O. Gofaizen, O. Osharovska, S. Kiiko, M. Patlayenko, V. Pyliavskyi, V. Solodka
{"title":"Potentially Achievable Image Definition in Video Applications","authors":"O. Gofaizen, O. Osharovska, S. Kiiko, M. Patlayenko, V. Pyliavskyi, V. Solodka","doi":"10.1109/PICST51311.2020.9467907","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467907","url":null,"abstract":"The paper gives an estimate of the potentially achievable level of definition for light-to-light video transmission path, which can be considered as ideal, i.e. such that a decrease in definition in it occurs only due to the diffraction limitations of the camera lens and the finite dimensions of the transforming elements of the camera matrix sensor and of the reproducing display without additional image processing. The assessment is based on the parameters of the spatial modulation transfer function (MTF) and the integral criterion of definition, estimated as the relative volume under the two-dimensional MTF. The authors proceeded from the fact that when describing the characteristics of digital video systems, the fundamental is the choice of the spatial sampling frequency, which is determined by the number of cycles of brightness variation per a given interval; the sampling rate, calculated for video applications by the number of half-cycles of brightness variation, is twice as high. Thus, the spatial sampling frequency of the image horizontally and vertically is equal to twice the number of active lines per frame height, and the spatial Nyquist frequency is correspondingly equal to the number of active lines. These considerations form the basis of the estimates made in the work, as well as the principle of development the proposed algorithm for MTF correction. For examples of combinations of lens parameters and geometric dimensions of matrix sensors of television, multimedia and other cameras, an assessment of the non-uniformity of the ideal camera MTF for SDTV, HDTV, UHDTV 4K and UHDTV 8K systems within the Nyquist frequency band is given. Examples of MTF of end-to-end paths for SDTV, HDTV, UHDTV 4K and UNDTV 8K systems for the specified parameters of the lens and camera sensor, taking into account the distortions introduced by the reproducing display, are presented. It is shown that for considered examples, integral criterion of definition can vary thereabout within 0.75–0.3.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131378690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Inference Considering Data Aging in Smart Rules Engine","authors":"A. Kargin, T. Petrenko","doi":"10.1109/PICST51311.2020.9468100","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468100","url":null,"abstract":"When developing the Internet of Things and Smart Systems, framework based on pattern technology are used. The Rules Engine (RE) pattern implements the functionality of the system under development. A new model Smart RE (SRE) with a two-stage data processing is discussed. The Abstracting Engine (AE) on a first processing stage, are integrated with RE which implements traditional Fuzzy Logic System (FLS) on second stage. The AE maps the data from sensors into facts (words) that reveal the meaning of the data. The fact model takes into account various types of uncertainty, including those associated with data aging over time. The Certainty Factor (CF) as a numerical characteristic of a fact is an input variable of a fuzzy inference mechanism at the second stage of data processing in RE. This article discusses the requirements for the knowledge representation (rules and facts) and the features of the RE operating (fuzzy logic inference), allow using the quantitative estimates of data aging effect in FLS. Three FLS encapsulation options as RE in SRE on an example of application of a Smart Traffic Light system are considered.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Khlaponin, V. Vyshniakov, Mykhailo P. Prygara, V. Poltorak
{"title":"The New Concept of Guaranteeing Confidence in the E-Voting System","authors":"Y. Khlaponin, V. Vyshniakov, Mykhailo P. Prygara, V. Poltorak","doi":"10.1109/PICST51311.2020.9468012","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468012","url":null,"abstract":"There is no doubt about the urgency of ensuring trust in e-voting systems since elections without trust cannot be acceptable in a democratic society. To solve this problem, it was proposed to use blockchain technology, however, in voting systems this leads to significant delays in the execution of transactions, and the software solution is accessible only to a narrow circle of specialists, which clearly does not help to show confidence on the part of voters. This paper proposes a different approach, which is based on the widely available verification of all means and processes that may cause distrust in the accuracy of the vote count or in ensuring their confidentiality. We offer a solution to the problem of transparency of all hardware and software that cause distrust. Voting systems that use this approach are implemented in three leading Ukrainian universities for student elections to self-government bodies. The conceptual model of the e-voting system for state elections on the example of Ukraine is presented. Links to Internet resources are provided where you can not only get acquainted with the principles of building the system, but also conduct an experimental vote in Ukrainian, English or Russian. You can also copy and test e-voting server software on your computers.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132204514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Immunity Estimation of Abandoned Object Detection Video System to Environmental Impact","authors":"V. Baliar, O. Mazurkiewicz, Artem Hryshchenko","doi":"10.1109/PICST51311.2020.9467956","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467956","url":null,"abstract":"This article is devoted to the analysis both the environmental condition influences and different live scenarios of scene on the algorithm robustness of typical video surveillance camera which implement the abandoned object detection feature. Present study judge algorithm robustness, which also can be related to system immunity, as a percentage of correctly detected events over all implemented events. The study was carried out with the use of typical IP camera and doubled with the same studies by simulated MATLAB model of such a system to compare the immunity of real IP camera accuracy over math model. The obtained results can be used during the technical maintenance and service implementations for IP video tracking, as well as during further research aimed at increasing the robustness of such a systems.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Saiko, S. Toliupa, Volodymyr Nakonechnyi, M. Brailovskyi
{"title":"Models of Improving the Efficiency of Radio Communication Systems Using the Terrahert Range","authors":"V. Saiko, S. Toliupa, Volodymyr Nakonechnyi, M. Brailovskyi","doi":"10.1109/PICST51311.2020.9468022","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468022","url":null,"abstract":"The work is devoted to research in the direction of creating multi-position systems based on low-power transceivers for the construction of inter-satellite communication channels of the terahertz range of low-orbit satellite systems with a “distributed satellite” architecture. Comprehensive studies of the possibilities of creating communication channels of the terahertz range for communication systems based on high-altitude air platforms are being carried out. Models for improving the efficiency of terahertz radio communication systems are proposed: an improved algorithm for searching for multibeam signals in radio systems based on high-altitude THz band airplanes and a simulation model for predicting the maximum length of the terahertz range wireless communication system U-IR-based. The use of X-ray diffraction in an advanced algorithm has simplified the implementation of multi-beam signal processing and significantly reduced the computational processing resource. The model on the basis of machine learning allows in laboratory conditions to investigate experimentally various architectures of construction of devices and systems of generation 5G/IoT and to work out knots of formation and processing of information signals and to define their best characteristics.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129393985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sheketa, V. Pikh, Roman Vovk, M. Pasyeka, Y. Romanyshyn, Olga Khrabatyn
{"title":"Structuring Problem Cases Based on Constraints in the Drilling Control Infocommunications Routines","authors":"V. Sheketa, V. Pikh, Roman Vovk, M. Pasyeka, Y. Romanyshyn, Olga Khrabatyn","doi":"10.1109/PICST51311.2020.9468074","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468074","url":null,"abstract":"Analysis of the research subject domain, as well as means to support technological decision-making, shows that geological and technological uncertainties affect the ability of the drilling process operator to achieve technical and economic goals when drilling oil and gas wells. In particular, this study develops an integrated intelligent hierarchical decision-making strategy for drilling, which allows optimizing the task of operational efficiency of drilling in real time, by forecasting and avoiding emergencies. The advantage of the proposed approach is that it allows the use of large amounts of actual data obtained from sensors or data mining systems at the level of direct regulation and their aggregate analysis based on constraints control. Technological operations of the drilling process should be considered as processes that can be designed for some hierarchy. Defining the hierarchical organization of the process allows a way to build a solution that can lead to results that are higher than the set of optimal solutions built for individual unstructured elements of the process. Therefore, an important solution to these problems is to create intelligent decision support systems in the drilling process, which include multi-layered and scalable strategies based on constraints. The use of such strategies allows to optimize the overall efficiency of drilling and development of wells with a given productivity. The structure of the problem will be to achieve common integrated goals, which is not the arithmetic sum of selected problems for which there are solutions.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficiency of the D2D Direct Connection System in 5G Networks","authors":"A. Bulashenko, S. Piltyay, I. Demchenko","doi":"10.1109/PICST51311.2020.9468035","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468035","url":null,"abstract":"This paper is dedicated to the analysis of energy efficiency of the D2D direct connection system in 5G networks. Fast development of 5G networks results in large increase of volumes of the data transmitted by the users. On one hand, the reduction of coverage areas of small cells and increase of their number in places with high load level enhance the capacity and quality of the whole system. On the other hand, increase of density of the network coverage leads to greater complexity of the system. As a result, one requires alternative approaches to improve the communication quality. In the research we suggest to apply direct connection technologies for the improvement of performance of 5G systems. The paper presents the results of numerical experiments and analysis of the dependences of number of users, of the probability of blocking and of the energy consumption on the input intensity of sessions of D2D systems. These results demonstrate improved performance of the 5G network with D2D direct connection compared to LTE systems. Therefore, the application of D2D technology allows to increase the data transfer rates and to improve energy efficiency of 5G networks.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Makoveyenko, O. Osharovska, S. Siden, V. Pyliavskyi
{"title":"The Effect of Interference Evaluation Between LTE Mobile Stations and McWill Technology","authors":"D. Makoveyenko, O. Osharovska, S. Siden, V. Pyliavskyi","doi":"10.1109/PICST51311.2020.9468080","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468080","url":null,"abstract":"In this article the radius of cell for the Multi-Carrier Wireless Information Local Loop (McWill) system in the downlink channel has been defined. To evaluate the interference between the LTE system and McWill in the adjacent frequency channel, it is necessary to take into account the formation of frequency channels for both systems. Frequencies of the carriers for the uplink and downlink are defined with the help of the LTE (E-UTRA) absolute radio frequency channel (EARFCN) in the range 0 – 262143 Hz. A probabilistic estimation of the McWill’s continuous operation for the several channels using the Monte-Carlo model of the uniform distribution of the IMT mobile stations has been performed. The results of a decrease in the spectral efficiency of the McWill system downlink due to interference from LTE mobile stations are presented. It should be noted that for the 5 MHz operation mode probability’s degradation is less rapid. The obtained results indicate that it should be used carriers started from the index 3 for McWill bandwidth for 1 MHz operation mode in the downlink channel. For 5 MHz operation, mode carrier's index limitation is absent.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Management Models in Operative Planning at an Industrial Enterprise","authors":"V. Zaruba, Iryna Parfentenko","doi":"10.1109/PICST51311.2020.9467954","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467954","url":null,"abstract":"The subject of the study was the situation of operational planning of production of an industrial company in the face of random fluctuations in the current demand for its products. It is shown that in this situation there are loss risks that depend on the decisions made during operational planning. A model of the planning situation is developed for the case when the volume of orders for products for one period of time is described by a random variable with stationary statistical characteristics. The effectiveness of decisions made was estimated by the average economic effect per unit of time over an infinite time interval. The planning situation model was used to conduct a comparative analysis of the effectiveness of various operational planning policies.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concept of Intelligent Detection of DDoS Attacks in SDN Networks Using Machine Learning","authors":"M. Klymash, O. Shpur, Nazar Peleh, O. Maksysko","doi":"10.1109/PICST51311.2020.9467963","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467963","url":null,"abstract":"In this paperwe propose the concept of intelligent detection of DDoS attacks in SDN networks by log analyzing. Due to SDN management and implementation of the self-learning element, we propose to teach the SDN controller to detect attacks using information about the state of the flow, the duration of the session and its source, using information from logs and flow tables. To do this, it is necessary to divide the total traffic flow into anomalous and normal. Realizing which client requests are the result of DDoS-attack, one can create the appropriate rules for their blocking. We propose to do this by determining the metrics of traffic behavior using the Kulbak-Leibler approach to detect flow anomalies over the session time. In our case, we will compare the average session time with time to access the server from specific IP addresses. The obtained values will be recorded in the Machine Learning database. If the result of the comparison did not bring results, the duration of access to the service during the last seven days is compared. Similarly, the value of KL is determined and written to the ML database. KL accumulation values in a ML will identify anomalies in the flow admission requests by analyzing the length of service and access to prescribe rules of Controller. As a result of using machine learning, the SDN controller will block IP domains from which DDoS attacks are just starting","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}