首页 > 最新文献

2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)最新文献

英文 中文
Secure Routing with Power Link Blocking Model and Load Balancing 基于电源链路阻塞模型和负载均衡的安全路由
Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan
The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.
本文研究了一种基于电力链路阻塞模型和负载均衡的安全路由方法。因此,提出了遵循流量工程概念的基于流量的基本负载均衡数学模型,以改进和补充考虑链路妥协概率作为网络安全参数的条件。改进的安全流量工程路由模型的新颖性体现在与链路带宽和妥协概率相关的负载均衡条件上。安全流量工程模型的应用允许过载,以减少最脆弱的妥协概率链路。采用电力链路阻塞模型作为加权系数对链路妥协概率的具体函数依赖关系。
{"title":"Secure Routing with Power Link Blocking Model and Load Balancing","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan","doi":"10.1109/aict52120.2021.9628938","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628938","url":null,"abstract":"The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Node Deployment Optimization Method of Wireless Sensor Network Based on Firefly Algorithm 基于Firefly算法的无线传感器网络节点部署优化方法
Wei Liu, Pan Li, Z. Ye, Shuai Yang
for making the deployment distribution of wireless sensor network nodes more uniform and improve coverage, this paper proposes a node deployment optimization method based on the firefly algorithm. Firstly, a mathematical model is established to randomly deploy wireless sensor network nodes in the target area, and then the node deployment optimization problem is interpreted as a mathematical issue of searching extreme value; Finally, firefly algorithm is used for optimizing the location of wireless sensor network nodes stochastically deployed in the specified place to obtain this maximum coverage and complete the deployment. Experimental simulation results show that compared with genetic algorithm and particle swarm optimization algorithm, firefly algorithm can better avoid sinking into local optimum and avoid premature convergence. Compared with other two algorithm, the firefly algorithm has a faster search speed, better performance, and better stability.
为了使无线传感器网络节点的部署分布更加均匀,提高网络的覆盖率,本文提出了一种基于萤火虫算法的节点部署优化方法。首先建立了在目标区域随机部署无线传感器网络节点的数学模型,然后将节点部署优化问题解释为搜索极值的数学问题;最后,利用萤火虫算法对随机部署在指定地点的无线传感器网络节点进行位置优化,以获得该最大覆盖范围,完成部署。实验仿真结果表明,与遗传算法和粒子群优化算法相比,萤火虫算法能更好地避免陷入局部最优,避免过早收敛。与其他两种算法相比,萤火虫算法具有更快的搜索速度、更好的性能和更好的稳定性。
{"title":"A Node Deployment Optimization Method of Wireless Sensor Network Based on Firefly Algorithm","authors":"Wei Liu, Pan Li, Z. Ye, Shuai Yang","doi":"10.1109/aict52120.2021.9628937","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628937","url":null,"abstract":"for making the deployment distribution of wireless sensor network nodes more uniform and improve coverage, this paper proposes a node deployment optimization method based on the firefly algorithm. Firstly, a mathematical model is established to randomly deploy wireless sensor network nodes in the target area, and then the node deployment optimization problem is interpreted as a mathematical issue of searching extreme value; Finally, firefly algorithm is used for optimizing the location of wireless sensor network nodes stochastically deployed in the specified place to obtain this maximum coverage and complete the deployment. Experimental simulation results show that compared with genetic algorithm and particle swarm optimization algorithm, firefly algorithm can better avoid sinking into local optimum and avoid premature convergence. Compared with other two algorithm, the firefly algorithm has a faster search speed, better performance, and better stability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126182917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes 自适应编码方法的发展,用类巴克码实时解码数据
Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus
An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).
考虑了一种改进的快速查找这种抗干扰码序列的方法,该方法能够根据所得到的码序列的长度查找和纠正错误。这些方法使创建在功率和噪声抗扰性方面具有改进质量指标的编码系统成为可能。所考虑的噪声序列具有实际意义,因为在获得的代码序列的基础上,有机会轻松快速地发现(高达50%)和纠正(高达25%)失真字符(来自噪声代码序列的长度)。
{"title":"Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes","authors":"Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus","doi":"10.1109/aict52120.2021.9628911","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628911","url":null,"abstract":"An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis 用于指纹样本合成的自适应深度卷积GAN
Oleksandr Striuk, Yuriy Kondratenko
Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.
真实的生物特征指纹样本属于个人数据的范畴,因此将其用于深度学习模型训练可能存在一定的局限性。人工生成的指纹图像与真人无关,可以自由使用(“隐私友好”)。合成指纹样本是应用研究的兴趣:生物学(乳头线结构和改变),法医(计算机指纹识别,重建和恢复受损样本),技术(各种生物识别安全方法)。生成能够准确再现真实指纹纹理特征的人工指纹可能是一项艰巨的任务。在本文中,我们提出了一个深度学习框架-自适应深度卷积生成对抗网络(ADCGAN) -我们已经开发和研究,并且已经证明了生成真实指纹样本的能力,这些样本在特征谱方面与真实指纹样本相似。ADCGAN使进行指纹研究成为可能,而不受生物特征数据机密性的限制。
{"title":"Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis","authors":"Oleksandr Striuk, Yuriy Kondratenko","doi":"10.1109/aict52120.2021.9628978","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628978","url":null,"abstract":"Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Hardware for Digital Control System of Pulsed NQR Spectrometer 脉冲NQR光谱仪数字控制系统的硬件开发
I. Safronov, T. Kazemirskiy, Andrii Samila
The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.
通过分析,提出了实现脉冲相干NQR光谱仪数字控制系统的最佳PLD类型的选择。基于FPGA EP1C6T144C8N进行了电子器件的结构和功能合成。该开发还可用于可编程逻辑集成电路的操作研究,以加深对描述电子系统建模设备的语言- Verilog HDL, VHDL的知识和技能。
{"title":"Development of Hardware for Digital Control System of Pulsed NQR Spectrometer","authors":"I. Safronov, T. Kazemirskiy, Andrii Samila","doi":"10.1109/aict52120.2021.9628953","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628953","url":null,"abstract":"The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of COVID-19 Dynamics using Ridge Regression 基于脊回归的COVID-19动态模拟
D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko
The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.
COVID-19大流行影响了世界各地人类活动的所有领域。公共卫生系统已显示出对如此大规模流行病的准备不足。数学建模是控制疫情过程的有效方法。本文基于Ridge回归方法,建立了新冠肺炎疫情传播动态预测模型。该模型使用英国、德国、日本和乌克兰的COVID-19发病率数据进行了验证。选择这些具有不同流行过程动态的特定国家,可以充分调查所构建模型的准确性。
{"title":"Simulation of COVID-19 Dynamics using Ridge Regression","authors":"D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko","doi":"10.1109/aict52120.2021.9628991","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628991","url":null,"abstract":"The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality 基于微处理器的扩展功能电气负荷控制系统的概念
Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko
To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.
为了提高与电气设备(电子设备)一起工作时的能源安全,使用了许多设备,例如断路器,RCCB断路器,熔断器链接,继电器等。所有这些组件都是为了保护设备或与它们一起工作的人,但访问它们通常是有限的,此外,施加限制还因为用户必须具有一定的资格。此外,大多数元件都位于配电箱内。提出的控制系统概念是一个紧凑的解决方案,允许测量能源消耗的所有必要参数,分析这些参数并做出决策,以及实际上,使用物联网等现代技术远程控制设备的功率,这扩展了标准能源安全系统的功能。系统本身可以以浪涌保护器或瓦特表的形式直接定位于目标消费者。
{"title":"A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality","authors":"Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko","doi":"10.1109/aict52120.2021.9628945","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628945","url":null,"abstract":"To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things 5G LTE窄带工业物联网中超可靠低延迟通信的无线电资源管理方法
Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley
We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.
我们提出了5G LTE/窄带工业物联网(NB-IIoT)网络架构,通过分配窄带宽频谱,将部分功能通过eNodeB基站传输到物联网控制器,提供实时的工业物联网服务。该方法考虑了IIoT流量的优先级,并通过在新的IoT控制器上调度资源,允许保留现有的eNodeB基站不变。首次提出了工业物联网流量优先排序方法,并在此基础上提出了改进的物联网控制器无线资源规划与分配算法。研究了5G LTE/NB-IIoT网络的负载均衡方法。提出的方法考虑了工业物联网服务的优先级,为5G网络中的实时工业物联网服务提供了超可靠低延迟通信(URLLC)。
{"title":"Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things","authors":"Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley","doi":"10.1109/aict52120.2021.9628913","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628913","url":null,"abstract":"We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"41 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP TCP/IP协议不同阶段信息系统犯罪实现可能性评价
I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo
The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.
本文介绍了信息系统安全的主要经典模型。它给出了一种描述——一种在具有开放架构的信息系统中实现信息威胁的尝试的统计分析。对不同TCP/IP协议栈级别下信息威胁的实现概率进行了仿真;对仿真结果进行了分析。通过仿真得到了TCP/IP协议栈各层信息威胁在IS中实现的统计概率值。结果表明,所得的信息威胁统计概率值总体上与理论值吻合,表明该近似值具有足够的准确性,适用于评估TCP/IP协议栈不同层次的信息威胁统计概率。
{"title":"Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP","authors":"I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo","doi":"10.1109/aict52120.2021.9628936","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628936","url":null,"abstract":"The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection in the Framework of Decision-Making System through Graph Neural Network 决策系统框架下基于图神经网络的假新闻检测
I. Pilkevych, D. Fedorchuk, O. Naumchak, M. Romanchuk
The rapid growth of the number of fake news has become a serious threat to the credibility of the governments of many countries. The extensive use of social platforms contributes to the creation and dissemination of fake news. This is actualize the task of fake news detection. Much research has already focused on this. Modern methods of detecting fake news rely heavily on textual information, examining the extracted news content or writing style based on internal knowledge. However, intentional rumors can mask the style of writing, bypassing languages and text patterns. In order to combat the spread of fake news, methods of automatic detection based on artificial intelligence and machine learning were studied. In a world where millions of articles are deleted and published every minute, this cannot be done effectively manually. The solution may be to develop a system to provide reliable automated assessment systems or to assess the reliability of different publishers and news contexts using deep learning techniques, namely graph neural networks with an inductive structure.
假新闻数量的快速增长已经成为许多国家政府信誉的严重威胁。社交平台的广泛使用助长了假新闻的产生和传播。这就是实现假新闻检测的任务。很多研究已经集中在这方面。现代检测假新闻的方法严重依赖文本信息,检查提取的新闻内容或基于内部知识的写作风格。然而,有意的谣言可以掩盖写作风格,绕过语言和文本模式。为了打击假新闻的传播,研究了基于人工智能和机器学习的自动检测方法。在一个每分钟都有数百万篇文章被删除和发布的世界里,手工无法有效地完成这一点。解决方案可能是开发一个系统来提供可靠的自动评估系统,或者使用深度学习技术(即具有归纳结构的图神经网络)来评估不同出版商和新闻上下文的可靠性。
{"title":"Fake News Detection in the Framework of Decision-Making System through Graph Neural Network","authors":"I. Pilkevych, D. Fedorchuk, O. Naumchak, M. Romanchuk","doi":"10.1109/aict52120.2021.9628907","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628907","url":null,"abstract":"The rapid growth of the number of fake news has become a serious threat to the credibility of the governments of many countries. The extensive use of social platforms contributes to the creation and dissemination of fake news. This is actualize the task of fake news detection. Much research has already focused on this. Modern methods of detecting fake news rely heavily on textual information, examining the extracted news content or writing style based on internal knowledge. However, intentional rumors can mask the style of writing, bypassing languages and text patterns. In order to combat the spread of fake news, methods of automatic detection based on artificial intelligence and machine learning were studied. In a world where millions of articles are deleted and published every minute, this cannot be done effectively manually. The solution may be to develop a system to provide reliable automated assessment systems or to assess the reliability of different publishers and news contexts using deep learning techniques, namely graph neural networks with an inductive structure.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1