{"title":"Construction of the SDN Transport Network Model using the T-API Interface","authors":"O. Romanov, N. Korniienko, Hrigorii Burlaka","doi":"10.1109/aict52120.2021.9628980","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628980","url":null,"abstract":"The main purpose of the article is to present the SDN transport network in the form of a model that reflects the basic processes of the real network and allows you to manage service processes with a high degree of adequacy. It is important that the model reflects the basic set of services required to manage the transport network, such as network topology, available resources, element status information, query path calculation for future communications services, network event information, and changes. The main requirement for the model is representation using the principles of NFV (Network Function Virtualization). Then the solution of the tasks of managing such a network can provide a controller or a group of controllers SDN, regardless of the type of hardware implementation of network elements. For this the ONF (Open Networking Foundation) consortium has developed recommendations for building an open T-API. The aim of the article is to consider the principles of building a model of SDN optical transport network, functional architecture of T-API, the list of services needed to manage the transport network, the interaction of the orchestrator and controllers using T-API.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kovbasiuk, Leonid Kanevskyy, S. Chernyshuk, L. Naumchak, M. Romanchuk
{"title":"Creation Method of Priori Neural Network Data Set for Processing Digital Aerial Photographs in Automatic Mode","authors":"S. Kovbasiuk, Leonid Kanevskyy, S. Chernyshuk, L. Naumchak, M. Romanchuk","doi":"10.1109/aict52120.2021.9628988","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628988","url":null,"abstract":"The availability of large data sets contributes to the rapid expansion of the deep learning methods in general and computer vision methods in particular. At the same time, there is a lack of training data in many areas, which becomes an obstacle to the practical application of computer vision models. The article proposes a creation method of the necessary set of a priori objects images obtained by aerial photography from unmanned aerial vehicles, which differs from existing ones by adaptation to the shooting factors and the specifics of thematic processing objects. The use of the proposed method will allow to significantly reduce the complexity of required data collecting and add increasing techniques, which require less computing resources and enhance the object detection reliability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Formation of Method for Evaluation of Integral Parameters of the Patient’s Condition Monitoring, Forecasting of Consolidated Data","authors":"Alexander Trunov, V. Koshovyi","doi":"10.1109/aict52120.2021.9628986","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628986","url":null,"abstract":"The integrated indicator is proposed, that connects quantitative and qualitative medical parameters. Its properties are investigated. It is shown that the upper boundary of its estimation depends on the number of parameters that are generalized, and the lower does not depend. Modeling of monitoring of condition parameters at the remote recovery of post-stroke patients is carried out, data compression coefficients are determined.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Application About Earthquake to be Used Before and After a Disaster","authors":"Davut Arslan, Sureyya Fatih Dincer, Pınar Kırcı","doi":"10.1109/aict52120.2021.9628969","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628969","url":null,"abstract":"Earthquake is one of the biggest natural disasters in the world. Earthquakes cause both loss of life and property. It is one of the big problems in Turkey. The aim of the project is to provide information about earthquakes that may occur in our country and to raise awareness before an earthquake. In the project, there is a section containing the emergency numbers that people can use at the time of the earthquake, a section showing what should be in the earthquake bag to be used after the earthquake, in order of importance, and a general purpose comfortable section that helps to locate the casualty by making a sound during the earthquake. Therefore, a mobile application with many earthquake-related information and functions is presented. In the study, the reason for making a mobile project is that people will be able to access the application much more easily.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"42 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113934069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Lozhkovskyi, M. Klymash, Yuliia Pyrih, O. Shpur
{"title":"Method for Evaluating the Quality of Service Characteristic of a Packet Access Network for IoT Devices","authors":"A. Lozhkovskyi, M. Klymash, Yuliia Pyrih, O. Shpur","doi":"10.1109/aict52120.2021.9628912","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628912","url":null,"abstract":"This paper presents a method for assessing such a service quality characteristic as packet access network bandwidth for IoT devices. To determine the real bandwidth proposed its mathematical apparatus at the level of calls and at the level of packets, which allowed to fully explore the traffic of IP-communications. At the call level from IoT devices, the Engsett model through small groups of devices themselves is used for traffic, and at the packet level, the self-similar flow model is used. Calculation of the characteristics of the quality of service in the packet communication network is reduced to determining the Hurst coefficient of self-similarity of traffic, after which the average number of packets in the system is calculated using the known formula of Norros.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Representation of Quantum Signal Simulating","authors":"B. Yavorskyy","doi":"10.1109/aict52120.2021.9628977","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628977","url":null,"abstract":"The Newton’s laws had been developed on basis experiments with nature signals, and by hand computation for processing of these signals. The signal carries the code of data. The carrier is a wave - the process of transfer in space and time (physical space) of the code. Then the parameters of this transfer determines the state of the signals in time and space. The design of quantum communication systems, information technology, etc. modeling of quantum signals is a complex problem of representation of the carrier, the signal code, and their quantum states. Quantum computing, and explaining on resolving of application tasks (RSA, FFT algorithm, quantum circuits, etc.) in physical the scales theories and practices (in mechanics and quantum mechanics) are different in technics, algorithmic, and the simulation. All of these significantly does complexity of the design of quantum communication systems. This paper discusses the representation of a quantum signal as its general relationship with the difference of digitized sinusoidal functions with different digitization parameters obtained by a classical computer. This difference is considered similar to squeezed states with different sets of digitization parameters. The peculiarities of the obtained difference signatures with respect to similar quantum phenomena are classified. The representation of modeling of a quantum signal by possibilities of the classical computer as it was developed for quantum states, schemes, protocols is offered.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marek Ruzicka, Marcel Volosin, J. Gazda, T. Maksymyuk, Y. Bobalo
{"title":"Correcting Defective Trajectories using Conditional GAN","authors":"Marek Ruzicka, Marcel Volosin, J. Gazda, T. Maksymyuk, Y. Bobalo","doi":"10.1109/aict52120.2021.9628933","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628933","url":null,"abstract":"The end-user mobility patterns play a key role in the process of 5G network design. During tracking end-users via GPS, errors can appear. While we are still constrained with a very limited number of commercially available trajectory datasets, a possible solution is to extend an existing dataset using a generative adversarial network (GAN). Our previous work showed that the utilization of GAN in a form of artificial trajectory generator is possible but not flawless as it introduces the issue with unreasonable gaps between trajectory’s consecutive GPS coordinates. To overcome this issue with a generated dataset and with authentic data as well a special type of GAN called conditional GAN can be used. By leveraging this approach we are not only able to generate a potentially unlimited number of new data samples but as well to correct the existing ones. The number of missing datapoints in the trajectory can go as low as 95% of all points. This artificial intelligence approach has the potential to be used in various use cases where trajectory data are defective and need to be corrected.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124373869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Short-term Load Forecasting Model for Smart Grid","authors":"Jian Wang, Shuhui Yi, Shao Xing, Hao Liu, Jian Liu, Genrong Wang, Chunzhi Wang","doi":"10.1109/aict52120.2021.9628976","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628976","url":null,"abstract":"In the economic dispatch of power system. How to reasonably use the past and present of power load to speculate its future value has very long-term socio-economic value. Short-term power load forecasting is mainly used to predict the power load in the next few hours or days. The relationship between weather factors and load changes is very important for short-term forecasting. Short-term power load data has obvious temporal characteristics, and the traditional RNN model is more and more applied in this field. However, the RNN model may have gradient explosion or gradient disappearance. Therefore, based on the long-term and short-term memory neural network (LSTM), an improved AM-LSTM short-term load forecasting model is presented. The model improves the activation function in LSTM unit into weighted activation function group, and adds attention mechanism to improve the prediction accuracy.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Node Deployment Optimization Method of Wireless Sensor Network Based on Firefly Algorithm","authors":"Wei Liu, Pan Li, Z. Ye, Shuai Yang","doi":"10.1109/aict52120.2021.9628937","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628937","url":null,"abstract":"for making the deployment distribution of wireless sensor network nodes more uniform and improve coverage, this paper proposes a node deployment optimization method based on the firefly algorithm. Firstly, a mathematical model is established to randomly deploy wireless sensor network nodes in the target area, and then the node deployment optimization problem is interpreted as a mathematical issue of searching extreme value; Finally, firefly algorithm is used for optimizing the location of wireless sensor network nodes stochastically deployed in the specified place to obtain this maximum coverage and complete the deployment. Experimental simulation results show that compared with genetic algorithm and particle swarm optimization algorithm, firefly algorithm can better avoid sinking into local optimum and avoid premature convergence. Compared with other two algorithm, the firefly algorithm has a faster search speed, better performance, and better stability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126182917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security During Electronic Voting: Threats and Mechanisms for Ensuring","authors":"M. Buchyn, A. Helesh, B. Shubyn","doi":"10.1109/aict52120.2021.9628971","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628971","url":null,"abstract":"The essence and features of electronic voting have been revealed. The main threats to information security during electronic voting have been shown. The main mechanisms for neutralizing existing threats and ensuring information security of electronic voting have been proposed.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}