首页 > 最新文献

2020 International Conference Engineering and Telecommunication (En&T)最新文献

英文 中文
Applying Virtual Modelling to Verify Control Systems Decision with Artificial Intelligence in Railway Transport 应用虚拟建模技术验证铁路运输控制系统的人工智能决策
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431256
R. Gorbachev, A. Novikov, A. Kalinkin, Artem Cheranev, E. Zakharova
This paper describes the applying of simulation modelling as a method for verifying the decision support system and forecasting railway traffic in the dispatching management of railway transport. This decision support system would be realised using artificial intelligence methods and on the training, stage requires an additional check of those decisions. For this purpose, a railway traffic model on a test railway section was implemented using a virtual model of the railway section's infrastructure. A virtual model of the railway section infrastructure is realised using the MPC-EL microprocessor-based centralization of arrows and traffic lights. The combination of a virtual railway section and a railway traffic model form a unified system. This system making a forecast train schedule based on initial data of solutions which are received from the decision support system. The verification of solutions obtained from the DSS would check this railway schedule practicability in real conditions. An additional feature of that system supporting the ability to work on workstations with the Elbrus processor, which in turn contributes substitution to the imported component base on the Russian Railways.
本文介绍了仿真建模作为一种验证决策支持系统和预测铁路交通的方法在铁路运输调度管理中的应用。这个决策支持系统将使用人工智能方法实现,在训练阶段需要对这些决策进行额外的检查。为此,使用铁路路段基础设施的虚拟模型实现了测试铁路路段的铁路交通模型。利用基于MPC-EL微处理器的箭头和交通灯的集中化实现了铁路路段基础设施的虚拟模型。虚拟铁路断面与轨道交通模型相结合,形成一个统一的系统。该系统根据从决策支持系统接收到的方案初始数据进行列车时刻表预测。通过对DSS求解结果的验证,验证了该列车时刻表在实际工况下的实用性。该系统的另一个特性支持在带有Elbrus处理器的工作站上工作的能力,这反过来又有助于替代基于俄罗斯铁路的进口组件。
{"title":"Applying Virtual Modelling to Verify Control Systems Decision with Artificial Intelligence in Railway Transport","authors":"R. Gorbachev, A. Novikov, A. Kalinkin, Artem Cheranev, E. Zakharova","doi":"10.1109/EnT50437.2020.9431256","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431256","url":null,"abstract":"This paper describes the applying of simulation modelling as a method for verifying the decision support system and forecasting railway traffic in the dispatching management of railway transport. This decision support system would be realised using artificial intelligence methods and on the training, stage requires an additional check of those decisions. For this purpose, a railway traffic model on a test railway section was implemented using a virtual model of the railway section's infrastructure. A virtual model of the railway section infrastructure is realised using the MPC-EL microprocessor-based centralization of arrows and traffic lights. The combination of a virtual railway section and a railway traffic model form a unified system. This system making a forecast train schedule based on initial data of solutions which are received from the decision support system. The verification of solutions obtained from the DSS would check this railway schedule practicability in real conditions. An additional feature of that system supporting the ability to work on workstations with the Elbrus processor, which in turn contributes substitution to the imported component base on the Russian Railways.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of the Approximate Method for the Comparison Operation in the RNS RNS中比较运算近似方法的改进
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431290
Egor Shiryaev, E. Golimblevskaia, M. Babenko, A. Tchernykh, B. Pulido-Gaytán
The operation of number comparison is widely used in the implementation of most modern algorithms. The implementation of the algorithm for number comparison in the Residue Number System (RNS) consists of two stages. The first stage is calculating the positional characteristic of the modular number. The second stage is comparing positional characteristics of modular numbers in the positional number system. The article studies various comparison algorithms with software implementation in the Python programming language. The research consists in testing algorithms with different bit width and length of the RNS module vector. Also in this work, the improvement of the approximate method on the reduction of requirements for accuracy is carried out. The use of this method is based on low precision requirements for the comparison operation. It was found that in a certain range accuracy is not critical, which makes it possible to apply this method in a fairly wide range of problems.
数字比较运算被广泛应用于大多数现代算法的实现中。残数系统(RNS)中数比较算法的实现分为两个阶段。第一步是计算模数的位置特性。第二阶段是比较位置数系统中模数的位置特征。本文研究了各种比较算法,并用Python编程语言进行了软件实现。本研究主要包括对RNS模块矢量的不同位宽和长度的算法进行测试。本文还对近似方法进行了改进,降低了对精度的要求。这种方法的使用是基于对比较运算精度要求较低。研究发现,在一定范围内,精度并不重要,这使得该方法可以应用于相当广泛的问题。
{"title":"Improvement of the Approximate Method for the Comparison Operation in the RNS","authors":"Egor Shiryaev, E. Golimblevskaia, M. Babenko, A. Tchernykh, B. Pulido-Gaytán","doi":"10.1109/EnT50437.2020.9431290","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431290","url":null,"abstract":"The operation of number comparison is widely used in the implementation of most modern algorithms. The implementation of the algorithm for number comparison in the Residue Number System (RNS) consists of two stages. The first stage is calculating the positional characteristic of the modular number. The second stage is comparing positional characteristics of modular numbers in the positional number system. The article studies various comparison algorithms with software implementation in the Python programming language. The research consists in testing algorithms with different bit width and length of the RNS module vector. Also in this work, the improvement of the approximate method on the reduction of requirements for accuracy is carried out. The use of this method is based on low precision requirements for the comparison operation. It was found that in a certain range accuracy is not critical, which makes it possible to apply this method in a fairly wide range of problems.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Term-Rank Codes for Data Storage Systems 数据存储系统术语级代码
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431245
Huu Loc Pham
In this paper, the data storage process is considered from the point of view of coding theory. A hybrid of data storage systems and error-correcting code (ECC) is a promising technology storage with high performance. Error correction is inevitable in the data storage system and the error rate will increase with the number of write/delete and save data. However, the error-correction code degrades I/O performance of the system due to increased reading and encoding/decoding time from memory. Our work is to investigate the applicability of term-rank code in the data storage system.
本文从编码理论的角度对数据存储过程进行了研究。数据存储系统与纠错码(ECC)的混合存储是一种很有前途的高性能存储技术。在数据存储系统中,纠错是不可避免的,并且错误率会随着数据的写/删除和保存次数的增加而增加。然而,由于增加了从内存读取和编码/解码的时间,纠错码降低了系统的I/O性能。我们的工作是研究术语排序码在数据存储系统中的适用性。
{"title":"Term-Rank Codes for Data Storage Systems","authors":"Huu Loc Pham","doi":"10.1109/EnT50437.2020.9431245","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431245","url":null,"abstract":"In this paper, the data storage process is considered from the point of view of coding theory. A hybrid of data storage systems and error-correcting code (ECC) is a promising technology storage with high performance. Error correction is inevitable in the data storage system and the error rate will increase with the number of write/delete and save data. However, the error-correction code degrades I/O performance of the system due to increased reading and encoding/decoding time from memory. Our work is to investigate the applicability of term-rank code in the data storage system.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Approach for Process Scheduling in Cloud Environment Using Particle Swarm Optimization Technique 基于粒子群优化技术的云环境下混合调度方法
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431318
Himanshu Rai, S. Ojha, Alexey Nazarov
Resource Management is a central aspect in Cloud Computing. This is because the Cloud Services are offered to several users, in a way which ensures rapid deployment and on demand availability. The primary motivation behind cloud computing is to access desired resource over cloud/internet, using thin-clients capable of running only an internet browser program. A given physical resources is extended as multiple virtual resources which can be allocated to several users through virtualization paradigm. One a particular requirement is completed; the corresponding virtual resource can be allocated to another user or shall be stopped for execution to save energy/ enhance throughput. Resource management in a scenario, consisting of large population of users, over a number of resources, with various priorities, under different load conditions is a complex optimization problem. This issue has been discussed at length in research literature over different service models like SaaS, PaaS and IaaS. In this paper, a generic model of cloud service facility is considered which falls under the category of public cloud. Nature inspired algorithm, particularly, particle swarm optimization is presented to manage the request-response architecture, for minimum latency. The proposed approach outperforms the benchmark approaches presented so far. The simulation is performed on CloudSim and the results obtained are in excellent agreement to the analytical model.
资源管理是云计算的一个核心方面。这是因为云服务以一种确保快速部署和按需可用性的方式提供给多个用户。云计算背后的主要动机是通过云/互联网访问所需的资源,使用瘦客户机只能运行一个互联网浏览器程序。将给定的物理资源扩展为多个虚拟资源,这些虚拟资源可以通过虚拟化范式分配给多个用户。一是完成了特定的要求;相应的虚拟资源可以分配给另一个用户,或者应该停止执行,以节省能源/提高吞吐量。在一个由大量用户组成的场景中,资源管理是一个复杂的优化问题,在不同的负载条件下,有许多资源,具有不同的优先级。在针对不同服务模型(如SaaS、PaaS和IaaS)的研究文献中,已经详细讨论了这个问题。本文考虑了一种属于公有云范畴的云服务设施的通用模型。提出了一种受自然启发的算法,特别是粒子群算法来管理请求-响应体系结构,以实现最小的延迟。所提出的方法优于目前提出的基准方法。在CloudSim上进行了仿真,得到的结果与分析模型非常吻合。
{"title":"A Hybrid Approach for Process Scheduling in Cloud Environment Using Particle Swarm Optimization Technique","authors":"Himanshu Rai, S. Ojha, Alexey Nazarov","doi":"10.1109/EnT50437.2020.9431318","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431318","url":null,"abstract":"Resource Management is a central aspect in Cloud Computing. This is because the Cloud Services are offered to several users, in a way which ensures rapid deployment and on demand availability. The primary motivation behind cloud computing is to access desired resource over cloud/internet, using thin-clients capable of running only an internet browser program. A given physical resources is extended as multiple virtual resources which can be allocated to several users through virtualization paradigm. One a particular requirement is completed; the corresponding virtual resource can be allocated to another user or shall be stopped for execution to save energy/ enhance throughput. Resource management in a scenario, consisting of large population of users, over a number of resources, with various priorities, under different load conditions is a complex optimization problem. This issue has been discussed at length in research literature over different service models like SaaS, PaaS and IaaS. In this paper, a generic model of cloud service facility is considered which falls under the category of public cloud. Nature inspired algorithm, particularly, particle swarm optimization is presented to manage the request-response architecture, for minimum latency. The proposed approach outperforms the benchmark approaches presented so far. The simulation is performed on CloudSim and the results obtained are in excellent agreement to the analytical model.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Network-on-Chip Topologies for Elbrus Multi-Core Processors Elbrus多核处理器片上网络拓扑的性能分析
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431279
E. Kozhin, Alexey Kozhin, D. Shpagilev
Networks-on-chip play important role in modern multi-core processors linking all system components together. Their topologies determine a scalability of bandwidth and memory access time depending on the number of processor cores. In this work networks-on-chip with 2d mesh and 2d torus-mesh topologies for 8-, 12- and 16-core Elbrus processors were studied taking into account constraints of their physical design.
片上网络在现代多核处理器中起着连接所有系统组件的重要作用。它们的拓扑结构决定了带宽和内存访问时间的可伸缩性,这取决于处理器内核的数量。在这项工作中,考虑到其物理设计的限制,研究了8核、12核和16核Elbrus处理器的二维网格和二维环网格拓扑的片上网络。
{"title":"Performance Analysis of Network-on-Chip Topologies for Elbrus Multi-Core Processors","authors":"E. Kozhin, Alexey Kozhin, D. Shpagilev","doi":"10.1109/EnT50437.2020.9431279","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431279","url":null,"abstract":"Networks-on-chip play important role in modern multi-core processors linking all system components together. Their topologies determine a scalability of bandwidth and memory access time depending on the number of processor cores. In this work networks-on-chip with 2d mesh and 2d torus-mesh topologies for 8-, 12- and 16-core Elbrus processors were studied taking into account constraints of their physical design.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Application of Ensemble Machine Learning Methods to the Problem of Multiclass Classification of DDoS Attacks Identification 集成机器学习方法在DDoS攻击多类分类识别中的应用研究
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431255
D. Parfenov, L. Kuznetsova, N. Yanishevskaya, I. Bolodurina, A. Zhigalov, L. Legashev
This article studies the actual problem of network security. In particular, the task of identifying DDoS attacks is being solved. As part of the study, a solution was proposed based on expanding the set of features traditionally used to identify attacks on networks using a specialized hashing algorithm for individual blocks of device configuration files in the considered network of devices. Using the proposed approach, the identification of attacks was carried out using machine learning methods to ensure security in the Internet of Things networks. The approaches to the binary and multiclass classification of network traffic were investigated to detect attacking influences, taking into account the proposed hashing algorithm. As part of a pilot study, the article provides a comparative analysis of machine learning methods such as Gradient Boosting, AdaBoost, and CatBoost using the CICDDoS2019 dataset. It was found that in the case of binary classification, the best classifier from the considered ones is CatBoost with an accuracy of 99.3%, which is on average 0.3% higher than the existing algorithms. In the multiclass classification, the CatBoost algorithm on a feature set using hashing of data from network devices also shows the best performance, with an accuracy level of 97%, which is at least 3.9% better than similar classifiers. The decrease in accuracy in the multiclass classification did not have a significant effect on the result, but it made it possible to increase the solution performance by 11.5% in comparison with the full set of features used in traditional attack analysis.
本文研究了网络安全的实际问题。特别是,正在解决识别DDoS攻击的任务。作为研究的一部分,提出了一种解决方案,该解决方案基于扩展传统上用于识别网络攻击的特征集,使用针对所考虑的设备网络中的单个设备配置文件块的专用散列算法。利用提出的方法,使用机器学习方法进行攻击识别,以确保物联网网络的安全性。考虑所提出的哈希算法,研究了网络流量的二进制和多类分类方法,以检测攻击影响。作为试点研究的一部分,本文使用CICDDoS2019数据集对梯度增强、AdaBoost和CatBoost等机器学习方法进行了比较分析。研究发现,在二元分类的情况下,从考虑的分类器中,最好的分类器是CatBoost,准确率为99.3%,比现有算法平均高出0.3%。在多类分类中,CatBoost算法在使用网络设备数据哈希的特征集上也表现出最好的性能,准确率达到97%,比类似的分类器至少高出3.9%。多类分类准确度的下降对结果没有显著影响,但与传统攻击分析中使用的全套特征相比,它使解决方案的性能提高了11.5%。
{"title":"Research Application of Ensemble Machine Learning Methods to the Problem of Multiclass Classification of DDoS Attacks Identification","authors":"D. Parfenov, L. Kuznetsova, N. Yanishevskaya, I. Bolodurina, A. Zhigalov, L. Legashev","doi":"10.1109/EnT50437.2020.9431255","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431255","url":null,"abstract":"This article studies the actual problem of network security. In particular, the task of identifying DDoS attacks is being solved. As part of the study, a solution was proposed based on expanding the set of features traditionally used to identify attacks on networks using a specialized hashing algorithm for individual blocks of device configuration files in the considered network of devices. Using the proposed approach, the identification of attacks was carried out using machine learning methods to ensure security in the Internet of Things networks. The approaches to the binary and multiclass classification of network traffic were investigated to detect attacking influences, taking into account the proposed hashing algorithm. As part of a pilot study, the article provides a comparative analysis of machine learning methods such as Gradient Boosting, AdaBoost, and CatBoost using the CICDDoS2019 dataset. It was found that in the case of binary classification, the best classifier from the considered ones is CatBoost with an accuracy of 99.3%, which is on average 0.3% higher than the existing algorithms. In the multiclass classification, the CatBoost algorithm on a feature set using hashing of data from network devices also shows the best performance, with an accuracy level of 97%, which is at least 3.9% better than similar classifiers. The decrease in accuracy in the multiclass classification did not have a significant effect on the result, but it made it possible to increase the solution performance by 11.5% in comparison with the full set of features used in traditional attack analysis.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Domain Specific Language of Traffic Flow Factor Framework 交通流因子框架的领域特定语言
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431298
Francois Xavier Habinshuti
the challenge is to provide a convenient tool for modeling traffic problems. Many factors affect traffic related to the driver or human factor, weather factor, road conditions, vehicle performance and characteristics factor, etc. It is necessary to propose a model where the influence of these factors can be described uniformly. Furthermore, the factors described are loaded into the general mechanism of motion modeling. To overcome this problem we started to build a DSL language of Traffic Flow Factor Framework (TFFF). This paper introduces an Xtext grammar of weather condition model, which is part of factors. It also touches on Longitudinal Model (LM) a mathematical model used more often to capture the weather factors involved in driving vehicles and traffic flow modeling.
我们面临的挑战是为交通问题建模提供一个方便的工具。影响交通的因素很多,与驾驶员或人为因素、天气因素、路况因素、车辆性能和特性因素等有关。有必要提出一个能统一描述这些因素的影响的模型。此外,所描述的因素被加载到运动建模的一般机制中。为了克服这个问题,我们开始构建一个DSL语言的交通流量因子框架(TFFF)。本文介绍了一种天气状况模型的文本语法,它是因子的一部分。它还涉及纵向模型(LM),这是一种经常用于捕捉驾驶车辆和交通流量建模中涉及的天气因素的数学模型。
{"title":"Domain Specific Language of Traffic Flow Factor Framework","authors":"Francois Xavier Habinshuti","doi":"10.1109/EnT50437.2020.9431298","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431298","url":null,"abstract":"the challenge is to provide a convenient tool for modeling traffic problems. Many factors affect traffic related to the driver or human factor, weather factor, road conditions, vehicle performance and characteristics factor, etc. It is necessary to propose a model where the influence of these factors can be described uniformly. Furthermore, the factors described are loaded into the general mechanism of motion modeling. To overcome this problem we started to build a DSL language of Traffic Flow Factor Framework (TFFF). This paper introduces an Xtext grammar of weather condition model, which is part of factors. It also touches on Longitudinal Model (LM) a mathematical model used more often to capture the weather factors involved in driving vehicles and traffic flow modeling.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115190102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modification of the Method of EFIE in 2D Problem of H-Polarized Wave Scattering by PEC Cylinder of Arbitrary Cross-Section 任意截面PEC柱体散射h偏振波二维问题中EFIE方法的修正
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431302
D. A. Borisov, S. Skobelev
The modification proposed in the paper includes approximation of the contour of the cylinder cross-section by a polygon and use of the EFIE method for the PEC polygonal cylinder. The EFIE is reduced to a system of algebraic equations using a uniform current distribution on each polygon side and collocation method with collocation points located in the midpoints of the polygon sides. All the diagonal matrix elements and elements located near them are represented by analytical expressions based on the small argument approximation of the kernel with subsequent analytical integration. The integrals for corresponding to the other matrix elements are analytically represented using the centroid approximation. The effectiveness of the proposed modification is demonstrated using H-polarized plane wave scattering by the PEC cylinders of elliptical and square cross-sections.
本文提出的修正包括用多边形逼近圆柱截面的轮廓,以及对PEC多边形圆柱采用EFIE法。采用均匀电流分布在各多边形边上,并将配点设在多边形边的中点上的配点法,将EFIE简化为一个代数方程组。所有对角矩阵元素及其附近的元素都用解析表达式表示,该表达式基于核的小参数逼近,并进行解析积分。对应于其他矩阵元素的积分用质心近似解析表示。通过椭圆和方形截面的PEC柱体对h偏振平面波的散射,验证了所提改进的有效性。
{"title":"Modification of the Method of EFIE in 2D Problem of H-Polarized Wave Scattering by PEC Cylinder of Arbitrary Cross-Section","authors":"D. A. Borisov, S. Skobelev","doi":"10.1109/EnT50437.2020.9431302","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431302","url":null,"abstract":"The modification proposed in the paper includes approximation of the contour of the cylinder cross-section by a polygon and use of the EFIE method for the PEC polygonal cylinder. The EFIE is reduced to a system of algebraic equations using a uniform current distribution on each polygon side and collocation method with collocation points located in the midpoints of the polygon sides. All the diagonal matrix elements and elements located near them are represented by analytical expressions based on the small argument approximation of the kernel with subsequent analytical integration. The integrals for corresponding to the other matrix elements are analytically represented using the centroid approximation. The effectiveness of the proposed modification is demonstrated using H-polarized plane wave scattering by the PEC cylinders of elliptical and square cross-sections.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Security Solution for Mitigating Cyber-Attacks on Info-Communication Systems 缓解信息通信系统网络攻击的混合安全解决方案
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431296
Alireza Nik Aein Koupaei, A. Nazarov
In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, Databases, cars, and industrial equipment's are now connected to the internet. There are over several billion electronic equipment devices already on the internet, and within a decade these number is expected to increase massively. Info-communications have various software security solutions to defend and protect them from most of threats and attacks, although there are indiscernible security solutions to take care of the rest of the IoT [1]. Lately, as a strong example, several thousands of network equipments were breached to proceed DOS and DDOS attacks that caused them. Solutions in info-communication are not exclusively software but the entire physical environment of hardware, World Wide Web (WWW), Software, Cloud, and mobile interfaces involved. The Cyberspace ecosystem services are getting extended and not very fully developed yet for these reasons there are main primarily concerns fact around cyberspace adoption due to security threats/attacks. Cyber-security top Concerns: Cloud jacking [7], IoT devices, Phishing attacks, DDoS, Malwares and unauthorized devices. This paper shows hybrid solutions given in a mathematical and theoretical form for mitigating cyber-attacks in info-communication system.
在过去,只有手机和电脑可以连接到互联网,但在新时代,随着新技术的出现,安全摄像头、微波炉、数据库、汽车和工业设备等其他东西都可以连接到互联网。互联网上已经有超过几十亿的电子设备,在十年内,这个数字预计会大幅增加。信息通信有各种软件安全解决方案来防御和保护它们免受大多数威胁和攻击,尽管有不可识别的安全解决方案来照顾物联网的其余部分[1]。最近,作为一个强有力的例子,成千上万的网络设备被破坏,进行DOS和DDOS攻击,导致他们。信息通信的解决方案不仅仅是软件,而是硬件的整个物理环境,包括万维网(WWW)、软件、云和移动接口。由于这些原因,网络空间生态系统服务正在得到扩展,但尚未得到充分发展,主要关注的是由于安全威胁/攻击而导致的网络空间采用。网络安全最关注的问题:云劫持[7]、物联网设备、网络钓鱼攻击、DDoS、恶意软件和未经授权的设备。本文以数学和理论的形式给出了缓解信息通信系统中网络攻击的混合解决方案。
{"title":"A Hybrid Security Solution for Mitigating Cyber-Attacks on Info-Communication Systems","authors":"Alireza Nik Aein Koupaei, A. Nazarov","doi":"10.1109/EnT50437.2020.9431296","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431296","url":null,"abstract":"In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, Databases, cars, and industrial equipment's are now connected to the internet. There are over several billion electronic equipment devices already on the internet, and within a decade these number is expected to increase massively. Info-communications have various software security solutions to defend and protect them from most of threats and attacks, although there are indiscernible security solutions to take care of the rest of the IoT [1]. Lately, as a strong example, several thousands of network equipments were breached to proceed DOS and DDOS attacks that caused them. Solutions in info-communication are not exclusively software but the entire physical environment of hardware, World Wide Web (WWW), Software, Cloud, and mobile interfaces involved. The Cyberspace ecosystem services are getting extended and not very fully developed yet for these reasons there are main primarily concerns fact around cyberspace adoption due to security threats/attacks. Cyber-security top Concerns: Cloud jacking [7], IoT devices, Phishing attacks, DDoS, Malwares and unauthorized devices. This paper shows hybrid solutions given in a mathematical and theoretical form for mitigating cyber-attacks in info-communication system.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithm for Estimating the Distance of Meteorological Target in a Airport Surveillance Radar With a Chirp Signal 基于啁啾信号的机场监视雷达气象目标距离估计算法
Pub Date : 2020-11-25 DOI: 10.1109/EnT50437.2020.9431315
Khuong X. Nguyen, Stanislav Zaretsky, Stunin Dmitry
At the present time, determination the range of meteorological objects is an important task of meteolocation. Solution of this task allows to increase savefity of takeoff and landing of an aircraft. This article presents an algorithm for processing of the chirp signal, that allows to detect meteorological formation and estimate their parameters in a radar with a phased antenna array. Application of the presented algorithm will allow to provide a more complete information about the air situation in the area of responsibility of the radar.
目前,确定气象目标的距离是气象定位的一项重要任务。解决这一问题可以提高飞机起降的安全性。本文提出了一种处理啁啾信号的算法,用于在相控阵雷达中探测气象编队并估计其参数。所提出的算法的应用将允许提供有关雷达责任区域内的空气状况的更完整的信息。
{"title":"Algorithm for Estimating the Distance of Meteorological Target in a Airport Surveillance Radar With a Chirp Signal","authors":"Khuong X. Nguyen, Stanislav Zaretsky, Stunin Dmitry","doi":"10.1109/EnT50437.2020.9431315","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431315","url":null,"abstract":"At the present time, determination the range of meteorological objects is an important task of meteolocation. Solution of this task allows to increase savefity of takeoff and landing of an aircraft. This article presents an algorithm for processing of the chirp signal, that allows to detect meteorological formation and estimate their parameters in a radar with a phased antenna array. Application of the presented algorithm will allow to provide a more complete information about the air situation in the area of responsibility of the radar.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference Engineering and Telecommunication (En&T)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1