{"id":"https://openalex.org/W4415004014","doi":"https://doi.org/10.1109/acit65614.2025.11185606","title":"Enhancement of the logic-probabilistic trajectory modelling method for calculating the probability of pairwise connectivity in an Electronic Ground Surveillance Complex","display_name":"Enhancement of the logic-probabilistic trajectory modelling method for calculating the probability of pairwise connectivity in an Electronic Ground Surveillance Complex","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415004014","doi":"https://doi.org/10.1109/acit65614.2025.11185606"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061310756","display_name":"Leonid Ozirkovskyy","orcid":"https://orcid.org/0000-0003-0012-2908"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Leonid Ozirkovskyy","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010559812","display_name":"Bohdan Volochiy","orcid":"https://orcid.org/0000-0001-5230-9921"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Bohdan Volochiy","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107183926","display_name":"Nazar Pryymak","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Nazar Pryymak","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000707625","display_name":"\u042e.\u041e. \u0416\u0443\u043a","orcid":"https://orcid.org/0000-0002-6932-2484"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Yurii Zhuk","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061310756"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37564892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"70","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.8970999717712402,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.8970999717712402,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.8932999968528748,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.8669000267982483,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.8094000220298767},{"id":"https://openalex.org/keywords/trajectory","display_name":"Trajectory","score":0.7868000268936157},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.6711999773979187},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6611999869346619},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5346999764442444},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.5120000243186951},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.478300005197525},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.47189998626708984}],"concepts":[{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.8094000220298767},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.7868000268936157},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.6711999773979187},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6611999869346619},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6316999793052673},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5346999764442444},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.5120000243186951},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.478300005197525},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.47189998626708984},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4000999927520752},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3797999918460846},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.35019999742507935},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2921000123023987},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.28870001435279846},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.28610000014305115},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.28369998931884766},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.26570001244544983},{"id":"https://openalex.org/C60782215","wikidata":"https://www.wikidata.org/wiki/Q3333679","display_name":"Probabilistic method","level":3,"score":0.2621000111103058},{"id":"https://openalex.org/C113508815","wikidata":"https://www.wikidata.org/wiki/Q193446","display_name":"Packet switching","level":3,"score":0.25859999656677246},{"id":"https://openalex.org/C24858836","wikidata":"https://www.wikidata.org/wiki/Q844718","display_name":"Theory of computation","level":2,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,26],"study":[1],"[1]":[2],"demonstrated":[3],"the":[4,7,14,29,40,49,54,58,66,76,83,90,97],"effectiveness":[5],"of":[6,18,31,69,82,99],"logic-probabilistic":[8],"trajectory":[9,70,100],"modelling":[10],"method":[11,27],"for":[12,35,56,95],"determining":[13],"structural":[15,32,59],"survivability":[16,33,60],"indicator":[17],"a":[19,23,44,93],"communication":[20,41,84],"network":[21,42],"with":[22],"mesh":[24,45],"topology.":[25],"enables":[28],"assessment":[30],"indicators":[34],"safety-critical":[36],"systems":[37],"in":[38,48],"which":[39],"has":[43,102],"structure.":[46],"However,":[47],"basic":[50],"approach":[51],"to":[52],"composing":[53],"formula":[55],"obtaining":[57],"indicator,":[61],"its":[62],"accuracy":[63],"depends":[64],"on":[65,89],"assigned":[67],"order":[68,98],"traversal":[71],"by":[72],"probabilistic":[73],"packets":[74],"between":[75],"initial":[77],"and":[78],"final":[79],"nodes":[80],"(poles)":[81],"network's":[85],"topological":[86],"graph.":[87],"Based":[88],"conducted":[91],"research,":[92],"rule":[94],"assigning":[96],"consideration":[101],"been":[103],"formulated.":[104]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
