首页 > 最新文献

2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)最新文献

英文 中文
Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes 自适应编码方法的发展,用类巴克码实时解码数据
Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus
An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).
考虑了一种改进的快速查找这种抗干扰码序列的方法,该方法能够根据所得到的码序列的长度查找和纠正错误。这些方法使创建在功率和噪声抗扰性方面具有改进质量指标的编码系统成为可能。所考虑的噪声序列具有实际意义,因为在获得的代码序列的基础上,有机会轻松快速地发现(高达50%)和纠正(高达25%)失真字符(来自噪声代码序列的长度)。
{"title":"Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes","authors":"Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus","doi":"10.1109/aict52120.2021.9628911","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628911","url":null,"abstract":"An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Dipole Model Based Coherent Radar Target Decomposition 基于双偶极子模型的相干雷达目标分解
D. Kalimullin, A. Popov
A method for recovering objects parameters by experimental data based on the two-dipole model of target representing is discussed in the paper. The goal of the investigation is to develop the method of remote sensing objects parameters definition by measured data. A considered method is built on analysis of analytic expressions of PSM elements for a two-dipole mathematical model of object representation. The proposed method was applied to recover the parameters of different objects for which complex PSM’s were experimentally obtained. Some objects signatures were obtained and considered based on recovered parameters and provided their statistical analysis. Obtained results indicate the adequacy of the two-dipole model and appliance for modelling the real objects prototypes to study the process of transforming electromagnetic waves at reflecting from object also a possibility of radar targets imitating. Obtained results can be useful in solving radar objects recognition and classification problems.
本文讨论了一种基于目标表示的双偶极子模型,利用实验数据恢复目标参数的方法。本研究的目的是发展利用实测数据确定遥感目标参数的方法。通过对双偶极子对象表示数学模型中PSM元素解析表达式的分析,建立了一种考虑方法。将该方法应用于不同目标的参数恢复,并在实验中得到了复杂的PSM。根据恢复的参数,得到并考虑了一些目标特征,并对其进行了统计分析。研究结果表明,双偶极子模型是一种完备的模型,可用于实物原型的建模,研究电磁波在物体反射作用下的变换过程,也为模拟雷达目标提供了可能。所得结果可用于解决雷达目标识别和分类问题。
{"title":"Two-Dipole Model Based Coherent Radar Target Decomposition","authors":"D. Kalimullin, A. Popov","doi":"10.1109/aict52120.2021.9628926","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628926","url":null,"abstract":"A method for recovering objects parameters by experimental data based on the two-dipole model of target representing is discussed in the paper. The goal of the investigation is to develop the method of remote sensing objects parameters definition by measured data. A considered method is built on analysis of analytic expressions of PSM elements for a two-dipole mathematical model of object representation. The proposed method was applied to recover the parameters of different objects for which complex PSM’s were experimentally obtained. Some objects signatures were obtained and considered based on recovered parameters and provided their statistical analysis. Obtained results indicate the adequacy of the two-dipole model and appliance for modelling the real objects prototypes to study the process of transforming electromagnetic waves at reflecting from object also a possibility of radar targets imitating. Obtained results can be useful in solving radar objects recognition and classification problems.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Routing with Power Link Blocking Model and Load Balancing 基于电源链路阻塞模型和负载均衡的安全路由
Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan
The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.
本文研究了一种基于电力链路阻塞模型和负载均衡的安全路由方法。因此,提出了遵循流量工程概念的基于流量的基本负载均衡数学模型,以改进和补充考虑链路妥协概率作为网络安全参数的条件。改进的安全流量工程路由模型的新颖性体现在与链路带宽和妥协概率相关的负载均衡条件上。安全流量工程模型的应用允许过载,以减少最脆弱的妥协概率链路。采用电力链路阻塞模型作为加权系数对链路妥协概率的具体函数依赖关系。
{"title":"Secure Routing with Power Link Blocking Model and Load Balancing","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan","doi":"10.1109/aict52120.2021.9628938","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628938","url":null,"abstract":"The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Hardware for Digital Control System of Pulsed NQR Spectrometer 脉冲NQR光谱仪数字控制系统的硬件开发
I. Safronov, T. Kazemirskiy, Andrii Samila
The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.
通过分析,提出了实现脉冲相干NQR光谱仪数字控制系统的最佳PLD类型的选择。基于FPGA EP1C6T144C8N进行了电子器件的结构和功能合成。该开发还可用于可编程逻辑集成电路的操作研究,以加深对描述电子系统建模设备的语言- Verilog HDL, VHDL的知识和技能。
{"title":"Development of Hardware for Digital Control System of Pulsed NQR Spectrometer","authors":"I. Safronov, T. Kazemirskiy, Andrii Samila","doi":"10.1109/aict52120.2021.9628953","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628953","url":null,"abstract":"The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP TCP/IP协议不同阶段信息系统犯罪实现可能性评价
I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo
The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.
本文介绍了信息系统安全的主要经典模型。它给出了一种描述——一种在具有开放架构的信息系统中实现信息威胁的尝试的统计分析。对不同TCP/IP协议栈级别下信息威胁的实现概率进行了仿真;对仿真结果进行了分析。通过仿真得到了TCP/IP协议栈各层信息威胁在IS中实现的统计概率值。结果表明,所得的信息威胁统计概率值总体上与理论值吻合,表明该近似值具有足够的准确性,适用于评估TCP/IP协议栈不同层次的信息威胁统计概率。
{"title":"Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP","authors":"I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo","doi":"10.1109/aict52120.2021.9628936","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628936","url":null,"abstract":"The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of COVID-19 Dynamics using Ridge Regression 基于脊回归的COVID-19动态模拟
D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko
The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.
COVID-19大流行影响了世界各地人类活动的所有领域。公共卫生系统已显示出对如此大规模流行病的准备不足。数学建模是控制疫情过程的有效方法。本文基于Ridge回归方法,建立了新冠肺炎疫情传播动态预测模型。该模型使用英国、德国、日本和乌克兰的COVID-19发病率数据进行了验证。选择这些具有不同流行过程动态的特定国家,可以充分调查所构建模型的准确性。
{"title":"Simulation of COVID-19 Dynamics using Ridge Regression","authors":"D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko","doi":"10.1109/aict52120.2021.9628991","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628991","url":null,"abstract":"The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis 用于指纹样本合成的自适应深度卷积GAN
Oleksandr Striuk, Yuriy Kondratenko
Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.
真实的生物特征指纹样本属于个人数据的范畴,因此将其用于深度学习模型训练可能存在一定的局限性。人工生成的指纹图像与真人无关,可以自由使用(“隐私友好”)。合成指纹样本是应用研究的兴趣:生物学(乳头线结构和改变),法医(计算机指纹识别,重建和恢复受损样本),技术(各种生物识别安全方法)。生成能够准确再现真实指纹纹理特征的人工指纹可能是一项艰巨的任务。在本文中,我们提出了一个深度学习框架-自适应深度卷积生成对抗网络(ADCGAN) -我们已经开发和研究,并且已经证明了生成真实指纹样本的能力,这些样本在特征谱方面与真实指纹样本相似。ADCGAN使进行指纹研究成为可能,而不受生物特征数据机密性的限制。
{"title":"Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis","authors":"Oleksandr Striuk, Yuriy Kondratenko","doi":"10.1109/aict52120.2021.9628978","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628978","url":null,"abstract":"Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things 5G LTE窄带工业物联网中超可靠低延迟通信的无线电资源管理方法
Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley
We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.
我们提出了5G LTE/窄带工业物联网(NB-IIoT)网络架构,通过分配窄带宽频谱,将部分功能通过eNodeB基站传输到物联网控制器,提供实时的工业物联网服务。该方法考虑了IIoT流量的优先级,并通过在新的IoT控制器上调度资源,允许保留现有的eNodeB基站不变。首次提出了工业物联网流量优先排序方法,并在此基础上提出了改进的物联网控制器无线资源规划与分配算法。研究了5G LTE/NB-IIoT网络的负载均衡方法。提出的方法考虑了工业物联网服务的优先级,为5G网络中的实时工业物联网服务提供了超可靠低延迟通信(URLLC)。
{"title":"Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things","authors":"Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley","doi":"10.1109/aict52120.2021.9628913","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628913","url":null,"abstract":"We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"41 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality 基于微处理器的扩展功能电气负荷控制系统的概念
Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko
To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.
为了提高与电气设备(电子设备)一起工作时的能源安全,使用了许多设备,例如断路器,RCCB断路器,熔断器链接,继电器等。所有这些组件都是为了保护设备或与它们一起工作的人,但访问它们通常是有限的,此外,施加限制还因为用户必须具有一定的资格。此外,大多数元件都位于配电箱内。提出的控制系统概念是一个紧凑的解决方案,允许测量能源消耗的所有必要参数,分析这些参数并做出决策,以及实际上,使用物联网等现代技术远程控制设备的功率,这扩展了标准能源安全系统的功能。系统本身可以以浪涌保护器或瓦特表的形式直接定位于目标消费者。
{"title":"A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality","authors":"Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko","doi":"10.1109/aict52120.2021.9628945","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628945","url":null,"abstract":"To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of coding dynamic sequence of frame-spline structures of provided frames in info-communications 信息通信中所提供帧的帧样条结构动态序列的编码方法
V. Barannik, N. Barannik, Yu. G. Babenko, Victoriya Himenko, Vitaliy Tverdokhlib
This paper explains the general technological principle in the process of coding the sequence of predicted frames and their blocks in the spectrally differentiated space for coding methods of the H26 family *. There is the application of frame processing depending on their type in the stream and weight to video resource and their integrity. Problems for the existing technologies of processing a set of positional coordinates that describe the length of insignificant components of transformants are revealed. The main stages of the creation method of coding a dynamic sequence of frame-spline structures of the provided shots in info-communications are stated.
本文阐述了H26族编码方法*在谱微分空间对预测帧序列及其分块进行编码过程中的一般技术原理。根据帧在流中的类型、对视频资源的权重和完整性对帧进行处理。揭示了用一组位置坐标来描述变换分量长度的现有技术存在的问题。叙述了在信息通信中对所提供镜头的帧样条结构的动态序列进行编码的创建方法的主要步骤。
{"title":"Method of coding dynamic sequence of frame-spline structures of provided frames in info-communications","authors":"V. Barannik, N. Barannik, Yu. G. Babenko, Victoriya Himenko, Vitaliy Tverdokhlib","doi":"10.1109/aict52120.2021.9628928","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628928","url":null,"abstract":"This paper explains the general technological principle in the process of coding the sequence of predicted frames and their blocks in the spectrally differentiated space for coding methods of the H26 family *. There is the application of frame processing depending on their type in the stream and weight to video resource and their integrity. Problems for the existing technologies of processing a set of positional coordinates that describe the length of insignificant components of transformants are revealed. The main stages of the creation method of coding a dynamic sequence of frame-spline structures of the provided shots in info-communications are stated.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1