{"title":"Design & Analyses of a Novel Real Time Kurdish Sign Language for Kurdish Text and Sound Translation System","authors":"B. W. Salim, Subhi R. M. Zeebaree","doi":"10.1109/PICST51311.2020.9467920","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467920","url":null,"abstract":"The most used code for communication by deaf and dumb people is Sign Language, which involves several gestures where each has a particular meaning. Many researchers and commercial firms seek to help the lifestyle of science in various areas of life for deaf people. Except for necessary steps dealing with only ten integer numeric values or essential Kurdish alphabet representation, there is no adequate Kurdish sign language. This research aims to study and examine a new system to be developed based on the concepts of a system of sign language for Kurdish writings and spoken translation. The proposed approach deems to be acting to interpret signs for a better life for the deaf and the public. The framework proposed falls into three phases: video processing, creation of patterns, and discrimination, and translation of the text. This technique depends on a translator's structure trained in the Kurdish sign language, mainly in the standard Kurdish sign language, and the domain expert's signature gesture.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116626680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anton Sokoliuk, G. Kondratenko, I. Sidenko, Y. Kondratenko, Anatoly Khomchenko, I. Atamanyuk
{"title":"Machine Learning Algorithms for Binary Classification of Liver Disease","authors":"Anton Sokoliuk, G. Kondratenko, I. Sidenko, Y. Kondratenko, Anatoly Khomchenko, I. Atamanyuk","doi":"10.1109/PICST51311.2020.9468051","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468051","url":null,"abstract":"The number of patients with liver diseases has been continuously increasing because of excessive consumption of alcohol, inhale of harmful gases, intake of contaminated food, pickles, and drugs. Early diagnosis of liver problems will increase patients’ survival rates. Liver disease can be diagnosed by analyzing the levels of enzymes in the blood. Creating automatic classification tools may reduce the burden on doctors. To achieve this numerous classification algorithm (Decision Tree, Random Forest, SVM, Neural Net, Naive Bayes, and others) from different machine learning libraries (Scikit-learn, ML.Net, Keras) are tested against existing liver patients’ dataset, considering appropriate for each algorithm preliminary data processing. These algorithms evaluated based on three criteria: accuracy, sensitivity, specificity.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu. I. Lykov, Anastasia Paniotova, V. Shatalova, A. Lykova
{"title":"Energy Efficiency Comparison LPWANs: LoRaWAN vs Sigfox","authors":"Yu. I. Lykov, Anastasia Paniotova, V. Shatalova, A. Lykova","doi":"10.1109/PICST51311.2020.9468026","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468026","url":null,"abstract":"This article compares the energy efficiency of two radio technologies LoRaWAN and Sigfox for Internet of Things. The researched technologies are popular and quite close in terms of consumer parameters, so the user often faces the choice of which one to use for his use case. For this, a typical decision was made (use case), consisting of a sensor, MCU, and modem. Considering that, LoRaWAN originally has more advanced settings and flexible customizable parameters, within the framework of this investigation, the range of their changes was chosen as close as possible to Sigfox. In conclusion, a comparative analysis of the energy efficiency of these two technologies for various payloads and the number of messages per day was obtained, and recommendations were made for their optimization. The simulation results obtained are in good agreement with the experimental results obtained by other authors.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121977004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vedernikov, Helena Koshonko, L. Volianska-Savchuk, Maria Zelena, Natalia Bazaliyska, O. Chernushkina
{"title":"Assessment of Information and Communication Support of Production Systems in Conditions of Digital Transformation of National Economy","authors":"M. Vedernikov, Helena Koshonko, L. Volianska-Savchuk, Maria Zelena, Natalia Bazaliyska, O. Chernushkina","doi":"10.1109/PICST51311.2020.9468099","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468099","url":null,"abstract":"The article identifies the factors that affect the efficiency of information and communication technologies (ICT) in industrial enterprises. To this end, a study was conducted at four industrial enterprises, the results of which identified and substantiated 9 criteria that characterize the level of ICT use in industrial enterprises. The method of rank correlation and the method of expert evaluations were used to process the research results. According to the results of their use, the scientific assumption about the dependence of the level of ICT on the use of modern means of communication in the enterprise. It is hypothesized that the use of information and communication technologies in the process of economic activity of industrial enterprises is an effective means of achieving increased efficiency.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Globa, R. Novogrudskaya, Bohdan Zadoienko, O. Stryzhak
{"title":"Ontological Model for Scientific Institutions Information Representation","authors":"L. Globa, R. Novogrudskaya, Bohdan Zadoienko, O. Stryzhak","doi":"10.1109/PICST51311.2020.9467984","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467984","url":null,"abstract":"The paper presents an approach to ontological model development for representing information accumulated by scientific institutions. The ontology allows to structure and organize such in-formation for later use in the process of evaluating the performance of an institution. The general ontology is represented by a system of interconnected components, each allowing to de-scribe the relevant subprocess within both the activity of the institution itself and the process of its evaluation by external organizations and ministries. The elements of all the compo-nents of the ontology system are described. The practical devel-opment of the proposed ontological model was performed using the ontological solutions development platform TEDAOS.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Krasnobayev, A. Kuznetsov, A. Yanko, T. Kuznetsova
{"title":"The Procedure for Implementing the Operation of Multiplying Two Matrices Using the Residual Number System","authors":"V. Krasnobayev, A. Kuznetsov, A. Yanko, T. Kuznetsova","doi":"10.1109/PICST51311.2020.9468076","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468076","url":null,"abstract":"The report considers solution to the problem of improving the speed implementation of the operation of multiplying two square matrices of the same dimension. To carry out calculations and comparative analysis of the speed of the multiplication operation, we consider a computer system (CS) in the positional binary number system (PNS) and in the non-positional number system in the residual classes (the residual number system - RNS). A comparative analysis of the performance of the CS was carried out with the same characteristics of the computing system: equal lengths of bit grids, the same command systems, the same methods of addressing operands and instructions, the same clock speed of the processor, the equal number of program commands, etc. When calculating the speed of the matrix multiplication operation, the fastest data processing method in RNS was used, based on the tabular principle.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Lishchenko, H. Khudov, Volodymyr Hnyria, Andrii Lykianchykov, Ivan Kravchenko, Kristina Tahyan
{"title":"Processing of Non-Coherent Signals in a Multi-Radar System Based on Two-Coordinate Surveillance Radars","authors":"V. Lishchenko, H. Khudov, Volodymyr Hnyria, Andrii Lykianchykov, Ivan Kravchenko, Kristina Tahyan","doi":"10.1109/PICST51311.2020.9467910","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467910","url":null,"abstract":"The subject of study in the article is the development of a method for processing non-coherent signals in a multi-radar system based on two-coordinate radars. The aim is to increasing the efficiency of airspace radar reconnaissance by combining non-coherent signals in a multi-radar system from individual modules. Objectives: analysis of ways for improving the flight characteristics of air objects, analysis of the quality of detection of air objects with low radar cross section, development of a method for processing non-coherent signals in a multi-radar system of surveillance radars. The methods used are: methods of systems analysis, probability theory, mathematical statistics, mathematical apparatus of matrix theory, theory of statistical radio engineering, radar theory. The following results were obtained. A method for processing non-coherent signals in a multi-radar system based on existing radars has been developed. It was found that with non-coherent signal processing, the gain efficiency in the signal-to-noise ratio is 11 dB for a multi-radar system with four radars compared to stand-alone radar. Conclusions: the greatest efficiency for increasing the signal-to-noise ratio was shown by adding second radar. It is established that the optimal number of radars in the multi-radar system is not more than four. Further increase in the number of radars does not provide practical benefits and economic feasibility of creating a system.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115260778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Method of Hardware Security Problems Identification","authors":"M. Iavich, R. Bocu, G. Iashvili, S. Gnatyuk","doi":"10.1109/PICST51311.2020.9467966","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9467966","url":null,"abstract":"Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT devices are another potential target for the attackers. The goal of the paper is to offer the modern recognition system, which can identify the hardware-based vulnerabilities and provide users with corresponding recommendations. The system that is developed in the frame of our research has the ability to check the hardware of concrete classic, industrial, office or IoT devices. Based on the concrete scenario and information, the system will provide corresponding recommendations. The presented recognition system is a web-based application, which is available for free. Another goal of the work is to analyze the weaknesses of hardware-based devices and related software systems and to offer the necessary improvements.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Dronyuk, Iryna Moyseyenko, J. Kuck, Olena Gorina
{"title":"Theoretical and Applied Aspects of Bank Credit Risks Minimization","authors":"I. Dronyuk, Iryna Moyseyenko, J. Kuck, Olena Gorina","doi":"10.1109/PICST51311.2020.9468056","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468056","url":null,"abstract":"The article deals with the theoretical and applied bases of bank credit risks management. The credit risk minimization features are defined. Methodological support of the credit risk prevention system in JSC \"Kredobank\" is analyzed. It has been established that bank credit risk management efficiency depends on the combination of three factors: methodological bases of financial operations analysis, bank clients and risk minimization methods. The main practical result: methodological basis recommendations on the bank's credit risks assessment formation can be used as a tool for their minimization in the personnel-oriented risk management system.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oksana Mazurova, Oleksandr Samantsov, Oleksandr Topchii, Mariya Shirokopetleva
{"title":"A Study of Optimization Models for Creation of Artificial Intelligence for the Computer Game in the Tower Defense Genre","authors":"Oksana Mazurova, Oleksandr Samantsov, Oleksandr Topchii, Mariya Shirokopetleva","doi":"10.1109/PICST51311.2020.9468057","DOIUrl":"https://doi.org/10.1109/PICST51311.2020.9468057","url":null,"abstract":"The work is devoted to the study of optimization models of decision theory for the development of artificial intelligence to control the computer strategy in the game of the Tower Defense genre. Mathematical models of the optimization problem of assigning monsters to paths and the problem of assigning towers to map cells were designed. Multi-criteria convolutional model based on utility theory are proposed. Based on the conducted experiments, recommendations for the use of medium and advanced artificial intelligence in the game in this genre were made.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}