This paper is considered to be a continuation of a previous publication devoted to applications of digital transformations and simulation modeling in aerospace engineering and security (IJITS, №3, 2023). The aim of the paper is to present methods and means for conducting microwave measurements and practical learning of real antennas, which are expressed in the design, modeling, and validation of the models and contribute to obtaining reliable simulation results. The theoretical framework of the study is supported by classifications of the main types of microwave devices and technologies used in innovative laboratories.
{"title":"Methods and means for researching microwave devices","authors":"Y. Ivanova","doi":"10.59035/mkdq4834","DOIUrl":"https://doi.org/10.59035/mkdq4834","url":null,"abstract":"This paper is considered to be a continuation of a previous publication devoted to applications of digital transformations and simulation modeling in aerospace engineering and security (IJITS, №3, 2023). The aim of the paper is to present methods and means for conducting microwave measurements and practical learning of real antennas, which are expressed in the design, modeling, and validation of the models and contribute to obtaining reliable simulation results. The theoretical framework of the study is supported by classifications of the main types of microwave devices and technologies used in innovative laboratories.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 5","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138620797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amay Gada, Neel Kothari, R. Karani, Chetashri Badane, Dhruv Gada, Tanish Patwa
A spoof-aware speaker verification system is an integrated system that is capable of jointly identifying impostor speakers as well as spoofing attacks from target speakers. This type of system largely helps in protecting sensitive data, mitigating fraud, and reducing theft. Research has recently enhanced the effectiveness of countermeasure systems and automatic speaker verification systems separately to produce low Equal Error Rates (EER) for each system. However, work exploring a combination of both is still scarce. This paper proposes an end-to-end solution to address spoof-aware automatic speaker verification (ASV) by introducing a Deep Reliable Spoof-Aware-Speaker-Verification (DR-SASV) system. The proposed system allows the target audio to pass through a “spoof aware” speaker verification model sequentially after applying a convolutional neural network (CNN)-based spoof detection model. The suggested system produces encouraging results after being trained on the ASVSpoof 2019 LA dataset. The spoof detection model gives a validation accuracy of 96%, while the transformer-based speech verification model authenticates users with an error rate of 13.74%. The system surpasses other state-of-the-art models and produces an EER score of 10.32%.
{"title":"DR-SASV: A deep and reliable spoof aware speech verification system","authors":"Amay Gada, Neel Kothari, R. Karani, Chetashri Badane, Dhruv Gada, Tanish Patwa","doi":"10.59035/ffmb8272","DOIUrl":"https://doi.org/10.59035/ffmb8272","url":null,"abstract":"A spoof-aware speaker verification system is an integrated system that is capable of jointly identifying impostor speakers as well as spoofing attacks from target speakers. This type of system largely helps in protecting sensitive data, mitigating fraud, and reducing theft. Research has recently enhanced the effectiveness of countermeasure systems and automatic speaker verification systems separately to produce low Equal Error Rates (EER) for each system. However, work exploring a combination of both is still scarce. This paper proposes an end-to-end solution to address spoof-aware automatic speaker verification (ASV) by introducing a Deep Reliable Spoof-Aware-Speaker-Verification (DR-SASV) system. The proposed system allows the target audio to pass through a “spoof aware” speaker verification model sequentially after applying a convolutional neural network (CNN)-based spoof detection model. The suggested system produces encouraging results after being trained on the ASVSpoof 2019 LA dataset. The spoof detection model gives a validation accuracy of 96%, while the transformer-based speech verification model authenticates users with an error rate of 13.74%. The system surpasses other state-of-the-art models and produces an EER score of 10.32%.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"83 9","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138623645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natalya Rezova, Lev Kazakovtsev, I. Rozhnov, P. Stanimirović, Guzel Shkaberina
Progress in the development of location theory and clustering methods is mainly aimed at improving the performance of algorithms. We study the continuous p-median problem with the Euclidean metric. Various algorithmic combinations of the ALA procedure embedded into more sophisticated algorithmic combinations are used. Two repeated steps of the ALA algorithm solve the simplest discrete optimization problem, and then a series of central point search problems (Weber problem) for each cluster. A parallel implementation of the ALA algorithm is used. The paper studies the issue of choosing from two strategies: solve the Weber problem until accuracy ε is achieved at each iteration, or perform only one iteration of the Weiszfeld algorithm at each ALA iteration.
{"title":"Hybrid algorithms with alternative embedded local search schemes for the p-median problem","authors":"Natalya Rezova, Lev Kazakovtsev, I. Rozhnov, P. Stanimirović, Guzel Shkaberina","doi":"10.59035/ntbo2860","DOIUrl":"https://doi.org/10.59035/ntbo2860","url":null,"abstract":"Progress in the development of location theory and clustering methods is mainly aimed at improving the performance of algorithms. We study the continuous p-median problem with the Euclidean metric. Various algorithmic combinations of the ALA procedure embedded into more sophisticated algorithmic combinations are used. Two repeated steps of the ALA algorithm solve the simplest discrete optimization problem, and then a series of central point search problems (Weber problem) for each cluster. A parallel implementation of the ALA algorithm is used. The paper studies the issue of choosing from two strategies: solve the Weber problem until accuracy ε is achieved at each iteration, or perform only one iteration of the Weiszfeld algorithm at each ALA iteration.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 12","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138615287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is a substantiated need for a more differentiated approach in assessing the population as an element of national power. Proposed is the use of coefficients reflecting the alignment of different ethnicities and diasporas with the goals of the state-forming ethnicity in the national state. Particular attention is paid to the role of diasporas in this regard.
{"title":"Ethno-demographic dimensions of national power","authors":"Marian Ninov, Valeri Nikolov","doi":"10.59035/gjmb4806","DOIUrl":"https://doi.org/10.59035/gjmb4806","url":null,"abstract":"There is a substantiated need for a more differentiated approach in assessing the population as an element of national power. Proposed is the use of coefficients reflecting the alignment of different ethnicities and diasporas with the goals of the state-forming ethnicity in the national state. Particular attention is paid to the role of diasporas in this regard.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 27","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138616276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The application of artificial intelligence and semantic models for increasing learning and tutoring quality by personalization is an emerging research area. Мulti-agent frameworks facilitate the communication between the different components and ontological models can be used as knowledge sources for intelligent agents. In this research we analyse knowledge models and software architectures, outline trends in the personalized learning area and propose an agent-based architecture for e-learning systems that can conduct learning by generating and recommending personalized learning paths. Initial evaluation of prototype system is proposed and learning path generation scenarios are discussed.
{"title":"A multi-agent architecture for learning paths-based personalized e-learning systems","authors":"Tatyana Ivanova","doi":"10.59035/qeza3869","DOIUrl":"https://doi.org/10.59035/qeza3869","url":null,"abstract":"The application of artificial intelligence and semantic models for increasing learning and tutoring quality by personalization is an emerging research area. Мulti-agent frameworks facilitate the communication between the different components and ontological models can be used as knowledge sources for intelligent agents. In this research we analyse knowledge models and software architectures, outline trends in the personalized learning area and propose an agent-based architecture for e-learning systems that can conduct learning by generating and recommending personalized learning paths. Initial evaluation of prototype system is proposed and learning path generation scenarios are discussed.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138618919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Kravets, I. Aksenov, Yu. R. Redkin, D. Mutin, I. Atlasov, A. Zaslavskiy
The article devoted to the approaches to algorithmization of the information management system of a distributed service enterprise. The study of the dependence of the optimal capacity of the service system center on the service area was carried out. The mechanism of optimization of the service area, taking into account organizational and economic constraints, as well as optimization of the service area for mobile sources of applications, is investigated. Processing customer requests must meet the requirements of efficiency, reliability, and efficiency of the corporate information network. In the presence of a single office of a service company, it is not always possible to find an optimal or close to optimal query processing algorithm in terms of performance. The problem of the optimal service area without taking into account restrictions in order to maximize the profit of the enterprise is considered. Models of the functioning of the decision-making subsystem for servicing requests by a service enterprise have been developed, differing in taking into account the service area and the spatial stationarity of customers.
{"title":"Algorithms and methods for managing request flows in a distributed service system","authors":"O. Kravets, I. Aksenov, Yu. R. Redkin, D. Mutin, I. Atlasov, A. Zaslavskiy","doi":"10.59035/obny2037","DOIUrl":"https://doi.org/10.59035/obny2037","url":null,"abstract":"The article devoted to the approaches to algorithmization of the information management system of a distributed service enterprise. The study of the dependence of the optimal capacity of the service system center on the service area was carried out. The mechanism of optimization of the service area, taking into account organizational and economic constraints, as well as optimization of the service area for mobile sources of applications, is investigated. Processing customer requests must meet the requirements of efficiency, reliability, and efficiency of the corporate information network. In the presence of a single office of a service company, it is not always possible to find an optimal or close to optimal query processing algorithm in terms of performance. The problem of the optimal service area without taking into account restrictions in order to maximize the profit of the enterprise is considered. Models of the functioning of the decision-making subsystem for servicing requests by a service enterprise have been developed, differing in taking into account the service area and the spatial stationarity of customers.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"18 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the MATLAB environment, with the help of author's code, a programming environment is developed in which the input parameters are entered, the type and structure of the inverter is selected, and the values of the circuit elements are automatically calculated. Finally, for the purpose of verification, the operation of the designed inverter is simulated. From the resulting simulation, the overall behavior of the state space variables is seen.
{"title":"System for automated design of resonant inverters","authors":"B. Gilev, Nikolay Hinov, Yuri Dimitrov","doi":"10.59035/nrpr1121","DOIUrl":"https://doi.org/10.59035/nrpr1121","url":null,"abstract":"In the MATLAB environment, with the help of author's code, a programming environment is developed in which the input parameters are entered, the type and structure of the inverter is selected, and the values of the circuit elements are automatically calculated. Finally, for the purpose of verification, the operation of the designed inverter is simulated. From the resulting simulation, the overall behavior of the state space variables is seen.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 19","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138612699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The field of food image classification and recognition is gaining prominence in academic research, primarily driven by its increasing significance in the domains of medicine and healthcare. The application of food image classification has the potential to enhance overall food experiences in various ways. In this study, optimized DenseNet architecture proposed for transfer learning. The experimental findings demonstrate that the optimized DenseNet model, accuracy rate of Training is 98.7% and testing is 95.10%, surpassing the performance of alternative model MobileNetv3 in direct comparison. Accuracy of MobileNetV3 on Indian food image dataset is 98% on training and 92.39% testing. It shows best model for Indian food image dataset is optimized DenseNet and performance of the system surpasses state of the art methods.
{"title":"ODNET: Optimized DenseNet for Indian food classification","authors":"Jigar A. Patel, Hardik N. Talsania, Kirit Modi","doi":"10.59035/fpbl3081","DOIUrl":"https://doi.org/10.59035/fpbl3081","url":null,"abstract":"The field of food image classification and recognition is gaining prominence in academic research, primarily driven by its increasing significance in the domains of medicine and healthcare. The application of food image classification has the potential to enhance overall food experiences in various ways. In this study, optimized DenseNet architecture proposed for transfer learning. The experimental findings demonstrate that the optimized DenseNet model, accuracy rate of Training is 98.7% and testing is 95.10%, surpassing the performance of alternative model MobileNetv3 in direct comparison. Accuracy of MobileNetV3 on Indian food image dataset is 98% on training and 92.39% testing. It shows best model for Indian food image dataset is optimized DenseNet and performance of the system surpasses state of the art methods.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"38 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138626621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alsheikhy, T. Shawly, Hossam Ahmed, Hassan Lahza
Fires can cause devastating damage to lands, properties, and humans. Many countries suffer from huge financial losses due to these fires. Therefore, there is a need to implement a practical solution to spot fires effectively and accurately. Deep-learning algorithms and artificial intelligence have been deployed recently in various fields, such as monitoring systems, economics, and detection. This paper proposes a New Light Ensemble Deep-Learning Framework (NLEDLF). This framework consists of two deep-learning technologies, which are a New Generative Adversarial Network (NGAN) and a New Convolutional Neural Network (NCNN). These two tools are incorporated into the framework along with some image preprocessing methods to detect fires using pixels. The proposed framework achieves a reasonable.
{"title":"A new light ensemble deep-learning framework to detect fire","authors":"A. Alsheikhy, T. Shawly, Hossam Ahmed, Hassan Lahza","doi":"10.59035/xncu8652","DOIUrl":"https://doi.org/10.59035/xncu8652","url":null,"abstract":"Fires can cause devastating damage to lands, properties, and humans. Many countries suffer from huge financial losses due to these fires. Therefore, there is a need to implement a practical solution to spot fires effectively and accurately. Deep-learning algorithms and artificial intelligence have been deployed recently in various fields, such as monitoring systems, economics, and detection. This paper proposes a New Light Ensemble Deep-Learning Framework (NLEDLF). This framework consists of two deep-learning technologies, which are a New Generative Adversarial Network (NGAN) and a New Convolutional Neural Network (NCNN). These two tools are incorporated into the framework along with some image preprocessing methods to detect fires using pixels. The proposed framework achieves a reasonable.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 7","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138618746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, Bulgarian municipalities have introduced smart development systems. The Bulgarian state is at the top of the world rankings regarding household internet access and connection speed. The authors develop and validate a GIS-based model for the analysis and evaluation of sustainable cities. The authors conclude that in a global digital economy and society, Bulgarian regions need to improve the accessibility of WI-FI networks to meet the challenges of Smart Development. In recent years, the authors have observed a growth of Smart Cities initiatives in large areas of Northeast Bulgaria. However, Bulgarian municipalities in the study area are lagging in deploying smart governance systems.
{"title":"GIS-based model for the assessment of the smart sustainable development of municipalities of Northeast Bulgaria","authors":"Nikolay Tsonkov, Radoslav Koste","doi":"10.59035/mbly5833","DOIUrl":"https://doi.org/10.59035/mbly5833","url":null,"abstract":"In recent years, Bulgarian municipalities have introduced smart development systems. The Bulgarian state is at the top of the world rankings regarding household internet access and connection speed. The authors develop and validate a GIS-based model for the analysis and evaluation of sustainable cities. The authors conclude that in a global digital economy and society, Bulgarian regions need to improve the accessibility of WI-FI networks to meet the challenges of Smart Development. In recent years, the authors have observed a growth of Smart Cities initiatives in large areas of Northeast Bulgaria. However, Bulgarian municipalities in the study area are lagging in deploying smart governance systems.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":" 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138617430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}