首页 > 最新文献

2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)最新文献

英文 中文
Application of Allan variance for data control in sensor networks Allan方差在传感器网络数据控制中的应用
V. Krizhanovski, V. Komarov, S. Serhiienko, V. Kryzhanovskyi
This work proposes application of dynamic Allan variance for detection of failures or external interventions in data acquisition systems, cyber-physical systems, and Internet-of-Things (IoT). The work analyzed a number of sample data sequences to which a random noise of various spectra was added by means of simulation starting from some point of time. It was demonstrated that the dynamic Allan variance could detect the changes in the statistical characteristics of the random data sequence caused by the added noise. This can be one of the methods of automatic data control in sensor networks.
这项工作提出了动态Allan方差在数据采集系统、网络物理系统和物联网(IoT)中检测故障或外部干预的应用。本文采用模拟的方法,从某一时间点开始,对加入各种光谱随机噪声的多个样本数据序列进行了分析。结果表明,动态Allan方差可以检测到随机数据序列的统计特性因添加噪声而发生的变化。这可以作为传感器网络中自动数据控制的方法之一。
{"title":"Application of Allan variance for data control in sensor networks","authors":"V. Krizhanovski, V. Komarov, S. Serhiienko, V. Kryzhanovskyi","doi":"10.1109/aict52120.2021.9628918","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628918","url":null,"abstract":"This work proposes application of dynamic Allan variance for detection of failures or external interventions in data acquisition systems, cyber-physical systems, and Internet-of-Things (IoT). The work analyzed a number of sample data sequences to which a random noise of various spectra was added by means of simulation starting from some point of time. It was demonstrated that the dynamic Allan variance could detect the changes in the statistical characteristics of the random data sequence caused by the added noise. This can be one of the methods of automatic data control in sensor networks.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Orthogonal Signals to Hide Information in Images 利用正交信号隐藏图像中的信息
A. Kuznetsov, Iryna Lokotkova, Oleksii Smirnov, T. Kuznetsova, Serhii Florov, O. Lebid
Spread-Spectrum Steganography (SSS) technology is used to hide information messages in image containers. For this purpose, propagating discrete signals are used, in specially formed pseudo-random sequences (PRS) with special correlation properties. This technology is similar to the direct-sequence spread spectrum (DSSS) used in telecommunications systems to reduce the effects of random noise in information channels. The properties of expansion PRS directly affect the quality of communication in DSSS and, accordingly, the efficiency of SSS. This article investigates various methods of PRS formation and conducts experiments to assess the intensity of bit errors and the quality of the image container. We show that it is most appropriate to use orthogonal discrete Walsh-Hadamard signals that provide the best performance.
扩频隐写技术(SSS)用于隐藏图像容器中的信息消息。为此,在具有特殊相关特性的特殊形式的伪随机序列(PRS)中使用传播离散信号。该技术类似于电信系统中使用的直接序列扩频(DSSS),用于减少信息信道中随机噪声的影响。扩展PRS的性能直接影响到DSSS中的通信质量,从而影响到SSS的效率。本文研究了各种PRS的形成方法,并通过实验来评估误码强度和图像容器的质量。我们证明了使用正交离散Walsh-Hadamard信号是最合适的,它提供了最好的性能。
{"title":"Using Orthogonal Signals to Hide Information in Images","authors":"A. Kuznetsov, Iryna Lokotkova, Oleksii Smirnov, T. Kuznetsova, Serhii Florov, O. Lebid","doi":"10.1109/aict52120.2021.9628959","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628959","url":null,"abstract":"Spread-Spectrum Steganography (SSS) technology is used to hide information messages in image containers. For this purpose, propagating discrete signals are used, in specially formed pseudo-random sequences (PRS) with special correlation properties. This technology is similar to the direct-sequence spread spectrum (DSSS) used in telecommunications systems to reduce the effects of random noise in information channels. The properties of expansion PRS directly affect the quality of communication in DSSS and, accordingly, the efficiency of SSS. This article investigates various methods of PRS formation and conducts experiments to assess the intensity of bit errors and the quality of the image container. We show that it is most appropriate to use orthogonal discrete Walsh-Hadamard signals that provide the best performance.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-Enabled Software-Defined Networks for QoE Management QoE管理中支持机器学习的软件定义网络
Chunzhi Wang, Le Yuan, M. Medvetskyi, M. Beshley, A. Pryslupskyi, H. Beshley
The use of artificial intelligence in modern technology is not a novelty. However, its use in telecommunication systems is little studied. This is not surprising because the implementation of third-party software modules in traditional networks is too complex, in contrast to software-defined networks, which have become very popular in the last few years. This paper presents the development of a machine learning module for predicting QoE (Quality of Experience) in software-defined networks. The module allows to predict and provide customer-defined quality of service and reduce the load on network equipment by reducing the amount of signaling traffic in the network. A software-defined network architecture with an integrated machine learning module is proposed. The study compared the predicted QoE level and the results obtained with the QoE monitoring system in the virtual network in the Mininet environment. In addition, graphs of the network load by signal packets using the machine learning module and the standard monitoring system are presented. We have proven that using a machine learning module reduces signaling traffic on the network by 30%.
在现代技术中使用人工智能并不是什么新鲜事物。然而,它在电信系统中的应用很少被研究。这并不奇怪,因为传统网络中第三方软件模块的实现过于复杂,这与软件定义网络形成了鲜明对比,而软件定义网络在过去几年中变得非常流行。本文介绍了一个用于预测软件定义网络中QoE(体验质量)的机器学习模块的开发。该模块允许预测和提供客户定义的服务质量,并通过减少网络中的信令通信量来减少网络设备的负载。提出了一种集成机器学习模块的软件定义网络体系结构。在Mininet环境下,将预测的QoE水平与虚拟网络中QoE监测系统获得的结果进行了比较。此外,利用机器学习模块和标准监控系统,给出了信号数据包的网络负载图。我们已经证明,使用机器学习模块可以将网络上的信令流量减少30%。
{"title":"Machine Learning-Enabled Software-Defined Networks for QoE Management","authors":"Chunzhi Wang, Le Yuan, M. Medvetskyi, M. Beshley, A. Pryslupskyi, H. Beshley","doi":"10.1109/aict52120.2021.9628961","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628961","url":null,"abstract":"The use of artificial intelligence in modern technology is not a novelty. However, its use in telecommunication systems is little studied. This is not surprising because the implementation of third-party software modules in traditional networks is too complex, in contrast to software-defined networks, which have become very popular in the last few years. This paper presents the development of a machine learning module for predicting QoE (Quality of Experience) in software-defined networks. The module allows to predict and provide customer-defined quality of service and reduce the load on network equipment by reducing the amount of signaling traffic in the network. A software-defined network architecture with an integrated machine learning module is proposed. The study compared the predicted QoE level and the results obtained with the QoE monitoring system in the virtual network in the Mininet environment. In addition, graphs of the network load by signal packets using the machine learning module and the standard monitoring system are presented. We have proven that using a machine learning module reduces signaling traffic on the network by 30%.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131183158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Investigation of Web Application Security Web应用程序安全性的实验研究
V. Strukov, Vladislav Gudilin
The purpose of the research work is to prove the effectiveness of the method of experimental investigation of web application security, which allows for a limited time to detect the maximum possible number of vulnerabilities in the computer systems, in order to fix promptly these security problems. Based on the results of an experimental study, the authors propose methodology for identifying appropriate types of vulnerabilities for cybersecurity professionals.
研究工作的目的是为了证明web应用程序安全实验调查方法的有效性,该方法可以在有限的时间内检测到计算机系统中尽可能多的漏洞,以便及时修复这些安全问题。基于一项实验研究的结果,作者提出了为网络安全专业人员识别适当类型漏洞的方法。
{"title":"Experimental Investigation of Web Application Security","authors":"V. Strukov, Vladislav Gudilin","doi":"10.1109/aict52120.2021.9628957","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628957","url":null,"abstract":"The purpose of the research work is to prove the effectiveness of the method of experimental investigation of web application security, which allows for a limited time to detect the maximum possible number of vulnerabilities in the computer systems, in order to fix promptly these security problems. Based on the results of an experimental study, the authors propose methodology for identifying appropriate types of vulnerabilities for cybersecurity professionals.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133440745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Making Optimal Decisions with Learning Method Based on Fuzzy Logic 基于模糊逻辑的学习方法的最优决策
P. Kravets, V. Lytvyn, Y. Burov, V. Vysotska, L. Chyrun, V. Panasyuk
This work aims to develop the functions and structure of intelligent agents with fuzzy logic based on methods of reinforcement learning and their application to solve practical problems of decision-making in conditions of uncertainty. To achieve this goal, it is used fuzzy inference based on production rules knowledge bases to develop an algorithm for the operation of an intelligent agent. The empirical verification of the developed algorithm efficacy is carried out for the task of agent finding the optimal value of the function in the cell space with the determination of the direction of movement according to the rules of fuzzy logic.
本工作旨在发展基于强化学习方法的模糊逻辑智能体的功能和结构,并将其应用于解决不确定条件下决策的实际问题。为了实现这一目标,利用基于生产规则知识库的模糊推理,开发了智能代理的运行算法。针对智能体在单元空间中寻找函数的最优值并根据模糊逻辑规则确定运动方向的任务,对所开发算法的有效性进行了实证验证。
{"title":"Making Optimal Decisions with Learning Method Based on Fuzzy Logic","authors":"P. Kravets, V. Lytvyn, Y. Burov, V. Vysotska, L. Chyrun, V. Panasyuk","doi":"10.1109/aict52120.2021.9628983","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628983","url":null,"abstract":"This work aims to develop the functions and structure of intelligent agents with fuzzy logic based on methods of reinforcement learning and their application to solve practical problems of decision-making in conditions of uncertainty. To achieve this goal, it is used fuzzy inference based on production rules knowledge bases to develop an algorithm for the operation of an intelligent agent. The empirical verification of the developed algorithm efficacy is carried out for the task of agent finding the optimal value of the function in the cell space with the determination of the direction of movement according to the rules of fuzzy logic.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for Reliability Analysis of Human-Machine Interaction in Automated Control Systems 自动化控制系统中人机交互可靠性分析方法
E. Lavrov
The article deals with the problems of the so-called human factor in automated systems. The author substantiates the need for a comprehensive human-system approach to the design and operation of computerized systems of various purposes, describes the functional network methodology used to describe and evaluate operator-automation interaction, analytical and simulation modeling technology to obtain predictive estimates of interaction quality in automated systems (error-freeness, timeliness, information load and operator workload). The author shows the place of the developed models in decision support systems for the design and operation of automated systems.
这篇文章讨论了自动化系统中所谓的人为因素的问题。作者论证了在设计和运行各种目的的计算机化系统时需要一种全面的人-系统方法,描述了用于描述和评估操作员-自动化交互的功能网络方法,分析和仿真建模技术,以获得自动化系统中交互质量(无错误性、及时性、信息负载和操作员工作量)的预测估计。作者展示了所开发的模型在自动化系统设计和运行决策支持系统中的地位。
{"title":"Methodology for Reliability Analysis of Human-Machine Interaction in Automated Control Systems","authors":"E. Lavrov","doi":"10.1109/aict52120.2021.9628925","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628925","url":null,"abstract":"The article deals with the problems of the so-called human factor in automated systems. The author substantiates the need for a comprehensive human-system approach to the design and operation of computerized systems of various purposes, describes the functional network methodology used to describe and evaluate operator-automation interaction, analytical and simulation modeling technology to obtain predictive estimates of interaction quality in automated systems (error-freeness, timeliness, information load and operator workload). The author shows the place of the developed models in decision support systems for the design and operation of automated systems.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Possible Ways of Video Processing at the Quantization Stage 量化阶段视频处理的可能方法
D. Havrylov, Yeroshenko Valerii, R. Onyshchenko, Kateryna Zakomorna, Savchuk Maksym, Karaban Oleksandr
The aim of the article is to build a method of video processing with the possibility of its protection at the stage of quantization with subsequent arithmetic coding. That will allow at preservation of structural - statistical regularity to provide a necessary level of availability, reliability and confidentiality at video data transmission. Providing the required level of availability involves reducing the video volume by 30% compared to the original volume. In this case, the provision of the required level of reliability is confirmed by estimating the peak signal-to-noise ratio for the authorized user, which is PSNRaBT ≥ 20 dB. Ensuring the required level of confidentiality is confirmed by estimating the peak signal-to-noise ratio for unauthorized access, which is PSNRHCд ≤ 9 dB. The scientific novelty of the obtained results lies in the following: for the first time two methods of video image processing at the quantization stage are proposed. The method of using encryption tables has greater cryptographic stability, and the method of using the key matrix has greater speed. At the same time, the use of arithmetic coding will satisfy the need for availability by reducing the initial volume.
本文的目的是建立一种视频处理方法,在量化阶段对其进行保护,并进行后续的算术编码。这将使结构-统计规律得以保存,从而在视频数据传输方面提供必要的可用性、可靠性和保密性。提供所需的可用性级别需要将视频容量与原始容量相比减少30%。在这种情况下,通过估计授权用户的峰值信噪比(PSNRaBT≥20 dB)来确认是否提供所需的可靠性水平。通过估计未经授权访问的峰值信噪比(PSNRHCд≤9 dB)来确定所需的机密级别。所得结果的科学新颖之处在于:首次提出了两种量化阶段的视频图像处理方法。使用加密表的方法具有更高的加密稳定性,使用密钥矩阵的方法具有更高的速度。同时,算术编码的使用通过减少初始体积来满足可用性的需要。
{"title":"Possible Ways of Video Processing at the Quantization Stage","authors":"D. Havrylov, Yeroshenko Valerii, R. Onyshchenko, Kateryna Zakomorna, Savchuk Maksym, Karaban Oleksandr","doi":"10.1109/aict52120.2021.9628893","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628893","url":null,"abstract":"The aim of the article is to build a method of video processing with the possibility of its protection at the stage of quantization with subsequent arithmetic coding. That will allow at preservation of structural - statistical regularity to provide a necessary level of availability, reliability and confidentiality at video data transmission. Providing the required level of availability involves reducing the video volume by 30% compared to the original volume. In this case, the provision of the required level of reliability is confirmed by estimating the peak signal-to-noise ratio for the authorized user, which is PSNRaBT ≥ 20 dB. Ensuring the required level of confidentiality is confirmed by estimating the peak signal-to-noise ratio for unauthorized access, which is PSNRHCд ≤ 9 dB. The scientific novelty of the obtained results lies in the following: for the first time two methods of video image processing at the quantization stage are proposed. The method of using encryption tables has greater cryptographic stability, and the method of using the key matrix has greater speed. At the same time, the use of arithmetic coding will satisfy the need for availability by reducing the initial volume.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology 3D Noon-Models of Switching Patterns on Elements by Berezovsky 别列佐夫斯基在元素上切换模式的本体三维非模型
S. Berezovsky
The problem of creating 2D, 3D midday models of switching circuits for the design of N-dimensional switching structures based on a physical object - switching element by Berezovsky is considered. Particular attention is paid to the development of an ontology of noon models of switching patterns based on elements by Berezovsky. Noon-models of switching schemes are constructed using algebraic lines of the 1st and 2nd orders. Midday Models allow you to incorporate the developer solver directly into the design process. This approach allows the solver to synthesize intelligently heuristic 2D and 3D switching structures based on the geometrization theorem for bounded manifolds.
考虑了基于别列佐夫斯基的物理对象-开关元件的n维开关结构设计中创建二维、三维开关电路中午模型的问题。特别关注的是基于别列佐夫斯基元素的切换模式的中午模型本体论的发展。利用一阶和二阶代数线构造了切换方案的非模型。正午模型允许您将开发人员求解器直接合并到设计过程中。该方法允许求解器基于有界流形的几何化定理智能地综合启发式二维和三维切换结构。
{"title":"Ontology 3D Noon-Models of Switching Patterns on Elements by Berezovsky","authors":"S. Berezovsky","doi":"10.1109/aict52120.2021.9628895","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628895","url":null,"abstract":"The problem of creating 2D, 3D midday models of switching circuits for the design of N-dimensional switching structures based on a physical object - switching element by Berezovsky is considered. Particular attention is paid to the development of an ontology of noon models of switching patterns based on elements by Berezovsky. Noon-models of switching schemes are constructed using algebraic lines of the 1st and 2nd orders. Midday Models allow you to incorporate the developer solver directly into the design process. This approach allows the solver to synthesize intelligently heuristic 2D and 3D switching structures based on the geometrization theorem for bounded manifolds.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Distributed Machine Learning Methods in Databases 数据库中分布式机器学习方法的研究
M. Klymash, M. Kyryk, I. Demydov, O. Hordiichuk-Bublivska, H. Kopets, N. Pleskanka
This article discusses the problems of processing large amounts of information in databases to more efficiently execute user queries. The methods of distributed machine learning were described in this research, which allow a faster analysis of large data. A modification of the distributed database system architecture was proposed, which ensures the effective application of machine learning methods. Software modeling of data arrays processing using distributed machine learning has been carried out. The obtained results indicate an increase in the efficiency of processing large amounts of information in databases using distributed machine learning methods.
本文讨论了在数据库中处理大量信息以更有效地执行用户查询的问题。本研究描述了分布式机器学习的方法,它可以更快地分析大数据。提出了一种改进的分布式数据库体系结构,保证了机器学习方法的有效应用。使用分布式机器学习进行数据阵列处理的软件建模。所得结果表明,使用分布式机器学习方法可以提高处理数据库中大量信息的效率。
{"title":"Research on Distributed Machine Learning Methods in Databases","authors":"M. Klymash, M. Kyryk, I. Demydov, O. Hordiichuk-Bublivska, H. Kopets, N. Pleskanka","doi":"10.1109/aict52120.2021.9628949","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628949","url":null,"abstract":"This article discusses the problems of processing large amounts of information in databases to more efficiently execute user queries. The methods of distributed machine learning were described in this research, which allow a faster analysis of large data. A modification of the distributed database system architecture was proposed, which ensures the effective application of machine learning methods. Software modeling of data arrays processing using distributed machine learning has been carried out. The obtained results indicate an increase in the efficiency of processing large amounts of information in databases using distributed machine learning methods.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of Level of Algorithms Parallelization and Efficiency of Using Different Error-Correction Codes in Cloud Realizations of Parallel Computing Algorithms 并行计算算法云实现中算法并行化水平的估计及不同纠错码的使用效率
I. Melnyk, A. Luntovskyy
The basic matrix algorithm for statement of parallel task in the cloud computing systems are considered in this paper. This algorithm is generally based on using the approach of arithmetic-logic relations and forming of recurrent matrixes. Possibility of using different error-coding methods for sending the request on parallelization task and receiving the answer is also considered. Comparative analyze of corrective ability of RS and convolutional codes is provided. As a result of provided investigations the relation for estimation the level of task parallelization is proposed. Choosing of convolutional codes for transmitting the data for parallelization the calculation task in cloud systems using of convolutional codes is recommended.
本文研究了云计算系统中并行任务语句的基本矩阵算法。该算法一般基于使用算术逻辑关系和循环矩阵的形成方法。还考虑了在并行化任务上发送请求和接收应答时使用不同的错误编码方法的可能性。对比分析了RS码和卷积码的纠错能力。在此基础上,提出了任务并行化水平估计的关系。推荐在云计算系统中使用卷积码进行并行化计算任务的数据传输时选择卷积码。
{"title":"Estimation of Level of Algorithms Parallelization and Efficiency of Using Different Error-Correction Codes in Cloud Realizations of Parallel Computing Algorithms","authors":"I. Melnyk, A. Luntovskyy","doi":"10.1109/aict52120.2021.9628935","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628935","url":null,"abstract":"The basic matrix algorithm for statement of parallel task in the cloud computing systems are considered in this paper. This algorithm is generally based on using the approach of arithmetic-logic relations and forming of recurrent matrixes. Possibility of using different error-coding methods for sending the request on parallelization task and receiving the answer is also considered. Comparative analyze of corrective ability of RS and convolutional codes is provided. As a result of provided investigations the relation for estimation the level of task parallelization is proposed. Choosing of convolutional codes for transmitting the data for parallelization the calculation task in cloud systems using of convolutional codes is recommended.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1