2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Construction of the SDN Transport Network Model using the T-API Interface 基于T-API接口的SDN传输网络模型构建
O. Romanov, N. Korniienko, Hrigorii Burlaka
{"title":"Construction of the SDN Transport Network Model using the T-API Interface","authors":"O. Romanov, N. Korniienko, Hrigorii Burlaka","doi":"10.1109/aict52120.2021.9628980","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628980","url":null,"abstract":"The main purpose of the article is to present the SDN transport network in the form of a model that reflects the basic processes of the real network and allows you to manage service processes with a high degree of adequacy. It is important that the model reflects the basic set of services required to manage the transport network, such as network topology, available resources, element status information, query path calculation for future communications services, network event information, and changes. The main requirement for the model is representation using the principles of NFV (Network Function Virtualization). Then the solution of the tasks of managing such a network can provide a controller or a group of controllers SDN, regardless of the type of hardware implementation of network elements. For this the ONF (Open Networking Foundation) consortium has developed recommendations for building an open T-API. The aim of the article is to consider the principles of building a model of SDN optical transport network, functional architecture of T-API, the list of services needed to manage the transport network, the interaction of the orchestrator and controllers using T-API.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creation Method of Priori Neural Network Data Set for Processing Digital Aerial Photographs in Automatic Mode 自动模式下处理数字航空照片的先验神经网络数据集的创建方法
S. Kovbasiuk, Leonid Kanevskyy, S. Chernyshuk, L. Naumchak, M. Romanchuk
{"title":"Creation Method of Priori Neural Network Data Set for Processing Digital Aerial Photographs in Automatic Mode","authors":"S. Kovbasiuk, Leonid Kanevskyy, S. Chernyshuk, L. Naumchak, M. Romanchuk","doi":"10.1109/aict52120.2021.9628988","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628988","url":null,"abstract":"The availability of large data sets contributes to the rapid expansion of the deep learning methods in general and computer vision methods in particular. At the same time, there is a lack of training data in many areas, which becomes an obstacle to the practical application of computer vision models. The article proposes a creation method of the necessary set of a priori objects images obtained by aerial photography from unmanned aerial vehicles, which differs from existing ones by adaptation to the shooting factors and the specifics of thematic processing objects. The use of the proposed method will allow to significantly reduce the complexity of required data collecting and add increasing techniques, which require less computing resources and enhance the object detection reliability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Formation of Method for Evaluation of Integral Parameters of the Patient’s Condition Monitoring, Forecasting of Consolidated Data 患者病情监测积分参数评价方法的形成,综合数据的预测
Alexander Trunov, V. Koshovyi
{"title":"The Formation of Method for Evaluation of Integral Parameters of the Patient’s Condition Monitoring, Forecasting of Consolidated Data","authors":"Alexander Trunov, V. Koshovyi","doi":"10.1109/aict52120.2021.9628986","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628986","url":null,"abstract":"The integrated indicator is proposed, that connects quantitative and qualitative medical parameters. Its properties are investigated. It is shown that the upper boundary of its estimation depends on the number of parameters that are generalized, and the lower does not depend. Modeling of monitoring of condition parameters at the remote recovery of post-stroke patients is carried out, data compression coefficients are determined.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mobile Application About Earthquake to be Used Before and After a Disaster 一个关于地震的移动应用程序,在灾难发生前后使用
Davut Arslan, Sureyya Fatih Dincer, Pınar Kırcı
{"title":"A Mobile Application About Earthquake to be Used Before and After a Disaster","authors":"Davut Arslan, Sureyya Fatih Dincer, Pınar Kırcı","doi":"10.1109/aict52120.2021.9628969","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628969","url":null,"abstract":"Earthquake is one of the biggest natural disasters in the world. Earthquakes cause both loss of life and property. It is one of the big problems in Turkey. The aim of the project is to provide information about earthquakes that may occur in our country and to raise awareness before an earthquake. In the project, there is a section containing the emergency numbers that people can use at the time of the earthquake, a section showing what should be in the earthquake bag to be used after the earthquake, in order of importance, and a general purpose comfortable section that helps to locate the casualty by making a sound during the earthquake. Therefore, a mobile application with many earthquake-related information and functions is presented. In the study, the reason for making a mobile project is that people will be able to access the application much more easily.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"42 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113934069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method for Evaluating the Quality of Service Characteristic of a Packet Access Network for IoT Devices 物联网设备分组接入网业务质量特性评价方法
A. Lozhkovskyi, M. Klymash, Yuliia Pyrih, O. Shpur
{"title":"Method for Evaluating the Quality of Service Characteristic of a Packet Access Network for IoT Devices","authors":"A. Lozhkovskyi, M. Klymash, Yuliia Pyrih, O. Shpur","doi":"10.1109/aict52120.2021.9628912","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628912","url":null,"abstract":"This paper presents a method for assessing such a service quality characteristic as packet access network bandwidth for IoT devices. To determine the real bandwidth proposed its mathematical apparatus at the level of calls and at the level of packets, which allowed to fully explore the traffic of IP-communications. At the call level from IoT devices, the Engsett model through small groups of devices themselves is used for traffic, and at the packet level, the self-similar flow model is used. Calculation of the characteristics of the quality of service in the packet communication network is reduced to determining the Hurst coefficient of self-similarity of traffic, after which the average number of packets in the system is calculated using the known formula of Norros.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Representation of Quantum Signal Simulating 量子信号模拟的表征
B. Yavorskyy
{"title":"Representation of Quantum Signal Simulating","authors":"B. Yavorskyy","doi":"10.1109/aict52120.2021.9628977","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628977","url":null,"abstract":"The Newton’s laws had been developed on basis experiments with nature signals, and by hand computation for processing of these signals. The signal carries the code of data. The carrier is a wave - the process of transfer in space and time (physical space) of the code. Then the parameters of this transfer determines the state of the signals in time and space. The design of quantum communication systems, information technology, etc. modeling of quantum signals is a complex problem of representation of the carrier, the signal code, and their quantum states. Quantum computing, and explaining on resolving of application tasks (RSA, FFT algorithm, quantum circuits, etc.) in physical the scales theories and practices (in mechanics and quantum mechanics) are different in technics, algorithmic, and the simulation. All of these significantly does complexity of the design of quantum communication systems. This paper discusses the representation of a quantum signal as its general relationship with the difference of digitized sinusoidal functions with different digitization parameters obtained by a classical computer. This difference is considered similar to squeezed states with different sets of digitization parameters. The peculiarities of the obtained difference signatures with respect to similar quantum phenomena are classified. The representation of modeling of a quantum signal by possibilities of the classical computer as it was developed for quantum states, schemes, protocols is offered.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correcting Defective Trajectories using Conditional GAN 利用条件GAN修正缺陷轨迹
Marek Ruzicka, Marcel Volosin, J. Gazda, T. Maksymyuk, Y. Bobalo
{"title":"Correcting Defective Trajectories using Conditional GAN","authors":"Marek Ruzicka, Marcel Volosin, J. Gazda, T. Maksymyuk, Y. Bobalo","doi":"10.1109/aict52120.2021.9628933","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628933","url":null,"abstract":"The end-user mobility patterns play a key role in the process of 5G network design. During tracking end-users via GPS, errors can appear. While we are still constrained with a very limited number of commercially available trajectory datasets, a possible solution is to extend an existing dataset using a generative adversarial network (GAN). Our previous work showed that the utilization of GAN in a form of artificial trajectory generator is possible but not flawless as it introduces the issue with unreasonable gaps between trajectory’s consecutive GPS coordinates. To overcome this issue with a generated dataset and with authentic data as well a special type of GAN called conditional GAN can be used. By leveraging this approach we are not only able to generate a potentially unlimited number of new data samples but as well to correct the existing ones. The number of missing datapoints in the trajectory can go as low as 95% of all points. This artificial intelligence approach has the potential to be used in various use cases where trajectory data are defective and need to be corrected.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124373869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Short-term Load Forecasting Model for Smart Grid 智能电网短期负荷预测模型
Jian Wang, Shuhui Yi, Shao Xing, Hao Liu, Jian Liu, Genrong Wang, Chunzhi Wang
{"title":"Short-term Load Forecasting Model for Smart Grid","authors":"Jian Wang, Shuhui Yi, Shao Xing, Hao Liu, Jian Liu, Genrong Wang, Chunzhi Wang","doi":"10.1109/aict52120.2021.9628976","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628976","url":null,"abstract":"In the economic dispatch of power system. How to reasonably use the past and present of power load to speculate its future value has very long-term socio-economic value. Short-term power load forecasting is mainly used to predict the power load in the next few hours or days. The relationship between weather factors and load changes is very important for short-term forecasting. Short-term power load data has obvious temporal characteristics, and the traditional RNN model is more and more applied in this field. However, the RNN model may have gradient explosion or gradient disappearance. Therefore, based on the long-term and short-term memory neural network (LSTM), an improved AM-LSTM short-term load forecasting model is presented. The model improves the activation function in LSTM unit into weighted activation function group, and adds attention mechanism to improve the prediction accuracy.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Node Deployment Optimization Method of Wireless Sensor Network Based on Firefly Algorithm 基于Firefly算法的无线传感器网络节点部署优化方法
Wei Liu, Pan Li, Z. Ye, Shuai Yang
{"title":"A Node Deployment Optimization Method of Wireless Sensor Network Based on Firefly Algorithm","authors":"Wei Liu, Pan Li, Z. Ye, Shuai Yang","doi":"10.1109/aict52120.2021.9628937","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628937","url":null,"abstract":"for making the deployment distribution of wireless sensor network nodes more uniform and improve coverage, this paper proposes a node deployment optimization method based on the firefly algorithm. Firstly, a mathematical model is established to randomly deploy wireless sensor network nodes in the target area, and then the node deployment optimization problem is interpreted as a mathematical issue of searching extreme value; Finally, firefly algorithm is used for optimizing the location of wireless sensor network nodes stochastically deployed in the specified place to obtain this maximum coverage and complete the deployment. Experimental simulation results show that compared with genetic algorithm and particle swarm optimization algorithm, firefly algorithm can better avoid sinking into local optimum and avoid premature convergence. Compared with other two algorithm, the firefly algorithm has a faster search speed, better performance, and better stability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126182917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information Security During Electronic Voting: Threats and Mechanisms for Ensuring 电子投票中的信息安全:威胁与保障机制
M. Buchyn, A. Helesh, B. Shubyn
{"title":"Information Security During Electronic Voting: Threats and Mechanisms for Ensuring","authors":"M. Buchyn, A. Helesh, B. Shubyn","doi":"10.1109/aict52120.2021.9628971","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628971","url":null,"abstract":"The essence and features of electronic voting have been revealed. The main threats to information security during electronic voting have been shown. The main mechanisms for neutralizing existing threats and ensuring information security of electronic voting have been proposed.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信