2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)最新文献

筛选
英文 中文
The Method of Adaptive Control of the Process of Human-Machine Interaction to Ensure the Reliability and Efficiency of Automated Control Systems 人机交互过程的自适应控制方法保证自动化控制系统的可靠性和效率
E. Lavrov, O. Siryk, B. Rybalov, D. Velykodnyi
{"title":"The Method of Adaptive Control of the Process of Human-Machine Interaction to Ensure the Reliability and Efficiency of Automated Control Systems","authors":"E. Lavrov, O. Siryk, B. Rybalov, D. Velykodnyi","doi":"10.1109/PICST54195.2021.9772126","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772126","url":null,"abstract":"The necessity of new approaches to the search for ergonomic reserves of increasing the efficiency of dialogue automated systems focused on adapting the dialogue to the characteristics of human operators has been substantiated. The problems of designing adaptive interfaces are characterized. The expediency of including a model of the “functional network” type with the dialogue control system, which allows modeling alternative options for organizing a dialogue, is shown. The nomenclature of dialogue management procedures has been substantiated, which ensures the required reliability and compliance with ergonomic norms and requirements. The proposed models are convenient for embedding into control systems for dialogue interaction and provide reliability, flexibility and convenience of automated systems for various purposes.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualization of Network Functions for the Implementation of Modern Routing Methods 实现现代路由方法的网络功能虚拟化
O. Starkova, Kyryl Nikolchev, K. Herasymenko, Yurii Ahafonov, Mykola Yastrebov
{"title":"Virtualization of Network Functions for the Implementation of Modern Routing Methods","authors":"O. Starkova, Kyryl Nikolchev, K. Herasymenko, Yurii Ahafonov, Mykola Yastrebov","doi":"10.1109/PICST54195.2021.9772222","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772222","url":null,"abstract":"The article discusses the existing routing methods, their advantages and disadvantages. It was discovered that to solve the routing methods disadvantages it is necessary to use the concept of Network Functions Virtualization (ETSI ISG NFV). There were also showed the capabilities of future routing methods programming.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing Approaches of IT Infrastructure Audit 资讯科技基础架构审核的评估方法
F. Kipchuk, V. Sokolov, P. Skladannyi, D. Ageyev
{"title":"Assessing Approaches of IT Infrastructure Audit","authors":"F. Kipchuk, V. Sokolov, P. Skladannyi, D. Ageyev","doi":"10.1109/PICST54195.2021.9772181","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772181","url":null,"abstract":"The paper presents a brief overview of information security components criteria. Further analysis of common schemas in financial and commerce sectors determining common items as IT security subjects. Lead and general security standards are analyzed for the approach of determining the scope for auditing IT infrastructure. Schemes typical for financial and commerce sectors are analyzed for identifying typical and individual IT subjects. A new approach for determining scope is purposed. Comparison of new and general approaches is shown on examples of basic schemas of companies. Testing of the approach described.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Innovative HR-Engineering Personnel Management to Ensure the Security of Economic Structures 创新人力资源工程人事管理保障经济结构安全
M. Vedernikov, Natalia Bazaliyska, Maria Zelena, L. Volianska-Savchuk, I. Shelest, Olena Mantur-Chubata
{"title":"Innovative HR-Engineering Personnel Management to Ensure the Security of Economic Structures","authors":"M. Vedernikov, Natalia Bazaliyska, Maria Zelena, L. Volianska-Savchuk, I. Shelest, Olena Mantur-Chubata","doi":"10.1109/PICST54195.2021.9772125","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772125","url":null,"abstract":"In this work, a fundamentally new innovative HR-technology of headhunting is justified and formulated as an element of improving the business process of personnel selection at the enterprise. An algorithm for making decisions using innovative HR-technology of headhunting at the enterprise has been improved. The types of candidates in the negotiations during the implementation of HR-headhunting technology have been established. The validity of staff selection methods in the process of implementing the headhunting business procedure has been determined. A headhunting procedure has been developed using the mathematical method of solving multi-criterion optimization problems based on an additive criterion. The algorithm of business process of headhunting with use of mathematical methods is constructed. A clear rating of HR candidates has been formed using innovative headhunting technology, which will allow the selection of the best specialists for professional business activities.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121288410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Arithmetic Operations in the Residue Numeral System 余数系统中算术运算的实现
V. Krasnobayev, A. Kuznetsov, K. Kuznetsova, T. Ivko
{"title":"Implementation of Arithmetic Operations in the Residue Numeral System","authors":"V. Krasnobayev, A. Kuznetsov, K. Kuznetsova, T. Ivko","doi":"10.1109/PICST54195.2021.9772148","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772148","url":null,"abstract":"To improve the performance of computer systems, special number systems can be used, for example, the residue numeral system (RNS). Replacing integers with their values modulo several pairwise coprime integers (called the moduli) can significantly reduce the complexity of arithmetic operations. However, the different way of representing numbers makes it difficult to use RNS in practice. For example, integers represented in a positional numeral system need to be quickly converted to RNS and vice versa. In addition, the implementation of computing devices operating in the RNS must also take into account the peculiarities of representing numbers as residuals on coprime bases. In this article, we look at the various structures of computing devices in RNS. In particular, we present the arithmetic operations of addition modulo and give examples of adders.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Approches to Solving Problems of Information Security for a Small Enterprise 解决小型企业信息安全问题的现代方法
A. Zhuravka, D. Ageyev, A. Chugay
{"title":"Modern Approches to Solving Problems of Information Security for a Small Enterprise","authors":"A. Zhuravka, D. Ageyev, A. Chugay","doi":"10.1109/picst54195.2021.9772112","DOIUrl":"https://doi.org/10.1109/picst54195.2021.9772112","url":null,"abstract":"the research presents the approach to solving the problems of choosing tools and methods of ensuring information security in conditions of a limited budget and to justify a set of measures, aimed at ensuring information security for a small enterprise","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Technology of Forming a 3D Object 形成三维物体的信息技术
Bohdan Kovalskyi, Myroslava Dubnevych, Z. Selmenska, T. Holubnyk, Nataliya Zanko, N. Snihur
{"title":"Information Technology of Forming a 3D Object","authors":"Bohdan Kovalskyi, Myroslava Dubnevych, Z. Selmenska, T. Holubnyk, Nataliya Zanko, N. Snihur","doi":"10.1109/PICST54195.2021.9772167","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772167","url":null,"abstract":"Over the past decade, the demand for a profession in the field of 3D modeling has grown exponentially. The article discusses the advantages and disadvantages of selected modern additive technologies, as well as their classification. By the method of approximating the geometric figure of a point type of object - the Eiffel Tower, which is printed on the output devices of 3D printing. Important problems in the formation of a 3D product are listed. An algorithm for creating any printed object in a format understandable by 3D equipment has been built.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks 网络攻击监控、入侵检测与识别方法分析
T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov
{"title":"Analysis of Approaches of Monitoring, Intrusion Detection and Identification of Network Attacks","authors":"T. Radivilova, I. Dobrynin, Oleksandr V Lemeshko, D. Ageyev, Andrii Ilkov","doi":"10.1109/PICST54195.2021.9772226","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772226","url":null,"abstract":"Ensuring the security of cloud data, computing and applications is an urgent task. The main methods of web-application development and existing ways to improve information security at all stages of product development are considered. The main characteristics of cloud computing providers are described. It also compares different types of infrastructures and cloud computing providers and analyzes modern tools for process automation. The work includes an analysis of modern software development methodologies, as well as an analysis of data providers to ensure the protection of information in their use.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formalized Designing Methodology of ISMS for Critical Infrastructure 关键基础设施ISMS的形式化设计方法
Yuliia Ulianovska, Serhii Florov, A. Hrebeniuk, T. Katkova, D. Prokopovich-Tkachenko, R.Y. Gvozdov
{"title":"Formalized Designing Methodology of ISMS for Critical Infrastructure","authors":"Yuliia Ulianovska, Serhii Florov, A. Hrebeniuk, T. Katkova, D. Prokopovich-Tkachenko, R.Y. Gvozdov","doi":"10.1109/PICST54195.2021.9772182","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772182","url":null,"abstract":"Today, the functioning of the state is impossible without a developed information infrastructure. Such systems are already considered as critical infrastructure. The architecture of information systems is growing along with the number of services they provide. Designing flaws of such systems can critically affect the safety of their operation. As information and telecommunication systems become more complex, security is becoming an important issue, where a formal approach to the design of security features will help to avoid mistakes in integrating an information security management system. This paper proposes new requirements for the ISMS project for critical infrastructure, in particular a formal design approach.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128516763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of Two Implementation Methods of the Equivalents Generator in the Code Converters 码变换器中等效发生器两种实现方法的比较分析
Anna Makarenko, D. Rakhlis, S. Kavun
{"title":"Comparative Analysis of Two Implementation Methods of the Equivalents Generator in the Code Converters","authors":"Anna Makarenko, D. Rakhlis, S. Kavun","doi":"10.1109/PICST54195.2021.9772118","DOIUrl":"https://doi.org/10.1109/PICST54195.2021.9772118","url":null,"abstract":"The algorithm of functioning tables' formation of the basic non-standard node (equivalents generator) by the method of equivalents accumulation was been considered in the code converters. Formulas for lines amount in the functioning table of the equivalent's generator were been obtained. In comparison with the serial strategy, the proposed author's method allows to reduce the amount of the conversion cycles of the two-steps parallel code converters from 7 to 5 steps (increase the performance at 28,57%), and for the three-step parallel code converters - from 4 to 3 steps (increase the performance at 25%). The conducted researches allow accelerating a stage of a system design of the code converters with the parallel strategy of the step usage, increasing code converters performance and reducing hardware expenses of the construction of the main non-standard node of the equivalents generator and code converters in generally. An advantage by the method of equivalents accumulation of code converters in comparison with other methods is a high calculation performance and the possibility of changing in the wide boundaries of the ratio between speed and hardware expenses.","PeriodicalId":391592,"journal":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信