2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes 自适应编码方法的发展,用类巴克码实时解码数据
Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus
{"title":"Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes","authors":"Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus","doi":"10.1109/aict52120.2021.9628911","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628911","url":null,"abstract":"An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Dipole Model Based Coherent Radar Target Decomposition 基于双偶极子模型的相干雷达目标分解
D. Kalimullin, A. Popov
{"title":"Two-Dipole Model Based Coherent Radar Target Decomposition","authors":"D. Kalimullin, A. Popov","doi":"10.1109/aict52120.2021.9628926","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628926","url":null,"abstract":"A method for recovering objects parameters by experimental data based on the two-dipole model of target representing is discussed in the paper. The goal of the investigation is to develop the method of remote sensing objects parameters definition by measured data. A considered method is built on analysis of analytic expressions of PSM elements for a two-dipole mathematical model of object representation. The proposed method was applied to recover the parameters of different objects for which complex PSM’s were experimentally obtained. Some objects signatures were obtained and considered based on recovered parameters and provided their statistical analysis. Obtained results indicate the adequacy of the two-dipole model and appliance for modelling the real objects prototypes to study the process of transforming electromagnetic waves at reflecting from object also a possibility of radar targets imitating. Obtained results can be useful in solving radar objects recognition and classification problems.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Routing with Power Link Blocking Model and Load Balancing 基于电源链路阻塞模型和负载均衡的安全路由
Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan
{"title":"Secure Routing with Power Link Blocking Model and Load Balancing","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan","doi":"10.1109/aict52120.2021.9628938","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628938","url":null,"abstract":"The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Hardware for Digital Control System of Pulsed NQR Spectrometer 脉冲NQR光谱仪数字控制系统的硬件开发
I. Safronov, T. Kazemirskiy, Andrii Samila
{"title":"Development of Hardware for Digital Control System of Pulsed NQR Spectrometer","authors":"I. Safronov, T. Kazemirskiy, Andrii Samila","doi":"10.1109/aict52120.2021.9628953","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628953","url":null,"abstract":"The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP TCP/IP协议不同阶段信息系统犯罪实现可能性评价
I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo
{"title":"Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP","authors":"I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo","doi":"10.1109/aict52120.2021.9628936","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628936","url":null,"abstract":"The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of COVID-19 Dynamics using Ridge Regression 基于脊回归的COVID-19动态模拟
D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko
{"title":"Simulation of COVID-19 Dynamics using Ridge Regression","authors":"D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko","doi":"10.1109/aict52120.2021.9628991","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628991","url":null,"abstract":"The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis 用于指纹样本合成的自适应深度卷积GAN
Oleksandr Striuk, Yuriy Kondratenko
{"title":"Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis","authors":"Oleksandr Striuk, Yuriy Kondratenko","doi":"10.1109/aict52120.2021.9628978","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628978","url":null,"abstract":"Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things 5G LTE窄带工业物联网中超可靠低延迟通信的无线电资源管理方法
Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley
{"title":"Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things","authors":"Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley","doi":"10.1109/aict52120.2021.9628913","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628913","url":null,"abstract":"We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"41 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality 基于微处理器的扩展功能电气负荷控制系统的概念
Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko
{"title":"A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality","authors":"Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko","doi":"10.1109/aict52120.2021.9628945","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628945","url":null,"abstract":"To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of coding dynamic sequence of frame-spline structures of provided frames in info-communications 信息通信中所提供帧的帧样条结构动态序列的编码方法
V. Barannik, N. Barannik, Yu. G. Babenko, Victoriya Himenko, Vitaliy Tverdokhlib
{"title":"Method of coding dynamic sequence of frame-spline structures of provided frames in info-communications","authors":"V. Barannik, N. Barannik, Yu. G. Babenko, Victoriya Himenko, Vitaliy Tverdokhlib","doi":"10.1109/aict52120.2021.9628928","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628928","url":null,"abstract":"This paper explains the general technological principle in the process of coding the sequence of predicted frames and their blocks in the spectrally differentiated space for coding methods of the H26 family *. There is the application of frame processing depending on their type in the stream and weight to video resource and their integrity. Problems for the existing technologies of processing a set of positional coordinates that describe the length of insignificant components of transformants are revealed. The main stages of the creation method of coding a dynamic sequence of frame-spline structures of the provided shots in info-communications are stated.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信