V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov
{"title":"Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement","authors":"V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov","doi":"10.1109/ATIT50783.2020.9349304","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349304","url":null,"abstract":"The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova
{"title":"Generative Adversarial Neural Network for Creating Photorealistic Images","authors":"Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova","doi":"10.1109/ATIT50783.2020.9349326","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349326","url":null,"abstract":"This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125821078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov
{"title":"Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations","authors":"Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov","doi":"10.1109/ATIT50783.2020.9349265","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349265","url":null,"abstract":"The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko
{"title":"Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm","authors":"O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko","doi":"10.1109/atit50783.2020.9349317","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349317","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information and Encoding Theory","authors":"","doi":"10.1109/atit50783.2020.9349293","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349293","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna
{"title":"Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission","authors":"Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna","doi":"10.1109/ATIT50783.2020.9349308","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349308","url":null,"abstract":"Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of Security Authentication and Authorization into Informationals Systems","authors":"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav","doi":"10.1109/ATIT50783.2020.9349333","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349333","url":null,"abstract":"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko
{"title":"Intrusion and Fire Detection Method by Wireless Sensor Network","authors":"A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko","doi":"10.1109/ATIT50783.2020.9349351","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349351","url":null,"abstract":"The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bulashenko, S. Piltyay, A. Polishchuk, O. Bulashenko
{"title":"New Traffic Model of M2M Technology in 5G Wireless Sensor Networks","authors":"A. Bulashenko, S. Piltyay, A. Polishchuk, O. Bulashenko","doi":"10.1109/ATIT50783.2020.9349305","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349305","url":null,"abstract":"This paper presents a new model of M2M traffic of wireless sensor networks. Internet of Things traffic is a significant component of modern networks traffic. Such traffic is used today by modern M2M devices. The peculiarity of M2M traffic consists in its generation by a large number of devices. The number of such devices can be many times greater than the number of regular users. The share of this traffic is more than an order of magnitude less than the video traffic. M2M device traffic is poorly understood and much less predictable. Thus, when developing new technologies, it is necessary to focus a lot on this traffic. The paper contains the results of M2M traffic analysis and develops model of M2M traffic. The 3GPP model was chosen as the base model. The analysis of this model is given, and also its modification is offered. This model allows to simulate the traffic at the unlimited time interval. A feature of this model is the stability characteristics of the devices. It allows to evaluate not only the initial attempts to transmit messages, but also attempts caused by reduced service quality. The mathematical description of the model and simulation results are obtained in the research. It describes the traffic of M2M devices and its impact on quality of service in the network. The obtained results can be used to model the traffic of M2M devices and to select their parameters. In addition, algorithms have been developed to control M2M devices during possible overloads.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources","authors":"T. Belikova","doi":"10.1109/ATIT50783.2020.9349300","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349300","url":null,"abstract":"The modern information space, as a collection of heterogeneous information resources, is a rather aggressive environment that has a negative destructive effect on the psyche of users, primarily adolescents. To identify such negative influences, a technique for decoding the phonetic display of the sound space of an information resource is needed to identify destructive modifications. Therefore, it is proposed to improve information technologies to counter threats to information and psychological security of adolescents.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}