{"title":"Modern informatics and its teaching methods (MITM2020) [Electronic resource]: collection of materials of the international scientific-practical conference. - Andijan, May 20, 2020 Section IV. The role of information and communication technologies in preschool educational institutions","authors":"","doi":"10.26739/conf_20/05/2020_4_1","DOIUrl":"https://doi.org/10.26739/conf_20/05/2020_4_1","url":null,"abstract":"","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90565484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DIGITALIZATION - A FACTOR OF SOCIAL DEVELOPMENT QUALITY","authors":"G. G. Gafforova","doi":"10.26739/conf/28052020_3-1","DOIUrl":"https://doi.org/10.26739/conf/28052020_3-1","url":null,"abstract":"Today, the activities of all spheres of life are electronic, computer, imagining without networking and other important automated technologies difficult From communications and shopping to product manufacturing and everything from the company’s independent “work” to the digital environment. Therefore, in the new paradigm of world economic development digital technologies determine the growth of social welfare considered as the main source of production","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89240644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DIGITAL TECHNOLOGIES IN MODERN EDUCATION: CURRENT TRENDS AND DEVELOPMENT FACTORS IN PHILOLOGY AND PEDAGOGY","authors":"","doi":"10.26739/conf_02/05/2020_1","DOIUrl":"https://doi.org/10.26739/conf_02/05/2020_1","url":null,"abstract":"","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74334003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kovbasiuk, Leonid Kanevskyy, I. Sashchuk, M. Romanchuk
{"title":"Object Detection Method Based on Aerial Image Instance Segmentation in Poor Optical Conditions for Integration of Data into an Infocommunication System","authors":"S. Kovbasiuk, Leonid Kanevskyy, I. Sashchuk, M. Romanchuk","doi":"10.1109/PICST47496.2019.9061496","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061496","url":null,"abstract":"The article analyses the possibilities to use the unmanned aerial complexes in the system of decision making process in crisis situations that require the object detection at aerial images received by the unmanned aerial complexes under the conditions of atmospheric fog. The Pansharpening method was used for image correction to inject spatial details from panchromatic image to multidimensional image. In order to increase the operational efficiency and accuracy of automotive vehicles detection at aerial images received by the unmanned aerial complexes for more efficient use of received information in the system of decision making support it was selected the Cascade Mask R-CNN model. This model is more suitable for task solution of multiclass classification and small-sized object detection at the image. To improve this model it is suggested using the small-sized anchors making into account the aspect ratio to more classes, function focal loss for model training that along with test time augmentation use enabled to increase mean Average Precision (mAP).","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"118 1","pages":"224-228"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73049174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing the Security ESP32 Internet of Things Devices","authors":"Oleksii Barybin, E. Zaitseva, Volodymyr Brazhnyi","doi":"10.1109/PICST47496.2019.9061269","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061269","url":null,"abstract":"The physical model of a handmade IoT system that includes device for measuring temperature based on ESP32, WiFi home network and web interface was proposed and implemented upon laboratory scale. The result of the experiment based on this model to attempt to gain unauthorized access to the transmitted data was successful. Attack scenario was formulated and consist of four stages: gaining unauthorized access to a network, network traffic interception and analysis, create fake ESP32 client and disconnecting original ESP32 from a server. It is shown that the attacker, who has the basic knowledge and skills in working with common wireless network hacking tools and a basic knowledge of ESP32 and ESP32 programming skills can access the system and send fake information to the web interface. To reduce the probability of the proposed scenario it is recommended to use TCP instead of UDP.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"10 1","pages":"143-146"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73215019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Saiko, T. Narytnyk, M. Brailovskyi, Volodymyr Nakonechnyi
{"title":"Radiating Telecommunication System of the Sub-THz-band to Protect Objects from Unauthorized Access","authors":"V. Saiko, T. Narytnyk, M. Brailovskyi, Volodymyr Nakonechnyi","doi":"10.1109/PICST47496.2019.9061483","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061483","url":null,"abstract":"A technical solution of the radiation telecommunication protection system with focused radiation of sub-Tertiary range of zones and objects against unauthorized penetration has been proposed in the present article. The principle of the system is to determine the location of the hidden offender and the impact on it by electromagnetic radiation of the installation of sub-Tertiary range, taking into account the possible reflection of electromagnetic radiation from the surfaces. The solution contains a generator and amplifier, a circulator, a waveguide, a waveguide section, an antenna-rotary complex. The novelty of the research is that a generation and amplification device is made on the basis of a reference generator, the output of which is connected to series-connected frequency multipliers with amplifiers, solid-state pre-amplifiers, solid-state intermediate power amplifiers, vacuum end-amplifiers. A simulation model of a radiating telecommunication system has been developed in the simulation environment of the Visual System Simulator CAD software package AWR Microwave Office ver.12 by National Instruments. A comparative analysis of the proposed solution with similar technical solutions has been given. Prospects of development and application of radiating telecommunication systems in the future have been presented as well.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"96 1","pages":"698-702"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80164165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scenarios for Implementation of Nested Virtualization Technology in Task of Improving Cloud Firewall Fault Tolerance","authors":"Vitalii Tkachov, Mykhailo Hunko, Vadym Volotka","doi":"10.1109/PICST47496.2019.9061473","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061473","url":null,"abstract":"Currently, the use of cloud firewalls allows protecting not only individual network resources, but also the entire infrastructure of large data centers. The main requirement for a cloud firewall is high fault tolerance. There are classic ways to increase fault tolerance, which focus on high redundancy of technological solution. Small and medium Internet business cannot always afford the creation of a separate solution to ensure the security of resources. Therefore, it is relevant to implement nested virtualization technology that gives the opportunity to use a cloud server with a hypervisor inside, in which, in turn, virtual machines are launched. Firewall software can be directly implemented on these virtual machines. Improving the fault tolerance of a cloud firewall is possible using of a set of nested virtual machines of the cloud server, which can be instantly restored by its hypervisor. To analyze the impact of the resource allocation plan of the cloud server, to detect a failed or incorrectly running nested virtual machine, the calculation of the virtual machine efficiency indicator is given. The paper proposed three scenarios for the use of nested virtualization technology: nested virtualization of services, nested virtualization of machines and virtualization of the entire infrastructure. For each of them, experimental studies have been carried out in order to identify patterns of time delay values for restoring the full functionality of the cloud firewall after a network attack on its various elements. By conducting experiments, it has been established that the use of nested virtualization technology in the first scenario allows to get a time gain of 7 times; in the second scenario there is a gain of 1.5 times; in the third one, it has been allowed to fully restart the cloud firewall infrastructure in a new cloud.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"34 1","pages":"759-763"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84875029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bispectrum-Based Detection Homogeneous Areas in the Digital Images","authors":"V. Naumenko, A. Totsky","doi":"10.1109/PICST47496.2019.9061418","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061418","url":null,"abstract":"A novel bispectrum-based strategy applied to digital image processing is suggested for solving the problems of detection the homogeneous areas in digital images. Novel classification features evaluated in the form of bispectrum magnitude estimates and computed for the certain image areas are suggested and studied. Decision about homogeneous area has been made by comparative analysis of the bimagnitude peak values. Small biamplitude values indicate homogeneous area and large biamplitude values indicate non- homogeneous area contained in the image. Results of computer simulations performed for grayscale images are represented and discussed. Performance of detection the homogeneous areas has been examined both for various noiseless and contaminated by noise test images. The biamplitude computations have been performed under influence of four various noise types. It has been examined the following noises: Gaussian, Poisson, salt & pepper, and speckle. According to the experimental results, proposed technique provides high accuracy for detecting homogeneous areas in the noiseless images. But in the presence of noise, the proposed technique is less effective.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"557-560"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80857077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Dumin, V. Plakhtii, O. Prishchenko, D. Shyrokorad
{"title":"Signal Processing in UWB Subsurface Radiolocation by Artificial Neural Networks","authors":"O. Dumin, V. Plakhtii, O. Prishchenko, D. Shyrokorad","doi":"10.1109/PICST47496.2019.9061427","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061427","url":null,"abstract":"The signal processing problem for identification of underground objects is considered. The source of signals is the ultra short impulse electromagnetic waves reflected from air-ground interface and underground objects and received by subsurface radar antenna system. The source of the irradiated ultrawideband field is the plane electromagnetic wave with Gaussian time dependence that is incident normally to the air-ground interface. The numerical simulation of the electromagnetic problem to find the electrical field strength in receiving points above the ground at some fixed height is carried out by Finite Difference Time Domain method The received signals are processed by artificial neural networks for the object identification and classification of its position. The electrically small metal cylinder is used as an example of an object for the classification and recognition. The influence of the structure of an artificial neural network and its training peculiarities on the precision of the classification is investigated.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"16 1","pages":"383-386"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85818904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Evaluation of Sensor Nodes in the Home Automation System based on Arduino","authors":"I. Kuzminykh, Anders Carlsson, M. Yevdokymenko","doi":"10.1109/PICST47496.2019.9061442","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061442","url":null,"abstract":"In this paper, a home automation system model was constructed with purpose to investigate of the correlation between the performance of wireless communication, power consumption of the constrained IoT devices and security. The series of experiments were conducted using sensor nodes connected to Arduino microcontroller and an RF 433 MHz wireless communication module. Measurements of the execution time and power consumption of the Arduino during data transfer with different security levels, as well as the analysis of the experimental results, were performed. The results show that the lifetime of the IoT device is determined by the communication speed, sleep mode management and depends on encryption. The obtained results can be used to minimize the power consumption of the device and improve communication efficiency. The results show that applied security reduces the productivity and lifetime of the sensor node not significantly.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"13 1","pages":"511-516"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84088551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}