N. Bumanis, O. Komasilova, V. Komašilovs, A. Kviesis, A. Zacepins
{"title":"Application of Data Layering in Precision Beekeeping: The Concept","authors":"N. Bumanis, O. Komasilova, V. Komašilovs, A. Kviesis, A. Zacepins","doi":"10.1109/AICT50176.2020.9368733","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368733","url":null,"abstract":"The monitoring and predictions of various multi-level states of honeybee colonies are performed using emerging Internet of Things technologies and data processing methods. It is become common to use multiple sensors and devices providing multi-modal data to monitor a single activity. Modern data analysis and data processing procedures include a step of data fusion in order to provide more accurate input data. This, however, requires implementation of machine learning and large data sets, whereas gathering large data sets of real time and observation data is a common problem for small to medium size apiaries. This why there are no real implementation of data fusion method in precision beekeeping field. The aim of this paper was to introduce the concept of data layering, which aims to solve the global precision beekeeping problems without implementation of machine learning. The concept was demonstrated within the scope of foraging optimization problem using three data sets: flowering calendar data, rainfall precipitation data and bee activity data.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127602077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of different optical cable length values on GPON access network parameters","authors":"M. Abdujapparova, S. Sadchikova, D. Normatova","doi":"10.1109/AICT50176.2020.9368784","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368784","url":null,"abstract":"High speed applications require the access network modernization based on optical technologies. Automatic network planning is not finished on the access technology choice. Next step is calculation of special parameters of chosen technology applicable for exact access network. Fiber To Home (FTTH) architecture uses Passive Optical Network (PON) as a transport technology. This article is discussed how you can develop algorithms for Gigabit Passive Optical Network (GPON) technology planning on the basis on optical fiber length.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Assessment Using Delay from Backlog Bound Calculation","authors":"A. Baybulatov, V. Promyslov, Ivery Prangishvili","doi":"10.1109/AICT50176.2020.9368731","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368731","url":null,"abstract":"During the last decade, cybersecurity assessment has become a key issue among all security problems encountered in designing and managing complex systems. Today, for dealing with cybersecurity, many sophisticated models are available. Still, the classic CIA triad of confidentiality, integrity, and availability remains actual and useful. In this article, following the CIA model, we investigate cybersecurity of control systems. After some research, we make it clear that availability is the most critical property of cybersecurity in the operational technology context, and so can be used as an indicator of cybersecurity. Conducting a review of availability definitions, we elect a proper interpretation of availability with a delay as a measure for its evaluation. For calculations, we use a theory of deterministic queueing systems Network calculus, but in contrast to the common practice of delay calculation through the bounds of the arrival flow and service, we investigate another critical case where a delay can be estimated from the knowledge of the backlog bound and the framework of service curves. A problem for systems with a linear relationship between the minimum and maximum service curves and a special case of rate-latency service curves are examined.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Simulation Model of Fetal Activity Signal Source","authors":"Yulia Bobrova, Olga N. Kapranova, K. V. Filipenko","doi":"10.1109/AICT50176.2020.9368573","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368573","url":null,"abstract":"The development of passive systems for long-term monitoring of fetal activity is one of the leading tasks of modern perinatal diagnosis. Fetal activity is one of the markers of the fetal condition, by which changes in its wellbeing can be quickly determined. The introduction of a passive system of long-term monitoring into medical practice will allow medical professionals to constantly monitor the condition of the fetus, which will allow timely recognition of the development of a pathological condition. The development of such system requires careful selection of sensors, testing and debugging of the new system. In addition, the susceptibility of the fetal activity signal to the influence of numerous noises requires the development of signal processing algorithms that could be used to process large amounts of data in a short time. To solve these problems, we proposed a simulation model of the fetal activity signal source.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AICT 2020 Conference Committees","authors":"","doi":"10.1109/aict50176.2020.9368713","DOIUrl":"https://doi.org/10.1109/aict50176.2020.9368713","url":null,"abstract":"","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122653476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender variation in the discourse of online hotel reviews: A corpus-based semantic analysis","authors":"V. Lanin, E. Smirnova","doi":"10.1109/AICT50176.2020.9368872","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368872","url":null,"abstract":"The study deals with sematic categories mentioned in a 24,6-million-word corpus of online hotel reviews from Booking.com authored by men and women. The overall objective of the current study is the application of text mining techniques, namely corpus-based semantic analysis, to find if there are significant differences in the discourse of men and women when reviewing hotels. The reviews employed for the analysis were written by people located in the UK and relate to hotels and apartments of all star ratings. The semantic categories suggested by McArthur (1981) were detected by means of sematic tagging with UCREL Semantic Analysis System (USAS). We found a number of statistically significant differences between male and female discourses both in terms of linguistic expression and highlighted aspects of the stay. For example, women’s writing appears to be more personal and emotional with an extensive use of pronouns and boosters. As for the content of reviews, males tend to mention money paid, the location of the hotel and food; while females are more likely to write about family and friends or partners.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Nasimov, B. Muminov, Sanjar Mirzahalilov, N. Nasimova
{"title":"Algorithm of Automatic Differentiation of Myocardial Infarction from Cardiomyopathy based on Electrocardiogram","authors":"R. Nasimov, B. Muminov, Sanjar Mirzahalilov, N. Nasimova","doi":"10.1109/AICT50176.2020.9368738","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368738","url":null,"abstract":"This article is devoted to the development of a neural network learning algorithm that automatically detects cardiomyopathy based on an electrocardiogram (ECG). It also supports the automatic differentiation of myocardial infarction from cardiomyopathy and the symptoms of a healthy person through the proposed method. As a result, the rate of automatic differentiation of myocardial infarction and healthy person from cardiomyopathy reached 95.7%. Detection and diagnosis of such diseases can now be detected by various means, for example, ECG, laboratory, X-ray, MRI. In this paper, only the ECG-based method was considered.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115938430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operational risk estimation using probabilistic model","authors":"Trofimchuk Oleksandr, Prosiankina-Zharova Tetyana, Bidiuk Petro, Terentiev Oleksandr","doi":"10.1109/AICT50176.2020.9368630","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368630","url":null,"abstract":"Operational risks remain one of the most difficult and relevant issues of risk management for companies which is interested in profitable operation and sustainable development. The aim of the work is analysis of existing solutions and proposes an effective method of forecasting losses from operational risks. Suggested methods are used retrospective analysis of data. Standard methods don’t take into account the causal relationships and uncertainties which are typical for individual enterprises and ineffective. The paper proposes information technology based on the adaptive approach for construction of mathematical models, in particular using Bayesian belief networks, which in turn allow processing the uncertainties caused by the random nature of risk factors.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. A. Lenda, D. Semenova, A. Yakobson, E. Goldenok
{"title":"Association Analysis of Digital Transformation Processes of the B2G Trade Services Market Segment in Russia","authors":"E. A. Lenda, D. Semenova, A. Yakobson, E. Goldenok","doi":"10.1109/AICT50176.2020.9368584","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368584","url":null,"abstract":"Results of the research of digital transformation processes of the B2G market of trade services (the market of the state and the municipal purchases and the same trade procedures) by the MClose association rules search algorithm based on the analysis of the formal concepts are considered. A non-redundant minimax basis of association rules was obtained, which allowed us to establish causal-consequence relationships between the main criteria for digital transformation and additional criteria reflected the fundamental processes accompanied the activities of trade enterprises in the researched market.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123441352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical algorithm for modeling turbulence in a jet with diffusion combustion","authors":"J. Jura, Mustapakulov Yazdonkul, Kuldoshev Hakim","doi":"10.1109/AICT50176.2020.9368857","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368857","url":null,"abstract":"The paper proposes a method for calculating the diffusion combustion of a propane-butane mixture in a turbulent jet using the \"k-e\" model of turbulence. For mathematical modeling of the combustion object, the equations of the theory of the boundary layer are used. The equations for the components of the gas mixture are reduced to one using the Schwab-Zeldovich function..The formulated system of partial differential equations with boundary conditions is solved numerically and its algorithm is implemented using the DELPHI graphical environment.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}