{"title":"Software HDL Modeling of a Coherent Telecommunication System With Digital Modulation","authors":"I. Pyatin, J. Boiko, O. Eromenko","doi":"10.1109/PICST57299.2022.10238527","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238527","url":null,"abstract":"This paper presents an assessment the noise immunity of telecommunication systems. The cause of interference is destabilizing factors - conversion of the sampling rate of signals in the transmitter and receiver, frequency and phase shift of the signal in the communication channel, signal delay, white noise, etc. To improve noise immunity, the transceiver contains synchronization circuits that have a certain range of changes in destabilizing factors. Deviation outside this range leads to a deterioration in the parameters and quality of telecommunications. The purpose of the article is to evaluate the digital modulation constellation distortions of Hardware Description Language (HDL) transmitter and receiver implementations of 64QAM signals. It is assumed that the results obtained will be useful in the deployment of digital telecommunications.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125208043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aleksandr Kuznetsov, Davyd Kvaratskheliia, Andrea Maranesi, L. Romeo, Alessandro Muscatello, Riccardo Rosati
{"title":"Deep Learning Based Face Liveliness Detection","authors":"Aleksandr Kuznetsov, Davyd Kvaratskheliia, Andrea Maranesi, L. Romeo, Alessandro Muscatello, Riccardo Rosati","doi":"10.1109/PICST57299.2022.10238559","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238559","url":null,"abstract":"Modern systems of face recognition (FRS) are used in a wide range of computer applications: for user authentication; in email marketing; in social networks; for personal identification and more. However, such technologies are often vulnerable to spoofing attacks. Facial image can be faked in various ways: print a photo; record a video; create a high-quality silicone mask, etc. By presenting a fake to the FRS the attacker has an intention of passing himself off as another person, for instance, trying to get an access to a secure computer system. Face Liveliness Detection solves this problem by detecting whether the person in front of the camera is real or fake. In this article, we explore the possibilities of using deep learning technology for face liveliness detection. We consider several models and setting numerous experiments. As datasets for experiments we use various fake images and for each such dataset we obtained evaluation of effectiveness. In our research, our main goal is to improve basic deep learning architectures using latest technologies to get more accurate model.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Volodymyr Sokolov, F. Kipchuk, P. Skladannyi, O. Zhyltsov, D. Ageyev
{"title":"Method for Increasing the Various Sources Data Consistency for IoT Sensors","authors":"Volodymyr Sokolov, F. Kipchuk, P. Skladannyi, O. Zhyltsov, D. Ageyev","doi":"10.1109/PICST57299.2022.10238518","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238518","url":null,"abstract":"The paper represents importance of performing data consistency operations with data sets, where it is possible and essential. Producing vast amounts of data by the Internet of Things (IoT) devices and sensors, all electronic data must be organized and processed. The approach presented in this paper may help researchers look for new areas of processing data, making it more consistent and reviewing already presented, maybe not so efficient methods. Learning from real-life examples, the efficiency of using smart devices, and the coverage of cellular or global positioning systems show many exciting and inspirational ways to work on science and practical success. This paper aims to create a method for combining data from different sources to obtain the best quality of the resulting data. The paper shows that we continue to increase number of sources to process and operate data, making it essential to process correctly and qualitatively. Researching approaches to make data more consistent and precise will be present almost all time.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roman Yaroshevych, Vitalii Tkachov, Andriy Kovalenko, Dmytro Rosinskyi
{"title":"Modelling the Domain Architecture of the Tactile Internet Using a Foggy Infrastructure","authors":"Roman Yaroshevych, Vitalii Tkachov, Andriy Kovalenko, Dmytro Rosinskyi","doi":"10.1109/PICST57299.2022.10238653","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238653","url":null,"abstract":"The high efficiency and reliability of the Tactile Internet (TI) primarily depends on the construction of the architecture of the distributed service platform. Therefore, the main goal of the work is to analyze and present an effective solution for building a Tactile Internet domain architecture model with high reliability, availability, and low latency. In this article, the domain architecture consists of three sections, namely: master, slave, and network domains. Using haptic commands and haptic feedback signals, the master and slave domains communicate across the network domain. To implement the construction of the network domain architecture, the article proposes the use of a new technology, such as mobile edge computing (MEC) with an open fog structure (OpenFog).","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121197601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Applications Use for Business Growth","authors":"Iskren Tairov, Ivailo Donchev","doi":"10.1109/PICST57299.2022.10238668","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238668","url":null,"abstract":"The article aims to study the essence and prospects of using mobile application technology in the information space and modern business. The research is focused on the essence of mobile applications. It is found that the mobile application is a specialized software designed to work on smartphones, tablets and other mobile devices that is installed mainly through the official stores of the manufacturer or developer of the mobile operating system, and they are aimed at optimizing and solving user tasks. It is noted that there are several approaches to the technical implementation of applications for mobile devices, namely - native, hybrid, and progressive web. Among the most used types for businesses should note the main applications for automating processes, increasing productivity and collaboration, and providing online services. The functionality of mobile applications has been analyzed and several concepts for mobile management are presented and compared to create a model for effective mobile management as the main contribution of this paper. Conclusions are drawn about the feasibility of using mobile applications in the activities.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Tabular Implementation of the Arithmetic Operation of Multiplying Two Numbers Represented in the System of Residual Classes","authors":"V. Krasnobayev, A. Yanko, D. Kovalchuk","doi":"10.1109/PICST57299.2022.10238624","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238624","url":null,"abstract":"The article discusses the method of tabular implementation of the arithmetic operation of multiplying two numbers represented in the system of residual classes (SRC). The existing methods of tabular implementation of the arithmetic operation of multiplying two numbers in the SRC allow you to implement this operation only in a positive numerical range. This circumstance significantly narrows the area of effective application of tabular arithmetic (TA) in the SRC. In order to further develop the scope of TA, the method of tabular implementation of the arithmetic operation of multiplication in the SRC has been improved in the article due to the additional possibility of simultaneously performing operations of both arithmetic and algebraic multiplication. For this, a mathematical model (MM) of the process of tabular implementation of the operation of modular multiplication in positive and negative numerical ranges is synthesized. The MM developed in the article is the basis for the method of tabular implementation of the arithmetic operation of multiplication. An example of the application of this method of multiplication of two numbers in the SRC in the negative numerical range is given. In the future, MM and an improved method for multiplying two numbers can be used as the basis for a generalized method for fast processing of arithmetic operations of modular addition, subtraction, and multiplication in the SRC.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Barkalov, L. Titarenko, I. Zeleneva, S. Hrushko, Tetiana Holub, Mykhailo Shadrin
{"title":"Synthesis of a Finite State Machine With Elementary Chains of States","authors":"A. Barkalov, L. Titarenko, I. Zeleneva, S. Hrushko, Tetiana Holub, Mykhailo Shadrin","doi":"10.1109/PICST57299.2022.10238579","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238579","url":null,"abstract":"Modified structure and method are proposed for synthesis of a combined finite state machine (CFSM) which forms the output functions of both types FSM – Mealy and Moore. Similar algorithms are used mainly for controlling the blocks of in-built systems in cases when the sensors that describe the system are not numerous, but it is necessary to perform certain sequences of microoperations. We consider a case when initial control algorithm is represented with a linear flowchart. Such flowcharts have a significant number of operator vertices, exceeding 75% of the total number of vertices. In the case of linear flowchart we propose to replace the register RG with a counter of states CT. It allows simplification of Boolean functions representing a combined FSM logic circuit. Also this allows to simplify the system of memory-excitation functions. The method uses existence of elementary linear chains of states in the initial flowchart. There is an example of synthesis and results of experimental study given in the article. The study of the proposed method based on the real control algorithm of the onboard computing device. Experiments and testing performed for various Intel (Altera) microchips. The studies carried out for different families of FPGAs, in different price ranges. A comparative analysis of time characteristics for the basic and proposed structures allows us to notice a tendency to some acceleration of the operation. In general, research results have shown that proposed structures of combined FSM can be useful for design of embedded systems.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Romanov, Volodymyr Mankivskyi, Ivan Saychenko, M. Nesterenko
{"title":"Event Model Algorithm with Microservice Architecture Implementation","authors":"O. Romanov, Volodymyr Mankivskyi, Ivan Saychenko, M. Nesterenko","doi":"10.1109/PICST57299.2022.10238498","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238498","url":null,"abstract":"The Event-driven architectures (EDA) are gaining popularity for a reason. Scalability in building isolated microservices is a paradigm that many businesses are constantly striving for, and event-driven architecture is built with that in mind. With innovative tools such as Kafka and RabbitMQ, event-driven architectures are becoming more flexible, versatile, and robust to satisfy a wide range of business needs. However, powerful tool also comes at a price: a high learning curve and rather complicated initial setup. However, once such a structure is in place, the benefits are clear as data is transmitted with lower latency and higher throughput. So why not use an event-driven architecture? In the work, an algorithm for transition to the use of EDA is proposed for a successful transition to such an architecture.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129154743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Higher-Order Statistics Applied to Electromyographic Signals of Persons With Low Back Pain to Improve the Information Content of a Physiological Examination","authors":"Tatyana Zhemchuzhkina","doi":"10.1109/PICST57299.2022.10238476","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238476","url":null,"abstract":"Low back pain (LBP) is a common global problem as it is the leading cause of years lived with disability. In the case of LBP, electromyography (EMG) is used for diagnostic purposes and monitoring the functional state of a person. Electromyographic signals (EMGs) are usually analyzed using 2nd-order statistical methods, such as power spectrum, but due to the non-stationarity, nonlinearity and non-Gaussianity of EMGs, these methods cannot provide an adequate analysis. Thus, higher-order statistical methods are useful. This work is devoted to the study of higher-order statistical characteristics of EMGs for LBP persons. Signals from five groups of patients, including vertebral disorders, scoliosis, functional pain, healthy people without complaints, and healthy people with pain complaints were processed.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Early Reflections in the Room Impulse Response by Estimating the Excess Kurtosis","authors":"A. Prodeus, M. Didkovska, Kateryna Kukharicheva","doi":"10.1109/PICST57299.2022.10238647","DOIUrl":"https://doi.org/10.1109/PICST57299.2022.10238647","url":null,"abstract":"The potential possibilities of the previously proposed method for detecting early reflections, which consists in estimating the excess kurtosis at short intervals of the room impulse response, have been studied. The dependences of detection probability and false alarm probability on segment length were obtained by means of computer simulation. In order to increase the reliability of detecting early reflections, a two-stage algorithm is proposed. At the first stage, the excess kurtosis is measured within the segments of the impulse response, and the maxima of those segments where the excess kurtosis estimate exceeds a given threshold are selected. The procedure for selecting maxima is repeated several times for segments of different lengths. As a result, a set of moments of time is formed, which pretend to be the reflection onset timings. At the second stage, a histogram of the distribution of these moments is constructed. The decision about the presence of early reflections is made using this histogram. The performance of the proposed algorithm was experimentally verified using binaural impulse characteristics of a real room. It was shown that reflection onset timing measuring error did not exceed 0.1 ms in 80% of cases.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115256170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}