Oleksandra Yeremenko, M. Yevdokymenko, Anatoliy Persikov
{"title":"Flow-aware approach of evaluating probability of compromise in combined structure network","authors":"Oleksandra Yeremenko, M. Yevdokymenko, Anatoliy Persikov","doi":"10.1109/AIACT.2017.8020114","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020114","url":null,"abstract":"A flow-aware approach of evaluating the probability of compromise in combined structure network is presented. Experimental and numerical examples have been used to analyze the influence on flow compromising of security parameters of network links and fragments. It is shown that the proposed approach gives more precise results of calculation the probability of flow compromise when using overlapping routes with series-parallel and combined structure up to 30% in most of cases in relation to the known method, which is used for overlapping paths.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oleksandr V Lemeshko, A. Ilyashenko, O. Nevzorova, Ahmed Mhamed Mal-allah
{"title":"Method of segment hierarchical coordination routing in multi-area network","authors":"Oleksandr V Lemeshko, A. Ilyashenko, O. Nevzorova, Ahmed Mhamed Mal-allah","doi":"10.1109/AIACT.2017.8020115","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020115","url":null,"abstract":"The method of segment hierarchical coordination routing in multi-area network has been proposed. The method based on decomposed implementation of How-based model of inter-area routing and goal coordination principle. In this method on the lower level, there is the calculation of the routing variables, and on the upper level, there is the coordination of the solutions obtained from lower level for providing the connectivity of inter-area routes. The analysis of method convergence to optimal solutions of hierarchical routing was performed.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Klymash, H. Beshley, M. Seliuchenko, T. Maksymyuk
{"title":"Improving architecture of LTE mobile network for IoT services provisioning","authors":"M. Klymash, H. Beshley, M. Seliuchenko, T. Maksymyuk","doi":"10.1109/AIACT.2017.8020101","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020101","url":null,"abstract":"In this paper we analyze the current state of 3G mobile networks in Ukraine and study the prospects and ways of introducing IoT services based on 4G/5G technologies. We improve architecture of LTE mobile network to provide IoT services through the allocation of narrowband spectrum and the transfer of functions from the eNodeB base station to IoT controller. We propose narrowband spectrum allocation method for IoT in LTE spectrum to reduce inter-cell interference impact on the signal-to-noise ratio at the edges of cells. We also propose method of traffic prioritization to ensure IoT E2E QoS in a heterogeneous LTE/IoT network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of forming digital quadrature modulations","authors":"V. Pelishok, Y. V. Sukhyi","doi":"10.1109/AIACT.2017.8020091","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020091","url":null,"abstract":"The paper shows the developed method of forming quadrature amplitude and phase manipulations, using Gray code. This method can significantly reduce the time required for the formation of N-level manipulation, especially high levels.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Services continuous integration based on modern free infrastructure","authors":"O. Lavriv, B. Buhyl, M. Klymash, G. Grynkevych","doi":"10.1109/AIACT.2017.8020087","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020087","url":null,"abstract":"This paper considers the continuous integration (CI) process of user-related services based on free modern software. The CI pipeline consist of source control, quality control, testing, building and deployment of service every time new commit comes to source control server. CI is very important part of service lifecycle due to demands of security and quality assurance at the stage of service deployment. We propose the infrastructure design and pipeline design for CI in this paper. Also, we use server for local repository and docker for deploying services.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Zadereyko, A. Troyanskiy, Nataliia Loginova, E. Trofimenko
{"title":"The implementation of depersonalization algorithm of digital images","authors":"A. Zadereyko, A. Troyanskiy, Nataliia Loginova, E. Trofimenko","doi":"10.1109/AIACT.2017.8020065","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020065","url":null,"abstract":"The study was conducted and the classification of the signs of digital images was proposed in the article. These signs can uniquely identify the digital devices which the images were created. There was proposed the depersonalizing algorithm of digital images to ensure confidentiality during using of different photo, web cameras and scanners. Practical application of the developed depersonalization algorithm of digital images has shown its effectiveness in protecting equipment from identification by third parties by breaking the direct connection between the digital optoelectronic devices and created digital images.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oleksandra Yeremenko, Oleksandr V Lemeshko, Nadia Tariki, A. Hailan
{"title":"Research of optimization model of fault-tolerant routing with bilinear path protection criterion","authors":"Oleksandra Yeremenko, Oleksandr V Lemeshko, Nadia Tariki, A. Hailan","doi":"10.1109/AIACT.2017.8020105","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020105","url":null,"abstract":"A flow-based model of fault-tolerant routing with path protection has been improved. In the course of the improvement, when the fault-tolerant routing problem was presented in optimization form, an optimality criterion has been formulated, which contains the conditions for path protection when it is possible to implement both single path and multipath routing strategies. The novelty of the proposed improvement lies in the fact that the path protection conditions are included in the optimality criterion in bilinear form. The efficiency and adequacy of the proposed improvement of the flow-based model of fault-tolerant routing has been confirmed in a number of computational examples in solving single path and multipath routing problems when implementing the path protection scheme in the network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andriy Alimpiev, V. Barannik, Larin Volodymyr, Yuriy Ryabukha
{"title":"Method of image segments compression based on two-level local position representation of vectors","authors":"Andriy Alimpiev, V. Barannik, Larin Volodymyr, Yuriy Ryabukha","doi":"10.1109/AIACT.2017.8020069","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020069","url":null,"abstract":"A technology for distributing the components of the tuple according to the codograms in the combined mode is created, namely, when unequal codograms are constructed with a maximum value constraint under conditions of the length uncertainty of the last chain of zero components.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128504079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Barannik, Mykhailo Lytvinenko, D. Okladnoy, O. Suprun
{"title":"Description of the OFDM symbol with the help of mathematical laws. Analysis of technologies that were used in this case","authors":"V. Barannik, Mykhailo Lytvinenko, D. Okladnoy, O. Suprun","doi":"10.1109/AIACT.2017.8020095","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020095","url":null,"abstract":"This document implements a mathematical description of the OFDM symbol. The goal was set to analyze principle and method for forming Gray's code. The description for the signal code construction. The description of a transient process between the bit stream and the analog signal.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research of the synchronous detector of the phase-shift keyed signals in the system UDF MAOPCs","authors":"B. Mandziy, K. Chaban, Y. Shapovalov, D. Bachyk","doi":"10.1109/AIACT.2017.8020097","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020097","url":null,"abstract":"The paper presents analysis of work of a quadrature demodulator. In the environment of the system UDF MAOPCs (Multivariate Analysis and Optimization of the Parametric Circuits) was analyzed the influence of parameters of input signals and parameters of the synchronous detector on the output signals of the in-phase channel. On the example of the synchronous detector is shown that application of the frequency symbolic method makes it possible to in an explicit form determine the effect of selected parameters of the circuit elements on the characteristics of functional units of telecommunications equipment.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}