2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

筛选
英文 中文
Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource 提高视频信息资源可用性的显著微段变换编码方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349256
V. Barannik, Yu. G. Babenko, O. Kulitsa, V. Barannik, Andriy Khimenko, O. Matviichuk-Yudina
{"title":"Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource","authors":"V. Barannik, Yu. G. Babenko, O. Kulitsa, V. Barannik, Andriy Khimenko, O. Matviichuk-Yudina","doi":"10.1109/ATIT50783.2020.9349256","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349256","url":null,"abstract":"The presence of an imbalance caused by an insufficient level of performance of modern and promising infocommunication technologies with respect to the information intensity of bit streams is shown. It is substantiated that a decrease in the level of imbalance is organized as a result of an increase in the efficiency of information processing technologies. It is substantiated that at the moment the JPEG platform is the basic concept for the construction of compression representation technologies. Accordingly, it is proposed to organize the further development of methods for processing video resources using individual components of the JPEG platform in the direction of increasing the integrity of information while ensuring the required level of its availability. The development of the basic concept of processing segmented video frames using the core of the JPEG technology is presented, which is based on the following aspects: conditions are created for differential processing of video frame segments, taking into account their previous identification, depending on their importance from the position of maintaining the desired level of integrity of video resources; provides compatibility of segment identification processes and their processing using the JPEG platform. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide a reduction in the information delivery time under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Counteraction to Strategic Manipulations on Actors’ Decision Making in Social Networking Services 社交网络服务中策略操纵对行为者决策的反作用
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349347
K. Molodetska
{"title":"Counteraction to Strategic Manipulations on Actors’ Decision Making in Social Networking Services","authors":"K. Molodetska","doi":"10.1109/ATIT50783.2020.9349347","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349347","url":null,"abstract":"Today, social networking services have become a source of manipulation of public opinion. Of particular importance for influencing on social and political processes in the country are the variety of surveys, which have conducted in social networking services. The results of such surveys are used for further decision-making by the actors in the real life. The publication applies the Arrow’s paradox to formalise the processes of conducting surveys in social internet services. Also, the requirements for actor surveys have formulated to reflect public opinion adequately. As a result of the research, measures to counteract strategic manipulations in social networking services have justified. The obtained results can be useful to improve the information security of social networking services.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116472248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series 视频容器序列信息无视觉失真的间接隐写编码方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349262
Yu. M. Ryabukha, N. Barannik
{"title":"Method of Indirect Steganographic Coding of Information without Visual Distortion of the Video Container series","authors":"Yu. M. Ryabukha, N. Barannik","doi":"10.1109/ATIT50783.2020.9349262","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349262","url":null,"abstract":"A method of an indirect steganographic embedding is proposed, which allows to ensure the security of information resources based on the use of structural-combinatorial redundancy of the video container. Within the method, the embedding of information is performed simultaneously in the space-time domain of the video resource, as well as in spectral space and spectral-time space.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of an All-Based Method Using Blockchain Technologies and Cuda Technologies 使用区块链技术和Cuda技术开发全基础方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349345
T. Domkiv, A. Dudnik, N. Dakhno, V. Kvasnikov, Olexander Trush, Serhii Dorozhynskyi
{"title":"Development of an All-Based Method Using Blockchain Technologies and Cuda Technologies","authors":"T. Domkiv, A. Dudnik, N. Dakhno, V. Kvasnikov, Olexander Trush, Serhii Dorozhynskyi","doi":"10.1109/ATIT50783.2020.9349345","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349345","url":null,"abstract":"The article presents a method of using parallel computing technology using CUDA technology and blockchain to recover the key(s) of an encrypted PDF file. The analysis and comparison of the speed of calculations using the graphic processor (GPU) and central processing unit (CPU). Testing the implemented method. A statistical analysis of the results of experimental studies is presented.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face recognition systems based on Neural Compute Stick 2, CPU, GPU comparison 基于神经计算棒的人脸识别系统2,CPU, GPU的比较
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349313
O. Aleksandrova, Y. Bashkov
{"title":"Face recognition systems based on Neural Compute Stick 2, CPU, GPU comparison","authors":"O. Aleksandrova, Y. Bashkov","doi":"10.1109/ATIT50783.2020.9349313","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349313","url":null,"abstract":"The most common approaches to face recognition are considered, the latest developments in this area are analyzed, an experiment is carried out on a face recognition system on the Neural Compute Stick 2, the conditions for its necessity are substantiated. The system also was tested on CPU and GPU, as well as system models separately to determine the conditions for increasing performance. The main result is the determination of the need for Neural Compute Stick 2 on personal computers, as well as the optimal conditions for the performance of the face recognition system. The need to use the Neural Compute Stick 2 only for low-performance devices is revealed. The tasks of further research are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129278221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Marginal Utility Approach for Quality of Service Evaluation in IT infrastructure IT基础设施服务质量评价的边际效用方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349352
O. Rolik, Kolesnik Valerii
{"title":"Marginal Utility Approach for Quality of Service Evaluation in IT infrastructure","authors":"O. Rolik, Kolesnik Valerii","doi":"10.1109/ATIT50783.2020.9349352","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349352","url":null,"abstract":"IT-services are corner stones of any computing IT-infrastructures. In order to make them working properly their quality should be evaluated, measured and controlled. A lot of researches were conducted on quality of service evaluation, and many approaches were discovered. However, there is still need for connecting user satisfaction as subjective parameter with objective parameters or key performance indicators.Possible way for connecting those characteristics is to use marginal utility function in order to define direct dependency between quality of experience and quality of service. This kind of solution was proposed in this research.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FDTD and FEM Simulation of Microwave Waveguide Polarizers 微波波导偏振器的FDTD和FEM仿真
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349339
S. Piltyay, A. Bulashenko, Yevhenii Herhil, O. Bulashenko
{"title":"FDTD and FEM Simulation of Microwave Waveguide Polarizers","authors":"S. Piltyay, A. Bulashenko, Yevhenii Herhil, O. Bulashenko","doi":"10.1109/ATIT50783.2020.9349339","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349339","url":null,"abstract":"This paper presents results of comparison of modern effective numerical techniques for the calculation of microwave devices. Nowadays finite difference time domain method and finite elements method are the most frequently used numerical techniques, which are applied for the simulation of electromagnetic fields in various antennas and bounded structures. Modern modifications of these numerical methods and their pro and contras are considered in the paper. Besides, we have compared finite difference time domain technique and finite elements method in the case of calculation of polarization and matching characteristics of microwave waveguide iris polarizers. Using this example we have found that the convergence of the calculated matching characteristics of microwave waveguide devices is fast for both considered numerical techniques. On the other hand, the accuracy of calculation of the phase and polarization characteristics is very sensitive to the number of mesh cells, at which the volume of device structure is divided. It has been found that more than 100 000 tetrahedral mesh cells per structure volume must be used, if calculation of the polarizer’s axial ratio and crosspolar discrimination is performed by finite elements method in the frequency domain with required accuracies of 0.5 dB. If axial ratio and crosspolar discrimination must be calculated with the accuracies of 0.5 dB by the finite difference time domain method, then the utilization of more than 800 000 hexahedral mesh cells per structure volume is required. In has been found that the computation time of the finite elements method in the frequency domain is more than 2 times less than the same time required by finite difference time domain method. Besides, the corresponding number of tetrahedral mesh cells in finite elements method is 10 times less, than the number of hexahedral mesh cells in finite difference time domain method.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Method to Ranking Reliability of Sensors of Multisensor System: Interval-Valued Number Case 多传感器系统中传感器可靠性排序的一种方法:区间数情况
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349318
M. Popov, Alpert Sofiia, Alpert Maksym, O. Zaitsev, Ruslana G. Stambirska
{"title":"A Method to Ranking Reliability of Sensors of Multisensor System: Interval-Valued Number Case","authors":"M. Popov, Alpert Sofiia, Alpert Maksym, O. Zaitsev, Ruslana G. Stambirska","doi":"10.1109/ATIT50783.2020.9349318","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349318","url":null,"abstract":"A method to ranking information reliability of sensors of multisensor system is proposed. The case is considered when the set of data is represented by interval-valued numbers. The information reliability of any sensor is calculated based on estimates of the proximity of its data to the data of the other sensors of system. To assess the proximity three metric are applied: Wasserstein, Hausdorff-Chavent, and Euclidean ones. The numerical example is given to exemplify the application of the proposed method.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technologies of Informative Security 信息安全技术
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349253
{"title":"Technologies of Informative Security","authors":"","doi":"10.1109/atit50783.2020.9349253","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349253","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Method of Embedding Information in the Noise Domain Based on the Modification of Elements in the Pseudo-Spatial Domain 基于伪空间域元素修改的噪声域信息嵌入方法
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT) Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349266
N. Barannik, O. Yudin, M. Babenko, A. Bekirov, V. Manakov, Valerii Yroshenko
{"title":"The Method of Embedding Information in the Noise Domain Based on the Modification of Elements in the Pseudo-Spatial Domain","authors":"N. Barannik, O. Yudin, M. Babenko, A. Bekirov, V. Manakov, Valerii Yroshenko","doi":"10.1109/ATIT50783.2020.9349266","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349266","url":null,"abstract":"The article presents a steganographic method based on the selection of the noise area of the image with the subsequent transition to the pseudo-spatial area. Embedding of elements is carried out on the basis of indirect modification of elements according to the formulated rule.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123302851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信