Вітаємо в Інституційному репозитарії Національного університету «Полтавська політехніка імені Юрія Кондратюка»
У зв'язку з оновленням ресурсу користувачі, які були зареєстровані раніше, можуть активувати свої облікові записи, відновивши пароль.
Будь ласка, перед поданням нових матеріалів ознайомтеся із Довідкою депозитору.
Нові користувачі можуть зареєструватися за формою "Зворотній зв'язок". Після реєстрації на e-mail надійде лист зі сповіщенням про активацію облікового запису.
Останні публікації
The paper proposes a bio-inspired approach to the optimization of non-binary low-density parity-check codes. At the first stage of the developed optimization method, the characteristics of information transmission and the parameters of the selected bio-inspired optimization procedure are set. The ke...
Not long ago, the fifth-generation (5G) telecommunications standard was introduced, and active development is already underway for the sixth-generation (6G) standard. The subject of the study is the key characteristics and requirements of 5G/6G networks. The purpose of the research is to conduct a c...
The subject of the article is the tactical and technical characteristics and the tactics of employment the main short-range electronic warfare (EW) systems (trench EW) used by the armed forces of the russian federation in the RussianUkrainian war. The aim is to analyze the tactical and technical cha...
Sensor networks play a key role in many industries due to their ability to effectively collect and transmit data. However, ensuring the reliability and quality of data transmission remains one of the main problems. The article presents a method for calculating the quality of channels in a sensor net...
The most effective use of multi-service networks occurs with traditional communication operators, which significantly expands the range of services. For the corporate market, the consolidation of all remote divisions into a single multiservice network can significantly increase the efficiency of inf...
Radio communication and radar systems operate under the influence of tropospheric inhomogeneities and the substratum, which is the cause of fluctuations in the phase front of electromagnetic waves. In particular, fluctuations of the interference wave front lead to a decrease in the immunity of these...
The proposed approach to determining the statistical characteristics of a multiservice distributed telecommunication network (DTT). The use of self-similarity properties allowed us to obtain a statistical model of the network process if we set a finite-dimensional distribution of its samples. The re...
This article presents a new approach to solving the problem of adequate network traffic modeling. A novel method is proposed that allows generating self-similar packet flows with an arbitrarily specified degree of self-similarity in infocommunication networks. The method is based on the use of the P...
The levels of construction equipment used for repair and restoration of buildings within residential areas are investigated. It is established that in most cases there is an excess of maximum permissible values for populated areas. The analysis of measurements in octave frequency bands shows that lo...
The levels of electromagnetic fields in the most critical areas of a thermal power generation enterprise are investigated. It is established that the intensity of the electric and magnetic components of the electromagnetic field of industrial frequency at the workplaces of the main control panel per...
The electromagnetic environment formed by the life support systems of industrial and residential buildings and structures is investigated. The relevance of the study is due to the fact that the saturation of the living environment with electrical and electronic equipment reduces the efficiency of re...
The article examines the influence of the corrective abilities of non-positional code structures, which are represented by mutually non-prime bases of the system of residual classes (SRC). Currently, non-positional code structures, which are represented by a set of mutually non-prime bases of SRC, h...
The article’s subject matter is the processes of constructing explanations in intelligent systems using temporal and causal dependencies. The aim is to develop an approach to constructing explanations based on the integration of temporal and causal dependencies regarding the decision-making process ...
The outbreak of "pneumonia of unknown etiology" marked the beginning of a new era in global health care and public life. The disease quickly spread throughout the world, turning into a pandemic that posed a serious threat to the international community. Ukraine, like many other countries, has been s...
The use of unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) is a current trend. At the same time, their individual use is moving to group use when it is necessary to ensure communication and optimal use of resources. The subject of the article is the processes of group use of unma...
The article proposes a method of multivariate synthesis of discrete-casual models of elementary functions of operations controlled by information. The implementation of this method will expand the possibilities of designing low-resource devices for the implementation of SET operations for the constr...
The article presents an analysis of modern approaches to audio information protection using digital watermarks. It discusses various watermark embedding methods, including those based on the time, frequency, and timefrequency domains. Special attention is given to the characteristics of watermark ro...
Artificial intelligence methods for forest fire monitoring systems based on UAV swarms were investigated. The methods used both for individual UAVs and for different architectures using a UAV swarm are considered. AI integration has been shown to enhance UAV capabilities for early fire detection, re...
Smart packaging of pharmaceutical products covers modern technologies that are transforming packaging approaches in the pharmaceutical industry. The study demonstrates how the use of intelligent systems, such as temperature and humidity sensors, RFID tags, and time indicators, improves control over ...
Due to the widespread use of digital and Internet technologies in all processes of the oil and gas industry's production cycle, cybersecurity is becoming an increasing threat. Therefore, today cybersecurity is becoming one of the priorities of technological development of oil and gas companies. The ...
