{"title":"Detection of Early Reflections in the Room Impulse Response by Estimating the Excess Coefficient at Short Time Intervals","authors":"A. Prodeus, M. Didkovska","doi":"10.1109/PICST54195.2021.9772210","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772210","url":null,"abstract":"A new method of automatic detection of early reflections in room impulse responses is studied. This method consists in estimating the excess coefficient within the impulse response segments into which they are divided, and in comparing these estimates with a certain threshold value. The threshold value choice is based on a predetermined probability of error detection of the burst caused by early reflection and on the length of the segment. The efficiency of this method and the corresponding experimental algorithm is checked with the use of simulated and real room impulse responses. In the case of simulated room impulse responses, the method and algorithm general efficiency have been shown. In the case of real room impulse responses, the first early reflection from the ceiling was correctly detected in 90% of cases, and the error of estimation of time of arrival did not exceed 0.15 ms. These results indicate the effectiveness of the proposed method.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Shestak, Sergii Tolupa, Anna Torchylo, Ogbu James Onyigwang
{"title":"Analysis of Methods for Data Structuring in Data Centers","authors":"Y. Shestak, Sergii Tolupa, Anna Torchylo, Ogbu James Onyigwang","doi":"10.1109/PICST54195.2021.9772154","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772154","url":null,"abstract":"Data Centers are significantly important components of the main part of information systems all over the world. This paper presents an overview of the main stages of information consolidation and a short review of historical origins of data centers - from mainframes to the modern systems. This article is describing core components of Data Centers, their features, functions and purposes. As follows, the performed analysis helps to identify urgent problems that exist in Data Centers and to find the ways to protect data processed in the system. In this paper, we targeted the main models of data structuring in Data Centers to decrease the security of the systems through proposing algorithms that use the methods of artificial intelligence, neural measurements, methods of preliminary analysis, statistics and Natural Language Processing. The study is focused on the investigation of the main areas of Big Data technology application and determining the relationship between the level of efficiency of the cybersecurity system and the profitability of enterprises.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125831264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kharchenko, I. Raichev, I. Bodnarchuk, Oleksandr Matsiuk
{"title":"The Survey of Global Software Design Processes","authors":"A. Kharchenko, I. Raichev, I. Bodnarchuk, Oleksandr Matsiuk","doi":"10.1109/picst54195.2021.9772205","DOIUrl":"https://doi.org/10.1109/picst54195.2021.9772205","url":null,"abstract":"The researches results on applying of hybrid approaches to development of large software projects are discussed in the paper. These approaches include traditional, planned and agile methods of development. The analysis of empirical studding of applying frequency for different technologies and their combinations are shown. The cons and pros of hybrid technologies are examined. The problems of their effectiveness increase are discussed as well by means of architecture design automation and software products quality assurance processes are discussed too.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an Information-Measuring System for Measuring the Dynamic Parameters of Moving Objects","authors":"T. Mansurov, C. Aliyev","doi":"10.1109/PICST54195.2021.9772238","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772238","url":null,"abstract":"It is shown in the work that due to the opposite direction of the sensitivity vectors and the direction of the measured inertial force, the known accelerometers can measure only linear inertia and acceleration varying within relatively small limits. In this regard, the proposed piezoelectric vibration and three-coordinate accelerometers, allowing to increase the influence of inertial force, by increasing the amplitude of the resulting voltage, increase the sensitivity of the piezoelectric vibration accelerometer by 4 … 5 times, increase the created mass during movement and the ability to work in two modes of the piezoelectric bimorph vibrator provide enhanced functionality of the accelerometer and speed measurement by integrating a signal integrator. In addition, a diagram of an information-measuring system is proposed that allows automating the process of measuring the dynamic parameters of moving objects, receiving information about the measured dynamic parameters of moving objects, processing received information, storing and transmitting information to an operator or computer, generating control actions on measured objects, and improving accuracy., speed, reliability, noise immunity, expand the dynamic range of measurements, improve design indicators, quality of metrological support, expand the multifunctionality of the system.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Krasimir Todorov Shishmano, Veselin Popov, P. Popova
{"title":"API Strategy for Enterprise Digital Ecosystem","authors":"Krasimir Todorov Shishmano, Veselin Popov, P. Popova","doi":"10.1109/PICST54195.2021.9772206","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772206","url":null,"abstract":"The digital transformation of business is a process of transition to flexible integration of dynamic systems and platforms, defining new ways to organize the process of value creation. We are witnessing the creation of digital ecosystems based on freely and flexibly integrating modules. Based on a review of theoretical and methodological publications dedicated to the tools for building digital ecosystems - application programming interface (API), the concept of API and understanding of it from the point of view of developer, product manager, business analyst is studied. Its importance for the development of the digital ecosystem is commented. The concept of API economy is presented, which is generally used to denote the creation of a new value based on API. The technical and economic advantages and risks of using the API are indicated. The technical and economic advantages and risks of using the API are indicated. The article assesses the importance of the API strategy for business organizations, discusses some strategies for adapting the API in business systems, and provides assessments and recommendations for choosing an API strategy. Key issues are identified and recommendations for API implementation are given.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kryshtanovych, O. Ilkiv, Vasyl Matviiv, Oleh Pryshliak
{"title":"The Main Threats to the Cybersecurity Management System in the Context of COVID 19","authors":"S. Kryshtanovych, O. Ilkiv, Vasyl Matviiv, Oleh Pryshliak","doi":"10.1109/PICST54195.2021.9772191","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772191","url":null,"abstract":"The main purpose of the article is to form a methodological approach to countering the major threats to the cybersecurity management system in the context of COVID-19. Cybersecurity is a complex conception and requires a careful approach. Today, in conditions when the pandemic has changed all the rules of doing business and requires alternative approaches from the organization management system, talking about the security of the digital space, which is actively used during a pandemic, is very relevant. We have applied methods of expert analysis with the involvement of specialists in the field of cybersecurity and methods of hierarchical ordering of certain threats. Because of our research in the article, an approach was proposed to counter the major threats to the cybersecurity management system in the context of COVID 19. The article is intended to form an approach to countering threats to cybersecurity management systems in organizations. Further research should actively try to apply the proposed approach in practice.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129225711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kuznetsov, Yuriy Gorbenko, A. Kiian, T. Kuznetsova, Yuliia Ulianovska, Tatyana Rudyanova
{"title":"Information Technology for Contact Tracking in the COVID-19 Pandemic","authors":"A. Kuznetsov, Yuriy Gorbenko, A. Kiian, T. Kuznetsova, Yuliia Ulianovska, Tatyana Rudyanova","doi":"10.1109/PICST54195.2021.9772187","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772187","url":null,"abstract":"The development and implementation of the latest information technologies for contact tracking in the context of the COVID-19 pandemic is an extremely important and urgent task, which is directly related to the possible adjustment and mitigation of quarantine restrictions without increasing the risks and threats of infection. In this article, we analyze, research, and substantiate various information technologies (such as Bluetooth, Wi-Fi, GPS, etc.) in contact tracking tools to prevent the spread of infectious diseases. We explore various aspects such as centralization; the need to use a central server (data warehouse); used cryptographic protection algorithms; acceptable actions when establishing contact, etc. The research results make it possible to formulate practical recommendations on the choice of information technologies for building global contact tracing systems.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Chumachenko, I. Meniailov, K. Bazilevych, Serhii Krivtsov
{"title":"Forecasting of COVID-19 Epidemic Process by Random Forest Method","authors":"D. Chumachenko, I. Meniailov, K. Bazilevych, Serhii Krivtsov","doi":"10.1109/PICST54195.2021.9772149","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772149","url":null,"abstract":"The new coronavirus has changed the life of the planet and continues to spread around the world. Mathematical modeling allows the development of effective scientifically substantiated preventive and anti-epidemic measures. Machine learning methods have the highest accuracy when constructing the predicted incidence of infectious diseases. In this work, a model of a random forest was built to calculate the predicted incidence of COVID-19. To verify the model, data on the incidence of coronavirus in Ukraine, Great Britain, Germany and Japan were used. These countries were chosen because have different dynamics of the epidemic process and different control measures.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Productivity of HDL Efficient Coding Models for 5G Information Networks","authors":"I. Pyatin, J. Boiko, O. Eromenko","doi":"10.1109/PICST54195.2021.9772185","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772185","url":null,"abstract":"The article studies the principles of constructing encoders and decoders using the hardware description language (HDL). Models of efficient coding systems for information networks of 5G technology are proposed. Evaluation of the effectiveness of the proposed models was carried out by research and comparison of the performance of turbo codes, LDPC and polar codes. The architecture of efficient coding systems, HDL coding algorithms are described, recommendations are given for the configuration, interleaving, framing, and delay procedures. The productivity of coding systems is carried out by setting the bit error rate (BER) for different information block lengths and coding rates. During the research, signal-code constructions were used that cover various scenarios of reliability and high-throughput networks. It is assumed that the results obtained will be useful in the design processes of practical coding schemes in 5G networks.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Khalimov, Oleksandr Sievierinov, Svitlana Khalimova, Y. Kotukh, Sang-Yoon Chang, Y. Balytskyi
{"title":"Encryption Based on the Group of the Hermitian Function Field and Homomorphic Encryption","authors":"G. Khalimov, Oleksandr Sievierinov, Svitlana Khalimova, Y. Kotukh, Sang-Yoon Chang, Y. Balytskyi","doi":"10.1109/PICST54195.2021.9772219","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772219","url":null,"abstract":"The article proposes a general approach to the implementation of encryption schemes based on the group of automorphisms of the Hermitian functional field. The three-parameter group is used with logarithmic captions outside the center of the group. This time we applied for an encryption scheme based on a Hermitian function field with homomorphic encryption. The use of homomorphic encryption is an advantage of this implementation. The complexity of the attack and the size of the encrypted message depends on the strength of the group.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}