Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 6
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The paper deals with alliances and coalitions that can be formed by agents or entities. It is assumed that alliance agents cooperate and form coalitions for performing the tasks or missions. It is considered that alliance agents are unselfish. That is, they are more interested in achieving the common goal(s) than in getting personal benefits. In the paper, the concept of fuzzy alliance was introduced. A fuzzy alliance is considered as generalization of traditional alliance allowing agents to decide on the capabilities that their agents can and wanted deliver to coalition. Coalitions that can be formed by fuzzy alliance agents were considered. The definition of the “best” coalition was explained. The method of how to find the “best” coalition among all possible coalitions was suggested and verified by computer simulation.
Go to article

Authors and Affiliations

Viktor Mashkov
1
Andrzej Smolarz
2
Volodymy Lytvynenko
3

  1. University J. E. Purkyne, Usti nad Labem, CzechRepublic
  2. Lublin University of Technology, Lublin, Poland
  3. Kherson National Technical University,Kherson, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

This paper is focused on multiple soft fault diagnosis of linear time-invariant analog circuits and brings a method that achieves all objectives of the fault diagnosis: detection, location, and identification. The method is based on a diagnostic test arranged in the transient state, which requires one node accessible for excitation and two nodes accessible for measurement. The circuit is specified by two transmittances which express the Laplace transform of the output voltages in terms of the Laplace transform of the input voltage. Each of these relationships is used to create an overdetermined system of nonlinear algebraic equations with the circuit parameters as the unknown variables. An iterative method is developed to solve these equations. Some virtual solutions can be eliminated comparing the results obtained using both transmittances. Three examples are provided where laboratory or numerical experiments reveal effectiveness of the proposed method.
Go to article

Bibliography

[1] A. Guney, G. Önal and T. Atmaca, “New aspect of chromite gravity tailings re-processing”, Minerals Engineering, Vol., 24, no 11, pp. 1527- 1530, 2001. https://doi.org/10.1016/S0892-6875(01)00165-0.
[2] W.M. Ambrósa, C.H. Sampaioa, Bogdan G. Cazacliub, Paulo N.Conceiçãoa and Glaydson S.dos Reisab, “Some observations on the influence of particle size and size distribution on stratification in pneumatic jigs”, Powder Technology, Vol. 342, pp. 594-606, 2019. https://doi.org/10.1016/j.powtec.2018.10.029.
[3] M.V. Verkhoturov, “Gravitational enrichment methods”. Moscow: MAX Press, 2006, pp.160- 180. ISBN 5-317-01710-6.
[4] Ya-li Kuang, Jin-Wu Zhuo, Li Wang, Chao Yang, “Laws of motion of particles in a jigging process”, Journal of China University of Mining and Technology, Vol. 18, no 4, pp. 575-579, December 2008. https://doi.org/10.1016/S1006-1266(08)60297-7.
[5] S.Cierpisz. “A dynamic model of coal products discharge in a jig”, Minerals Engineering, Vol. 105, pp. 1-6, 1 May 2017. https://doi.org/10.1016/j.mineng.2016.12.010.
[6] B.A. Suleimenov and Ye.A. Kulakova, “The prospects for the use of intelligent systems in the processes of gravitational enrichment”, Informatyka, Automatyka, Pomiary w Gospodarcei Ochronie Środowiska, Vol. 9, no 2, pp. 46-49, 2019. https://doi.org/10.5604/01.3001.0013.2547.
[7] Y.R. Murthy, S.K. Tripathy, C.R. Kumar, “Chrome ore beneficiation challenges & opportunities – A review”, Minerals Engineering, Vol. 24, no 5, pp. 375-380, 2011, DOI: https://doi.org/10.1016/j.mineng.2010.12.001.
[8] L. Panda, S.K. Tripathy, “Performance prediction of gravity concentrator by using artificial neural network – A case study”. International Journal of Mining Science and Technology, Vol. 24, no 4, pp. 461-465, 2014. https://doi.org/10.1016/j.ijmst.2014.05.007.
[9] Y.R. Murthy, S.K. Tripathy, C.R. Kumar, “Chrome ore beneficiation challenges & opportunities-a review”, Minerals Engineering, Vol. 36, no 5, pp. 375-380, 2014, https://doi.org/10.1016/j.ijmst.2014.05.007.
[10] T. J. Stich, and J.K. Spoerre and T.Velasco, “The application of artificial neutral networks to monitoring and control of an induction hardening process”, Journal of Industrial Technology, Vol. 16, no 1, pp.168-174, 2015.
[11] L.Panda, A.K. Sahoo, S.K Tripathy and others, “Application of artificial neural network to study the performance of jig for beneficiation of noncoking coal”, Fuel, Vol. 97, pp. 151-156, 2012. https://doi.org/10.1016/j.fuel.2012.02.018.
[12] K. Shravan and R. Venugopal, “Performance analyses of jig for coal cleaning using 3D response surface methodology”, International Journal of Mining Science and Technology, Vol. 27, no 2, pp 333-337, March 2017.
[13] B.A. Suleimenov and E.A. Kulakova, “Development of intelligent system for optimal process control”, Resource–saving technologies of raw–material base development in mineral mining and processing: Multy–authored monograph, Universitas Publishing, Romania, Petrosani: 2020, pp.198-217. URI: ep3.nuwm.edu.ua/id/eprint/18359.
[14] V. Mashkov, A. Smolarz, V. Lytvynenko, and K. Gromaszek, “The problem of system fault-tolerance”, Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 4, no. 4, pp. 41-44, 2014, https://doi.org/10.5604/20830157.1130182
[15] M. S. Islam, P. Nepal and others. “A knowledge-based expert system to assess power plant project cost overrun risks”, Expert Systems With Applications, Vol. 136, pp. 12-32, 2019. https://doi.org/10.1016/j.eswa.2019.06.030.
[16] B.A.Suleimenov and E.A Kulakova, “Creation the knowledge base of the intelligent control system for gravitational enrichment processes using expert information processing methods”, Vestnik KazNRTU, Vol. 5, no 141, pp. 590-597, October 2020.
[17] Ye.A. Kulakova and B.A. Suleimenov, “Development and Research of Intelligent Algorithms for Controlling the Process of Ore Jigging”, International Journal of Emerging Trends in Engineering Research, Vol. 8, no 9, pp. 6240-6246, September 2020. https://doi.org/10.30534/ijeter/2020/21589202.
[18] N. Siddique. “Intelligent Control”, Springer International Publishing, Switzerland, 2014, pp.54-78. https://doi.org/10.1007/978-3-319-02135-5.
[19] P.V. de Campos Souza, “Fuzzy neural networks and neuro-fuzzy networks: A review the main techniques and applications used in the literature” Applied Soft Computing. Vol. 92, pp. 106275, July 2020. https://doi.org/10.1016/j.asoc.2020.106275.
[20] A.Tripathy, L.Panda, A.K Sahoo, S.K. Biswal, R.K Dwari, A.K. Sahu, “Statistical optimization study of jigging process on beneficiation of fine size high ash Indian non-coking coal”, Advanced Powder Technology, Vol. 27, no 4, pp. 1219-1224, 2016. https://doi.org/10.1016/j.apt.2016.04.006.
[21] A.K. Mukherjeea and B.K. Mishrab, “An integral assessment of the role of critical process parameters on jigging”, International Journal of Mineral Processing Vol. 81, no 3, pp. 187-200, December 2006. https://doi.org/10.1016/j.minpro.2006.08.005.
[22] N.(K.)M. Faber, “Estimating the uncertainty in estimates of root mean square error of prediction: application to determining the size of an adequate test set in multivariate calibration”, Chemometrics and Intelligent Laboratory Systems, Vol. 49, no 1, pp. 79-89, 6 September 1999, https://doi.org/10.1016/S0169-7439(99)00027-1.
Go to article

Authors and Affiliations

Yelena Kulakova
1
Waldemar Wójcik
2
Batyrbek Suleimenov
1
Andrzej Smolarz
2

  1. Satbaev University, Almaty, Kazakhstan
  2. Lublin University of Technology, Lublin, Poland
Download PDF Download RIS Download Bibtex

Abstract

This paper represents a developed cryptographic information protection algorithm based on a substitutionpermutation network. We describe the cryptographic transformations used in the developed algorithm. One of the features of the algorithm is the simplicity of its modification with regard to different security levels. The algorithm uses a predeveloped S-box tested against differential and linear cryptanalysis. The S-box is consistent with one of the known standards AES and GOST R 34.12-2015. We provide the findings of an avalanche-effect investigation and statistical properties of ciphertexts. The algorithm actually meets the avalanche-effect criterion even after the first round.
Go to article

Authors and Affiliations

Rustem G. Biyashev
1
Nursulu A. Kapalova
1
Dilmuhanbet S. Dyusenbayev
1
Kunbolat T. Algazy
1
Waldemar Wojcik
2
Andrzej Smolarz
2

  1. Institute of Information and Computational Technologies of the Committee of Science of the Ministry of Education and Science of the Republic of Kazakhstan, Almaty
  2. Lublin University of Technology, Lublin, Poland
Download PDF Download RIS Download Bibtex

Abstract

As the delivery of good quality software in time is a very important part of the software development process, it's a very important task to organize this process very accurately. For this, a new method of the searching associative rules were proposed. It is based on the classification of all tasks on three different groups, depending on their difficulty, and after this, searching associative rules among them, which will help to define the time necessary to perform a specific task by the specific developer.

Go to article

Authors and Affiliations

Tamara O. Savchuk
Natalia V. Pryimak
Nina V. Slyusarenko
Andrzej Smolarz
Saule Smailova
Yedilkhan Amirgaliyev
Download PDF Download RIS Download Bibtex

Abstract

In this article is revealed the systems of a good delivery witch implement unmanned aerial vehicles during providing the service. the one channel systems of a goods delivery are a goal of this research work. the close analysing of their functional features, the classification, the types and parameters of different systems from this band are presented. in addition, the modelling of the different types of the one channel systems of goods delivery are has done.

Go to article

Authors and Affiliations

Roman N. Kvyetnyy
Yaroslav A. Kulyk
Bogdan P. Knysh
Yuryy Yu. Ivanov
Andrzej Smolarz
Orken Mamyrbaev
Aimurat Burlibayev
Download PDF Download RIS Download Bibtex

Abstract

Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One of the candidates for the role of the standard is the Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan). The article describes the algorithm. Differential properties of the main operations that make up the Qamal cypher are considered in the questions of stability. We have shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2–120, which makes differential cryptanalysis not applicable to the Qamal cypher.

Go to article

Authors and Affiliations

Kunbolat T. Algazy
Ludmila K. Babenko
Rustem G. Biyashev
Evgeniya A. Ishchukova
Ryszard Romaniuk
Nursulu A. Kapalova
Saule E. Nysynbaeva
Andrzej Smolarz

This page uses 'cookies'. Learn more