2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

筛选
英文 中文
Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement 基于多位置距离测量的隐式发射机定位精度模型
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349304
V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov
{"title":"Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement","authors":"V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov","doi":"10.1109/ATIT50783.2020.9349304","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349304","url":null,"abstract":"The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Generative Adversarial Neural Network for Creating Photorealistic Images 生成对抗神经网络创建逼真的图像
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349326
Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova
{"title":"Generative Adversarial Neural Network for Creating Photorealistic Images","authors":"Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova","doi":"10.1109/ATIT50783.2020.9349326","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349326","url":null,"abstract":"This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125821078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations 用微分-泰勒变换求解稳定微分方程的建模
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349265
Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov
{"title":"Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations","authors":"Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov","doi":"10.1109/ATIT50783.2020.9349265","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349265","url":null,"abstract":"The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm 基于神经网络MELM算法的无人机自主飞行轨迹控制方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349317
O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko
{"title":"Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm","authors":"O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko","doi":"10.1109/atit50783.2020.9349317","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349317","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and Encoding Theory 信息与编码理论
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349293
{"title":"Information and Encoding Theory","authors":"","doi":"10.1109/atit50783.2020.9349293","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349293","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission 傅里叶变换在数据传输信号理论研究中的应用
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349308
Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna
{"title":"Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission","authors":"Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna","doi":"10.1109/ATIT50783.2020.9349308","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349308","url":null,"abstract":"Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Methods of Security Authentication and Authorization into Informationals Systems 信息系统的安全认证和授权方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349333
Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav
{"title":"Methods of Security Authentication and Authorization into Informationals Systems","authors":"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav","doi":"10.1109/ATIT50783.2020.9349333","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349333","url":null,"abstract":"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion and Fire Detection Method by Wireless Sensor Network 基于无线传感器网络的入侵和火灾探测方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349351
A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko
{"title":"Intrusion and Fire Detection Method by Wireless Sensor Network","authors":"A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko","doi":"10.1109/ATIT50783.2020.9349351","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349351","url":null,"abstract":"The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New Traffic Model of M2M Technology in 5G Wireless Sensor Networks 5G无线传感器网络中M2M技术的新流量模型
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349305
A. Bulashenko, S. Piltyay, A. Polishchuk, O. Bulashenko
{"title":"New Traffic Model of M2M Technology in 5G Wireless Sensor Networks","authors":"A. Bulashenko, S. Piltyay, A. Polishchuk, O. Bulashenko","doi":"10.1109/ATIT50783.2020.9349305","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349305","url":null,"abstract":"This paper presents a new model of M2M traffic of wireless sensor networks. Internet of Things traffic is a significant component of modern networks traffic. Such traffic is used today by modern M2M devices. The peculiarity of M2M traffic consists in its generation by a large number of devices. The number of such devices can be many times greater than the number of regular users. The share of this traffic is more than an order of magnitude less than the video traffic. M2M device traffic is poorly understood and much less predictable. Thus, when developing new technologies, it is necessary to focus a lot on this traffic. The paper contains the results of M2M traffic analysis and develops model of M2M traffic. The 3GPP model was chosen as the base model. The analysis of this model is given, and also its modification is offered. This model allows to simulate the traffic at the unlimited time interval. A feature of this model is the stability characteristics of the devices. It allows to evaluate not only the initial attempts to transmit messages, but also attempts caused by reduced service quality. The mathematical description of the model and simulation results are obtained in the research. It describes the traffic of M2M devices and its impact on quality of service in the network. The obtained results can be used to model the traffic of M2M devices and to select their parameters. In addition, algorithms have been developed to control M2M devices during possible overloads.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources 信息资源语音空间中信息心理破坏的解码方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349300
T. Belikova
{"title":"Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources","authors":"T. Belikova","doi":"10.1109/ATIT50783.2020.9349300","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349300","url":null,"abstract":"The modern information space, as a collection of heterogeneous information resources, is a rather aggressive environment that has a negative destructive effect on the psyche of users, primarily adolescents. To identify such negative influences, a technique for decoding the phonetic display of the sound space of an information resource is needed to identify destructive modifications. Therefore, it is proposed to improve information technologies to counter threats to information and psychological security of adolescents.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信