A. Serkov, V. Tkachenko, Vyacheslav Kharchenko, V. Pevnev, Karyna Trubchaninova
{"title":"A Method to Enhance the Bandwidth and Noise Immunity of IIoT When Exposed to Natural and Intentional Electromagnetic Interference","authors":"A. Serkov, V. Tkachenko, Vyacheslav Kharchenko, V. Pevnev, Karyna Trubchaninova","doi":"10.1109/PICST51311.2020.9467929","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467929","url":null,"abstract":"The rapidly developing ultra-wideband (UWB) radio technology is very promising for use in infocommunication systems and networks, in particular in wireless, personal (WPAN) and local (WLAN) IoT / IIoT (Internet of Things / Industrial Internet of Things) networks, including and in wearable networks (Wireless Body Area Network, WBAN) for IoMT (Internet of Medical Things). Ensuring high reliability, increasing noise immunity and the degree of information protection from interception in IIoT is due to the use of UWS technology based on ultrashort pulses with a duration of the order of units and fractions of a nanosecond, time pulse modulation and flickering polarization of the emitted signal. The use of UWS technology in a wireless IIoT network provides a number of advantages that cannot be achieved with existing methods. UWS technologies make it possible to provide high speed data transmission, low power consumption of communication facilities, solution of the problem of determining the location of objects with an accuracy of several centimeters, high penetrating power of the radio signal, an almost unlimited number of communication channels and low cost of communication facilities. The aim of the work is to ensure high reliability, noise immunity and the degree of information protection against interception in IIoT critical in speed, reliability and safety under the influence of natural and deliberate electromagnetic interference. The results obtained and the directions for further research are discussed in the conclusions.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117232305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/picst51311.2020.9467994","DOIUrl":"https://doi.org/10.1109/picst51311.2020.9467994","url":null,"abstract":"","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Krasnobayev, A. Kuznetsov, A. Yanko, T. Kuznetsova
{"title":"Solving the Shortest Path Problem Using Integer Residual Arithmetic","authors":"V. Krasnobayev, A. Kuznetsov, A. Yanko, T. Kuznetsova","doi":"10.1109/PICST51311.2020.9467947","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467947","url":null,"abstract":"The report considers solution to the problem of routing, the essence of which is to determine the shortest path length between any pair of computer network subscribers represented as an undirected graph, as one of the possible methods to increase the speed and performance of computer systems (CS). To carry out calculations and comparative analysis of the speed and productivity of CS in a positional binary number system (PNS) and in a non-positional number system in residual classes (residual number system-RNS), we consider one practical problem. Task is the routing problem, the essence of which is to determine the shortest path length, that is, to find the optimal data transmission route in the computer network.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129449827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized 5G mmWave Propagation Model in an Urban Macro Environment","authors":"D. Makoveyenko, S. Siden, V. Pyliavskyi","doi":"10.1109/PICST51311.2020.9468030","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468030","url":null,"abstract":"This paper is presented of overview of the main features of existed mmWave propagation models for 5G wireless networks. The main factors affecting the level of losses of millimeter waves are considered (penetration losses, attenuation due to rain and atmospheric gasses). Based on this analysis, generalized propagation model, which makes it possible to more comprehensive take into account all the factors affecting the resulting signal level of mmWave is proposed. Obtained quantitative estimates of radio wave propagation losses on the example of urban macro scenario. The simulation results show that for mmWave it is necessary to take into account additional propagation losses in addition to the path losses. The using of this model can greatly improve the planning accuracy of the wireless network.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Afanasiev, Yrii Afanasiev, Oleksii Sitkov, V. Chystov, Vitalii Surhai, Serhii Fediuk
{"title":"Research of Access Control System Using Wireless Sensor Network","authors":"V. Afanasiev, Yrii Afanasiev, Oleksii Sitkov, V. Chystov, Vitalii Surhai, Serhii Fediuk","doi":"10.1109/PICST51311.2020.9468102","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468102","url":null,"abstract":"The paper considers the problem of ensuring access control to objects using modern means and methods of telecommunications. Access control systems must ensure the specified throughput, possess the properties of autonomy, controllability, and functional stability. When implementing access control at dispersed facilities, access points are combined into a single network. The advent of electronic components with low power requirements has led to widespread adoption of the IoT concept in the field of safety and life support. The analysis of access control systems, authentication methods, technologies for wireless data transmission in telecommunication networks is carried out. A model is proposed for implementing multifactor authentication in an access control system using a sensor network. The hardware and software implementation of the system with the autonomy function was completed and tested.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132408497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bohdan Kovalskyi, Bohdana Havrysh, T. Holubnyk, L. Mayik, Myroslava Dubnevych
{"title":"Research of Color Gradation in Digital Publishing Systems","authors":"Bohdan Kovalskyi, Bohdana Havrysh, T. Holubnyk, L. Mayik, Myroslava Dubnevych","doi":"10.1109/PICST51311.2020.9468097","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468097","url":null,"abstract":"Digital printing technologies as a computer communication technology are considered. In digital online printing systems, a digital document is the so-called communication consultation with the ability to send digital data over communication channels. Modern publishing systems and technologies provide intensive development in the production of digital printing. The research and comparison of modern contactless technologies (NIP-Technologies): electrophotographic laser and inkjet technologies. An optimal solution has been found for creating our own printing production in the field of operational printing. Evaluation of the print quality was carried out using control scales. During the measurements, the whiteness of the paper was taken into account. The study was conducted using the densitometric method for assessing the quality of technology imprints of digital publishing systems. The dependences of the gradation curves of CMYK paints on the optical densities of proof prints of selected technologies are constructed and presented.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132894430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Influence of UDP Parameters on QoS in IP Network","authors":"O. Romanov, Volodymyr Mankivskyi, Ivan Saychenko","doi":"10.1109/PICST51311.2020.9467892","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467892","url":null,"abstract":"The paper analyzes the influence of the main parameters of the UDP protocol on the time of message transmission and the probability of packet loss as the main indicators of transmission quality. The study was performed on a test bench in a GNS3 network emulation environment. At the software level, server and client applications were implemented on virtual machines. This approach is used in private corporate networks to optimize network losses, while increasing the transfer rate. The impact of UDP settings for small private networks is described and the parameters that need to be changed to achieve higher data rates and reduce packet loss are identified. A network has also been built for future testing of the UDP. (Abstract).","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Pliushch, S. Toliupa, V. Vyshnivskyi, Anatolii Rybydajlo
{"title":"Studying of Initial Weight Vector Selection Impact on Transient Performance of Coherent Sidelobe Cancellation System with Gradient Adaptation Algorithm","authors":"O. Pliushch, S. Toliupa, V. Vyshnivskyi, Anatolii Rybydajlo","doi":"10.1109/PICST51311.2020.9467905","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467905","url":null,"abstract":"Coherent sidelobe canceller is considered as a special case of adaptive antenna arrays. Utilization of the steepest descent algorithm in such a system is studied. It is shown that eigenvectors of the auxiliary channels correlation matrix create two subspaces with so-called primed coordinates, which comprise the principal axes of the quadratic performance surface. The first subspace is formed by the eigenvectors corresponding to the singular eigenvalues, which equal channels’ internal noise power, while the second is created by those corresponding to the distinct eigenvalues. Dimension of the second subspace equals the number of the jamming sources. It is proven that, if the initial weight vector is chosen zero, the trajectory of the transient process totally belongs to the second subspace. In this case, transient performance is good. If, for whatever reason, initial weight vector finds itself in the first subspace, the transient performance can be compromised. Computer simulation of the adaptive coherent sidelobe canceller has shown that this transient performance degradation can be substantial. Still, it lessens greatly if the number of the auxiliary antennas is much higher than that of the jammers. As a measure to improve performance, it is proposed to set to zero the initial weight vector in the systems with the small number of the auxiliary channels any time interference environment changes.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Masking Interference on the Quality of Request Signal Detection in Aircraft Responders of the Identification Friend or Foe Systems","authors":"I. Obod, I. Svyd, O. Maltsev, S. Starokozhev","doi":"10.1109/PICST51311.2020.9467955","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467955","url":null,"abstract":"The principle of building a network of survey IFF systems, the principle of servicing request signals in an aircraft responder, as well as the presence of a significant number of information facilities operating in the frequency range of IFF systems predetermined the presence of significant flows of intra-system and intentional correlated and uncorrelated interference of significant intensity both in the request channel and response channel. The use of primitive time-domain and positional codes as request signals predetermined the low noise immunity of IFF systems when exposed to masking interference in the request channel due to the need to expand the receiver bandwidth significantly higher than the bandwidth of the request signals used. The paper evaluates the influence of masking interference on the quality of detection of request signals in aircraft responders. It is shown that the expansion of the bandwidth of the receiver of the aircraft responder leads to additional losses in the signal-to-noise ratio, as a consequence to a decrease in the noise immunity of the considered information systems.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Long Short-Term Memory Model Appliance for Generating Music Compositions","authors":"Maksym Shopynskyi, N. Golian, I. Afanasieva","doi":"10.1109/PICST51311.2020.9468088","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468088","url":null,"abstract":"This paper represents an approach to the music generation based on a recurrent neural network. The key goal is to create a model, that can learn different musical styles, and then generate new compositions based on previously explored content. The model declares a function with the ability to remember the temporal state and short pieces of data to use them for future predictions. The deep-learned neural network uses a one-to-many bi-axial LSTM model trained with the convolutional kernel to generate a polymorphic music piece. A deep reinforcement learning (DRL) approach was used to encourage research and increase the global consistency of music compositions being created. For quantitative and qualitative analysis, this approach works well when generating polyphonic music.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}