Brest State Technical University

www.bstu.by
Brest, Belarus

Brest State Technical University is situated in Brest, Belarus. It began as Brest State Civil Engineering Institute on April 1, 1966, that was reorganized into Brest State Polytechnic Institute in 1989 and eventually into a University in 2000. Wikipedia.


Time filter

Source Type

Gerdt V.P.,Joint Institute for Nuclear Research | Prokopenya A.N.,Brest State Technical University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We consider an application of the Mathematica package QuantumCircuit to simulation of quantum circuits implementing two of the best known quantum algorithms, namely, the Grover search algorithm and the Shor algorithm for order finding. The algorithms are discussed in detail and concrete examples of their application are demonstrated. The main features of the package QuantumCircuit which can be used for the simulation of an arbitrary quantum algorithm are briefly described. © 2012 Springer-Verlag.


Gerdt V.P.,Joint Institute for Nuclear Research | Prokopenya A.N.,Brest State Technical University
Programming and Computer Software | Year: 2010

Algorithms for calculating unitary matrices determined by quantum circuits are discussed. The algorithms are used in the program QuantumCircuit designed for modeling quantum circuits. Practical implementations of the algorithms as functions written in the language of the Mathematica system are suggested. © Pleiades Publishing, Ltd., 2010.


Gerdt V.P.,Joint Institute for Nuclear Research | Prokopenya A.N.,Warsaw University of Life Sciences | Prokopenya A.N.,Brest State Technical University
Programming and Computer Software | Year: 2013

In the paper, the problem of simulation of quantum error correction by means of error correcting codes is discussed. Examples of error correction by means of quantum circuits constructed with the help of the QuantumCircuit package written in the language of the computer algebra system Mathematica are presented. © 2013 Pleiades Publishing, Ltd.


Bulskaya I.,Brest State University | Volchek A.,Brest State Technical University
Oceanologia | Year: 2014

The aim of this paper was to study the inorganic constituents of snow and snowmelt surface runoff in a case study of the city of Brest and to indicate components that could pose a threat to the environment. Samples of snow and snowmelt runoff were analysed for the following parameters: total suspended solids, pH, the contents of nitrate, phosphate and ammonium ions, and of heavy metals. The concentrations of most of these pollutants were higher in the snowmelt runoff than in snow. The concentrations of pollutants in the snowmelt surface runoff exceeded the levels established by national regulations (maximum permissible concentrations). © by Polish Academy of Sciences, Institute of Oceanology, 2014.


Imada A.,Brest State Technical University
Communications in Computer and Information Science | Year: 2014

The 8th International Conference on Neural Network and Artificial Intelligence organizes a round table discussion where, thinking of the title of this conference 'neural network and artificial intelligence,' we discuss whether we will be able to achieve a real human-like intelligence by using an artificial neural network, or not. This article is to break the ice of the session. We argue how these proposed machines, including those by neural networks, are intelligent, how we define machine intelligence, how can we measure it, how those measurements really represent an intelligence, and so on. For the purpose, we will take a brief look at a couple of formal definitions of machine intelligence so far proposed. We also take it a consideration on our own definition of machine intelligence. © Springer International Publishing Switzerland 2014.


Kachurka P.,Brest State Technical University | Golovko V.,Brest State Technical University
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS'2011 | Year: 2011

Modern intrusion detection systems process large amounts of data. Most systems use signature- and rule-based approaches to find attack traces. The main disadvantage of such technologies is the need of continuous updating of signature database to let the system detect newest attacks. We present recirculation neural network based approach which lets to detect previously unseen attack types in real-time mode and to further correct recognition of this types. The experiments held on both KDD data and real network traffic data prove that this approach can be used in host-based anomaly and misuse detectors. © 2011 IEEE.


Imada A.,Brest State Technical University
Advances in Intelligent Systems and Computing | Year: 2015

This chapter is a summary of my talk given during the 19th International Multiconference on Advanced Computer Systems held in Miedzyzdroje, Poland in October 2014. The talk started with the Legg and Hutter’s formal definition of what they call Universal Machine Intelligence which aims to measure intelligence of almighty robot,where agents are given an infinitely large number of different types of task to measure its universal intelligence.We take it a consideration what if we apply the formula to only one specific task. We claim the measurement of performance for each of those tasks given in the Legg and Hutter’s definition is not sufficient to represent agent’s intelligence. Then, we present our ongoing definition of machine intelligence for a specific one task such as forecasting stock market price. © Springer International Publishing Switzerland 2015.


Golovko V.,Brest State Technical University | Komar M.,Ternopil National Economic University | Sachenko A.,Ternopil National Economic University
Modern Problems of Radio Engineering, Telecommunications and Computer Science - Proceedings of the 10th International Conference, TCSET'2010 | Year: 2010

It's proposed to use artificial immune systems and neural networks to detect attacks on computer systems. The principles of attack detection system design based on artificial immune network are described, and the architecture of attack detection system is presented.


Imada A.,Brest State Technical University
Communications in Computer and Information Science | Year: 2014

The 8th International Conference on Neural Network and Artificial Intelligence invites a plenary talk whose topic is Forest Resource Maintenance. It's not specifically from the point of information technology but from a general point of view. Thinking of the title of this conference, 'neural networks and artificial intelligence,' the talk follows this literature review on the topic of forest management by neural network and/or artificial intelligence. While focus is mainly put on wildfire prediction, also preservation of biodiversity of forest ecosystems and forest resource management are surveyed. Comparison of these methods with traditional statistical methods such as regression is mentioned too. © Springer International Publishing Switzerland 2014.


Chichurin A.V.,Catholic University of Lublin | Shvychkina H.N.,Brest State Technical University
Mathematical Biosciences | Year: 2016

We consider Michaelis-Menten chemostat dynamic models, describing the process of continuous cultivation of bacteria with one organic substrate and two types of microorganisms in a case where the Michaelis-Menten constants for the two competing species of microorganisms are equal. For such a system we obtain solutions with the finite initial conditions assuming only positive values. As it is shown the problem is reduced to the solution of the nonlinear differential equation of the first order. For some parametric relations the solutions of the differential system are found in the analytical form. Using numerical procedures we construct software modules that allow modeling the chemostat cultivation for the changing parameters and visualizing the dynamics of the development process for each microorganism. A comparative analysis of some numerical methods that are used to integrate the resulting nonlinear differential equation is given. © 2016 Elsevier Inc.

Loading Brest State Technical University collaborators
Loading Brest State Technical University collaborators