{"title":"2D Amplitude-Only Microwave Tomography Algorithm for Breast-Cancer Detection","authors":"S. Costanzo, G. Lopez","doi":"10.1109/AICT50176.2020.9368748","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368748","url":null,"abstract":"A preliminary assessment for the development of a two-dimensional amplitude-only tomography approach is described in this work. An iterative inversion strategy is adopted, which is based on the contrast source scheme, but avoiding any intermediate phase retrieval stage. The presented method does not consider a priori information on the nature of the scatterer, while all the measured data are exploited within the starting guess. Some validation reconstructions are proposed in the field of breast imaging, by considering a simulated breast model with a malignant portion as test case. The proposed phaseless tomography scheme reveals the potential extension to biomedical applications, supporting the current cutting-edge bio-imaging techniques.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Andrei, Bergaliyev Marlen, Tinyakov Sergey, K. Krinkin
{"title":"Industrial Messaging Middleware: Standards and Performance Evaluation","authors":"G. Andrei, Bergaliyev Marlen, Tinyakov Sergey, K. Krinkin","doi":"10.1109/AICT50176.2020.9368846","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368846","url":null,"abstract":"In our world due to rapid development of automotive systems, robotic systems and increasing amounts of data the question is what are the requirements for data transfer software or middleware. This document describes and compares main standards that are used in various systems of the industry. The analysis of opportunities which every standard provides is carried out. In this work, there were developed methods for testing some data transfer characteristics and tested two DDS implementations and one AMQP in inter-process communication.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Dynamic Algorithm for Petri Nets Slicing","authors":"Albana Roci, R. Davidrajuh","doi":"10.1109/AICT50176.2020.9368613","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368613","url":null,"abstract":"Petri Nets are a mathematical and graphical tool that is used to model and analyze discrete event systems. The integration of different concurrent processes leads to more complex Petri Nets models. Verifying these models is a nontrivial challenge, as the huge models result in huge state space. Therefore, slicing algorithms are used to reduce the size of the models. These algorithms aim to extract parts from the model that affect the slicing criteria. In this paper, a new slicing algorithm is proposed, which aims to minimize the size of the model while preserving the behaviors of the system. The retained slice is formed by extracting the backward executions starting from the slicing criteria. Simultaneously, it generates all possible lower boundaries of the initial marking that can influence the places of slicing criteria. The paper also presents a case study. The case study compares the performance of the proposed algorithm against some of the existing dynamic Petri Nets slicing algorithms.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anna E. Stepanova, Kseniya V. Tcyguleva, D. Silnov
{"title":"Application of modern messengers for automation of business processes based on 1C: Enterprise","authors":"Anna E. Stepanova, Kseniya V. Tcyguleva, D. Silnov","doi":"10.1109/AICT50176.2020.9368729","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368729","url":null,"abstract":"In this paper, the problem of automation of various business processes in the field of financial services is considered. The main content of the research: a way to integrate messengers in the processes of interaction between the client and the company. The paper considers the possibility of merging two systems: configuration of 1C: Enterprise and the Telegram messenger - for providing financial services in remote mode. Also, an important part of the research is the implementation of differentiation of user roles when accessing the bot.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116096602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital technologies in the formation the students’ supra professional competencies","authors":"A. Pesha, M. Shavrovskaya","doi":"10.1109/AICT50176.2020.9368868","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368868","url":null,"abstract":"This paper presents the results of a study on the use of digital technologies for the development of university students’ supra-professional competencies. The authors present the modern transformations of the didactic tetrahedron and the influence of digital technologies on the organization and results of the educational process at universities. The key problems of the large-scale implementation of ICT in teaching are identified. As a result of analysis of previous studies, the authors give a correlation of the use of ICT for the development and assessment of students' supra-professional competencies. An online survey of 88 university teachers from 10 regions of Russia showed the relevance and importance of using digital technology in shaping the future of a competitive and comprehensively developed specialist. At the same time, a number of difficulties were identified that impeded the use of ICT in the implementation of academic disciplines at the university. The authors conclude that it is necessary to reduce the technological gap between the development of technologies and their implementation in the educational process, including to increase the efficiency of the development of students' supra-professional competencies.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122191416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sensor-Actor Coordination protocol for Variable Rate Irrigation","authors":"Sapna, A. Trivedi, Kiran Kumar Pattanaik","doi":"10.1109/AICT50176.2020.9368742","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368742","url":null,"abstract":"In mobile automated Wireless Sensor and Actuator Network (WSAN), resource rich actors are responsible for data collection, decision making, and implementing control actions. Information collection from entire event region is the prerequisite for generation of control actions. However, random stopping locations and predefined time for data collection at stop point(s) can result in partial information collection of a region that in turn hampers the decision. In existing research works stopping time and location are either predefined or random that can be crucial to decision making process for the event region. To this end, this paper proposes an energy efficient sensor-actor coordination mechanism that ensures data collection from event region taking decision making aspects into account. Proposed algorithm takes challenges of Variable Rate Irrigation (VRI) under consideration. It calculates event region dependent stop locations and time for mobile actors that ensures data collection from entire event region.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Developing a Framework for Modeling Cross-Layer Optimization Tasks for Mobile Communications","authors":"Usmanova N., Qodirov A.","doi":"10.1109/AICT50176.2020.9368655","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368655","url":null,"abstract":"Based on the layered organization of the functional architecture of communication systems, the necessity of using the statements of cross-layer design and optimization is provided, which, in comparing with the interconnection model of open systems, is a concept of cross-layer communication, the main idea of which is to maintain the functionality associated with the initial levels, but, taking into account intersections of various levels, ensure coordination, interaction and joint optimization of protocols. The Framework taking into account the multi-agent representation and utility function is proposed for modeling the tasks of cross-layer optimization for wireless communications.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Zaynalov, O. Mavlonov, A. Muhamadiev, Qilichev Dusmurod, I. Rahmatullaev
{"title":"UNICODE For Hiding Information In A Text Document","authors":"N. Zaynalov, O. Mavlonov, A. Muhamadiev, Qilichev Dusmurod, I. Rahmatullaev","doi":"10.1109/AICT50176.2020.9368819","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368819","url":null,"abstract":"Steganography is a unique approach for developing tools and methods to hide the fact of transmitting a secret message. The first traces of steganographic methods are lost in ancient times. From detective works, various methods of secret writing between the lines of ordinary text are well known: from milk to complex chemical reagents with subsequent processing. Digital steganography is based on hiding or embedding additional information in digital objects, while causing some distortion of these objects. In this case, text, images, audio, video, network packets, and so on can be used as objects or containers. To embed a secret message, steganographic methods rely on redundant container information or properties that the human perception system cannot distinguish. Recently, there has been a lot of research in the field of hiding information in a text container, since text documents are used in many organizations. Based on this, here the MS Word document is considered as a data carrier, which has various parameters, changing these parameters can achieve data integration. In the same article, we present steganography using invisible Unicode characters of the Space type, but with different encoding. A combined approach for encoding Latin characters is proposed for the effectiveness of the method.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132063757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 3x+1 Problem For Rational Numbers : Invariance of Periodic Sequences in 3x+1 Problem","authors":"Y. Aliyev","doi":"10.1109/aict50176.2020.9368585","DOIUrl":"https://doi.org/10.1109/aict50176.2020.9368585","url":null,"abstract":"In the paper, we discuss a generalization of 3x+1 Problem sometimes called Collatz’ (Syracuse) Conjecture. For a given initial rational number, each next number is obtained by dividing the previous integer by 2 (T operation), or multiplying it by 3, adding 1 and then dividing by 2 (S operation), or multiplying by 3, adding 2 and then dividing by 2 (V operation), or finally, just multiplying by 3, and then dividing by 2 (W operation). The presence of the last operation W makes the problem different from what was studied in the previous papers of the author. If a sequence consisted of T, S, V and W operations is given then one can ask whether there is an initial rational number xo for which the application of these operations in the given order will return at the end of this procedure the starting number X0. We will also study how this rational number changes when the order of operations changes. We proved that there is an invariant which is not dependent on the order of operations. In contrast to previous papers, we developed some terminology and notations, and now the results are stated and proved in a reader friendly way. The proofs are also considerably simplified.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Belkin, D. Fofanov, Boris A. Kartyshev, A. Sigov
{"title":"Studying Optimal Configuration of Microwave-Photonics Long-Term Time Delay Circuit Based on Fiber-Optics Recirculating Loop","authors":"M. Belkin, D. Fofanov, Boris A. Kartyshev, A. Sigov","doi":"10.1109/AICT50176.2020.9368782","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368782","url":null,"abstract":"An updated approach to configure a microwave-photonics-based long-term radio-frequency memory using recirculating delay line structure is proposed and discussed. As clear validated by the results of modeling and experimental research, the proposed circuit in comparison with the known approaches is provided the trade-off between output power drop and noise rise with increasing number of re-circulations. Specifically, more than 5-fold shorter delay step, better transmission gain flatness of super-wide bandwidth radio-frequency signal, smaller dimensions mainly due to multicore fiber application, and lower power consumption using less number of needed optical amplifiers are demonstrated.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}