Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349304
V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov
The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.
{"title":"Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement","authors":"V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov","doi":"10.1109/ATIT50783.2020.9349304","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349304","url":null,"abstract":"The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349326
Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova
This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity
{"title":"Generative Adversarial Neural Network for Creating Photorealistic Images","authors":"Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova","doi":"10.1109/ATIT50783.2020.9349326","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349326","url":null,"abstract":"This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125821078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349265
Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov
The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.
{"title":"Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations","authors":"Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov","doi":"10.1109/ATIT50783.2020.9349265","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349265","url":null,"abstract":"The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/atit50783.2020.9349317
O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko
{"title":"Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm","authors":"O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko","doi":"10.1109/atit50783.2020.9349317","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349317","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349335
I. Sachuk, P. Kushch, A. Kalyta, P. Open’ko, V. Orlenko, S. Bondarenko
Typical functional diagrams and operation algorithms of tracking system of tracking radar of antiaircraft missile armament with digital processing of error signal are considered. It’s showed that independent of the measurable parameters of radio signal all tracking systems have a similar structure. The leading place of digital filter in the performance of defined target movement model by tracking system is based. The state matrix equations for target movement model used in tracking system of tracking radar of antiaircraft missile armament are obtained. The ways of further research for improvement of target tracking accuracy are defined.
{"title":"The Results of System Analysis of Functional Diagrams and Operation Algorithms of Tracking Systems of Tracking Radar of Antiaircraft Missile Armament With Digital Processing of Error Signal","authors":"I. Sachuk, P. Kushch, A. Kalyta, P. Open’ko, V. Orlenko, S. Bondarenko","doi":"10.1109/ATIT50783.2020.9349335","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349335","url":null,"abstract":"Typical functional diagrams and operation algorithms of tracking system of tracking radar of antiaircraft missile armament with digital processing of error signal are considered. It’s showed that independent of the measurable parameters of radio signal all tracking systems have a similar structure. The leading place of digital filter in the performance of defined target movement model by tracking system is based. The state matrix equations for target movement model used in tracking system of tracking radar of antiaircraft missile armament are obtained. The ways of further research for improvement of target tracking accuracy are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349308
Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna
Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.
{"title":"Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission","authors":"Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna","doi":"10.1109/ATIT50783.2020.9349308","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349308","url":null,"abstract":"Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/atit50783.2020.9349293
{"title":"Information and Encoding Theory","authors":"","doi":"10.1109/atit50783.2020.9349293","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349293","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.
{"title":"Methods of Security Authentication and Authorization into Informationals Systems","authors":"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav","doi":"10.1109/ATIT50783.2020.9349333","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349333","url":null,"abstract":"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349351
A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko
The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.
{"title":"Intrusion and Fire Detection Method by Wireless Sensor Network","authors":"A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko","doi":"10.1109/ATIT50783.2020.9349351","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349351","url":null,"abstract":"The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/ATIT50783.2020.9349332
V. Sobchuk, V. Pichkur, O. Barabash, O. Laptiev, Kovalchuk Igor, Amina Zidan
The article analyzes the concept of process control at an industrial enterprise, ensuring the functional stability of technological processes. A novelty of the proposed model is the use of pseudo- inversion tools as an apparatus that provides the best solution of a system of algebraic equations, the parameters of which describe the technological process. The algorithm for the organization and planning of technological processes is offered. With the help of pseudo-inversion the control algorithm for functionally stable technological process of the production enterprise is constructed
{"title":"Algorithm of Control of Functionally Stable Manufacturing Processes of Enterprises","authors":"V. Sobchuk, V. Pichkur, O. Barabash, O. Laptiev, Kovalchuk Igor, Amina Zidan","doi":"10.1109/ATIT50783.2020.9349332","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349332","url":null,"abstract":"The article analyzes the concept of process control at an industrial enterprise, ensuring the functional stability of technological processes. A novelty of the proposed model is the use of pseudo- inversion tools as an apparatus that provides the best solution of a system of algebraic equations, the parameters of which describe the technological process. The algorithm for the organization and planning of technological processes is offered. With the help of pseudo-inversion the control algorithm for functionally stable technological process of the production enterprise is constructed","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}