首页 > 最新文献

2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)最新文献

英文 中文
Factors Affecting Synchronization Time of Tree Parity Machines in Cryptography 密码学中影响树奇偶校验机同步时间的因素
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349327
M. Aleksandrov, Y. Bashkov
This article presents experimental results of evaluating factors affecting synchronization time of tree parity machines. Tree parity machines are proposed as a modification of the symmetric encryption algorithm. One of the advantages of the method consists in using the phenomenon of mutual synchronization of neural networks to generate an identical encryption key for users without the need to transfer it. As a result, the factors influencing the synchronization time of neural networks and the level of key cryptographic strength were determined. The degree of influence factors was found out experimentally. The influence of the learning rule on timing and stability of synchronization of neural networks was also determined. As a result, it was determined that the best rule for mutual learning of neural networks is Hebb’s rule, and when the architecture of neural networks becomes more complex, the number of hidden neurons should be increased first. The tasks of further research are defined.
本文给出了树奇偶校验机同步时间影响因素的实验结果。提出了树奇偶校验机作为对称加密算法的改进。该方法的优点之一是利用神经网络的相互同步现象为用户生成相同的加密密钥,而无需传输。确定了影响神经网络同步时间和密钥加密强度水平的因素。通过实验确定了各因素的影响程度。确定了学习规则对神经网络同步时间和稳定性的影响。结果确定了神经网络互学习的最佳规则为Hebb规则,当神经网络的结构变得更复杂时,应首先增加隐藏神经元的数量。明确了进一步研究的任务。
{"title":"Factors Affecting Synchronization Time of Tree Parity Machines in Cryptography","authors":"M. Aleksandrov, Y. Bashkov","doi":"10.1109/ATIT50783.2020.9349327","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349327","url":null,"abstract":"This article presents experimental results of evaluating factors affecting synchronization time of tree parity machines. Tree parity machines are proposed as a modification of the symmetric encryption algorithm. One of the advantages of the method consists in using the phenomenon of mutual synchronization of neural networks to generate an identical encryption key for users without the need to transfer it. As a result, the factors influencing the synchronization time of neural networks and the level of key cryptographic strength were determined. The degree of influence factors was found out experimentally. The influence of the learning rule on timing and stability of synchronization of neural networks was also determined. As a result, it was determined that the best rule for mutual learning of neural networks is Hebb’s rule, and when the architecture of neural networks becomes more complex, the number of hidden neurons should be increased first. The tasks of further research are defined.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121105522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Paraphrase Identification Using Dependency Tree and Word Embeddings 释义识别使用依赖树和词嵌入
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349338
V. Vrublevskyi, O. Marchenko
In this paper, we are trying to develop an efficient and simple model for detecting paraphrase sentences in the English language. The dependency tree was chosen as the main structure to represent the relationships between words in a sentence. To represent the word semantics, we are using pre-trained general-purpose word embeddings. Based on these two key components, we designed a few features that can help to identify paraphrases. Conducted experiments proved that the model is efficient and shows relatively close results to state-of-the-art models.
在本文中,我们试图建立一个高效和简单的模型来检测英语中的释义句。选择依存树作为主要结构来表示句子中单词之间的关系。为了表示单词语义,我们使用预训练的通用词嵌入。基于这两个关键组成部分,我们设计了一些可以帮助识别释义的功能。实验证明,该模型是有效的,其结果与目前最先进的模型相当接近。
{"title":"Paraphrase Identification Using Dependency Tree and Word Embeddings","authors":"V. Vrublevskyi, O. Marchenko","doi":"10.1109/ATIT50783.2020.9349338","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349338","url":null,"abstract":"In this paper, we are trying to develop an efficient and simple model for detecting paraphrase sentences in the English language. The dependency tree was chosen as the main structure to represent the relationships between words in a sentence. To represent the word semantics, we are using pre-trained general-purpose word embeddings. Based on these two key components, we designed a few features that can help to identify paraphrases. Conducted experiments proved that the model is efficient and shows relatively close results to state-of-the-art models.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonparametric Multiple Comparison Test for Change-Point Detection in Big Data 大数据变化点检测的非参数多重比较检验
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349323
D. Klyushin, K. Golubeva
We offer a new effective tool for detection of change-points in tracking data (movement data, health rate data etc.). We developed a nonparametric test for homogeneity of data in two adjacent time intervals. In the context of Big Data and IoT it allows online analyzing data stream from sensor and recognizing significant deviations from the baseline. The significance level for the test is less than 0.05. Also, we provide the results of comparison of the test with well-known Kolmogorov–Smirnov test, the sign test, the Wilcoxon signed-rank test, and the Mann–Whitney test. The computational experiment has shown that the Klyushin–Petunin test based on p-statistics has very high robustness, specificity, and sensitivity, and is more universal than the Kolmogorov–Smirnov test, the sign test, the Wilcoxon signed-rank test, and the Mann–Whitney test.
我们提供了一种新的有效工具来检测跟踪数据(运动数据、健康率数据等)的变化点。我们在两个相邻的时间间隔中对数据的同质性进行了非参数检验。在大数据和物联网的背景下,它允许在线分析来自传感器的数据流并识别与基线的重大偏差。检验的显著性水平小于0.05。并与著名的Kolmogorov-Smirnov检验、符号检验、Wilcoxon符号秩检验和Mann-Whitney检验进行了比较。计算实验表明,基于p统计量的Klyushin-Petunin检验具有非常高的稳健性、特异性和敏感性,比Kolmogorov-Smirnov检验、符号检验、Wilcoxon符号秩检验和Mann-Whitney检验更具普适性。
{"title":"Nonparametric Multiple Comparison Test for Change-Point Detection in Big Data","authors":"D. Klyushin, K. Golubeva","doi":"10.1109/ATIT50783.2020.9349323","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349323","url":null,"abstract":"We offer a new effective tool for detection of change-points in tracking data (movement data, health rate data etc.). We developed a nonparametric test for homogeneity of data in two adjacent time intervals. In the context of Big Data and IoT it allows online analyzing data stream from sensor and recognizing significant deviations from the baseline. The significance level for the test is less than 0.05. Also, we provide the results of comparison of the test with well-known Kolmogorov–Smirnov test, the sign test, the Wilcoxon signed-rank test, and the Mann–Whitney test. The computational experiment has shown that the Klyushin–Petunin test based on p-statistics has very high robustness, specificity, and sensitivity, and is more universal than the Kolmogorov–Smirnov test, the sign test, the Wilcoxon signed-rank test, and the Mann–Whitney test.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123318524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methods for Predicting Adjustments to the Rates of Modern “Digital Money” 现代“数字货币”利率调整的预测方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349309
O. Leshchenko, Olexander Trush, Natalia Dahno, A. Dudnik, Karina Kazintseva, Olexander Kovalenko
This article describes advantages and disadvantages of using methods for predicting the adjustment of the rates of modern digital money, which every year are gaining popularity among ordinary users - transors and entrepreneurs.Cryptocurrency is a set of concepts and technologies that together create basis for the digital money ecosystem. Money are used to save and transfer value between network members.The topicality of the topic is due to uncertainty about the appropriateness of using cryptocurrencies.
本文描述了使用预测现代数字货币利率调整方法的优点和缺点,这些方法每年都受到普通用户- transtranser和企业家的欢迎。加密货币是一组概念和技术,它们共同为数字货币生态系统创造了基础。金钱被用来在网络成员之间储存和转移价值。这个话题的话题性是由于使用加密货币是否合适的不确定性。
{"title":"Methods for Predicting Adjustments to the Rates of Modern “Digital Money”","authors":"O. Leshchenko, Olexander Trush, Natalia Dahno, A. Dudnik, Karina Kazintseva, Olexander Kovalenko","doi":"10.1109/ATIT50783.2020.9349309","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349309","url":null,"abstract":"This article describes advantages and disadvantages of using methods for predicting the adjustment of the rates of modern digital money, which every year are gaining popularity among ordinary users - transors and entrepreneurs.Cryptocurrency is a set of concepts and technologies that together create basis for the digital money ecosystem. Money are used to save and transfer value between network members.The topicality of the topic is due to uncertainty about the appropriateness of using cryptocurrencies.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Use of a Genetic Algorithm in the Problem of Distribution of Information Security Organizational and Financial Resources 遗传算法在信息安全组织和财务资源分配问题中的应用
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349310
V. Lakhno, B. Akhmetov, S. Adilzhanova, A. Blozva, Rzaieva Svitlana, Rzaiev Dmytro
A model of the application of the genetic algorithm (GA) for solving the problem of multicriteria optimization in the distribution of resources allocated for the cybersecurity of the protected object is proposed. In the presented model, in contrast to the existing solutions, the Bellman-Zade principle is involved, which makes it possible to optimize the distribution, for example, of the organizational and financial resources of the protected object. It is shown that the use of GAs in the tasks of multicriteria optimization of cybersecurity resources will make it possible, based on multivariate simulation modeling, to select the optimal variant of resource allocation, which is especially important when these resources are limited in volume, and the defense side does not have data on the attackers’ resources.
提出了一种应用遗传算法(GA)解决保护对象网络安全资源分配中的多准则优化问题的模型。在本模型中,与现有的解决方案相比,涉及Bellman-Zade原则,这使得优化分配成为可能,例如,受保护对象的组织和财务资源。研究表明,在网络安全资源多准则优化任务中使用GAs,可以在多元仿真建模的基础上选择资源分配的最优变量,这在资源数量有限、防御方没有攻击者资源数据的情况下尤为重要。
{"title":"The Use of a Genetic Algorithm in the Problem of Distribution of Information Security Organizational and Financial Resources","authors":"V. Lakhno, B. Akhmetov, S. Adilzhanova, A. Blozva, Rzaieva Svitlana, Rzaiev Dmytro","doi":"10.1109/ATIT50783.2020.9349310","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349310","url":null,"abstract":"A model of the application of the genetic algorithm (GA) for solving the problem of multicriteria optimization in the distribution of resources allocated for the cybersecurity of the protected object is proposed. In the presented model, in contrast to the existing solutions, the Bellman-Zade principle is involved, which makes it possible to optimize the distribution, for example, of the organizational and financial resources of the protected object. It is shown that the use of GAs in the tasks of multicriteria optimization of cybersecurity resources will make it possible, based on multivariate simulation modeling, to select the optimal variant of resource allocation, which is especially important when these resources are limited in volume, and the defense side does not have data on the attackers’ resources.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"2 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132463723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ATIT 2020 Copyright Page ait2020版权页面
Pub Date : 2020-11-25 DOI: 10.1109/atit50783.2020.9349349
I. Polovinkin, V. Savchenko, O. Stefurak, O. Barabash, systemSerhii Korotin, A. Salii, Yurii P. Tselischev, Ivan P. Korovin, Anatolii V. Kotsiuruba, Yurii M. Kolomiets, Olha Suprun, Anton Sorokun, O. Suprun, Viktor Matviichuk, Svetlana Zhakiyeva, Rustam Nassirkhan
Paper / Article Title Author Name Author Email Authorized Signatory Name Authorized Signatory Email D te of Sigature Copyright Type IEEEATIT2020-10 The method of improving the quality of signal detection by accounting for interferenceOleksander Laptiev, Igor Polovinkin, Vitalii Savchenko, Oleh Stefurak and Oleg Barabash alaptev64@ukr.net,Igor1964mo@i.ua,savitan@ukr.net,stefurak.oleg@ukr.net,bar64@ukr.net 2020-12-15 IEEE IEEEATIT2020-101 Modeling the characteristics of the stabilization circuit of a hypothetical dynamic systemSerhii Korotin, Anatolii Salii, Yurii Tselischev, Ivan Korovin, Anatolii Kotsiuruba and Yurii Kolomiets korotin2008@gmail.com,salyi_ _g@nuou.org.ua,cup1938@ukr.net,korovinip@gmail.com,kav2510@ukr.net,ip48212@gmail.com 2020-12-15 IEEE IEEEATIT2020-102 Research of Features and Possibilities of Modern Real Time Video Services Olha Suprun, Anton Sorokun, Oleh Suprun, Viktor Matviichuk , Serhii Voskoboinikov and Yurii Babenko o.n.suprun@gmail.com,sorokun@gmail.com,oleh.o.suprun@gmail.com,123qwert1@ukr.net,Rtyvcb@gmail.com,babenkomahalych@gmail.com 2020-12-15 IEEE IEEEATIT2020-103 Information model of decision support in the design of information and communication systems based on the customer's profile Viach slav Riabtsev viacheslav.riabtsev@gmail.com 2020-12-15 IEEE IEEEATIT2020-104 Protection Of Information In Assessing The Factors Of Influence Tsiutsiura Mykola, Tsiutsiura Svitlana, Andrii Yerukaiev, Terentiev Oleksandr, Kyivska Kateryna, Kuleba Mykola alusion@ukr.net 2020-12-15 IEEE IEEEATIT2020-105-1 The Network Reliability Assessment and Risk Prevention Measures for the Power System of Kazakhstan Due to High Renewables Svetlana Zhakiyeva, Rustam Nassirkhan, Bekzhan Mukatov and Nurkhat Zhakiyev zhakiyevas@gmail.com,o arov.r@climate.kz,mukatov@kegoc.kz,nurkhat.zhakiyev@astanait.edu.kz 2020-12-21 IEEE IEEEATIT2020-106 Mathematical Model for Heterogeneous Databases Parameters Estimation in Distributed Systems with Dynamic Structure Vad m Mukh n, Yaroslav Ko naga, Viktor Bondarenko, Valerii Zavgorodnii, Oksana Herasymenko and Oleksii Sholokhov v.mukhin@kpi.u ,slovyan_k@ukr.net,victorbondarenko@ukr.net,z vgorodni valerii@gmail.com,oksgerasymenko@gmail.com,gyroalex@ukr.net 2020-12-16 IEEE IEEEATIT2020-11 Comparison of floating-point numbers absolute values when representation of the exponents with sign-inverse two’s complementary code Ol ksandr Miroshkin, Oleksandr Samoshchenko and Heorhii Marhiiev miroshkina @gmail.com,aleksandr.samoshchenko@gmail.com,margievge@gmail.com 2020-12-16 IEEE IEEEATIT2020-111 Methods of Assessing the Scientific Activity of Scientists and Higher Education Institutions Andrii Biloshchytskyi, Alexander Kuchansky, Yurii Andrashko, Aidos Mukhatayev, Sapar Toxanov and Adil Faizullin kuczanski@gmail.com,b o1978@gmail.com,andrashkojv@gmail.com 2020-12-16 IEEE IEEEATIT2020-114 Hierarchical model of a complex of IoT devices based on the use of a wireless sensor network Yrii Afanasiev, Valerii Chystov, Volodymyr A
论文/文章标题作者姓名作者电子邮件授权签字人姓名授权签字人电子邮件签名版权类型IEEEATIT2020-10考虑干扰提高信号检测质量的方法oleksander Laptiev, Igor Polovinkin, Vitalii Savchenko,Oleh Stefurak和Oleg Barabash alaptev64@ukr.net,Igor1964mo@i.ua,savitan@ukr.net,stefurak.oleg@ukr.net,bar64@ukr.net 2020-12-15 IEEE IEEEATIT2020-101假设动态系统稳定化电路的建模Anatolii Kotsiuruba和yuri Kolomiets korotin2008@gmail.com,salyi_ _g@nuou.org.ua,cup1938@ukr.net,korovinip@gmail.com,kav2510@ukr.net,ip48212@gmail.com 2020-12-15 IEEE IEEEATIT2020-102现代实时视频服务的特征和可能性研究Olha Suprun, Anton Sorokun, Oleh Suprun, Viktor Matviichuk,Serhii Voskoboinikov, Yurii Babenko o.n.suprun@gmail.com,sorokun@gmail.com,oleh.o.suprun@gmail.com,123qwert1@ukr.net,Rtyvcb@gmail.com,babenkomahalych@gmail.com 2020-12-15 IEEE IEEEATIT2020-103基于客户资料的信息通信系统设计决策支持信息模型Viach slav Riabtsev viacheslav.riabtsev@gmail.com 2020-12-15 IEEE IEEEATIT2020-104影响因素评估中的信息保护张建军,张建军,张建军,张建军,张建军,张建军,张建军alusion@ukr.net 2020-12-15 IEEE IEEEATIT2020-105-1高可再生能源下哈萨克斯坦电力系统可靠性评估及风险防范措施Bekzhan Mukatov和Nurkhat Zhakiyev zhakiyevas@gmail.com,o arov.r@climate.kz,mukatov@kegoc.kz,nurkhat.zhakiyev@astanait.edu.kz 2020-12-21 IEEE IEEEATIT2020-106动态结构分布式系统异构数据库参数估计的数学模型[m] Mukh n, Yaroslav Ko naga, Viktor Bondarenko, Valerii Zavgorodnii,Oksana Herasymenko和Oleksii Sholokhov v.mukhin@kpi.u,slovyan_k@ukr.net,victorbondarenko@ukr.net,z vgorodni valerii@gmail.com,oksgerasymenko@gmail.com,gyroalex@ukr.net 2020-12-16 IEEE IEEEATIT2020-11用符号逆二互补码表示指数时浮点数绝对值的比较刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,刘建军,等。基于无线传感器网络的复杂物联网设备层次模型研究[j] ., [j] . o1978@gmail.com,andrashkojv@gmail.comOleksii Sitkov和Serhii Fediuk testkivi204@gmail.com,valera.chistov43@gmail.com,afvv74@ukr.net,vitasik-81@ukr.net,sitkov@ukr.net,sfeduyk@gmail.com 2020-12-15 IEEE IEEEATIT2020-115长期数据存储介质创建方法分析Ievgen Beliak beliak1312@gmail.com 2020-12-16 IEEE IEEEATIT2020-116 IT学科教师方法论能力形成水平研究Andrii Biloshchytskyi, Serik Omirbayev, Aidos Mukhatayev, Adil Faizullin基于多位置距离测量的隐式发射机定位精度模型Vitalii Savchenko, Oleksander Laptiev, Oleksandr Kolos, Rostyslav LisnevskyiIlya Pyatin, Juliy Boiko和Oleksander Eromenko ilkhmel@ukr.net,boiko_julius@ukr.net,yeromenko_s@ukr.net 2020-12-15 IEEE IEEEATIT2020-14基于神经计算棒2的人脸识别系统,CPU,GPU比较Oleksandra Aleksandrova and Yevhen Bashkov al xandra666kl@gmail.com,eab23may@gmail.com 2020-12-15 IEEE IEEEATIT2020-15密码学中树型奇偶机同步时间影响因素Mykyta Aleksandrov and Yevhen Bashkov neckic @gmail.com,eab23may@gmail.com 2020-12-15 IEEE IEEEATIT2020-16楼宇管理智能多服务平台Oleksandr Prokhorov, yuri Pronchakov and Oleg Fedorovich .pro horov@khai.edu,pronchakov@gmail.com,oe.fedorovich@gmail。 一种隐蔽获取信息手段信号检测新方法Oleksander Laptiev, Vitalii Savchenko, Yevseiev Serhii,哈莱娜·海杜尔,谢尔盖·加霍夫alaptev64@ukr.net,savitan@ukr.net,谢尔盖·伊vseiev@hneu.net,gaydurg@gmail.com,gakhov@ukr.net 2020-12-15 IEEE IEEEATIT2020-19防空导弹武器装备跟踪雷达跟踪系统功能图与运行算法系统分析结果Igor Sachuk, Pavel Kushch, Alex Kalyta, Pavel Openko, Valery Orlenko和Sergij Bondarenko [s] chuk1@ukr.net,pav lkushch@gmail.com,majorkalit @gmail.com,pavel.openko@ukr.net,orlenkoval@gmail.com,sergbonditas@gmail.com 2020-12-17 IEEE IEEEATIT2020-21
{"title":"ATIT 2020 Copyright Page","authors":"I. Polovinkin, V. Savchenko, O. Stefurak, O. Barabash, systemSerhii Korotin, A. Salii, Yurii P. Tselischev, Ivan P. Korovin, Anatolii V. Kotsiuruba, Yurii M. Kolomiets, Olha Suprun, Anton Sorokun, O. Suprun, Viktor Matviichuk, Svetlana Zhakiyeva, Rustam Nassirkhan","doi":"10.1109/atit50783.2020.9349349","DOIUrl":"https://doi.org/10.1109/atit50783.2020.9349349","url":null,"abstract":"Paper / Article Title Author Name Author Email Authorized Signatory Name Authorized Signatory Email D te of Sigature Copyright Type IEEEATIT2020-10 The method of improving the quality of signal detection by accounting for interferenceOleksander Laptiev, Igor Polovinkin, Vitalii Savchenko, Oleh Stefurak and Oleg Barabash alaptev64@ukr.net,Igor1964mo@i.ua,savitan@ukr.net,stefurak.oleg@ukr.net,bar64@ukr.net 2020-12-15 IEEE IEEEATIT2020-101 Modeling the characteristics of the stabilization circuit of a hypothetical dynamic systemSerhii Korotin, Anatolii Salii, Yurii Tselischev, Ivan Korovin, Anatolii Kotsiuruba and Yurii Kolomiets korotin2008@gmail.com,salyi_ _g@nuou.org.ua,cup1938@ukr.net,korovinip@gmail.com,kav2510@ukr.net,ip48212@gmail.com 2020-12-15 IEEE IEEEATIT2020-102 Research of Features and Possibilities of Modern Real Time Video Services Olha Suprun, Anton Sorokun, Oleh Suprun, Viktor Matviichuk , Serhii Voskoboinikov and Yurii Babenko o.n.suprun@gmail.com,sorokun@gmail.com,oleh.o.suprun@gmail.com,123qwert1@ukr.net,Rtyvcb@gmail.com,babenkomahalych@gmail.com 2020-12-15 IEEE IEEEATIT2020-103 Information model of decision support in the design of information and communication systems based on the customer's profile Viach slav Riabtsev viacheslav.riabtsev@gmail.com 2020-12-15 IEEE IEEEATIT2020-104 Protection Of Information In Assessing The Factors Of Influence Tsiutsiura Mykola, Tsiutsiura Svitlana, Andrii Yerukaiev, Terentiev Oleksandr, Kyivska Kateryna, Kuleba Mykola alusion@ukr.net 2020-12-15 IEEE IEEEATIT2020-105-1 The Network Reliability Assessment and Risk Prevention Measures for the Power System of Kazakhstan Due to High Renewables Svetlana Zhakiyeva, Rustam Nassirkhan, Bekzhan Mukatov and Nurkhat Zhakiyev zhakiyevas@gmail.com,o arov.r@climate.kz,mukatov@kegoc.kz,nurkhat.zhakiyev@astanait.edu.kz 2020-12-21 IEEE IEEEATIT2020-106 Mathematical Model for Heterogeneous Databases Parameters Estimation in Distributed Systems with Dynamic Structure Vad m Mukh n, Yaroslav Ko naga, Viktor Bondarenko, Valerii Zavgorodnii, Oksana Herasymenko and Oleksii Sholokhov v.mukhin@kpi.u ,slovyan_k@ukr.net,victorbondarenko@ukr.net,z vgorodni valerii@gmail.com,oksgerasymenko@gmail.com,gyroalex@ukr.net 2020-12-16 IEEE IEEEATIT2020-11 Comparison of floating-point numbers absolute values when representation of the exponents with sign-inverse two’s complementary code Ol ksandr Miroshkin, Oleksandr Samoshchenko and Heorhii Marhiiev miroshkina @gmail.com,aleksandr.samoshchenko@gmail.com,margievge@gmail.com 2020-12-16 IEEE IEEEATIT2020-111 Methods of Assessing the Scientific Activity of Scientists and Higher Education Institutions Andrii Biloshchytskyi, Alexander Kuchansky, Yurii Andrashko, Aidos Mukhatayev, Sapar Toxanov and Adil Faizullin kuczanski@gmail.com,b o1978@gmail.com,andrashkojv@gmail.com 2020-12-16 IEEE IEEEATIT2020-114 Hierarchical model of a complex of IoT devices based on the use of a wireless sensor network Yrii Afanasiev, Valerii Chystov, Volodymyr A","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Method of Improving the Signal Detection Quality by Accounting for Interference 考虑干扰因素提高信号检测质量的方法
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349259
O. Laptiev, I. Polovinkin, Savchenko Vitalii, O. Stefurak, O. Barabash, O. Zelikovska
In the process of detecting the radio signal of information transmission in information systems, an urgent issue is to increase noise immunity. The article investigates the peculiarities of using low - pass filters with quadratic and linear dependence of the response on the input signal. It is shown that the principle of operation of filters is that the summation process is performed. In this case, the useful signal is summed coherently, and the interference signal is incoherent, ie the useful signal increases and the interference signal decreases.When influencing the input of linear and square filters, a rectangular pulse that mimics the signal of modern digital radio signals, the necessary parameters for further use of input and output signals are determined: mathematical expectation, correlation coefficient, variance, standard deviation.It is proved that the use of narrow-band low-pass filters in the process of signal processing allows to increase the noise immunity of the system for detection, recognition and localization of radio signals by 11%.Modeling of the process of filtering radio signals at different correlation coefficients is carried out. The simulation results confirmed the results of theoretical calculations.
在对信息系统中信息传输的无线电信号进行检测的过程中,提高抗干扰性是一个迫切需要解决的问题。本文研究了响应与输入信号呈二次线性关系的低通滤波器的特点。结果表明,滤波器的工作原理是进行求和过程。在这种情况下,有用信号被相干求和,干扰信号是非相干的,即有用信号增加,干扰信号减少。当影响线性和方形滤波器的输入时,一个模仿现代数字无线电信号信号的矩形脉冲,确定了进一步使用输入和输出信号的必要参数:数学期望、相关系数、方差、标准差。实验证明,在信号处理过程中使用窄带低通滤波器可以使系统对无线电信号的检测、识别和定位的抗噪能力提高11%。对不同相关系数下的无线电信号滤波过程进行了建模。仿真结果证实了理论计算的结果。
{"title":"The Method of Improving the Signal Detection Quality by Accounting for Interference","authors":"O. Laptiev, I. Polovinkin, Savchenko Vitalii, O. Stefurak, O. Barabash, O. Zelikovska","doi":"10.1109/ATIT50783.2020.9349259","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349259","url":null,"abstract":"In the process of detecting the radio signal of information transmission in information systems, an urgent issue is to increase noise immunity. The article investigates the peculiarities of using low - pass filters with quadratic and linear dependence of the response on the input signal. It is shown that the principle of operation of filters is that the summation process is performed. In this case, the useful signal is summed coherently, and the interference signal is incoherent, ie the useful signal increases and the interference signal decreases.When influencing the input of linear and square filters, a rectangular pulse that mimics the signal of modern digital radio signals, the necessary parameters for further use of input and output signals are determined: mathematical expectation, correlation coefficient, variance, standard deviation.It is proved that the use of narrow-band low-pass filters in the process of signal processing allows to increase the noise immunity of the system for detection, recognition and localization of radio signals by 11%.Modeling of the process of filtering radio signals at different correlation coefficients is carried out. The simulation results confirmed the results of theoretical calculations.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multimodular Cyberphysical Systems: Challenges and Existing Solutions 多模块网络物理系统:挑战和现有解决方案
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349291
Y. Albrekht, A. Pysarenko
The modern solutions to parts of the problem of creating multimodular cyberphysical systems are described. The article contains analysis of current solutions to cyberphysical space systems, creating multi-module systems that includes micro robots, to create swarm intelligence, integration cyberphysical systems for conducting experiments and using LiFi in solving network issues in cyberphysical systems. The article also includes a list of still existing issues that are yet to be solved: security, reliability and performance issues. Combining these solutions and solving the remaining issues allow to create systems that can be used in variety of researches and automate the process of collecting data.
描述了创建多模块网络物理系统的部分问题的现代解决方案。本文分析了当前网络物理空间系统的解决方案,创建包括微型机器人在内的多模块系统,创建群体智能,集成网络物理系统进行实验,并使用LiFi解决网络物理系统中的网络问题。本文还列出了仍然存在的有待解决的问题:安全性、可靠性和性能问题。结合这些解决方案并解决剩下的问题,可以创建可用于各种研究和自动化收集数据过程的系统。
{"title":"Multimodular Cyberphysical Systems: Challenges and Existing Solutions","authors":"Y. Albrekht, A. Pysarenko","doi":"10.1109/ATIT50783.2020.9349291","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349291","url":null,"abstract":"The modern solutions to parts of the problem of creating multimodular cyberphysical systems are described. The article contains analysis of current solutions to cyberphysical space systems, creating multi-module systems that includes micro robots, to create swarm intelligence, integration cyberphysical systems for conducting experiments and using LiFi in solving network issues in cyberphysical systems. The article also includes a list of still existing issues that are yet to be solved: security, reliability and performance issues. Combining these solutions and solving the remaining issues allow to create systems that can be used in variety of researches and automate the process of collecting data.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131545242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static Analysis of Resource Consumption in Programs Using Rewriting Rules 基于重写规则的程序资源消耗静态分析
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349290
T. Mamedov, A. Doroshenko, Ruslan Shevchenko
The paper presents a method of static analysis of resource consumption for C# programs. A software tool based on rewriting rules is proposed for that purpose for the case of opened and closed files. In order to work with C#-programs, the special plugin for TermWare, which helps to generate appropriate terms from source code, was developed. The plugin uses the Roslyn compiler to find different syntax errors and focus on the primary task of generating terms from source code. Also, an application based on TermWare system – a static analyzer that finds problems with open-close files, is described in the article.
本文提出了一种c#程序资源消耗静态分析方法。针对打开文件和关闭文件的情况,提出了一种基于规则重写的软件工具。为了与c#程序一起工作,开发了专门用于TermWare的插件,它可以帮助从源代码生成适当的术语。该插件使用Roslyn编译器查找不同的语法错误,并专注于从源代码生成术语的主要任务。此外,本文还描述了一个基于TermWare系统的应用程序——一个静态分析器,用于发现打开关闭文件的问题。
{"title":"Static Analysis of Resource Consumption in Programs Using Rewriting Rules","authors":"T. Mamedov, A. Doroshenko, Ruslan Shevchenko","doi":"10.1109/ATIT50783.2020.9349290","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349290","url":null,"abstract":"The paper presents a method of static analysis of resource consumption for C# programs. A software tool based on rewriting rules is proposed for that purpose for the case of opened and closed files. In order to work with C#-programs, the special plugin for TermWare, which helps to generate appropriate terms from source code, was developed. The plugin uses the Roslyn compiler to find different syntax errors and focus on the primary task of generating terms from source code. Also, an application based on TermWare system – a static analyzer that finds problems with open-close files, is described in the article.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three-Pass Cryptographic Protocol Based on Permutations 基于排列的三通道密码协议
Pub Date : 2020-11-25 DOI: 10.1109/ATIT50783.2020.9349343
Shcherba Anatoly, Faure Emil, Lavdanska Olha
The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.
本文提出了一种新的实现三道加密协议的原理。其中实现的所有操作都是在排列上执行的。这样的运算是置换的乘法,取其不相交环的幂,以及求共轭置换的运算。这避免了与离散对数相关的问题,这可能会增加所提议协议的加密强度。所开发的协议既可用于阶乘编码的信息传输系统,也可用于传统系统。
{"title":"Three-Pass Cryptographic Protocol Based on Permutations","authors":"Shcherba Anatoly, Faure Emil, Lavdanska Olha","doi":"10.1109/ATIT50783.2020.9349343","DOIUrl":"https://doi.org/10.1109/ATIT50783.2020.9349343","url":null,"abstract":"The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1