2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Flow-aware approach of evaluating probability of compromise in combined structure network 组合结构网络妥协概率评估的流感知方法
Oleksandra Yeremenko, M. Yevdokymenko, Anatoliy Persikov
{"title":"Flow-aware approach of evaluating probability of compromise in combined structure network","authors":"Oleksandra Yeremenko, M. Yevdokymenko, Anatoliy Persikov","doi":"10.1109/AIACT.2017.8020114","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020114","url":null,"abstract":"A flow-aware approach of evaluating the probability of compromise in combined structure network is presented. Experimental and numerical examples have been used to analyze the influence on flow compromising of security parameters of network links and fragments. It is shown that the proposed approach gives more precise results of calculation the probability of flow compromise when using overlapping routes with series-parallel and combined structure up to 30% in most of cases in relation to the known method, which is used for overlapping paths.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method of segment hierarchical coordination routing in multi-area network 多区域网络中分段分层协调路由方法
Oleksandr V Lemeshko, A. Ilyashenko, O. Nevzorova, Ahmed Mhamed Mal-allah
{"title":"Method of segment hierarchical coordination routing in multi-area network","authors":"Oleksandr V Lemeshko, A. Ilyashenko, O. Nevzorova, Ahmed Mhamed Mal-allah","doi":"10.1109/AIACT.2017.8020115","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020115","url":null,"abstract":"The method of segment hierarchical coordination routing in multi-area network has been proposed. The method based on decomposed implementation of How-based model of inter-area routing and goal coordination principle. In this method on the lower level, there is the calculation of the routing variables, and on the upper level, there is the coordination of the solutions obtained from lower level for providing the connectivity of inter-area routes. The analysis of method convergence to optimal solutions of hierarchical routing was performed.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving architecture of LTE mobile network for IoT services provisioning 改进LTE移动网络架构,提供物联网服务
M. Klymash, H. Beshley, M. Seliuchenko, T. Maksymyuk
{"title":"Improving architecture of LTE mobile network for IoT services provisioning","authors":"M. Klymash, H. Beshley, M. Seliuchenko, T. Maksymyuk","doi":"10.1109/AIACT.2017.8020101","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020101","url":null,"abstract":"In this paper we analyze the current state of 3G mobile networks in Ukraine and study the prospects and ways of introducing IoT services based on 4G/5G technologies. We improve architecture of LTE mobile network to provide IoT services through the allocation of narrowband spectrum and the transfer of functions from the eNodeB base station to IoT controller. We propose narrowband spectrum allocation method for IoT in LTE spectrum to reduce inter-cell interference impact on the signal-to-noise ratio at the edges of cells. We also propose method of traffic prioritization to ensure IoT E2E QoS in a heterogeneous LTE/IoT network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimization of forming digital quadrature modulations 形成数字正交调制的优化
V. Pelishok, Y. V. Sukhyi
{"title":"Optimization of forming digital quadrature modulations","authors":"V. Pelishok, Y. V. Sukhyi","doi":"10.1109/AIACT.2017.8020091","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020091","url":null,"abstract":"The paper shows the developed method of forming quadrature amplitude and phase manipulations, using Gray code. This method can significantly reduce the time required for the formation of N-level manipulation, especially high levels.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Services continuous integration based on modern free infrastructure 基于现代免费基础设施的服务持续集成
O. Lavriv, B. Buhyl, M. Klymash, G. Grynkevych
{"title":"Services continuous integration based on modern free infrastructure","authors":"O. Lavriv, B. Buhyl, M. Klymash, G. Grynkevych","doi":"10.1109/AIACT.2017.8020087","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020087","url":null,"abstract":"This paper considers the continuous integration (CI) process of user-related services based on free modern software. The CI pipeline consist of source control, quality control, testing, building and deployment of service every time new commit comes to source control server. CI is very important part of service lifecycle due to demands of security and quality assurance at the stage of service deployment. We propose the infrastructure design and pipeline design for CI in this paper. Also, we use server for local repository and docker for deploying services.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The implementation of depersonalization algorithm of digital images 数字图像去人格化算法的实现
A. Zadereyko, A. Troyanskiy, Nataliia Loginova, E. Trofimenko
{"title":"The implementation of depersonalization algorithm of digital images","authors":"A. Zadereyko, A. Troyanskiy, Nataliia Loginova, E. Trofimenko","doi":"10.1109/AIACT.2017.8020065","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020065","url":null,"abstract":"The study was conducted and the classification of the signs of digital images was proposed in the article. These signs can uniquely identify the digital devices which the images were created. There was proposed the depersonalizing algorithm of digital images to ensure confidentiality during using of different photo, web cameras and scanners. Practical application of the developed depersonalization algorithm of digital images has shown its effectiveness in protecting equipment from identification by third parties by breaking the direct connection between the digital optoelectronic devices and created digital images.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of optimization model of fault-tolerant routing with bilinear path protection criterion 基于双线性路径保护准则的容错路由优化模型研究
Oleksandra Yeremenko, Oleksandr V Lemeshko, Nadia Tariki, A. Hailan
{"title":"Research of optimization model of fault-tolerant routing with bilinear path protection criterion","authors":"Oleksandra Yeremenko, Oleksandr V Lemeshko, Nadia Tariki, A. Hailan","doi":"10.1109/AIACT.2017.8020105","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020105","url":null,"abstract":"A flow-based model of fault-tolerant routing with path protection has been improved. In the course of the improvement, when the fault-tolerant routing problem was presented in optimization form, an optimality criterion has been formulated, which contains the conditions for path protection when it is possible to implement both single path and multipath routing strategies. The novelty of the proposed improvement lies in the fact that the path protection conditions are included in the optimality criterion in bilinear form. The efficiency and adequacy of the proposed improvement of the flow-based model of fault-tolerant routing has been confirmed in a number of computational examples in solving single path and multipath routing problems when implementing the path protection scheme in the network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Method of image segments compression based on two-level local position representation of vectors 基于矢量两级局部位置表示的图像段压缩方法
Andriy Alimpiev, V. Barannik, Larin Volodymyr, Yuriy Ryabukha
{"title":"Method of image segments compression based on two-level local position representation of vectors","authors":"Andriy Alimpiev, V. Barannik, Larin Volodymyr, Yuriy Ryabukha","doi":"10.1109/AIACT.2017.8020069","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020069","url":null,"abstract":"A technology for distributing the components of the tuple according to the codograms in the combined mode is created, namely, when unequal codograms are constructed with a maximum value constraint under conditions of the length uncertainty of the last chain of zero components.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128504079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Description of the OFDM symbol with the help of mathematical laws. Analysis of technologies that were used in this case 用数学规律描述OFDM符号。分析本案例中使用的技术
V. Barannik, Mykhailo Lytvinenko, D. Okladnoy, O. Suprun
{"title":"Description of the OFDM symbol with the help of mathematical laws. Analysis of technologies that were used in this case","authors":"V. Barannik, Mykhailo Lytvinenko, D. Okladnoy, O. Suprun","doi":"10.1109/AIACT.2017.8020095","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020095","url":null,"abstract":"This document implements a mathematical description of the OFDM symbol. The goal was set to analyze principle and method for forming Gray's code. The description for the signal code construction. The description of a transient process between the bit stream and the analog signal.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research of the synchronous detector of the phase-shift keyed signals in the system UDF MAOPCs 系统UDF MAOPCs中相移键控信号同步检波器的研究
B. Mandziy, K. Chaban, Y. Shapovalov, D. Bachyk
{"title":"The research of the synchronous detector of the phase-shift keyed signals in the system UDF MAOPCs","authors":"B. Mandziy, K. Chaban, Y. Shapovalov, D. Bachyk","doi":"10.1109/AIACT.2017.8020097","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020097","url":null,"abstract":"The paper presents analysis of work of a quadrature demodulator. In the environment of the system UDF MAOPCs (Multivariate Analysis and Optimization of the Parametric Circuits) was analyzed the influence of parameters of input signals and parameters of the synchronous detector on the output signals of the in-phase channel. On the example of the synchronous detector is shown that application of the frequency symbolic method makes it possible to in an explicit form determine the effect of selected parameters of the circuit elements on the characteristics of functional units of telecommunications equipment.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信