СТАТИСТИЧНА ІНФЕРЕНЦІЯ В ОЦІНЦІ ЕФЕКТИВНОСТІ ЗЕНІТНОГО ДРОНА ЗА БОЙОВИМИ СПОСТЕРЕЖЕННЯМИ
І.Г. Дзеверін, О.О. Болюбаш, С.М. Бачурін
et al.
У статті розглянуто актуальні питання оцінки ефективності бойового застосування зенітного безпілотного літального апарату (UAV-F) в сучасних умовах війни, що характеризуються широким залученням безпілотних літальних апаратів (БпЛА) винищувачів (перехоплювачів) безпілотних систем (БпС) у підрозділах протиповітряної оборони (ППО). Запропоновано методику статистичного оцінювання (MSI-UAVF) технічної ймовірності ураження повітряних цілей одним зенітним БпЛА за результатами бойових спостережень, без використання паспортних даних виробника (Методика).
Методика спирається на біноміальну модель результатів (успіх / неуспіх) для кожної категорії знищення повітряних цілей (КЗПЦ) та використовує довірчі інтервали Вільсона для оцінювання частки уражень, а також дельта-метод з коваріацією для технічної ефективності з урахуванням втрат носіїв. Розрахована можливість розширення за допомогою бета-біноміальної моделі та GLMM (узагальнені лінійні змішані моделі) для врахування неоднорідності екіпажів, районів, умов.
Наведено структуру облікових даних (спроби, ураження, втрати) підрозділу БпС ППО з урахуванням часу доби, типу цілі (розвідувальний / ударний БпЛА противника), рівня радіоактивних перешкод (РЕБ) та погодних умов.
Подано приклад повного числового розрахунку, узгодженого із шаблоном Excel: розрахунок точкових оцінок, довірчих інтервалів, агрегованих показників та їх інтерпретація для оперативного планування.
Окремо наведено технічний опис реалізації Методики в середовищі електронних таблиць Microsoft Excel: автоматизований розрахунок фактичних (бойових) ймовірностей, довірчих інтервалів, агрегованих показників за РЕБ та погодою, а також приклад числових розрахунків, синхронізований з таблицями. Використання реальних бойових даних у процесі планування ППО і оцінки ефективності підрозділів БпС ППО підвищує точність прогнозування та адаптованість прийнятих рішень до конкретних умов бойових дій.
Leveraging genetic data for female breast cancer prevention and therapy: Perspectives from Mendelian randomization
Danqi Huang, Jingbo Zhai, Min Yang
et al.
Contribution of Sir Charles Bell to medicine
Tatiana A. Fominykh, Sergey A. Kutia
Relevance. Knowledge of scientific concepts and achievements of the past provides an informative basis for modern research. Moreover, these achievements are filled with the greatest meaning if they are associated with a specific person and the time in which they occurred. Thus, knowledge of the history of science allows us not to neglect the intellectual heritage of past generations and turn it into potential for the development of modern research. In one of his speeches, Nobel laureate Sir Andrew Huxley noted that if he had familiarized himself with the literature of the 19th century in more detail, he would have been able to successfully complete some of his research much faster and more effectively. It must be said that the 19th century gave humanity a whole galaxy of the greatest scientists who made truly fateful discoveries. Our article is dedicated to one of such scientists - Sir Charles Bell (1774-1842), an outstanding Scottish surgeon, anatomist and experimental physiologist. Results of study. In the course of his scientific, teaching and practical medical activities, Bell implemented his accumulated knowledge and experience in the publication of many treatises that remain relevant to this day. Charles Bell applied his talent as an artist in anatomy, personally illustrating magnificent treatises written in collaboration with his older brother, the famous surgeon John Bell, and in surgery (more precisely, in military field surgery), sketching the wounded after the Battle of Waterloo. The scientist also made an invaluable contribution to the development of neurology. Thus, the name of Charles Bell is immortalized in the name of the long thoracic (or «external respiratory») nerve, in the description of lower motor neuron palsy of the facial nerve, and in the «Bell’s sign», when the eyeball rolls upward when trying to close the eye. His description of the differences between the fifth and seventh cranial nerves, as well as the definition of the morpho-functional characteristics of the anterior and posterior roots of the spinal cord as Bell’s law, are widely known. For his invaluable contribution to science, Charles Bell was awarded the gold medal of the Royal Society and made a knight of the Hanoverian Guelphic Order. Conclusion. The statement of the great Russian surgeon N.I. Pirogov, «Everything that is high in the world is art, inspiration and science…» is the most appropriate description of his contemporary Charles Bell, who combined these three hypostases. It is important to note that the reflex theory, whose founder is considered to be Charles Bell, is a fundamental concept of physiology and medicine, although in the early stages (in the mid-19th century) this principle was considered only in relation to the spinal cord.
Review of I.Z. Farkhutdinov’s Monograph “The Evolution of International Law – from Westphal to Versailles”, 2024
R. Sh. Davletgildeev, D. V. Zarubin
INTRODUCTION. The history of international law has attracted special attention of domestic legal scholars in the past and continues to arouse high scientific interest among legal researchers at the present time. There is no doubt that this issue will not cease to be the subject of serious scientific research in the future. The ongoing scientific study of issues related to the history of international law is quite justified. On the one hand, the ongoing development of international relations and modern trends in interstate interaction allow us to rethink past events in world life. On the other hand, the future sustainable and effective development of international law is impossible without analyzing the past. This is explained by the fact that turning to the accumulated experience of international legal regulation, as well as to early and subsequent concepts of international law, can provide invaluable assistance in solving the problems facing the world community in modern times. In this regard, there is no doubt about the relevance of the monograph by I.Z. Farkhutdinov «Evolution of International Law – from Westphal to Versailles», published in 2024.MATERIALS AND METHODS. The writing of this work is based both on the approaches and conclusions formulated in the monograph under review, and on the scientific works of domestic and foreign international lawyers on the issues under consideration. In preparing the review, general scientific and special methods of cognition used in legal research were used.RESEARCH RESULTS. The chronological framework of the presented study is designated by the adoption of a few important international documents, which, on the one hand, marked the completion of the Thirty Years' War of 1618-1648 and the First World War of 1914-1918, respectively, and, on the other hand, established certain models of international relations in a specific historical period. The monograph opens with a study of the origin of international law as a regulator of interstate relations. Then it moves on to the problems of the Vienna Congress and the formation of the Vienna system of international relations. The final part of the monograph is entitled «From Sarajevo to Versailles. From the «law of military conflicts» to the First World War.DISCUSSION AND CONCLUSIONS. In conclusion, it is noted that the monograph by I.Z. Farkhutdinov «Evolution of International Law – from Westphal to Versailles» is a monographic work with a deep personal view of the history of international law of the 16th-20th centuries, with extensive use of the achievements of related social sciences: history, theory of international relations, political science, which makes a significant contribution to the development of international legal science. On the one hand, it invites to discuss the stated topic, and on the other, serves as a guide for future legal research on the history of international law (both the legal system and science), as well as interstate relations. In addition, it is hoped that subsequent studies of the evolution of international law, covering other geographical and chronological frameworks of its historical development, will be reflected by the author of the monograph under review in his further scientific research.
Law of nations, Comparative law. International uniform law
Blockchain-Based Security Architecture for Uncrewed Aerial Systems in B5G/6G Services and Beyond: A Comprehensive Approach
Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Abdellah Chehri
et al.
Uncrewed aerial systems (UASs) were popularly used by hobbyists in the past, but they have now become critical enablers for managing disasters, handling emergencies, and so on. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAS-based B5G/6G architectures. Catering to this requirement, this article conducts a comprehensive review of the security aspects of UASs with respect to the 5G/6G system architecture, its enabling technologies, and privacy issues. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAS-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAS-based systems, along with the open challenges and strategies for future research work.
Telecommunication, Transportation and communications
Proceedings Twelfth Workshop on Fixed Points in Computer Science
Alexis Saurin
This EPTCS volume contains the post-proceedings of the Twelfth International Workshop on Fixed Points in Computer Science, presenting a selection of the works presented during the workshop that took place in Naples (Italy) on the 19th and 20th of February 2024 as a satellite of the International Conference on Computer Science Logic (CSL 2024).
The Politics and Dynamics of Secession in Nigeria
Michael Nwankpa
From its inception, the different components that constitute Nigeria have lived in mutual fear and suspicion of one another. The British colonial government, through its racialised and politicized system of indirect rule, sowed the seed of discord among the different ethnic groups and regions such that even before gaining independence in 1960, both the majority and minority ethnic groups were sceptical of the capacity of an independent Nigeria in protecting their interests and rights. The religious, linguistic, socio-cultural and political fault lines among Nigeria’s plural society have created tension and conflict throughout its existence as a political unit. This has often led to secessionist and self-determination drives and movements that reached their peak less than a decade after independence (1967-70) with Nigeria experiencing a bitter and costly civil war with the Igbo separatist nation of Biafra. Although Nigeria survived the breakup attempt, it continues to face threats of secession that manifest even at the sub-group level. The injustices that are ingrained in Nigeria’s political system remain a strong push factor, but in many cases the secessionist drives are elites’ manipulation to further their own interests and political survival. Based on the resurgence of secessionism in Nigeria, this article critically examines the politics involved in secession in Nigeria as well as the dynamic nature of selected secessionist movements, comparing or charting the trajectories from historical to contemporary secessionist movements.
Military Science, History of Africa
Sealing the Pandora’s vase of pancreatic fistula through entrapping the digestive enzymes within a dextrorotary (D)-peptide hydrogel
Wangxiao He, Yang Wang, Xiao Li
et al.
Abstract A variety of therapeutic possibilities have emerged for skillfully regulating protein function or conformation through intermolecular interaction modulation to rectify abnormal biochemical reactions in diseases. Herein, a devised strategy of enzyme coordinators has been employed to alleviate postoperative pancreatic fistula (POPF), which is characterized by the leakage of digestive enzymes including trypsin, chymotrypsin, and lipase. The development of a dextrorotary (D)-peptide supramolecular gel (CP-CNDS) under this notion showcases its propensity for forming gels driven by intermolecular interaction. Upon POPF, CP-CNDS not only captures enzymes from solution into hydrogel, but also effectively entraps them within the internal gel, preventing their exchange with counterparts in the external milieu. As a result, CP-CNDS completely suppresses the activity of digestive enzymes, effectively alleviating POPF. Remarkably, rats with POPF treated with CP-CNDS not only survived but also made a recovery within a mere 3-day period, while mock-treated POPF rats had a survival rate of less than 5 days when experiencing postoperative pancreatic fistula, leak or abscess. Collectively, the reported CP-CNDS provides promising avenues for preventing and treating POPF, while exemplifying precision medicine-guided regulation of protein activity that effectively targets specific pathogenic molecules across multiple diseases.
Child Impact Statements: Interdisciplinary Collaboration in Political Science and Computer Science
Leah Cathryn Windsor
Child Impact Statements (CIS) are instrumental in helping to foreground the concerns and needs of minor community members who are too young to vote and often unable to advocate for themselves politically. While many politicians and policymakers assert they make decisions in the best interests of children, they often lack the necessary information to meaningfully accomplish this. CISs are akin to Environmental Impact Statements in that both give voice to constituents who are often under-represented in policymaking. This paper highlights an interdisciplinary collaboration between Social Science and Computer Science to create a CIS tool for policymakers and community members in Shelby County, TN. Furthermore, this type of collaboration is fruitful beyond the scope of the CIS tool. Social scientists and computer scientists can leverage their complementary skill sets in data management and data interpretation for the benefit of their communities, advance scientific knowledge, and bridge disciplinary divides within the academy.
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Jason E. Ellis, Travis W. Parker, Joachim Vandekerckhove
et al.
The vulnerability of cyber-physical systems to cyber attack is well known, and the requirement to build cyber resilience into these systems has been firmly established. The key challenge this paper addresses is that maturing this discipline requires the development of techniques, tools, and processes for objectively, rigorously, and quantitatively measuring the attributes of cyber resilience. Researchers and program managers need to be able to determine if the implementation of a resilience solution actually increases the resilience of the system. In previous work, a table top exercise was conducted using a notional heavy vehicle on a fictitious military mission while under a cyber attack. While this exercise provided some useful data, more and higher fidelity data is required to refine the measurement methodology. This paper details the efforts made to construct a cost-effective experimentation infrastructure to provide such data. It also presents a case study using some of the data generated by the infrastructure.
Network Analysis of the iNaturalist Citizen Science Community
Yu Lu Liu, Thomas Jiralerspong
In recent years, citizen science has become a larger and larger part of the scientific community. Its ability to crowd source data and expertise from thousands of citizen scientists makes it invaluable. Despite the field's growing popularity, the interactions and structure of citizen science projects are still poorly understood and under analyzed. We use the iNaturalist citizen science platform as a case study to analyze the structure of citizen science projects. We frame the data from iNaturalist as a bipartite network and use visualizations as well as established network science techniques to gain insights into the structure and interactions between users in citizen science projects. Finally, we propose a novel unique benchmark for network science research by using the iNaturalist data to create a network which has an unusual structure relative to other common benchmark networks. We demonstrate using a link prediction task that this network can be used to gain novel insights into a variety of network science methods.
Non-military aspects of strategic deterrence
Milenković Miloš R., Subotić Milovan R.
Nowadays state and its citizens are exposed to a wide range of threats that are not necessarily of a military character, which requires a systemic and strategic response. The main hypothesis of the paper is that the very change in the perception of security, as well as the increasingly diverse manners of endangering it, which are also reflected in the theories of modern wars, impose on state the obligation to expand the concept of strategic deterrence to other spheres of social activities, in addition to the military, which still remains crucially important. In order to better understand the concept of strategic deterrence, the authors try to provide answers to the questions: who should be deterred and what from? In addition to armed aggression, which strategic deterrence is primarily aimed at, the paper indicates that the focus has to also be on all other phenomena and activities that lead to the destabilisation of society, the collapse of institutions, some form of intrastate conflict and, ultimately, the collapse of state and/or violent regime change. Having in mind that deterrence is, in essence, a matter of perception, a special part of the paper is devoted to the analysis of the situation in Serbia, that is, the perception of its internal weaknesses that affect the ability of strategic deterrence. For the purpose of this analysis, in the paper the authors use some databases and reports by international organizations, which make it possible to do a comparative analysis with other countries and monitor its trends. Theoretical assumptions and analysed data are used as a basis for answering the question: how to deter? For strategic deterrence to be effective, first of all it must not be partial and has to encompass all domains of national power. In this sense, it is pointed out that military power is important, but not sufficient. Moreover, in the context of strategic deterrence, the importance of strengthening the international position of state through cooperation with others, as well as attracting foreign investment, is emphasized. Finally, as a key condition for the credibility of strategic deterrence, the authors emphasize political stability and the functioning of institutions. Bearing in mind the expansion of the context of strategic deterrence, important institutions in this regard are, in addition to the military, police, intelligence and security services, certainly also the judiciary, financial institutions, educational and health system, cultural and information institutions, etc. For a country that has not managed to ensure the minimum of unity within its society for strategic decisions, or at least the absence of extreme polarisation, as well as the proper functioning of the state apparatus and other segments of society, there are not armed forces that could defend it. Such a state will not be externally attacked by potential enemies, but internally. Precisely due to this, the authors conclude that without a comprehensive and systemic approach, without strong and efficient institutions, without establishing a functional and democratic society, there is no successful deterrence.
Report of the Snowmass 2021 Theory Frontier Topical Group on Quantum Information Science
Simon Catterall, Roni Harnik, Veronika E. Hubeny
et al.
We summarize current and future applications of quantum information science to theoretical high energy physics. Three main themes are identified and discussed; quantum simulation, quantum sensors and formal aspects of the connection between quantum information and gravity. Within these themes, there are important research questions and opportunities to address them in the years and decades ahead. Efforts in developing a diverse quantum workforce are also discussed. This work summarizes the subtopical area Quantum Information for High Energy Physics TF10 which forms part of the Theory Frontier report for the Snowmass 2021 planning process.
Reflections on the Evolution of Computer Science Education
Sreekrishnan Venkateswaran
Computer Science education has been evolving over the years to reflect applied realities. Until about a decade ago, theory of computation, algorithm design and system software dominated the curricula. Most courses were considered core and were hence mandatory; the programme structure did not allow much of a choice or variety. This column analyses why this changed Circa 2010 when elective subjects across scores of topics become part of mainstream education to reflect the on-going lateral acceleration of Computer Science. Fundamental discoveries in artificial intelligence, machine learning, virtualization and cloud computing are several decades old. Many core theories in data science are centuries old. Yet their leverage exploded only after Circa 2010, when the stage got set for people-centric problem solving in massive scale. This was due in part to the rush of innovative real-world applications that reached the common man through the ubiquitous smart phone. AI/ML modules arrived in popular programming languages; they could be used to build and train models on powerful - yet affordable - compute on public clouds reachable through high-speed Internet connectivity. Academia responded by adapting Computer Science curricula to align it with the changing technology landscape. The goal of this experiential piece is to trigger a lively discussion on the past and future of Computer Science education.
The Scientific Evidence Indicator for Popular Science News
Anders Sundnes Løvlie, Astrid Waagstein, Peter Hyldgård
To what extent can news media help in providing more credible information about science? This is the core challenge for the Science Evidence Indicator (SEI) project, a collaboration between the Danish popular news website videnskab.dk and the authors of this paper. Looking specifically at medical science news, we aim to provide a transparent assessment of the scientific sources behind a story. This entails identifying some of the criteria that scientists use to assess research, and making it accessible and understandable for readers. We address the following research question: How can we communicate the quality of scientific publications in health science to a non-expert audience? Our goal is to make the assessments understandable for the youngest part of the website's target audience: high school students from age 16 and upwards.
Evolution of the Parvalbumin Genes in Teleost Fishes after the Whole-Genome Duplication
Subham Mukherjee, Oldřich Bartoš, Kamila Zdeňková
et al.
Parvalbumin is considered a major fish allergen. Here, we report the molecular evolution of the parvalbumin genes in bony fishes based on 19 whole genomes and 70 transcriptomes. We found unexpectedly high parvalbumin diversity in teleosts; three main gene types (<i>pvalb-α</i>, <i>pvalb-β1</i>, and <i>pvalb-β2</i>, including oncomodulins) originated at the onset of vertebrates. Teleosts have further multiplied the parvalbumin gene repertoire up to nine ancestral copies—two copies of <i>pvalb-α</i>, two copies of <i>pvalb-β1</i>, and five copies of <i>pvalb-β2</i>. This gene diversity is a result of teleost-specific whole-genome duplication. Two conserved parvalbumin genomic clusters carry <i>pvalb-β1</i> and <i>β2</i> copies, whereas <i>pvalb-α</i> genes are located separately in different linkage groups. Further, we investigated parvalbumin gene expression in 17 tissues of the common carp (<i>Cyprinus carpio</i>), a species with 21 parvalbumin genes in its genome. Two <i>pvalb-α</i> and eight <i>pvalb-β2</i> copies are highly expressed in the muscle, while two alternative <i>pvalb-α</i> copies show expression in the brain and the testes, and <i>pvalb-β1</i> is dominant in the retina and the kidney. The recent pairs of muscular <i>pvalb-β2</i> genes show differential expression in this species. We provide robust genomic evidence of the complex evolution of the parvalbumin genes in fishes.
Biology (General), Genetics
МОДЕЛЬ ІНТЕЛЕКТУАЛЬНОЇ СИСТЕМИ ВІДЕОСПОСТЕРЕЖЕННЯ ДЕРЖАВНОЇ ПРИКОРДОННОЇ СЛУЖБИ УКРАЇНИ
Анатолій БАБАРИКА
Використання систем відеоспостереження з функціями відеоаналітики дає можливість автоматизувати такі напрямки діяльності як аналітика контролю периметру, ситуаційний аналіз, біометричний аналіз, аналіз номерних знаків транспортних засобів, аналіз з декількох камер, автоматичне виявлення та класифікація об’єктів, пошук об’єктів в базі даних відеоархіву тощо.
В роботі проведено аналіз сучасних методів побудови інтелектуальних систем відеоспостереження. Проаналізовано архітектури основних із них (CROMATICA, PRISMATICA, ADVISOR, CARETAKER, VANAHEIM, P5, SURVEIRON, IMSK, CONNEXIONs тощо). На основі проведеного аналізу було запропоновано увести ряд інформаційно-логічних рівнів в процес обробки відеоінформації: L0 – формування відеоінформації на сенсорних пристроях (камери відеоспостереження); L1 – транспортування та зберігання відеоінформації на запам'ятовуючих пристроях; L2 – автоматизований аналіз відеоінформації; L3 – інтерпритація результатів відео аналізу. Запропоновано також архітектуру інтелектуальної системи відеоспостереження Державної прикордонної служби, визначено рівні її структурованості та місце в загальній структурі ІІТС "Гарт". Модульна структура побудови запропонованої архітектури дозволяє модернізувати систему вводячи нові функції, масштабуючи по кількості камер та характеристикам обладнання.
На прикладі використання програмного детектора виявлення динамічних об'єктів на відеопослідовностях, було обґрунтовано ефективність застосування інтелектуальної системи відеоспостереження.
Напрямком подальших досліджень є практична реалізація запропонованої моделі, її інтеграція до комплексних систем безпеки територіальних об'єктів, а також вивчення можливостей застосування на протяжних ділянках Державного кордону. Ще одним актуальним напрямком подальших досліджень є розробка комплексної методики оцінки ефективності застосування систем відеоспостереження.
Military Science, Societies: secret, benevolent, etc.
Human-Machine Collaboration for Democratizing Data Science
Clément Gautrais, Yann Dauxais, Stefano Teso
et al.
Everybody wants to analyse their data, but only few posses the data science expertise to to this. Motivated by this observation we introduce a novel framework and system \textsc{VisualSynth} for human-machine collaboration in data science. It wants to democratize data science by allowing users to interact with standard spreadsheet software in order to perform and automate various data analysis tasks ranging from data wrangling, data selection, clustering, constraint learning, predictive modeling and auto-completion. \textsc{VisualSynth} relies on the user providing colored sketches, i.e., coloring parts of the spreadsheet, to partially specify data science tasks, which are then determined and executed using artificial intelligence techniques.
Application of Data Envelopment Analysis for the Evaluation of IT Project Success
Dorota Kuchta, Dimitris Despotis, Kazimierz Frączkowski
et al.
The paper is devoted to the problem of IT project success definition and measurement seen against the background of IT human resources management organisation. A review of the state of art of the problem shows that the assessment of IT project success is highly equivocal and subjective. Various methods may produce conflicting results. The paper proposes basically one novelty: an original approach to IT project success evaluation based on Data Development Analysis (DEA). DEA has been developed and used for years, but for other purposes. The new method, contrasted with two other which are based on other philosophies, is applied to a sample of Polish IT projects. This application shows that the new method in some cases completely changes the optics and emphasizes such aspects of IT projects which are neglected by other methods. It also shows that a combination of the proposed method with other IT project measurement methods may substantially increase the fairness of IT project team members and managers' appraisal, and hence the motivation of human resources in IT projects. (original abstract)
Management. Industrial management, Economic growth, development, planning
Diseño del modelo de gestión de la cadena de suministro en una empresa de industria marítima en Colombia
Héctor Figueroa-Porto, Luis Guillermo Garcés-Henao
Debido a los grandes cambios y desafíos que enfrenta la industria astillera en la actualidad, se hace necesario establecer e implementar estrategias de planeación y gestión de la cadena de suministro que garanticen procesos más efectivos. El objetivo principal del presente artículo se enfoca en el proceso de abastecimiento de arena para sandblasting en la empresa Corporación de Ciencia y Tecnología para el Desarrollo de la Industria Naval, Marítima y Fluvial (COTECMAR), por lo cual, se diseñará el modelo de gestión para dicho proceso, como estrategia para mantener los niveles óptimos de inventario, de tal manera que se logre el aumento de la productividad, la competitividad de la empresa y la satisfacción de los clientes.
Military Science, Business