Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628911
Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus
An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).
{"title":"Development of Adaptive Coding Means, Decoding of Data in Real Time Using Barker-Like Codes","authors":"Oleg Riznvk, I. Tsmots, Ynrii Noga, O. Myaus","doi":"10.1109/aict52120.2021.9628911","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628911","url":null,"abstract":"An improved method for quickly finding such interference-resistant code sequences that are capable of finding and correcting errors according to the length of the resulting code sequence is considered. The methods make it possible to create coding systems with improved quality indicators in terms of power and noise immunity. The considered noise sequences are of practical interest, as on the basis of the obtained code sequence there is an opportunity to easily and quickly find (up to 50%) and correct (up to 25%) distorted characters (from the length of the noise code sequence).","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628926
D. Kalimullin, A. Popov
A method for recovering objects parameters by experimental data based on the two-dipole model of target representing is discussed in the paper. The goal of the investigation is to develop the method of remote sensing objects parameters definition by measured data. A considered method is built on analysis of analytic expressions of PSM elements for a two-dipole mathematical model of object representation. The proposed method was applied to recover the parameters of different objects for which complex PSM’s were experimentally obtained. Some objects signatures were obtained and considered based on recovered parameters and provided their statistical analysis. Obtained results indicate the adequacy of the two-dipole model and appliance for modelling the real objects prototypes to study the process of transforming electromagnetic waves at reflecting from object also a possibility of radar targets imitating. Obtained results can be useful in solving radar objects recognition and classification problems.
{"title":"Two-Dipole Model Based Coherent Radar Target Decomposition","authors":"D. Kalimullin, A. Popov","doi":"10.1109/aict52120.2021.9628926","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628926","url":null,"abstract":"A method for recovering objects parameters by experimental data based on the two-dipole model of target representing is discussed in the paper. The goal of the investigation is to develop the method of remote sensing objects parameters definition by measured data. A considered method is built on analysis of analytic expressions of PSM elements for a two-dipole mathematical model of object representation. The proposed method was applied to recover the parameters of different objects for which complex PSM’s were experimentally obtained. Some objects signatures were obtained and considered based on recovered parameters and provided their statistical analysis. Obtained results indicate the adequacy of the two-dipole model and appliance for modelling the real objects prototypes to study the process of transforming electromagnetic waves at reflecting from object also a possibility of radar targets imitating. Obtained results can be useful in solving radar objects recognition and classification problems.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628938
Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan
The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.
{"title":"Secure Routing with Power Link Blocking Model and Load Balancing","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, A. Shapovalova, M. Yevdokymenko, Stephen Olayinka Omowumi, A. Hailan","doi":"10.1109/aict52120.2021.9628938","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628938","url":null,"abstract":"The paper is devoted to researching a secure routing approach with a power link blocking model and load balancing. Therefore, the basic flow-based mathematical model with load balancing following the Traffic Engineering concept proposed for improving and supplementing with conditions that consider link compromise probabilities as network security parameters. The novelty of the improved Secure Traffic Engineering routing model is reflected in load balancing conditions related to links bandwidth and compromise probability. The application of the Secure Traffic Engineering model allows overload to reduce the most vulnerable in terms of compromise probability links. The power link blocking model is used as the specific functional dependence of weighting coefficients on the link compromise probability.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628953
I. Safronov, T. Kazemirskiy, Andrii Samila
The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.
{"title":"Development of Hardware for Digital Control System of Pulsed NQR Spectrometer","authors":"I. Safronov, T. Kazemirskiy, Andrii Samila","doi":"10.1109/aict52120.2021.9628953","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628953","url":null,"abstract":"The analysis is carried out and the choice of the optimal type of PLD for the implementation of a digital control system for a pulsed coherent NQR spectrometer is proposed. Structural and functional synthesis of electronic devices based on FPGA EP1C6T144C8N has been carried out. The development can also be used in the study of the operation of programmable logic integrated circuits for deepening knowledge and skills in the languages for describing equipment for modeling electronic systems – Verilog HDL, VHDL.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628936
I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo
The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.
{"title":"Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP","authors":"I. Opirskyy, Ivan Tyshyk, Vitalii Susukailo","doi":"10.1109/aict52120.2021.9628936","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628936","url":null,"abstract":"The article presents the main classical models of information systems security. It gives them a description—a statistical analysis of attempts to implement information threats in information systems with open architecture. The simulation of the probability of realization of information threats at different TCP/IP protocol stack levels is carried out; the simulation results are analyzed. As a result of the simulation, the values of the statistical probability of the realization of information threats in the IS for each layer of the TCP/IP protocol stack are obtained. It is established that the obtained values of the statistical probability of information threats, in general, coincide with theoretical values, which gives grounds to assert sufficient accuracy of the approximation and its applicability to assess the statistical probability of information threats at different levels of the TCP/IP protocol stack.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628991
D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko
The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.
{"title":"Simulation of COVID-19 Dynamics using Ridge Regression","authors":"D. Chumachenko, K. Bazilevych, I. Meniailov, S. Yakovlev, T. Chumachenko","doi":"10.1109/aict52120.2021.9628991","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628991","url":null,"abstract":"The COVID-19 pandemic has affected all areas of human activity around the world. Public health systems have shown their unpreparedness for a pandemic of this magnitude. An effective approach to managing the epidemic process is mathematical modeling. In this work, a predictive model of the dynamics of the spread of COVID-19 is built on the basis of the Ridge regression method. The model was verified using data on the incidence of COVID-19 in the UK, Germany, Japan and Ukraine. The choice of these particular countries with different dynamics of the epidemic process makes it possible to adequately investigate the accuracy of the constructed model.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628978
Oleksandr Striuk, Yuriy Kondratenko
Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.
{"title":"Adaptive Deep Convolutional GAN for Fingerprint Sample Synthesis","authors":"Oleksandr Striuk, Yuriy Kondratenko","doi":"10.1109/aict52120.2021.9628978","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628978","url":null,"abstract":"Real biometric fingerprint samples belong to the category of personal data, and therefore their usage for deep learning model training may have certain limitations. Artificially generated fingerprint images do not relate to a real person and can be used freely (“privacy-friendly”). Synthesized fingerprint samples are of interest for applied research: biological (papillary lines structure and alteration), forensic (computer fingerprint identification, reconstruction, and restoration of damaged samples), technological (various methods of biometric security). Generation of artificial fingerprints that accurately reproduce the textural features of real fingerprints could be a difficult task. In this paper, we present a deep learning framework — Adaptive Deep Convolutional Generative Adversarial Network (ADCGAN) — that we have developed and researched, and which has demonstrated the ability to generate realistic fingerprint samples that are similar to real ones in terms of their feature spectrum. ADCGAN makes it possible to conduct fingerprint research, without restrictions related to the confidential nature of biometric data.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628913
Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley
We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.
{"title":"Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things","authors":"Ruoxi Wang, I. Demydov, Orest Kochan, O. Krasko, M. Beshley, O. Lavriv, H. Beshley","doi":"10.1109/aict52120.2021.9628913","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628913","url":null,"abstract":"We proposed the architecture of the 5G LTE/Narrow Band Industrial Internet of Things (NB-IIoT) network for providing real time IIoT services by allocating the narrow bandwidth spectrum and transferring some functions over the eNodeB base station to the IoT controller. This method takes into account the priority of IIoT traffic and by scheduling resources on the new IoT controller allows to leave the existing eNodeB base stations unchanged. For the first time the method of IIoT traffic prioritization is proposed, on the basis of which the modified algorithms for planning and allocating radio resources in the IoT controller are developed. The method of load balancing for 5G LTE/NB-IIoT networks was developed. The proposed methods take into account the priority of IIoT service and provide Ultra-Reliable Low-Latency Communications (URLLC) for real time IIoT services in 5G networks.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"41 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628945
Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko
To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.
{"title":"A Concept of Microprocessor-Based Electrical Load Control System with Extended Functionality","authors":"Andrii Kanovskyi, Oleksandr Osolinskyi, Hrystyna Lipyanina-Goncharenko, A. Sachenko","doi":"10.1109/aict52120.2021.9628945","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628945","url":null,"abstract":"To increase energy safety when working with electrical devices (electronic equipment), a number of devices are used, such as a circuit breaker, RCCB circuit breaker, fuse links, relays and others. All of those components are designed to protect devices or people, who work with them, but access to them is often limited, in addition, the restriction is imposed also because the user must have certain qualifications. In addition, most of the elements are located in the electrical distribution box. The proposed concept of the control system is a compact solution, and allows to measure all the necessary parameters of energy consumption, analyze this parameters and make decisions, as well as, in fact, control the power of devices remotely using modern technologies, such as IoT, which expands the functions of a standard energy security system. The system itself can be located directly at the target consumer in the form of a surge protector or Watt-meter.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-21DOI: 10.1109/aict52120.2021.9628928
V. Barannik, N. Barannik, Yu. G. Babenko, Victoriya Himenko, Vitaliy Tverdokhlib
This paper explains the general technological principle in the process of coding the sequence of predicted frames and their blocks in the spectrally differentiated space for coding methods of the H26 family *. There is the application of frame processing depending on their type in the stream and weight to video resource and their integrity. Problems for the existing technologies of processing a set of positional coordinates that describe the length of insignificant components of transformants are revealed. The main stages of the creation method of coding a dynamic sequence of frame-spline structures of the provided shots in info-communications are stated.
{"title":"Method of coding dynamic sequence of frame-spline structures of provided frames in info-communications","authors":"V. Barannik, N. Barannik, Yu. G. Babenko, Victoriya Himenko, Vitaliy Tverdokhlib","doi":"10.1109/aict52120.2021.9628928","DOIUrl":"https://doi.org/10.1109/aict52120.2021.9628928","url":null,"abstract":"This paper explains the general technological principle in the process of coding the sequence of predicted frames and their blocks in the spectrally differentiated space for coding methods of the H26 family *. There is the application of frame processing depending on their type in the stream and weight to video resource and their integrity. Problems for the existing technologies of processing a set of positional coordinates that describe the length of insignificant components of transformants are revealed. The main stages of the creation method of coding a dynamic sequence of frame-spline structures of the provided shots in info-communications are stated.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}