2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Application of Data Layering in Precision Beekeeping: The Concept 数据分层在精准养蜂中的应用:概念
N. Bumanis, O. Komasilova, V. Komašilovs, A. Kviesis, A. Zacepins
{"title":"Application of Data Layering in Precision Beekeeping: The Concept","authors":"N. Bumanis, O. Komasilova, V. Komašilovs, A. Kviesis, A. Zacepins","doi":"10.1109/AICT50176.2020.9368733","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368733","url":null,"abstract":"The monitoring and predictions of various multi-level states of honeybee colonies are performed using emerging Internet of Things technologies and data processing methods. It is become common to use multiple sensors and devices providing multi-modal data to monitor a single activity. Modern data analysis and data processing procedures include a step of data fusion in order to provide more accurate input data. This, however, requires implementation of machine learning and large data sets, whereas gathering large data sets of real time and observation data is a common problem for small to medium size apiaries. This why there are no real implementation of data fusion method in precision beekeeping field. The aim of this paper was to introduce the concept of data layering, which aims to solve the global precision beekeeping problems without implementation of machine learning. The concept was demonstrated within the scope of foraging optimization problem using three data sets: flowering calendar data, rainfall precipitation data and bee activity data.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127602077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of different optical cable length values on GPON access network parameters 不同光缆长度值对GPON接入网参数的影响
M. Abdujapparova, S. Sadchikova, D. Normatova
{"title":"Impact of different optical cable length values on GPON access network parameters","authors":"M. Abdujapparova, S. Sadchikova, D. Normatova","doi":"10.1109/AICT50176.2020.9368784","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368784","url":null,"abstract":"High speed applications require the access network modernization based on optical technologies. Automatic network planning is not finished on the access technology choice. Next step is calculation of special parameters of chosen technology applicable for exact access network. Fiber To Home (FTTH) architecture uses Passive Optical Network (PON) as a transport technology. This article is discussed how you can develop algorithms for Gigabit Passive Optical Network (GPON) technology planning on the basis on optical fiber length.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Assessment Using Delay from Backlog Bound Calculation 基于积压边界延迟计算的网络安全评估
A. Baybulatov, V. Promyslov, Ivery Prangishvili
{"title":"Cybersecurity Assessment Using Delay from Backlog Bound Calculation","authors":"A. Baybulatov, V. Promyslov, Ivery Prangishvili","doi":"10.1109/AICT50176.2020.9368731","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368731","url":null,"abstract":"During the last decade, cybersecurity assessment has become a key issue among all security problems encountered in designing and managing complex systems. Today, for dealing with cybersecurity, many sophisticated models are available. Still, the classic CIA triad of confidentiality, integrity, and availability remains actual and useful. In this article, following the CIA model, we investigate cybersecurity of control systems. After some research, we make it clear that availability is the most critical property of cybersecurity in the operational technology context, and so can be used as an indicator of cybersecurity. Conducting a review of availability definitions, we elect a proper interpretation of availability with a delay as a measure for its evaluation. For calculations, we use a theory of deterministic queueing systems Network calculus, but in contrast to the common practice of delay calculation through the bounds of the arrival flow and service, we investigate another critical case where a delay can be estimated from the knowledge of the backlog bound and the framework of service curves. A problem for systems with a linear relationship between the minimum and maximum service curves and a special case of rate-latency service curves are examined.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a Simulation Model of Fetal Activity Signal Source 胎儿活动信号源仿真模型的建立
Yulia Bobrova, Olga N. Kapranova, K. V. Filipenko
{"title":"Development of a Simulation Model of Fetal Activity Signal Source","authors":"Yulia Bobrova, Olga N. Kapranova, K. V. Filipenko","doi":"10.1109/AICT50176.2020.9368573","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368573","url":null,"abstract":"The development of passive systems for long-term monitoring of fetal activity is one of the leading tasks of modern perinatal diagnosis. Fetal activity is one of the markers of the fetal condition, by which changes in its wellbeing can be quickly determined. The introduction of a passive system of long-term monitoring into medical practice will allow medical professionals to constantly monitor the condition of the fetus, which will allow timely recognition of the development of a pathological condition. The development of such system requires careful selection of sensors, testing and debugging of the new system. In addition, the susceptibility of the fetal activity signal to the influence of numerous noises requires the development of signal processing algorithms that could be used to process large amounts of data in a short time. To solve these problems, we proposed a simulation model of the fetal activity signal source.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AICT 2020 Conference Committees AICT 2020会议委员会
{"title":"AICT 2020 Conference Committees","authors":"","doi":"10.1109/aict50176.2020.9368713","DOIUrl":"https://doi.org/10.1109/aict50176.2020.9368713","url":null,"abstract":"","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122653476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gender variation in the discourse of online hotel reviews: A corpus-based semantic analysis 基于语料库的在线酒店评论语篇中的性别差异语义分析
V. Lanin, E. Smirnova
{"title":"Gender variation in the discourse of online hotel reviews: A corpus-based semantic analysis","authors":"V. Lanin, E. Smirnova","doi":"10.1109/AICT50176.2020.9368872","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368872","url":null,"abstract":"The study deals with sematic categories mentioned in a 24,6-million-word corpus of online hotel reviews from Booking.com authored by men and women. The overall objective of the current study is the application of text mining techniques, namely corpus-based semantic analysis, to find if there are significant differences in the discourse of men and women when reviewing hotels. The reviews employed for the analysis were written by people located in the UK and relate to hotels and apartments of all star ratings. The semantic categories suggested by McArthur (1981) were detected by means of sematic tagging with UCREL Semantic Analysis System (USAS). We found a number of statistically significant differences between male and female discourses both in terms of linguistic expression and highlighted aspects of the stay. For example, women’s writing appears to be more personal and emotional with an extensive use of pronouns and boosters. As for the content of reviews, males tend to mention money paid, the location of the hotel and food; while females are more likely to write about family and friends or partners.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm of Automatic Differentiation of Myocardial Infarction from Cardiomyopathy based on Electrocardiogram 基于心电图的心肌梗死与心肌病自动鉴别算法
R. Nasimov, B. Muminov, Sanjar Mirzahalilov, N. Nasimova
{"title":"Algorithm of Automatic Differentiation of Myocardial Infarction from Cardiomyopathy based on Electrocardiogram","authors":"R. Nasimov, B. Muminov, Sanjar Mirzahalilov, N. Nasimova","doi":"10.1109/AICT50176.2020.9368738","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368738","url":null,"abstract":"This article is devoted to the development of a neural network learning algorithm that automatically detects cardiomyopathy based on an electrocardiogram (ECG). It also supports the automatic differentiation of myocardial infarction from cardiomyopathy and the symptoms of a healthy person through the proposed method. As a result, the rate of automatic differentiation of myocardial infarction and healthy person from cardiomyopathy reached 95.7%. Detection and diagnosis of such diseases can now be detected by various means, for example, ECG, laboratory, X-ray, MRI. In this paper, only the ECG-based method was considered.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115938430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Operational risk estimation using probabilistic model 基于概率模型的操作风险估计
Trofimchuk Oleksandr, Prosiankina-Zharova Tetyana, Bidiuk Petro, Terentiev Oleksandr
{"title":"Operational risk estimation using probabilistic model","authors":"Trofimchuk Oleksandr, Prosiankina-Zharova Tetyana, Bidiuk Petro, Terentiev Oleksandr","doi":"10.1109/AICT50176.2020.9368630","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368630","url":null,"abstract":"Operational risks remain one of the most difficult and relevant issues of risk management for companies which is interested in profitable operation and sustainable development. The aim of the work is analysis of existing solutions and proposes an effective method of forecasting losses from operational risks. Suggested methods are used retrospective analysis of data. Standard methods don’t take into account the causal relationships and uncertainties which are typical for individual enterprises and ineffective. The paper proposes information technology based on the adaptive approach for construction of mathematical models, in particular using Bayesian belief networks, which in turn allow processing the uncertainties caused by the random nature of risk factors.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association Analysis of Digital Transformation Processes of the B2G Trade Services Market Segment in Russia 俄罗斯B2G贸易服务细分市场数字化转型过程关联分析
E. A. Lenda, D. Semenova, A. Yakobson, E. Goldenok
{"title":"Association Analysis of Digital Transformation Processes of the B2G Trade Services Market Segment in Russia","authors":"E. A. Lenda, D. Semenova, A. Yakobson, E. Goldenok","doi":"10.1109/AICT50176.2020.9368584","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368584","url":null,"abstract":"Results of the research of digital transformation processes of the B2G market of trade services (the market of the state and the municipal purchases and the same trade procedures) by the MClose association rules search algorithm based on the analysis of the formal concepts are considered. A non-redundant minimax basis of association rules was obtained, which allowed us to establish causal-consequence relationships between the main criteria for digital transformation and additional criteria reflected the fundamental processes accompanied the activities of trade enterprises in the researched market.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123441352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical algorithm for modeling turbulence in a jet with diffusion combustion 扩散燃烧射流湍流模拟的数值算法
J. Jura, Mustapakulov Yazdonkul, Kuldoshev Hakim
{"title":"Numerical algorithm for modeling turbulence in a jet with diffusion combustion","authors":"J. Jura, Mustapakulov Yazdonkul, Kuldoshev Hakim","doi":"10.1109/AICT50176.2020.9368857","DOIUrl":"https://doi.org/10.1109/AICT50176.2020.9368857","url":null,"abstract":"The paper proposes a method for calculating the diffusion combustion of a propane-butane mixture in a turbulent jet using the \"k-e\" model of turbulence. For mathematical modeling of the combustion object, the equations of the theory of the boundary layer are used. The equations for the components of the gas mixture are reduced to one using the Schwab-Zeldovich function..The formulated system of partial differential equations with boundary conditions is solved numerically and its algorithm is implemented using the DELPHI graphical environment.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信