10 results match your criteria: "National Aerospace University "KhAI"[Affiliation]"

Artificial intelligence technologies are becoming increasingly prevalent in resource-constrained, safety-critical embedded systems. Numerous methods exist to enhance the resilience of AI systems against disruptive influences. However, when resources are limited, ensuring cost-effective resilience becomes crucial.

View Article and Find Full Text PDF

The analysis of utilising unmanned aerial vehicles (UAVs) to form flying networks in obstacle conditions and various algorithms for obstacle avoidance is conducted. A planning scheme for deploying a flying LiFi network based on UAVs in a production facility with obstacles is developed and described. Such networks are necessary to ensure reliable data transmission from sensors or other sources of information located in dangerous or hard-to-reach places to the crisis centre.

View Article and Find Full Text PDF

Resilience-aware MLOps for AI-based medical diagnostic system.

Front Public Health

April 2024

Department of Computer Systems, Network and Cybersecurity, Faculty of Radio-Electronics, Computer Systems and Infocommunications, National Aerospace University "KhAI", Kharkiv, Ukraine.

Background: The healthcare sector demands a higher degree of responsibility, trustworthiness, and accountability when implementing Artificial Intelligence (AI) systems. Machine learning operations (MLOps) for AI-based medical diagnostic systems are primarily focused on aspects such as data quality and confidentiality, bias reduction, model deployment, performance monitoring, and continuous improvement. However, so far, MLOps techniques do not take into account the need to provide resilience to disturbances such as adversarial attacks, including fault injections, and drift, including out-of-distribution.

View Article and Find Full Text PDF

Security Information and Event Management (SIEM) technologies play an important role in the architecture of modern cyber protection tools. One of the main scenarios for the use of SIEM is the detection of attacks on protected information infrastructure. Consorting that ISO 27001, NIST SP 800-61, and NIST SP 800-83 standards objectively do not keep up with the evolution of cyber threats, research aimed at forecasting the development of cyber epidemics is relevant.

View Article and Find Full Text PDF

Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection.

Entropy (Basel)

July 2023

Software Engineering & Dependable Computing Lab, Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo", Area della Ricerca CNR di Pisa, Via G. Moruzzi 1, 56124 Pisa, Italy.

The entropy-oriented approach called security- or cybersecurity-informed safety (SIS or CSIS, respectively) is discussed and developed in order to analyse and evaluate the safety and dependability of autonomous transport systems (ATSs) such as unmanned aerial vehicles (UAVs), unmanned maritime vehicles (UMVs), and satellites. This approach allows for extending and integrating the known techniques FMECA (Failure Modes, Effects, and Criticality Analysis) and IMECA (Intrusion MECA), as well as developing the new SISMECA (SIS-based Intrusion Modes, Effects, and Criticality Analysis) technique. The ontology model and templates for SISMECA implementation are suggested.

View Article and Find Full Text PDF

Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis.

Entropy (Basel)

January 2023

Laboratory of Biomedical Optics, Department of Biomedical Engineering, Faculty for Infocommunications, Radioelectronics and Nanosystems, Vinnytsia National Technical University, Khmelnitske Shose Str. 95, 21000 Vinnytsia, Ukraine.

The article analytically summarizes the idea of applying Shannon's principle of entropy maximization to sets that represent the results of observations of the "input" and "output" entities of the stochastic model for evaluating variable small data. To formalize this idea, a sequential transition from the likelihood function to the likelihood functional and the Shannon entropy functional is analytically described. Shannon's entropy characterizes the uncertainty caused not only by the probabilistic nature of the parameters of the stochastic data evaluation model but also by interferences that distort the results of the measurements of the values of these parameters.

View Article and Find Full Text PDF

This paper suggests a methodology (conception and principles) for building two-mode monitoring systems (SMs) for industrial facilities and their adjacent territories based on the application of unmanned aerial vehicle (UAV), Internet of Things (IoT), and digital twin (DT) technologies, and a set of SM reliability models considering the parameters of the channels and components. The concept of building a reliable and resilient SM is proposed. For this purpose, the von Neumann paradigm for the synthesis of reliable systems from unreliable components is developed.

View Article and Find Full Text PDF

Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application.

Sensors (Basel)

June 2022

Department of Computer Systems, Networks and Cybersecurity, National Aerospace University "KhAI", 17, Chkalov Str., 61070 Kharkiv, Ukraine.

The factors complicating the specification of requirements for artificial intelligence systems (AIS) and their verification for the AIS creation and modernization are analyzed. The harmonization of definitions and building of a hierarchy of AIS characteristics for regulation of the development of techniques and tools for standardization, as well as evaluation and provision of requirements during the creation and implementation of AIS, is extremely important. The study aims to develop and demonstrate the use of quality models for artificial intelligence (AI), AI platform (AIP), and AIS based on the definition and ordering of characteristics.

View Article and Find Full Text PDF

Digital images are used in various technological, financial, economic, and social processes. Huge datasets of high-resolution images require protected storage and low resource-intensive processing, especially when applying edge computing (EC) for designing Internet of Things (IoT) systems for industrial domains such as autonomous transport systems. For this reason, the problem of the development of image representation, which provides compression and protection features in combination with the ability to perform low complexity analysis, is relevant for EC-based systems.

View Article and Find Full Text PDF

Objective: The aim of the research is to study the peculiarities of the legislative consolidation of criminal and disciplinary liability for offenses of health care professionals in Ukraine and other states.

Patients And Methods: Materials and methods: Criminal legislation of Ukraine, international acts, decisions of the European Court of Human Rights (hereinafter - ECHR), data of the Integrated State Register of Judgments, as well as criminal legislation of Germany, the French Republic, the Kingdom of Denmark, the Republic of Belarus, Kazakhstan and many other countries. A set of general and special scientific methods of scientific knowledge was the methodological basis.

View Article and Find Full Text PDF