Персона:
Шевченко, Надежда Алексеевна

Загружается...
Profile Picture
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Шевченко
Имя
Надежда Алексеевна
Имя

Результаты поиска

Теперь показываю 1 - 3 из 3
  • Публикация
    Открытый доступ
    Industrial plants investment projects efficiency estimation based on simulation and artificial intelligence methods
    (2021) Inozemtseva, V. S.; Zenkovich, M. V.; Drevs, Y. G.; Shevchenko, N. A.; Древс, Юрий Георгиевич; Шевченко, Надежда Алексеевна
    © 2020 Elsevier B.V.. All rights reserved.Methods and software enabling the estimation of efficiency and the comparisons of alternative designs of industrial plants are discussed. Problem of efficiency estimation for investment projects of industrial plants is formulated in the terms of decision theory. Presented approach is based on the reduction of multicriterion problem of investment project estimating to one-criterion problem. Application of simulation and artificial intelligence (AI) methods for estimation of technological and structural decisions, is the central feature of presented approach. Designed simulation model refers to discrete-event class. Object-oriented approach was applied for designing of the model and programming language C++ for its implementation. After it's successful implementation this model was improved, in order to obtain robust, adaptive, re-configurable and responsive system. That was done with self-organization, self-learning, self-adaptation, self-optimization. This approach is based on application of AI methods (multi-agent systems (MAS), in particular) for simulation model development. MAS is a bio-inspired paradigm that allows to design systems based on autonomous and cooperative agents, exhibiting modularity, robustness, flexibility, adaptability and re-configurability. Presented methodology is tried-and-true method which applies on the phase of designing and engineering of industrial plant. This approach is discussed on the example of foundry plant with moulding line.
  • Публикация
    Только метаданные
    The Control Algorithm of Compressor Equipment of Automobile Gas-Filling Compressor Stations with Fuzzy Logic Elements
    (2022) Evstifeev, A. A.; Zaeva, M. A.; Shevchenko, N. A.; Евстифеев, Андрей Александрович; Заева, Маргарита Анатольевна; Шевченко, Надежда Алексеевна
    © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.The need for motor fuel has a pronounced unevenness. At the same time, the unevenness of fuel consumption negatively affects the energy and economic efficiency of the production activities of automobile gas-filling compressor stations. The paper proposes algorithms for controlling compressor equipment that reduce this negative effect. The application of the theory of fuzzy sets and the fuzzy inference algorithm for estimating the parameters and the residual resource of gas equipment in the presence of fuzzy values in the equations allows us to obtain numerical values of the uncertainty of the estimated parameters. The use of varying the test results of equipment (nominal reference objects) allows you to make informed decisions when operating a vehicle if an expert has results for a limited number of tests with a set of models built on their basis.
  • Публикация
    Только метаданные
    Wi-Fi network analysis with a large number of access points
    (2019) Baranova, E. A.; Zareshin, S. V.; Shevchenko, N. A.; Шевченко, Надежда Алексеевна
    © 2019 IEEE For today, each of us uses wirelesscommunication capabilities. We often use Wi-Fi access points because we need an access to the Internet. This article discusses the security of Wi-Fi wireless networks. The article describes the method of a possible intruder's attack on one or several wireless networks. This study illustrates the possible scheme of the attacker's actions and the situation of the attack on wireless clients. This method is using the generation of a large number of Wi-Fi access points. The article also includes an analyzing of networks status during an attack and the behavior of wireless clients connected to access points with different configurations.