Abstract: The use of unmanned aerial vehicles (UAVs) for aerial photography is an extremely important area of geospatial data collection methods today. Especially in wartime - for reconnaissance of the enemy, but the creation of electronic interference that results in intercepting or "blinding" the UAV is possible . This paper investigated methods of autonomous navigation optical orientyramy.
Key words: UAV, autonomous navigation.
Summary: Porous carbon materials are investigated as an electrode component of supercapacitors (SC). The materials are obtained from vegetable organic raw materials by using a technique of pyrolysis with a subsequent activation in a potassium hydroxide solution. We have found an effect of which is similar to that of inductance in a. c. circuits.
Keywords: supercapacitor, plant material, inductance, electrode.
Summary: mathematical model of process of hot pressing of paper web was developed.
Key words: hot pressing, paper web, dryness.
Abstract. The article examines special aspects of the concept of motor vehicle safety and the concept of transport safety. The problems and prospects of motor vehicle safety were given herein. A wide range of internal and external threats, which impair transport safety of the country were observed. Along with the concept of transport safety threat, a classification of transport safety threats was introduced. It was concluded, that further development of transport system and provision of its stable operation in conditions of transport safety refer to strategic tasks of the State.
Key words: automobile transport, motor vehicle safety, transport safety, threats.
Summary: This paper investigate regression usage for modeling and forecast for economy in transition.
Key word: model, regression, trend, GDP.
Actual problems of modern science: Abstracts of VІІI International scientific-practical conference (Moscow - Astana - Kharkiv - Vienna, May 30, 2016)
Summary: Investigated the overall dependency of magnetic filtration technology process for liquid substances with identify of key values: magnetic susceptibility of particles, magnetic power factor of capturing particles zones by filling, velocity profile of the liquid in the pores of the filling. As a result, the overall refined equation of magnetic filtration of purification process, in which as the impact parameter magnetic forces uses the value of the magnetic field fillings instead of the external magnetic field.
Key words: magnetic field, deposition, magnetic field, induction magnetic field.
Actual problems of modern science: Abstracts of VІІI International scientific-practical conference (Moscow - Astana - Kharkiv - Vienna, May 30, 2016)
Actual problems of modern science: Abstracts of VІІI International scientific-practical conference (Moscow - Astana - Kharkiv - Vienna, May 30, 2016)
Actual problems of modern science: Abstracts of VІІI International scientific-practical conference (Moscow - Astana - Kharkiv - Vienna, May 30, 2016)
Summary: This article considers the problem of natural light and insolation conditions degradation in conditions of residential areas renovation. This article provides an analysis of this degradation and considerers possible methods to increase these parameters
Key words: sun exposure, lighting, reconstruction, light well.
Summary: Research of Eigenface algorithm of computer vision. Desciption of architecture and structure of algorithm. Realization of its training in Matlab.
Key words: face recognition problem, computer vision, eigen vectors, automatic control systems.
Summary: Had analyzed the mechanism of formation of structure and destruction of the crystal lattice of the high-viscosity oil in conditions of pumping over main pipelines.
Keywords: high-viscosity oil, thixotropic properties, relaxation.
Summary: Model for possible development of secondary explosion at the grain processing enterprise is constructed on the base of graph theory and fuzzy logic.
Key words: graph, fuzzy logic, explosion, grain processing enterprise.
Abstract: was introduced the theoretical basis of human body edge detection on the video, using methods based on optical flow, using the classification of metrics and temporal coherence, as well as methods based on finding contrasting paths.
Keywords: video processing, edge detection, contour recognition.
Summary: Proposed a new generation mechanism and the establishment of a private key pair in the cloud without private key transfer. Improved implementation of user authentication algorithm in the cloud using OAuth, by applying the algorithm of digital signature DSTU 4145-2012 and hardware protection.
Key words: key management, the OAuth, hardware protection, cloud.
Abstract: Every days thousands of new malware signatures are detected and this number is only growing. Intrusion based security products have become ineffective. This paper talks about new micro-virtualization technology which aimed to secure computers from undefeateble attacks and stop the malware.
Keywords: security, microvisor, micro-virtualization, malware.
Summary: The paper considers a variety of approaches to the adaptive testing. It points out the criteria of adaptive testing, then develops model of complex adaptive testing based on those criteria.
Keywords: adaptive testing, the criteria of adaptive testing, complex adaptive testing, model of complex adaptive testing.
Summary: The article studies a Systems Dynamics model for capturing the main interactions involved in the subprime mortgage crisis. The model provides two subsystems interconnection that related to each other relatively banking asset flow and house market. The differential equations are analyzed and simulated using Vensim PLE simulation software, which brings to the discussion of results.
Key words: system dynamics, financial crisis, subprime mortgage crisis.
Summary: This work describes the problem of map contraction and a robot localization using sensor data and data from a group of other robots. This methodology is called SLAM or CML, Simultaneous Localization and Mapping or Concurrent Mapping and Localization, respectively.
SLAM solves problems connected with building a map of an unknown environment by a mobile robot while at the same time navigating the environment using the map.
SLAM comprises of multiple parts: landmark extraction, data association, state estimation, state update and landmark update. Each part can be performed in different ways. As the robot has sensors on one height from the ground, we will get 2D map [1].
Key words: SLAM, computer simulation, robot.