2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)最新文献

筛选
英文 中文
Novel Quantum Random Number Generator for Cryptographical Applications 用于密码学应用的新型量子随机数发生器
M. Iavich, T. Kuchukhidze, T. Okhrimenko, Serhii Dorozhynskyi
{"title":"Novel Quantum Random Number Generator for Cryptographical Applications","authors":"M. Iavich, T. Kuchukhidze, T. Okhrimenko, Serhii Dorozhynskyi","doi":"10.1109/PICST51311.2020.9467951","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467951","url":null,"abstract":"Random numbers are a fundamental resource in science and engineering, and are also widely used in many fields, such as simulation, cryptography, lotteries, fundamental science. There are algorithmically generated numbers that look like random numbers but are not truly random. These pseudo random numbers are generated from a computer, using deterministic algorithms. Because, we cannot use pseudo random generators in situations, where true randomness is necessary, we use true random number generators. In this case, we use unpredictable random events as a random source. Quantum random number generators (QRNG) output true random numbers based on inherent randomness in quantum measurements. Our goal is to generate fast random numbers at a lower cost. At the same time, a high level of randomness is essential. We present the improved novel quantum random number generator, which is based the on time of arrival QRNG. It is rather efficient, as it uses the simple version of the detectors with rather few requirements. The novel QRNG produces more than one random bit per each photon detection.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Decision Support System in Entomophages Production 昆虫生产中的智能决策支持系统
V. Lysenko, I. Chernova
{"title":"Intelligent Decision Support System in Entomophages Production","authors":"V. Lysenko, I. Chernova","doi":"10.1109/PICST51311.2020.9467999","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467999","url":null,"abstract":"The work is devoted to the development of an intelligent decision support system in the production of entomophages, using the infocommunication approach, methods of structural synthesis, fuzzy logic, cognitive and correlation analysis, semantic modeling; the object of research were the processes of entomophages production; in order to increase the efficiency of entomophages production, an intelligent decision support system and an algorithm for its construction have been developed, semantic network of decision-making on parameter optimization production, cognitive model of interaction of entomocultures quality and technocenosis parameters; the results of the research were implemented in the conditions of laboratory production of entomophage Habrobrakon hebetor.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Procedure for Adapting a Neural Network to Eye Iris Recognition 应用神经网络进行眼睛虹膜识别的程序
Sergey Toliupa, L. Tereikovska, I. Tereikovskyi, Aliya Doszhanova, Zhuldyz Alimseitova
{"title":"Procedure for Adapting a Neural Network to Eye Iris Recognition","authors":"Sergey Toliupa, L. Tereikovska, I. Tereikovskyi, Aliya Doszhanova, Zhuldyz Alimseitova","doi":"10.1109/PICST51311.2020.9468020","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468020","url":null,"abstract":"The article is devoted to the problem of adapting the structural parameters of a convolutional neural network to iris recognition during biometric authentication and iridology. It is shown that the most effective type of neural network model is the convolutional neural network. There was determined a list of convolutional neural network parameters, which should be adapted to the conditions of the iris recognition problem. There are proposed a number of adaptation principles, based on an analogy with iris recognition by a human-expert. On the basis of the proposed principles, there was developed an original procedure for adapting the neural network model to the conditions of the iris recognition problem. In contrast to the known solutions, the development involves the use of the proposed adaptation principles, which allow determining the main parameters of the convolution and sub-sample layers. It was experimentally proved that the use of the proposed procedure allowed developing a neural network model whose accuracy at the level of 0,95 corresponds to the best modern solutions of a similar purpose. There is shown the expediency of further researches in the development of the neural network analysis Iris method using CNN.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126625059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems 构建动态多跳VPN链保证终端接入系统安全的方法
T. Vitalii, Budko Anna, Hvozdetska Kateryna, D. Hrebeniuk
{"title":"Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems","authors":"T. Vitalii, Budko Anna, Hvozdetska Kateryna, D. Hrebeniuk","doi":"10.1109/PICST51311.2020.9467953","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467953","url":null,"abstract":"International business groups are increasingly using terminal systems as workstations. At the same time, virtual machine servers are often located in the head structure, while remote offices have to connect to them using terminals. Currently, the security of terminal access systems is ensured by the robustness of communication protocols between a terminal and a host. To improve the security of such connections, the concept of Multi-hop VPN chains has recently been used. Its essence lies in the use of a set of intermediate VPN servers, the interaction of which is organized according to a certain rule for the purpose of multiple “repackaging” of traffic between subnets or through end-to-end tunneling. At the same time, the speed of building such an overlay structure and the delay indicator between the end nodes are important tasks. Therefore, the task of fast building Multi-hop VPN chains with a given security level and the condition of the minimum allowable network delay is relevant. A method for building dynamic Multi-hop VPN chains to ensure the security of terminal access systems is proposed in the paper. The method is based on solving a set of combinatorial best choice problems. The method provides for both scheduled hopping of the route in the chain, and unscheduled one conditioned by a failure of the VPN server or exceeding the threshold network delay between a terminal and a host. The paper presents the results of comparative experiments with the well-known NeuroRouting approach. It is shown that the developed method is more flexible than NeuroRouting. By carrying out experiments, it was found that the use of the developed method allows obtaining a gain in connection security by increasing the frequency of chain hopping; reducing the time delay of data exchange between the host and the terminal through a chain of VPN servers up to 15%.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"298 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mathematical Model of User Behavior in Computer Systems 计算机系统用户行为的数学模型
V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, A. Nosyk, Valentyn Lebediev
{"title":"Mathematical Model of User Behavior in Computer Systems","authors":"V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, A. Nosyk, Valentyn Lebediev","doi":"10.1109/PICST51311.2020.9467944","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467944","url":null,"abstract":"Various electronic keys (tokens, cards, etc.) are also quite common in the quality of identifiers. But it should be noted that in recent years, more and more widespread identification systems that use biometric characteristics of man in solving the problem of access to information systems. Therefore, the task of developing models of behavior of users of computer systems, which take into account both dynamic and static properties of the behavior of users, as well as their possible ones, is urgent. The paper presents a comprehensive approach to the analysis of user behavior in order to identify anomalies in its work. This approach should take into account the dynamic and statistical properties of the behavior, as well as possible changes in behavior that are not associated with anomalies.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of Development of Chinese Logistics Enterprises Based on the Technology of the Internet of Things 基于物联网技术的中国物流企业发展研究
L. Taraniuk, Hongzhou Qiu, K. Taraniuk
{"title":"Research of Development of Chinese Logistics Enterprises Based on the Technology of the Internet of Things","authors":"L. Taraniuk, Hongzhou Qiu, K. Taraniuk","doi":"10.1109/PICST51311.2020.9468029","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468029","url":null,"abstract":"Chinese logistics enterprises emerge endlessly, but the level of information is generally low, the management is extensive, the cost cannot be saved and cannot create more value-added service. The adoption of the Internet of Things technology will change that. At present, the Internet of Things technology has been widely applied. The application of the Internet of Things technology in the logistics industry is becoming more mature. RFID technology, GPS technology, sensor technology, and other logistics in the field of information acquisition, goods and vehicle tracking, transport monitoring, visual management, and other aspects have made a lot of progress. The application of the Internet of things technology in the field of logistics is conducive to improving the level of logistics technology. It can also improve the monitoring of product quality in the logistics process and the level of logistics services, and reduce logistics costs. After analyzing the above-mentioned issues, this paper introduces the application of the Internet of Things in the field of logistics production and transportation and takes the Internet of Things technology of the Shenzhen branch of Ande logistics for the analysis. This paper analyzes the current situation with profit models of logistics enterprises in China and introduces new profit models.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Models for Selection of Investment Strategies 投资策略选择模型分析
V. Lakhno, Liubov Plyska
{"title":"Analysis of Models for Selection of Investment Strategies","authors":"V. Lakhno, Liubov Plyska","doi":"10.1109/PICST51311.2020.9468024","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468024","url":null,"abstract":"The article discusses mathematical models of investment strategies for cybersecurity systems. The purpose of the work is to analyze and compare existing models in the field of information technology and cybersecurity in order to increase the efficiency and optimize the procedures for evaluating projects and supporting decision-making related to investment. Data analysis is often used to improve efficiency and streamline project evaluation procedures and support decision-making related to investing. The optimal value of resources depends not only on the vulnerability of the system, but also on the cost of the information to be protected. However, studies are very often purely economic and do not take into account trends regarding the introduction of information technology in the control and decision-making procedures for investment projects, this fact determines the need to develop new models for decision support systems. This can be achieved by applying mathematical models of game theory, which are used to make decisions in the design of information protection systems.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Representation of Information Processing in Intelligent Surveillance Radar Systems 智能监视雷达系统中信息处理的形式化表示
V. Zhyrnov, S. Solonska, A. Basova
{"title":"Formal Representation of Information Processing in Intelligent Surveillance Radar Systems","authors":"V. Zhyrnov, S. Solonska, A. Basova","doi":"10.1109/PICST51311.2020.9467906","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467906","url":null,"abstract":"A model of process knowledge in the inter-period processing of signal information in the intelligent surveillance radar systems is proposed. The main features and structural elements of the process knowledge model are presented. It is shown that the advantage of this model deals with the configuration and hierarchical representation of the process for studying the possible structures of single pulse signals or groups of signals within the same radar surveillance based on intelligent signal analysis using the algebra of finite predicates. It is shown how this approach can be used to automate the process of detecting and recognizing the pulsed signals structure from aerial objects such as aircraft, helicopters, UAVs, and extended stationary objects such as clouds, atmospheric inhomogeneities (angel-echoes).","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visually-Interactive Systems: Structural Optimization of Software Development 可视化交互系统:软件开发的结构优化
V. Akhundov, G. Kondratenko, I. Sidenko, Y. Kondratenko
{"title":"Visually-Interactive Systems: Structural Optimization of Software Development","authors":"V. Akhundov, G. Kondratenko, I. Sidenko, Y. Kondratenko","doi":"10.1109/PICST51311.2020.9467923","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467923","url":null,"abstract":"Visually-interactive systems development is a complex process that has the software architecture at the core. Software architecture research is trying to determine the best ways to split the system into parts, define these parts’ interaction with each other, transfer information between them, decide how these parts evolve individually, etc. The construction of the system architecture is done by defining the goals of the system, its input and output data, decomposition of the system into subsystems, components or modules, and development of its overall structure. The work aims to consider existing architectural approaches to creating visually-interactive systems, taking into account their specifications, including ways to represent game objects, work with graphical resources, optimize memory usage, rendering of textures, and 3D-models, work with artificial intelligence (AI) characters and others. Each approach will identify conditions of use, advantages and disadvantages, techniques that are organically combined with them. The work presents the results of optimizing structures of software systems based on classical approaches, analyzing the feasibility of their use in cases where the features of the visually-interactive component of these applications should be considered. The discussed approaches can be applied to most modern mobile games.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reception of OFDM Signals with Convolutional Coding in Channels with Dispersion and Fast Fading 基于卷积编码的OFDM信号在色散快速衰落信道中的接收
V. Kartashevskiy, O. Konyaeva, Alexandr Filimonov
{"title":"Reception of OFDM Signals with Convolutional Coding in Channels with Dispersion and Fast Fading","authors":"V. Kartashevskiy, O. Konyaeva, Alexandr Filimonov","doi":"10.1109/PICST51311.2020.9467943","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467943","url":null,"abstract":"The paper discusses the problem of coherent reception of signals with orthogonal frequency multiplexing (OFDM) in a channel with memory using convolutional coding. For a comparative analysis of the effectiveness of the reception “a whole” with element-wise decision (RWED) with a convolutional code, two different channels are modeled in the OFDM system – a channel with constant parameters and a fast fading channel. The analysis is carried out with different modulations - QPSK modulation and QAM modulation. The use of the algorithm of RWED makes it possible to abandon the use of prefixes and postfixes in the structure of the OFDM symbol, which leads to an increase in throughput.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信