首页 > 最新文献

2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

英文 中文
Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement 基于多位置距离测量的隐式发射机定位精度模型
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349304
V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov
The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.
本文考虑了基于距离测量法的隐式发射机多位置定位精度的数学模型。该模型以发射机到同步接收机群的距离作为主要参数进行计算。采用最小二乘法建立定位精度模型。定位精度的估计是在对隐藏发射机的定位精度与对接收天线的距离测量精度进行比较的基础上进行的。通过仿真得到了典型办公楼定位精度场的实际结果。
{"title":"Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement","authors":"V. Savchenko, O. Laptiev, O. Kolos, Rostyslav Lisnevskyi, V. Ivannikova, Ivan Ablazov","doi":"10.1109/ATIT50783.2020.9349304","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349304","url":null,"abstract":"The article considers a mathematical model of the accuracy of multi-position localization of hidden transmitters based on Distance Measuring Method. The model uses the distance from the transmitter to the group of synchronized receivers as the main parameter for calculations. The Least Squares Method is used to generate a localization accuracy model. The estimation of the localization accuracy is carried out on the basis of comparing the accuracy of finding the location of the hidden transmitter relative to the accuracy of measuring the range to the receiving antennas. Practical results of localization accuracy field for a typical office building are obtained by simulation.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Generative Adversarial Neural Network for Creating Photorealistic Images 生成对抗神经网络创建逼真的图像
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349326
Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova
This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity
本文的重点是研究生成对抗神经网络(GAN或GANN)作为创建各种功能样本的工具,特别是逼真的图像(图形,分子等)。本文考虑了现有的网络设计和算法的方法和途径,以及不同类型的结构与各种组合的有效性,并以手写体数字创建为例作为逼真图像之一。本文探讨了生成对抗神经网络作为人工智能复杂范式的实现的应用价值。研究结果证明了GAN技术在设计各种复杂类型和类别的样品方面的效率
{"title":"Generative Adversarial Neural Network for Creating Photorealistic Images","authors":"Oleksandr Striuk, Y. Kondratenko, I. Sidenko, Alla Vorobyova","doi":"10.1109/ATIT50783.2020.9349326","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349326","url":null,"abstract":"This paper is focused on studying the Generative Adversarial Neural Network (GAN or GANN) as an implement for creating diverse functional samples, particularly photorealistic images (graphic, molecular, etc.). The paper considers available existing methods and approaches for designing and algorithmization the current class of networks, also the effectiveness of different types of formed architectures with various combinations using the example of handwritten digits creation as one of the photorealistic images. The paper examines an applied value of the generative adversarial neural network as an implementation of the complex paradigm of artificial intelligence. The results of the study demonstrate the efficiency of the GAN technology in designing samples of various types and categories of complexity","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125821078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations 用微分-泰勒变换求解稳定微分方程的建模
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349265
Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov
The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.
本文给出了鲍姆加特法稳定常微分方程数值积分的一种典型算法。积分是在普霍夫微分-泰勒变换的基础上进行的。考虑了恒步长和顺序集成,以及“分步”、“分步和顺序”自适应。针对自适应问题,在传统的根据积分的相位变量给出给定相对误差的方法之外,提出了一种根据鲍姆加特法稳定所采用的原微分方程的积分给出给定相对误差的方法。考虑了对航天器运动微分方程进行积分的一个实例。该算法可有效地用于常微分方程计算机积分程序的开发。
{"title":"Modeling of Solving Stabilized Differential Equations By Differential-Taylor Transformations","authors":"Mykhailo Rakushev, Y. Kravchenko, Oleksandr Permiakov, Oleksandr Lavrinchuk, V. Bychenkov, V. Krainov","doi":"10.1109/ATIT50783.2020.9349265","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349265","url":null,"abstract":"The paper presents a typical algorithm for numerical integration of the ordinary differential equation stabilized by the Baumgart method. The integration is performed on the basis of Pukhov’s differential-Taylor transformations. Constant step size and order integration, as well as with “by steps”, “by steps and order” adaptation are considered. For adaptation, in addition to the traditional approach, which deals with providing a given relative error according to the phase variables of integration, an approach, which deals with providing a given relative error according to the integral of the original differential equation adopted for stabilization by the Baumgart method is proposed. A practical example of integrating the differential equation of spacecraft motion is considered. The proposed algorithm can be effectively used in the development of programs for computer integration of ordinary differential equations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm 基于神经网络MELM算法的无人机自主飞行轨迹控制方法
Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349317
O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko
{"title":"Trajectory Control Method Of UAV In Autonomous Flight Mode Using Neural Network MELM Algorithm","authors":"O. Fesenko, R. Bieliakov, H. Radzivilov, V. Hulii, O. Kovalchuk, L. Korotchenko","doi":"10.1109/atit50783.2020.9349317","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349317","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and Encoding Theory 信息与编码理论
Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349293
{"title":"Information and Encoding Theory","authors":"","doi":"10.1109/atit50783.2020.9349293","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349293","url":null,"abstract":"","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission 傅里叶变换在数据传输信号理论研究中的应用
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349308
Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna
Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.
现在,我们总是使用不同的网络进行任何数据传输。这种数据传输通常是用某种类型的信号来实现的。有时用傅里叶级数和傅里叶变换来研究这些信号会更好。本文提出了一种可用于数据传输的信号理论研究方法。这项工作的科学新颖之处在于研究了基于傅里叶级数的函数的积分表示在构造插值多项式中的应用。有许多插值多项式,可以通过这种方式建立。用相同的积分表示来构造插值多项式有不同的方法。主要研究了泊松积分在插值多项式定义中的应用。在工作时间内建立的插值多项式与常用的插值多项式相比,具有较好的信号恢复效果,并且易于进行不同的修改。将建立的插值多项式与傅里叶变换相结合,为信号理论提供了许多有用而有力的工具。
{"title":"Usage of Fourier Transformation in Theoretical Studying of Signals in Data Transmission","authors":"Andriy Makarchuk, I. Kal’chuk, Yurii Kharkevych, T. Voloshyna","doi":"10.1109/ATIT50783.2020.9349308","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349308","url":null,"abstract":"Nowadays we always use different networks for any data transmission. This data transmission usually is realized using signals of some class. Sometimes studying of these signals is better when we use Fourier series and Fourier transformation. Authors of this paper present a method of theoretical studying of signals which can be used in data transfer. Scientific novelty of this work is studying of usage of integral representations of function, based in Fourier series, in constructing of interpolation polynomial. There are many interpolation polynomials, can be built by this way. There are different methods to build interpolation polynomials using same integral representation. Main work was focused in usage of Poisson integral in building of interpolation polynomials by definition. An interpolation polynomial, which was built in time of work, can give better result in signal recovery and is easier for different modifications then some popular interpolation polynomials. Combined usage of built interpolation polynomial and Fourier transformation give many useful and powerful instruments, which can be used in signal theory.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Methods of Security Authentication and Authorization into Informationals Systems 信息系统的安全认证和授权方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349333
Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav
There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.
在信息系统中,有许多组织身份验证和授权的方法。通常,身份验证用于提供登录,身份验证主要是个人用户数据的安全工具。它是防止接收任何系统信息的第一级保护。反过来,授权有助于在运行具有不同权限的多个不同用户时确保数据完整性。信息和通信系统的安全包括保护为存储、搜索和处理信息而设计的计算机系统(数据库、应用程序、各种设备的控制系统等)和用于传播信息的计算机系统(互联网、本地控制和无线网络、移动通信、无线电通信、卫星通信等)中的信息流通,使其免遭未经授权的访问。伪造和破坏。在我们这个时代,信息和通信革命是最紧迫的任务,解决这一问题对使用计算机技术和电信的人类活动的各个领域的安全至关重要。本文考虑了现有的认证和授权机制,以及它们影响信息系统网络安全的优缺点。阐述了使用标准化信息系统登录方法的理论和方法要求。
{"title":"Methods of Security Authentication and Authorization into Informationals Systems","authors":"Korchenko Anna, Kryvoruchko Olena, Kostiuk Mykhailo, Kazmirchuk Svitlana, Synichuk Olena, Zakharov Rostyslav","doi":"10.1109/ATIT50783.2020.9349333","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349333","url":null,"abstract":"There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection against receiving any system information. In turn, authorization helps ensure data integrity when running multiple different users with different permissions. The security of information and communication systems includes the protection of information circulating in computer systems designed for storing, searching and processing information (databases, application programs, control systems for various devices, etc.) and computer systems intended for disseminating information (Internet, local control and wireless networks, mobile communications, radio communications, satellite communications, etc.), from unauthorized access, counterfeiting and destruction. In our time, the information and communication revolution is the most urgent task, the solution of which is important for security in various areas of human activity that use computer technology and telecommunications. This article considered the existing mechanisms of authentication and authorization, and their advantages and disadvantages that affect the cybersecurity of informational systems. Theoretical and methodological requirements for the use of standardized methods of information systems log in are stated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion and Fire Detection Method by Wireless Sensor Network 基于无线传感器网络的入侵和火灾探测方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349351
A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko
The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.
验证本文的新颖性和实用价值的主要任务是开发用于检测入侵和火灾的无线传感器网络。提出了一种用于监测温度和一氧化碳浓度的传感器网络模型。提出了一种用于监测温度和一氧化碳水平的无线传感器单元。提出了一种测定温度跳跃和一氧化碳以测定穿透和火灾的方法。研究了用于火灾和入侵探测的无线传感器网络的数据传输过程。
{"title":"Intrusion and Fire Detection Method by Wireless Sensor Network","authors":"A. Dudnik, Pokutnia Daria, Mykyta Kobylchuk, Tetyana Domkiv, Natalia Dahno, O. Leshchenko","doi":"10.1109/ATIT50783.2020.9349351","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349351","url":null,"abstract":"The main tasks confirming the scientific novelty and practical value of the article is the development of a wireless sensor network for detecting intrusions and fires. A model of a sensor network for monitoring temperature and carbon monoxide levels has been developed. A device is proposed as a wireless sensor unit for monitoring temperature and carbon monoxide levels. A method is proposed for determining temperature jumps and carbon monoxide to determine penetrations and fires. The process of data transmission in a wireless sensor network for detecting fires and intrusions is investigated.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New Traffic Model of M2M Technology in 5G Wireless Sensor Networks 5G无线传感器网络中M2M技术的新流量模型
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349305
A. Bulashenko, S. Piltyay, A. Polishchuk, O. Bulashenko
This paper presents a new model of M2M traffic of wireless sensor networks. Internet of Things traffic is a significant component of modern networks traffic. Such traffic is used today by modern M2M devices. The peculiarity of M2M traffic consists in its generation by a large number of devices. The number of such devices can be many times greater than the number of regular users. The share of this traffic is more than an order of magnitude less than the video traffic. M2M device traffic is poorly understood and much less predictable. Thus, when developing new technologies, it is necessary to focus a lot on this traffic. The paper contains the results of M2M traffic analysis and develops model of M2M traffic. The 3GPP model was chosen as the base model. The analysis of this model is given, and also its modification is offered. This model allows to simulate the traffic at the unlimited time interval. A feature of this model is the stability characteristics of the devices. It allows to evaluate not only the initial attempts to transmit messages, but also attempts caused by reduced service quality. The mathematical description of the model and simulation results are obtained in the research. It describes the traffic of M2M devices and its impact on quality of service in the network. The obtained results can be used to model the traffic of M2M devices and to select their parameters. In addition, algorithms have been developed to control M2M devices during possible overloads.
提出了一种新的无线传感器网络M2M流量模型。物联网流量是现代网络流量的重要组成部分。如今,现代M2M设备使用的就是这种流量。M2M流量的特点在于它是由大量的设备产生的。这些设备的数量可能比普通用户的数量多很多倍。该流量的份额比视频流量少一个数量级以上。人们对M2M设备流量知之甚少,也很难预测。因此,在开发新技术时,有必要对这种流量进行大量关注。本文包含了M2M流量分析的结果,并建立了M2M流量模型。选择3GPP模型作为基准模型。对该模型进行了分析,并对其进行了修正。这个模型可以模拟无限时间间隔的交通。该模型的一个特点是设备的稳定性特性。它不仅可以评估发送消息的初始尝试,还可以评估由于服务质量降低而导致的尝试。研究中得到了模型的数学描述和仿真结果。它描述了M2M设备的流量及其对网络服务质量的影响。所得结果可用于M2M设备的流量建模和参数选择。此外,已经开发了算法来控制M2M设备在可能的过载期间。
{"title":"New Traffic Model of M2M Technology in 5G Wireless Sensor Networks","authors":"A. Bulashenko, S. Piltyay, A. Polishchuk, O. Bulashenko","doi":"10.1109/ATIT50783.2020.9349305","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349305","url":null,"abstract":"This paper presents a new model of M2M traffic of wireless sensor networks. Internet of Things traffic is a significant component of modern networks traffic. Such traffic is used today by modern M2M devices. The peculiarity of M2M traffic consists in its generation by a large number of devices. The number of such devices can be many times greater than the number of regular users. The share of this traffic is more than an order of magnitude less than the video traffic. M2M device traffic is poorly understood and much less predictable. Thus, when developing new technologies, it is necessary to focus a lot on this traffic. The paper contains the results of M2M traffic analysis and develops model of M2M traffic. The 3GPP model was chosen as the base model. The analysis of this model is given, and also its modification is offered. This model allows to simulate the traffic at the unlimited time interval. A feature of this model is the stability characteristics of the devices. It allows to evaluate not only the initial attempts to transmit messages, but also attempts caused by reduced service quality. The mathematical description of the model and simulation results are obtained in the research. It describes the traffic of M2M devices and its impact on quality of service in the network. The obtained results can be used to model the traffic of M2M devices and to select their parameters. In addition, algorithms have been developed to control M2M devices during possible overloads.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources 信息资源语音空间中信息心理破坏的解码方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349300
T. Belikova
The modern information space, as a collection of heterogeneous information resources, is a rather aggressive environment that has a negative destructive effect on the psyche of users, primarily adolescents. To identify such negative influences, a technique for decoding the phonetic display of the sound space of an information resource is needed to identify destructive modifications. Therefore, it is proposed to improve information technologies to counter threats to information and psychological security of adolescents.
现代信息空间作为异质信息资源的集合,是一个相当具有侵略性的环境,对用户(主要是青少年)的心理产生了消极的破坏性影响。为了识别这种负面影响,需要一种解码信息资源声音空间的语音显示的技术来识别破坏性的修改。因此,建议提高信息技术,以应对青少年信息和心理安全的威胁。
{"title":"Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources","authors":"T. Belikova","doi":"10.1109/ATIT50783.2020.9349300","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349300","url":null,"abstract":"The modern information space, as a collection of heterogeneous information resources, is a rather aggressive environment that has a negative destructive effect on the psyche of users, primarily adolescents. To identify such negative influences, a technique for decoding the phonetic display of the sound space of an information resource is needed to identify destructive modifications. Therefore, it is proposed to improve information technologies to counter threats to information and psychological security of adolescents.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1