. As a result, the efficiency of exercises will be increased. These functions are implemented via a neural network able to recognize images. Besides, users will see their progress and information on exercises made with flaws, which will help to fix the execution technique. The IoT system configures business rules and scenarios, necessary artefacts for users, the exercises they perform, errors and deviations that are committed while doing the exercises, as well as analyzing video files. The IoT solution is built using a neural network that is capable of recognizing the user's body posture during the exercise using a video file captured on the camera of their own smartphone. With the help of mathematical calculations, artificial intelligence will return the result of the video file analysis, where the user will be able to see their flaws while doing a certain task, and get recommendations. A special factor in pattern recognition is the individual initial anthropometric data of each user, which must be taken into account in the analysis. The use of IoT system of monitoring and control over the performance of fitness exercises will positively affect the trend of a healthy lifestyle in today's world without the involvement of personal fitness trainers.Документ Method of allocation of labor resources for IT project based on expert assessements of Delphi(2023) Gladka, Myroslava; Kuchanskyi, Oleksandr; Kostikov, Mykola; Lisnevskyi, RostyslavAn essential component of the development and implementation of information systems is a clear definition of the project team, which is formed from possible options of company employees or freelancers in conditions of limited company resources. Based on the method of expert evaluation of Delphi, a study of qualifications and characteristics that are crucial for the implementation of project work on the development and implementation of IT projects, the level of significance of each parameter on the impact of the complex project is assessed, they are ranked according to the degree of importance for the project implementation; the critical parameters that entail the most significant project risks are identified. The importance of the selection of employees in the project team with certain levels of competence following the qualifications for the role performed and the appointment of responsible executors for project work according to their compliance is substantiated; the value of the qualification rank for different employees is taken into account in determining the type of work for which it will be assigned for the optimal distribution of all project work. The scientific novelty is to substantiate and evaluate the comparative importance of factors that limit the appointment of each developer to perform design work using the method of group expert evaluation of Delphi.Документ Using the Internet of things when introducing CRM systems in the banking sector(2020) Gladka, Myroslava; Lisnevskyi, Rostyslav; Kostikov, Mykola