E. Lavrov, O. Siryk, N. Pasko, P. Paderno, E. Burkov
{"title":"Reliability of Human-Machine Interaction in Distributed Information Environments. Models for Morphological Analysis and Optimization of Group Activities","authors":"E. Lavrov, O. Siryk, N. Pasko, P. Paderno, E. Burkov","doi":"10.1109/PICST51311.2020.9468043","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468043","url":null,"abstract":"The problem of the reliable design of polyergic information systems is under consideration. A model for the optimal formation of a group of operators selected to implement a certain application that enters the system has been built. The model is recommended for solving dispatch problems in distributed information systems.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Kostenko, V. Vasylyshyn, V. Slobodyanuk, V. Lebedev, S. Makarov
{"title":"Design of Pseudorandom Discrete Signals with Power Angle Modulation and Investigation of Their Characteristics","authors":"P. Kostenko, V. Vasylyshyn, V. Slobodyanuk, V. Lebedev, S. Makarov","doi":"10.1109/PICST51311.2020.9467989","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467989","url":null,"abstract":"The approach for design of the discrete pseudorandom signals with power-law angular modulation and time function with non-linear scale in respect of real time is considered. The analysis of the ambiguity function of the constructed signals is performed in the paper, analysis shows that constructed signals with power-law angular modulation have better resolution by time and frequency then simple signals. Analysis of the security of new constructed signals also given in the paper. In the paper under the security means the ability of signal to be like white noise (independent and identically-distributed (IID) security). It is shown that by control of the signal parameters the resolution and security of signals can be changed.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Loshakov, M. Moskalets, Oleksandr Martynchuk, Drif Abdenour, D. Ageyev, Kostiantyn Sielivanov, Al-Vandavi Saif Ahmed Iskandar Ismael, Oksana Martynchuk
{"title":"Use of Adaptive Polarization Processing of Signals in Perspective Mobile Communication Systems","authors":"V. Loshakov, M. Moskalets, Oleksandr Martynchuk, Drif Abdenour, D. Ageyev, Kostiantyn Sielivanov, Al-Vandavi Saif Ahmed Iskandar Ismael, Oksana Martynchuk","doi":"10.1109/PICST51311.2020.9468038","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468038","url":null,"abstract":"In the work, modeling of spatial-polarization signal processing is carried out, which confirmed the high efficiency of its use in new generation mobile communication systems on the basis of adaptive antenna arrays with the pilot signal adaptation algorithm. The possibility of forming the maximum of the radiation pattern in the direction of the useful signal and adaptive noise interference has been confirmed. The adaptation coefficient was chosen sufficiently small to ensure the stable operation of the adaptation algorithm, which works best in severe interference when its level is close to that of the useful signal.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Decision-Making Algorithm for Expert System in Information Security","authors":"Natalya Kireeva, I. Pozdnyak, N. Filippov","doi":"10.1109/PICST51311.2020.9467899","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467899","url":null,"abstract":"In today’s world, expert systems are used to solve various problems, including auditing the information security of an automated system. The article proposes one of the options for the decision-making algorithm of an expert system with the aim of assessing information security, which allows you to effectively counter modern cyber threats aimed at critical information objects of industrial systems and digital industries. Each step of the presented algorithm is described in detail, a methodology for assessing risks for the enterprise based on the results of its work is given. In addition, the paper presents the peculiar properties of the results of a comprehensive assessment of information security.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130370433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Batch Processing: Modelling and Applications","authors":"O. Pichugina, N. Muravyova","doi":"10.1109/PICST51311.2020.9467928","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467928","url":null,"abstract":"Two important problems in infocommunication of scheduling batch processing are investigated having discrete-continuous character. A number of mathematical models of these problems were built including mixed discrete, permutation-based and Boolean ones. It is justified that the models enable applying several optimization techniques taking into account investigated geometric and extreme features of feasible domains.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"99 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Comparative Analysis of the Dual Pair of the E2/M/1 and M/E2/1 Systems","authors":"V. Tarasov","doi":"10.1109/PICST51311.2020.9468052","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468052","url":null,"abstract":"Queueing theory is widely used in many branches of science and technology: in modeling active network equipment in telecommunications, to assess performance indicators of computer networks, to model traffic flows, in logistics problems, and much more. An alternative section of mathematical modelling - simulation modelling is also based on modelling the operation of queuing systems. In turn, in the theory of queueing, many results are obtained using the method of spectral expansion of the solution of the Lindley integral equation for a particular system. The paper proposes results on two dual queuing systems (QS) with general second-order Erlangian input distributions for which the author did not find information in the scientific literature. Thus, the paper presents spectral decompositions and formulas obtained on their basis for the main characteristic of the QS-average delay of incoming requests in the queue. The systems under consideration refer to systems of the G/M/1 and M/G/1 types, respectively. The obtained results of computational experiments indicate a significant difference between these systems and thus confirm the general theory of queueing. The adequacy of the obtained mathematical models is based on the correct use of the apparatus of the spectral decomposition method.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134346926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyryl Nikolchev, K. Herasymenko, O. Starkova, Mykola Yastrebov
{"title":"Development of Recommendations for the Implementation of Integrated Security in the Corporate Network at the OSI Data Link Layer","authors":"Kyryl Nikolchev, K. Herasymenko, O. Starkova, Mykola Yastrebov","doi":"10.1109/PICST51311.2020.9468014","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468014","url":null,"abstract":"Layer 2 is considered to be the weakest link in OSI model because LANs traditionally were under the administrative control of a single organization where all persons and devices were trusted. Today, with the newest attacks, LANs became more vulnerable to penetration. OSI Layer 2 solutions are not effective unless the management protocols are secured. This article analyses vulnerabilities at the Data Link Layer and describes ways to secure management protocols.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132037912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Industrial Wastewater Treatment from Ferromagnetic Impurities and Computer Modeling of the Impact of a Flow Velocity","authors":"Andrii Safonyk, O. Prysiazhniuk, I. Targoniy","doi":"10.1109/PICST51311.2020.9467946","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467946","url":null,"abstract":"The process of treatment of industrial water by the magnetic method has been considered in the work. An installation for complex iron removal that allows using a number of parameters to control the process has been developed. The structural scheme of relationships of parameters of the process has been received on the basis of the conducted researches, and further, it has been described by dependence. A conducted computer experiment showed that the process of iron removal from industrial water is not significantly affected by the flow velocity of the fluid.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127838602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of the Transport Channel With Polar Codes for the 5G Mobile Communication","authors":"J. Boiko, I. Pyatin, O. Eromenko","doi":"10.1109/PICST51311.2020.9468013","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468013","url":null,"abstract":"This paper discusses the polar code is applied to the downlink control information and uplink control information to enhanced mobile broadband, as well as to broadcast channel. Channel coding contains a set of procedures for error detection, error correction, rate matching, bit interleaving and mapping of information to physical control channels or transport layer. The downlink control information model with polar coding and modulation types provided by the standard (QPSK, 16-QAM, 64-QAM, 256-QAM) for the transmission channel with additive white Gaussian noise is investigated in the article. This model presents the results of bit error rate for coding scheme with different code rates. The structural scheme of the decision model on the modulation mode of the digital communication system is analyzed in the paper. Dependencies of bit error rate on the effective rate of the polar code with different types of modulation are explored. The modulation mode selection algorithm for code rate R=0.5 is developed on the basis of the obtained dependencies.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128916191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parametric Synthesis of 3D Structure of SRR Element of the Metamaterial","authors":"I. Sliusar, V. Slyusar, Y. Utkin, O. Kopishynska","doi":"10.1109/PICST51311.2020.9468067","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468067","url":null,"abstract":"Variants of split ring resonators (SRR) models are proposed. They are considered as unit cells of DNG metamaterials. The synthesized SRR variants are based on the implementation of 3D geometry. Efficiency assessment is carried out on the base of determination of the relative bandwidth $delta$ fDNG, in which the DNG properties are observed. Since metamaterials are complex composite structures, instead of analytical calculations, the Finite Element Method (FEM) is used to estimate the electromagnetic properties of SRR. The adequacy of the proposed SRR model is confirmed by the coincidence of the obtained results in the particular case with the corresponding estimates of the base model. At the same time, the influence of the geometric parameters of the SRR components (orientation and size of the conductor; axial rotation of the rings, subtract material) on the effectiveness of the decisions was investigated. The use of 3Dbased constituent elements in SRRs allowed us to achieve a 10 times increase in $delta$fDNG compared to the base prototype.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}