I. Shubin, S. Solonska, Stanislav Snisar, V. Zhyrnov, V. Slavhorodskyi, Victoria Skovorodnikova
{"title":"Efficiency Evaluation for Radar Signal Processing on the Basis of Spectral-Semantic Model","authors":"I. Shubin, S. Solonska, Stanislav Snisar, V. Zhyrnov, V. Slavhorodskyi, Victoria Skovorodnikova","doi":"10.1109/TCSET49122.2020.235416","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235416","url":null,"abstract":"The paper presents the methodology and results of efficiency evaluation of the radar signal markers processing based on the spectral-semantic model. The effectiveness of the semantic method for processing spectral images in the selection of moving objects against a background of passive interference is compared with the efficiency of digital optimal and quasi- optimal detection methods for radar signals. The expediency of the application of functional-semantic methods for processing virtual radar images in the conditions of non-stationary interference of the angel-echo type is shown.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model and method of chunk processing of payload for HTTP authorization protocols","authors":"Sergei Surkov","doi":"10.1109/TCSET49122.2020.235447","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235447","url":null,"abstract":"The existing HTTP authorizations methods, which guarantee the authentication of the payload were analyzed. The most implementations of modern existing servers and their extensions are optimized for a small payload size. A new method of authorization for HTTP protocols for requests with large payload was proposed. In order to apply the chunking approach, HTTP and HTTP/2 protocols were decomposed to states for blocking and non-blocking mode. The method was described and techniques of its implementation for HTTP and HTTP/2 protocols were developed. The new method was applied to OAuth 1.0a original and our modified version. The analysis of the newly developed method showed greater efficiency than the standard approach. As a result, the new method enhanced the web services to verify requests with large payload size and not prone to denial of service attacks.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid approach to building object-oriented programs with databases","authors":"V. Sokolov, Ihor Subach, S. Toliupa","doi":"10.1109/TCSET49122.2020.235524","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235524","url":null,"abstract":"the paper proposes a way to represent tasks as components of programs based on the architecture of integral objects and using relational databases. The graphical, tabular and formulaic representation of the tasks, as well as the relational query language, are given as a means of expressing the tasks, which allows applying this approach both during design and for code generation to execute the tasks. The approach allows integrating a relational database model, functional business-logic of database and objects of the server application, as well as a user interface into a single presentation.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying the Perceived Contrast of Complex Images","authors":"S. Yelmanov, Y. Romanyshyn","doi":"10.1109/TCSET49122.2020.235445","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235445","url":null,"abstract":"This paper addresses the problem of no-reference assessing the overall image contrast. The purpose of this work is to increase the accuracy of quantifying the perceived contrast of the multi-element image. To this end, we propose a new approach to quantify the perceived contrast of a complex multi-element image. The proposed approach is based on the analysis of the dependencies of brightness increments on the image adaptation level and the size ratio of image elements. Based on the proposed approaches, new techniques for quantifying the incomplete integral contrast also are considered. Research confirms the effectiveness of the proposed approach to quantifying the perceived contrast of complex images.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125038183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Green-Based Quantitative Assay Using Time Series to Detect Risks","authors":"B. Bakay, I. Rudko, S. Horzov, Iryna Brohovska","doi":"10.1109/TCSET49122.2020.235455","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235455","url":null,"abstract":"Designing efficient algorithms for forecasting of the state of the environment is one of the most important challenges in the field of time series analysis and accurate prediction. With the exponential rate of development of remote sensing and with the availability of fast computing platforms, it has now become possible to effectively and efficiently make use of vulnerability indicators forest stands.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125176028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Determination of Vehicle Longitude","authors":"V. Avrutov, L. Ryzhkov, O. Sushchenko","doi":"10.1109/TCSET49122.2020.235406","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235406","url":null,"abstract":"Paper deals with an algorithm for obtaining the vehicle’s longitude. Methods of full autonomous determination of initial positioning are represented. The process describes the longitude determining designed on the initial latitude obtaining. The strap-down inertial technology is used for initial latitude determination. The inertial measurement unit should be consisted of a set of gyroscopes and accelerometers. The longitude determination is described for both ways of moving base - orthodromic and loxodromic movements. The error of longitude determination is derived. It is shown that the error model depends on azimuth and latitude errors.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring of Web Service Availability in Distributed Infocommunication Systems","authors":"M. Klymash, Nazar Peleh, O. Shpur, S. Hladun","doi":"10.1109/TCSET49122.2020.235528","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235528","url":null,"abstract":"In this paper we improved technique of securing the web services against DDoS attacks based on the analysis of service information, which is based on monitoring of session duration from log files. This will increase the effectiveness of monitoring the security of web applications in distributed information systems after the attack of the first stage of its protection. The algorithm for monitoring the status of system based on log messages that are written to a file during the firewall stage has been proposed. Each message contains such information as web service request time and ip address. Using the time of access to the web service, you can track the attendance, and in the case of sharp differences with the number of visits in the previous intervals, to say about a possible attack. IP addresses us by tracking the number of requests from each request source, tracking who is causing the attack. Investigation of the effectiveness of the developed web application for monitoring of the security system in distributed information communications systems has shown that at a time when the number of visits is increasing dramatically, the incoming requests queue is growing rapidly. This indicates a possible attack.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Noise filtration By Random Point Processes","authors":"R. Kosarevych, V. Korniy, O. Lutsyk, B. Rusyn","doi":"10.1109/TCSET49122.2020.235481","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235481","url":null,"abstract":"A new method for identifying pixels as \"corrupted\" by noise is proposed in this paper for effectively denoising corrupted images. Unlike conventional filtration approaches that apply the filtration operation to each pixel unconditionally or by implementing a noise detection mechanism before filtration we propose to identify noise pixels by their position. As a model for noise pixels placement, we consider random or regular point patterns. To distinguish such pixels placements we form point patterns for image intensity from predefined range and apply a Clark- Evans test to identify the right ones. Next, the conventional filtration approach is applied to each pixel of intensities that form random or regular patterns. This approach allowed to increase a PNSR value and to reduce DSSIM one.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Polina Zhernova, Yevgeniy V. Bodyanskiy, Bohdan Yatsenko, I. Zavgorodnii
{"title":"Detection and Prevention of Professional Burnout Using Machine Learning Methods","authors":"Polina Zhernova, Yevgeniy V. Bodyanskiy, Bohdan Yatsenko, I. Zavgorodnii","doi":"10.1109/TCSET49122.2020.235426","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235426","url":null,"abstract":"Emotional burnout syndrome is an emotional condition that can be recognized mostly among social service employees. Indications of burnout are chronic fatigue, emotional drain and cynicism towards colleagues, patients and job at all. There are Maslach Burnout Inventory a questionnaire which provides to detect burnout condition and intensity of that condition. The propose to apply machine learning approaches is to predict early prerequisites of job burnout in employees. Initial data set was processed and labeled for machine learning models. Burnout is correctly predicted in 70% of cases.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oleksandr V Lemeshko, Oleksandra Yeremenko, M. Yevdokymenko, A. Hailan
{"title":"Tensor Based Load Balancing under Self-Similar Traffic Properties with Guaranteed QoS","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, M. Yevdokymenko, A. Hailan","doi":"10.1109/TCSET49122.2020.235442","DOIUrl":"https://doi.org/10.1109/TCSET49122.2020.235442","url":null,"abstract":"The paper proposes a tensor based load balancing multiflow model under self-similar traffic properties with guaranteed QoS. The novelty of the proposed model is that it is aimed at providing demanded values of QoS indicators such as flow rate and average packet delay taking into account the self-similarity of data traffic when calculating average packet delay in the link, which was also used in formation of the metric tensor. Providing the required numerical values of the QoS indicators was achieved by introducing into the model the corresponding Quality of Service ensuring conditions. The numerical research results for the data traffic flows with different values of QoS indicators confirmed the adequacy of the obtained solutions.","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}