Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pavlo Bykovyy is active.

Publication


Featured researches published by Pavlo Bykovyy.


intelligent data acquisition and advanced computing systems: technology and applications | 2013

Approaches of voltage divider development for metrology verification of ADC

R. Kochan; Orest Kochan; Mykhaylo Chyrka; Su Jun; Pavlo Bykovyy

It is presented the method of testing signal generation for ADCs integral nonlinearity identification in testing point using measurement converter based on multi-resistors voltage divider with averaging voltages of all resistors. It is proved that such converter is insensitive to resistances and systematic errors of own resistors. There is evaluated error of ADCs nonlinearity identification, which is caused by changing the curvature of ADCs conversion function in the neighborhood of testing point. Also it is proposed method of number of testing point incrementing - “basic” method, and it is proposed the methodology of development such methods of testing points generation, which provides more evenly distribution of testing points via the range in comparison with “basic” method.


intelligent data acquisition and advanced computing systems: technology and applications | 2007

Genetic Algorithm Implementation for Perimeter Security Systems CAD

Pavlo Bykovyy; Volodymyr Kochan; Anatoly Sachenko; George Markowsky

This paper discusses the use of genetic algorithms (GA) in a perimeter security CAD system (PSCAD). In this paper we compare the performance of a PSCAD system that uses exhaustive search for optimization with one that uses a genetic algorithm.


Computer Standards & Interfaces | 2012

Security network interface for alarm systems

Pavlo Bykovyy; Volodymyr Kochan; Anatoly Sachenko; Serkan Aksoy; George Markowsky

Authors suggested the development of a specialized network interface for network of detectors that are part of alarm system. Providing a high level of network security against intruder is achieved using a large number of security elements and their dynamic change in on-line mode network operation. The proposed system uses traditional detectors; each is connected to the network through node based on a microcontroller. This allows connection of traditional detectors into two-wired network with common bus type and to reduce the number of wired lines without loss of system informative channels. An additional advantage is in powering sensors by a server via informational network channel.


intelligent data acquisition and advanced computing systems: technology and applications | 2011

Assessment of probabilistic parameters of alarm security detectors taking uncertain noise into account

Pavlo Bykovyy; Yuriy Pigovsky; Volodymyr Kochan; Nadiya Vasylkiv; Andriy Karachka

A method for assessment detectors false alarm and fault was developed. It includes the assessments of noise intensity barriers and detectors vulnerability to them using fuzzy sets and their defuzzification. It allows considering different environmental influences that may cause improper functioning of the alarm systems.


international conference on computational intelligence for measurement systems and applications | 2008

Genetic algorithm implementation for distributed security systems optimization

Pavlo Bykovyy; Yuriy Pigovsky; Volodymyr Kochan; Anatoly Sachenko; George Markowsky; Serkan Aksoy

This paper describes two algorithms for optimizing the design of distributed perimeter security systems. The first algorithm is a straightforward algorithm whose primary purpose is to help us formulate the problem formally. The second algorithm, is a genetic algorithm. Both algorithms were incorporated into a new module for our distributed security systems CAD software. Tests of the module show that it produced better solutions more quickly than any other algorithms that are known to us.


intelligent data acquisition and advanced computing systems: technology and applications | 2005

A Low-Cost Network Controller for Security Systems

Pavlo Bykovyy; Ihor Maykiv; Iryna Turchenko; Orest Kochan; Vasyl Yatskiv; George Markowsky

This paper describes the design of a low-cost network controller that can be used to interface sensors to security systems. This controller can use either a two-wired network interface with reconfigurable structure or an open optical channel for data communication with the network server. This design reduces the cost of data communication channels between sensors and the controller.


intelligent data acquisition and advanced computing systems: technology and applications | 2009

Data communication crypto protocol for security systems sensor networks

Pavlo Bykovyy; Volodymyr Kochan; Y. Kinakh; Anatoly Sachenko; Oleksiy Roshchupkin; Serkan Aksoy; George Markowsky

This paper describes hardware implementations of crypto protocol elements for secured data communication in two wired networks of security system detectors. Those elements are basic to crypto protocol development for that type of network. In addition, hardware tools for the network controller and the network server that support this protocol were developed. These tools will allow us to test and debug the proposed security elements and the crypto protocol.


intelligent data acquisition and advanced computing systems technology and applications | 2017

Criteria to estimate quality of methods selecting contour inflection points

Diana Zahorodnia; Yuriy Pigovsky; Pavlo Bykovyy; Victor Krylov; Bohdan Rusyn; Vasyl Koval

Current study performs a comparison of the contour inflection point selection methods according to the following criteria: probability of the correct selection, probability of the incorrect selection and an error in the coordinate estimation based on the results of model tasks. Results of the interpolation and differential methods and the method based on wavelet analysis of the contour inflection point were analyzed and graphically illustrated. It is shown that for simple geometric shapes the interpolation method has low precision (it shifts the contour inflection points) while differential method has the best precision properties, however it selects redundant inflection points (it has a low noise resistance) and the method based on the wavelet analysis of the curvature function shows the best results under noisy conditions.


intelligent data acquisition and advanced computing systems technology and applications | 2015

Structural statistic method identifying facial images by contour characteristic points

Diana Zahorodnia; Yuriy Pigovsky; Pavlo Bykovyy; Viktor Krylov; Ihor Paliy; Igor Dobrotvor

This study discusses structural static method of human face identification for computer recognition systems based on building an identification vector as a set of characteristic points representing significant facial features with reduced data. It allowed providing an accurate classification invariant to the scale, rotation and shear at low computing complexity.


intelligent data acquisition and advanced computing systems: technology and applications | 2013

Adaptive model of fermentation processes under uncertainty conditions

Yuriy Pigovsky; Roman Pasichnyk; Pavlo Bykovyy; Su Jun

This study describes an adaptive model, which allows predicting industrial fermentation processes under uncertainty conditions. The model is based on a collection of deterministic differential thermal-controlled models. It predicts state variable dynamics under every controlling thermal profile as time series of random or fuzzy numbers, and adaptively refines parameters of their probability density or membership functions using experimental observations of the systems state.

Collaboration


Dive into the Pavlo Bykovyy's collaboration.

Top Co-Authors

Avatar

Yuriy Pigovsky

Ternopil National Economic University

View shared research outputs
Top Co-Authors

Avatar

Volodymyr Kochan

Ternopil National Economic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Diana Zahorodnia

Ternopil National Economic University

View shared research outputs
Top Co-Authors

Avatar

Anatoly Sachenko

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Anatoly Sachenko

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Viktor Krylov

Ternopil National Economic University

View shared research outputs
Top Co-Authors

Avatar

Serkan Aksoy

Gebze Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Vasyl Koval

Ternopil National Economic University

View shared research outputs
Top Co-Authors

Avatar

Vasyl Yatskiv

Ternopil National Economic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge