2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)最新文献

筛选
英文 中文
Model and Algorithms for Microwave Mutiport Receiver 微波多端口接收机的模型与算法
O. Zaichenko, Pavlo Galkin, M. Miroshnyk
{"title":"Model and Algorithms for Microwave Mutiport Receiver","authors":"O. Zaichenko, Pavlo Galkin, M. Miroshnyk","doi":"10.1109/PICST47496.2019.9061275","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061275","url":null,"abstract":"The six-port receiver is very perspective in wireless application as it much cheaper than receivers with heterodyne transformation because vector information about not only modulus but phase too is derived from scalar sensor signals by processing with algorithms. There was considered principle of action of six-port receiver, mathematical model of six-port receiver, using redundancy in the algorithms for six and more port receiver in the report. There was proposed how to provide phase and clock synchronization. There was proposed constellation diagram obtained by simulation. Due to described filters the error vector magnitude (EVM) decreases almoust 10 times","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"91 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84807165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Quality of Backup Copy Systems Data in Telecommunication Systems 电信系统中备份复制系统数据质量的评价
V. Bandura, Andriy Malitchuk, M. Pasieka, R. Khrabatyn
{"title":"Evaluation of Quality of Backup Copy Systems Data in Telecommunication Systems","authors":"V. Bandura, Andriy Malitchuk, M. Pasieka, R. Khrabatyn","doi":"10.1109/PICST47496.2019.9061379","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061379","url":null,"abstract":"This article deals with a number of issues associated with software quality evaluation. The method for the quality evaluation of data backup systems based on an example of open source software, taking into account the needs of the end consumer, which provide the determination of indicators based on the typical functionalities.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"46 1","pages":"329-335"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83065711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Models, Methods and Algorithms of Web System Architecture Optimization Web系统架构优化的模型、方法和算法
N. Pasieka, V. Sheketa, Y. Romanyshyn, M. Pasieka, Ulyana Domska, A. Struk
{"title":"Models, Methods and Algorithms of Web System Architecture Optimization","authors":"N. Pasieka, V. Sheketa, Y. Romanyshyn, M. Pasieka, Ulyana Domska, A. Struk","doi":"10.1109/PICST47496.2019.9061539","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061539","url":null,"abstract":"The algorithm of transfer of computational load without application of additional reserve resources and having offered innovative model of the organization of communication of modules within the limits of one knot and system as a whole is considered. The essence of the model is that the software is divided into logical modules, that is, by its purpose. The architecture of the Web-system is designed so that the modules contain as little logic as possible, because the main task of load redistribution is to support the system in balance. The second requirement for the software architecture is to avoid strong connectivity. Therefore, it is necessary to divide the system into small modules that work with one or a small number of «parent» modules. In the developed model, the modules are isolated from each other and do not have a general condition, but between them you can establish communication and receive notifications about their condition. Asynchronous message exchange is used for interaction of modules. An important aspect of the research is that additional free resources can be found within the existing capabilities of the Web-system.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"15 1","pages":"147-152"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83301389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Economic Security as a Result of Modern Biotechnology Implementation 现代生物技术实施带来的经济安全
A. Levkin, A. Petrenko, R. Levkina, Igor Chaliy
{"title":"Economic Security as a Result of Modern Biotechnology Implementation","authors":"A. Levkin, A. Petrenko, R. Levkina, Igor Chaliy","doi":"10.1109/PICST47496.2019.9061533","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061533","url":null,"abstract":"To solve the issue of economic security of the country due to providing the population with high-quality livestock products article proposed a model and a method for solving the automation and optimization tasks of embryo laser division, allowing effective computational implementation in the sense of insignificant storage and labor input. This ensures the solution of relevant practical problems in real-time, that is, directly upon receiving the embryo image, which is essential for the laser cutting process, since during the time of optimal trajectory constructing the embryo does not have time to significantly change its position. That solves the food sequrity problem in the context of the country’s economic security and will allow to bring biotechnological processes to a fundamentally new level, corresponding to the pace of modern technologies development. The research also solves the problem of animal livestock economic efficiency and the use of the latest technologies progres of fundamental areas of production.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"129 1","pages":"139-142"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83992142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Relevance of Using Message Brokers in Robust Enterprise Applications 在健壮的企业应用程序中使用消息代理的相关性
Vladyslav Apukhtin, Mariya Shirokopetleva, Victoria Skovorodnikova
{"title":"The Relevance of Using Message Brokers in Robust Enterprise Applications","authors":"Vladyslav Apukhtin, Mariya Shirokopetleva, Victoria Skovorodnikova","doi":"10.1109/PICST47496.2019.9061224","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061224","url":null,"abstract":"The paper covers main message broker protocols and the patterns which are used to manage technical problems. The article provides the reader with typical software engineering design issues which might lead to conceptual violations, software non-functional requirements nonconformity, which is high coupling problem, synchronous operation performance loss, and system constituent integration problem. The solutions which come as a result of applying messaging are brought covering each problem above, in particular establishing the communication between loosely coupled applications, researching the application performance speedup with the Amdahl’s law and applying Read Model architectural pattern leveraging message brokers capabilities.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"63 1","pages":"305-309"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88372702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Radar Technology for Detecting and Recognizing Low-Visible Air Objects 语义雷达探测与识别低可见空中目标技术
I. Shubin, S. Solonska, Stanislav Snisar, V. Slavhorodskyi, Victoria Skovorodnikova
{"title":"Semantic Radar Technology for Detecting and Recognizing Low-Visible Air Objects","authors":"I. Shubin, S. Solonska, Stanislav Snisar, V. Slavhorodskyi, Victoria Skovorodnikova","doi":"10.1109/PICST47496.2019.9061389","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061389","url":null,"abstract":"The paper presents the information technology of low-visible air objects radar detection developed by formalizing the processes of perception and transformation of signals and signal images, taking into account the possibilities of unification of procedures for inter-period and multi-survey (multi-view) radar signals processing and information based on semantic analysis. It is also proposed to accumulate the energy and semantic component of the signal information by forming space-time images using the algebra of finite predicates.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"7 1","pages":"665-670"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77972368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Spatial Signal Processing for Bandwidth Capability Improvement of Radio Relay Link 空间信号处理在提高无线电中继链路带宽能力中的应用
G. Avdeyenko
{"title":"Application of Spatial Signal Processing for Bandwidth Capability Improvement of Radio Relay Link","authors":"G. Avdeyenko","doi":"10.1109/PICST47496.2019.9061549","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061549","url":null,"abstract":"Novel method of radio relay link bandwidth capacity improvement based on spatial signal processing by the wave front of the electromagnetic wave are presented. Test results of a variant of one-hop simplex radio relay link lab prototype with spatial signal processing both in the transmitting and receiving sites are shown. This prototype provides simultaneous parallel wireless transmission of two DVB-C radio signals with 64-QAM modulations at bit rates of 41.25 Mbps over 8 MHz bandwidth with the same carrier frequency of 10.56 GHz and with the same electromagnetic waves polarization at distance of 8 meters. This prototype can be used for research the possibility of radio frequency resource reuse and bandwidth capability improvement for radio relay links by applying spatial signal processing techniques.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"106 1","pages":"187-192"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78361580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy Analysis Method for Attacks Detection 攻击检测的熵分析方法
T. Radivilova, Lyudmyla Kirichenko, A. S. Alghawli
{"title":"Entropy Analysis Method for Attacks Detection","authors":"T. Radivilova, Lyudmyla Kirichenko, A. S. Alghawli","doi":"10.1109/PICST47496.2019.9061451","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061451","url":null,"abstract":"The paper proposes and implements a network traffic analysis method for detecting attacks, which is based on protocol analysis and the maximum entropy method. To analyze the quality of functioning of the proposed method, we used data from a data set that contains traffic of various protocols and DDoS attacks, UDP floods, TCP SYN streams, Ping of Death attacks, and HTTP flood attacks. The proposed method for analyzing the maximum entropy was software implemented and the results of its work showed high-quality attack detection. The method can detect various attacks with a probability of about 94%, while false-positive values did not exceed 10%. The advantage of the method is the early detection of intrusions, due to the rapid calculation of the maximum entropy using the sliding window method.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"443-446"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75351240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Gradient Signal Processing Algorithm for Adaptive Antenna Arrays Obviating Reference Signal Presence 自适应天线阵列中消除参考信号存在的梯度信号处理算法
O. Pliushch
{"title":"Gradient Signal Processing Algorithm for Adaptive Antenna Arrays Obviating Reference Signal Presence","authors":"O. Pliushch","doi":"10.1109/PICST47496.2019.9061536","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061536","url":null,"abstract":"Signal processing algorithms in adaptive antenna arrays are analyzed with respect to their application in mobile telecommunication systems. It is established that both in literature and in practice insufficient attention is paid to search for and design of such simple adaptation algorithms that do not require presence of the reference signal. Gradient method of adaptation is considered and its limitations are exposed. It is shown that the gradient method requires a reference signal that can be presented as the signal in a selected antenna element or a reference signal generated in the antenna array. A simple algorithm of antenna array adaptation is deduced that operates in the absence of the reference signal. Computer simulation of adaptive antenna arrays with the designed algorithm in different situations is carried out, which singles out inherent deficiency in the algorithm. Improvements to eliminate this deficiency are offered. High performance of the improved gradient algorithm is confirmed in difficult interference environments.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"635-638"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73890538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Local Feature Detectors Performance Analysis on Digital Image 数字图像局部特征检测器性能分析
Kirill Smelyakov, Dariia Tovchyrechko, Igor Ruban, A. Chupryna, O. Ponomarenko
{"title":"Local Feature Detectors Performance Analysis on Digital Image","authors":"Kirill Smelyakov, Dariia Tovchyrechko, Igor Ruban, A. Chupryna, O. Ponomarenko","doi":"10.1109/PICST47496.2019.9061331","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061331","url":null,"abstract":"The article puts an experiment on application of widely used ORB, SIFT and SURF feature point detectors represented by the corresponding functions in the OpenCV library, to the images of the most common object classes such as human faces, fine details and artificial images. The considered detectors display as a result a huge number of points that are not classified or structured. Building an appropriate classifier would greatly increase the efficiency of subsequent image processing operations: localization, recognition, search, and tracking of objects. The article analyzes the effectiveness of the experimental results at a quantitative and qualitative level taking into account the conditions and limitations (primarily temporal) on solving practical problems in the era of Big Data, as well as taking into account the fact that some detectors are proprietary. According to the analysis results of the usage effectiveness of the features points detectors considered in the work the practical recommendations for specific use cases are given at the end of the work.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"6 1","pages":"644-648"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80253190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信