Статті
Постійне посилання на розділhttps://dspace.nuft.edu.ua/handle/123456789/7372
Переглянути
3 результатів
Результати пошуку
Документ Method of allocation of labor resources for IT project based on expert assessements of Delphi(2023) Gladka, Myroslava; Kuchanskyi, Oleksandr; Kostikov, Mykola; Lisnevskyi, RostyslavAn essential component of the development and implementation of information systems is a clear definition of the project team, which is formed from possible options of company employees or freelancers in conditions of limited company resources. Based on the method of expert evaluation of Delphi, a study of qualifications and characteristics that are crucial for the implementation of project work on the development and implementation of IT projects, the level of significance of each parameter on the impact of the complex project is assessed, they are ranked according to the degree of importance for the project implementation; the critical parameters that entail the most significant project risks are identified. The importance of the selection of employees in the project team with certain levels of competence following the qualifications for the role performed and the appointment of responsible executors for project work according to their compliance is substantiated; the value of the qualification rank for different employees is taken into account in determining the type of work for which it will be assigned for the optimal distribution of all project work. The scientific novelty is to substantiate and evaluate the comparative importance of factors that limit the appointment of each developer to perform design work using the method of group expert evaluation of Delphi.Документ A model of an IoT system based on RFID tags for mine defense under war conditions and in the post-war period(2023) Kolesnikova, Kateryna; Gladka, Myroslava; Kostikov, Mykola; Myronova, NataliaRadio frequency identification (RFID) technology is widely used in various industries, including logistics, retail, healthcare, and agriculture. In recent years, RFID has also been explored for military and civilian applications, especially in wartime. RFID tags can be used to protect military and civilian population during war by providing real-time tracking of people, vehicles and equipment. The use of RFID tags in the military and defense complex is gaining great popularity [1, 2, 3], however, the use of RFID tags for mine security has not yet been fully explored. A separate important task under war conditions is the mine defense of territories where combat actions are taking place. The use of various mines to create blocking effects from the enemy ensures the security of territories in wartime and postwar times. The use of mines for the security of territories is known as "mine defense". This includes the placement of mines or explosive devices in a certain area or around important objects in order to protect these objects from possible threats. The main aspects of using mines for the security of territories include: the creation of minefields (placement of mines or explosive devices in a certain area to create a minefield that can become an obstacle for potential invaders or enemies); creation of maps of minefields (designation of minefields to inform own troops and the civilian population about their presence and location, to avoid danger). It is important to note that the use of mines for the security of territories must comply with international norms and conventions regarding the prohibition of the use of anti-personnel mines, and must also comply with the principles of humanitarian law to protect the civilian population and minimize humanitarian consequences. The use of RFID tags on mines is a solution that fully ensures the implementation of these norms and conventions. This article considers the use of RFID tags in wartime, the advantages of using RFID technology for the implementation of mine defense of territories, the rules for the protection of RFID tags used to ensure the safety of the military and civilian population.Документ An IoT Solution: A Fitness Trainer(2021) Hladkyi, Yaroslav; Gladka, Myroslava; Kostikov, Mykola; Lisnevskyi, RostyslavAn IoT system of motion detection and control for fitness exercises can be urgent for people who do sports at home. Using such a system as a mobile application allows the user to get the assessment of technique when doing exercises demonstrating them in front of the smartphone camera, as well as recommendations which may help improve doing exercises. As a result, the efficiency of exercises will be increased. These functions are implemented via a neural network able to recognize images. Besides, users will see their progress and information on exercises made with flaws, which will help to fix the execution technique. The IoT system configures business rules and scenarios, necessary artefacts for users, the exercises they perform, errors and deviations that are committed while doing the exercises, as well as analyzing video files. The IoT solution is built using a neural network that is capable of recognizing the user's body posture during the exercise using a video file captured on the camera of their own smartphone. With the help of mathematical calculations, artificial intelligence will return the result of the video file analysis, where the user will be able to see their flaws while doing a certain task, and get recommendations. A special factor in pattern recognition is the individual initial anthropometric data of each user, which must be taken into account in the analysis. The use of IoT system of monitoring and control over the performance of fitness exercises will positively affect the trend of a healthy lifestyle in today's world without the involvement of personal fitness trainers.