首页 > 最新文献

2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)最新文献

英文 中文
Modern informatics and its teaching methods (MITM2020) [Electronic resource]: collection of materials of the international scientific-practical conference. - Andijan, May 20, 2020 Section IV. The role of information and communication technologies in preschool educational institutions 现代信息学及其教学方法(MITM2020)[电子资源]:国际科学实践会议资料集。——安集延,2020年5月20日第四节:信息和通信技术在学前教育机构中的作用
{"title":"Modern informatics and its teaching methods (MITM2020) [Electronic resource]: collection of materials of the international scientific-practical conference. - Andijan, May 20, 2020 Section IV. The role of information and communication technologies in preschool educational institutions","authors":"","doi":"10.26739/conf_20/05/2020_4_1","DOIUrl":"https://doi.org/10.26739/conf_20/05/2020_4_1","url":null,"abstract":"","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90565484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DIGITALIZATION - A FACTOR OF SOCIAL DEVELOPMENT QUALITY 数字化——社会发展质量的重要因素
G. G. Gafforova
Today, the activities of all spheres of life are electronic, computer, imagining without networking and other important automated technologies difficult From communications and shopping to product manufacturing and everything from the company’s independent “work” to the digital environment. Therefore, in the new paradigm of world economic development digital technologies determine the growth of social welfare considered as the main source of production
今天,所有生活领域的活动都是电子的,计算机,想象没有网络和其他重要的自动化技术很难从通信和购物到产品制造以及从公司独立的“工作”到数字环境的一切。因此,在世界经济发展的新范式中,数字技术决定了作为主要生产来源的社会福利的增长
{"title":"DIGITALIZATION - A FACTOR OF SOCIAL DEVELOPMENT QUALITY","authors":"G. G. Gafforova","doi":"10.26739/conf/28052020_3-1","DOIUrl":"https://doi.org/10.26739/conf/28052020_3-1","url":null,"abstract":"Today, the activities of all spheres of life are electronic, computer, imagining without networking and other important automated technologies difficult From communications and shopping to product manufacturing and everything from the company’s independent “work” to the digital environment. Therefore, in the new paradigm of world economic development digital technologies determine the growth of social welfare considered as the main source of production","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89240644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIGITAL TECHNOLOGIES IN MODERN EDUCATION: CURRENT TRENDS AND DEVELOPMENT FACTORS IN PHILOLOGY AND PEDAGOGY 现代教育中的数字技术:语言学和教育学的发展趋势和发展因素
{"title":"DIGITAL TECHNOLOGIES IN MODERN EDUCATION: CURRENT TRENDS AND DEVELOPMENT FACTORS IN PHILOLOGY AND PEDAGOGY","authors":"","doi":"10.26739/conf_02/05/2020_1","DOIUrl":"https://doi.org/10.26739/conf_02/05/2020_1","url":null,"abstract":"","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74334003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object Detection Method Based on Aerial Image Instance Segmentation in Poor Optical Conditions for Integration of Data into an Infocommunication System 基于航拍图像实例分割的低光学条件下的目标检测方法
S. Kovbasiuk, Leonid Kanevskyy, I. Sashchuk, M. Romanchuk
The article analyses the possibilities to use the unmanned aerial complexes in the system of decision making process in crisis situations that require the object detection at aerial images received by the unmanned aerial complexes under the conditions of atmospheric fog. The Pansharpening method was used for image correction to inject spatial details from panchromatic image to multidimensional image. In order to increase the operational efficiency and accuracy of automotive vehicles detection at aerial images received by the unmanned aerial complexes for more efficient use of received information in the system of decision making support it was selected the Cascade Mask R-CNN model. This model is more suitable for task solution of multiclass classification and small-sized object detection at the image. To improve this model it is suggested using the small-sized anchors making into account the aspect ratio to more classes, function focal loss for model training that along with test time augmentation use enabled to increase mean Average Precision (mAP).
分析了在大气雾条件下,需要对无人机接收到的航拍图像进行目标检测的危机决策过程系统中使用无人机综合体的可能性。采用泛锐化方法对图像进行校正,将全色图像的空间细节注入到多维图像中。为了提高无人机综合体接收到的航拍图像对汽车车辆检测的操作效率和准确性,在决策支持系统中更有效地利用接收到的信息,选择了级联掩模R-CNN模型。该模型更适合于图像上多类分类和小尺寸目标检测的任务求解。为了改进该模型,建议使用小型锚点,同时考虑到更多类别的纵横比,模型训练的功能焦点损失,随着测试时间的增加,可以提高平均平均精度(mAP)。
{"title":"Object Detection Method Based on Aerial Image Instance Segmentation in Poor Optical Conditions for Integration of Data into an Infocommunication System","authors":"S. Kovbasiuk, Leonid Kanevskyy, I. Sashchuk, M. Romanchuk","doi":"10.1109/PICST47496.2019.9061496","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061496","url":null,"abstract":"The article analyses the possibilities to use the unmanned aerial complexes in the system of decision making process in crisis situations that require the object detection at aerial images received by the unmanned aerial complexes under the conditions of atmospheric fog. The Pansharpening method was used for image correction to inject spatial details from panchromatic image to multidimensional image. In order to increase the operational efficiency and accuracy of automotive vehicles detection at aerial images received by the unmanned aerial complexes for more efficient use of received information in the system of decision making support it was selected the Cascade Mask R-CNN model. This model is more suitable for task solution of multiclass classification and small-sized object detection at the image. To improve this model it is suggested using the small-sized anchors making into account the aspect ratio to more classes, function focal loss for model training that along with test time augmentation use enabled to increase mean Average Precision (mAP).","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"118 1","pages":"224-228"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73049174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Testing the Security ESP32 Internet of Things Devices ESP32物联网设备安全性测试
Oleksii Barybin, E. Zaitseva, Volodymyr Brazhnyi
The physical model of a handmade IoT system that includes device for measuring temperature based on ESP32, WiFi home network and web interface was proposed and implemented upon laboratory scale. The result of the experiment based on this model to attempt to gain unauthorized access to the transmitted data was successful. Attack scenario was formulated and consist of four stages: gaining unauthorized access to a network, network traffic interception and analysis, create fake ESP32 client and disconnecting original ESP32 from a server. It is shown that the attacker, who has the basic knowledge and skills in working with common wireless network hacking tools and a basic knowledge of ESP32 and ESP32 programming skills can access the system and send fake information to the web interface. To reduce the probability of the proposed scenario it is recommended to use TCP instead of UDP.
提出了一个手工物联网系统的物理模型,该系统包括基于ESP32的温度测量设备、WiFi家庭网络和web界面,并在实验室规模上进行了实现。基于该模型的实验结果表明,试图对传输数据进行未经授权的访问是成功的。制定了攻击场景,分为4个阶段:获得网络授权访问、网络流量拦截与分析、创建假ESP32客户端、断开服务器原有ESP32连接。结果表明,只要具备常用无线网络黑客工具的基本知识和使用技能,具备ESP32基本知识和ESP32编程技能,攻击者就可以访问系统并向web界面发送虚假信息。为了降低出现上述情况的可能性,建议使用TCP而不是UDP。
{"title":"Testing the Security ESP32 Internet of Things Devices","authors":"Oleksii Barybin, E. Zaitseva, Volodymyr Brazhnyi","doi":"10.1109/PICST47496.2019.9061269","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061269","url":null,"abstract":"The physical model of a handmade IoT system that includes device for measuring temperature based on ESP32, WiFi home network and web interface was proposed and implemented upon laboratory scale. The result of the experiment based on this model to attempt to gain unauthorized access to the transmitted data was successful. Attack scenario was formulated and consist of four stages: gaining unauthorized access to a network, network traffic interception and analysis, create fake ESP32 client and disconnecting original ESP32 from a server. It is shown that the attacker, who has the basic knowledge and skills in working with common wireless network hacking tools and a basic knowledge of ESP32 and ESP32 programming skills can access the system and send fake information to the web interface. To reduce the probability of the proposed scenario it is recommended to use TCP instead of UDP.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"10 1","pages":"143-146"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73215019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Radiating Telecommunication System of the Sub-THz-band to Protect Objects from Unauthorized Access 亚太赫兹波段的辐射通信系统,以防止未经授权的对象访问
V. Saiko, T. Narytnyk, M. Brailovskyi, Volodymyr Nakonechnyi
A technical solution of the radiation telecommunication protection system with focused radiation of sub-Tertiary range of zones and objects against unauthorized penetration has been proposed in the present article. The principle of the system is to determine the location of the hidden offender and the impact on it by electromagnetic radiation of the installation of sub-Tertiary range, taking into account the possible reflection of electromagnetic radiation from the surfaces. The solution contains a generator and amplifier, a circulator, a waveguide, a waveguide section, an antenna-rotary complex. The novelty of the research is that a generation and amplification device is made on the basis of a reference generator, the output of which is connected to series-connected frequency multipliers with amplifiers, solid-state pre-amplifiers, solid-state intermediate power amplifiers, vacuum end-amplifiers. A simulation model of a radiating telecommunication system has been developed in the simulation environment of the Visual System Simulator CAD software package AWR Microwave Office ver.12 by National Instruments. A comparative analysis of the proposed solution with similar technical solutions has been given. Prospects of development and application of radiating telecommunication systems in the future have been presented as well.
本文提出了一种针对非授权渗透的亚三级区域和目标辐射集中防护系统的技术方案。该系统的原理是在考虑到从表面可能反射的电磁辐射的情况下,确定隐藏罪犯的位置及其受次三级范围内安装的电磁辐射的影响。该方案包含一个发生器和放大器,一个环行器,一个波导,一个波导部分,一个天线旋转复合体。本研究的新颖之处在于在基准发生器的基础上制作了一种产生放大装置,其输出连接到带放大器的串联倍频器、固态前置放大器、固态中间功率放大器、真空端放。在Visual system Simulator CAD软件包AWR Microwave Office ver的仿真环境下,建立了辐射通信系统的仿真模型。12由美国国家仪器公司。并与类似的技术方案进行了对比分析。最后对辐射通信系统的发展和应用前景进行了展望。
{"title":"Radiating Telecommunication System of the Sub-THz-band to Protect Objects from Unauthorized Access","authors":"V. Saiko, T. Narytnyk, M. Brailovskyi, Volodymyr Nakonechnyi","doi":"10.1109/PICST47496.2019.9061483","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061483","url":null,"abstract":"A technical solution of the radiation telecommunication protection system with focused radiation of sub-Tertiary range of zones and objects against unauthorized penetration has been proposed in the present article. The principle of the system is to determine the location of the hidden offender and the impact on it by electromagnetic radiation of the installation of sub-Tertiary range, taking into account the possible reflection of electromagnetic radiation from the surfaces. The solution contains a generator and amplifier, a circulator, a waveguide, a waveguide section, an antenna-rotary complex. The novelty of the research is that a generation and amplification device is made on the basis of a reference generator, the output of which is connected to series-connected frequency multipliers with amplifiers, solid-state pre-amplifiers, solid-state intermediate power amplifiers, vacuum end-amplifiers. A simulation model of a radiating telecommunication system has been developed in the simulation environment of the Visual System Simulator CAD software package AWR Microwave Office ver.12 by National Instruments. A comparative analysis of the proposed solution with similar technical solutions has been given. Prospects of development and application of radiating telecommunication systems in the future have been presented as well.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"96 1","pages":"698-702"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80164165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scenarios for Implementation of Nested Virtualization Technology in Task of Improving Cloud Firewall Fault Tolerance 以提高云防火墙容错能力为任务的嵌套虚拟化技术实现场景
Vitalii Tkachov, Mykhailo Hunko, Vadym Volotka
Currently, the use of cloud firewalls allows protecting not only individual network resources, but also the entire infrastructure of large data centers. The main requirement for a cloud firewall is high fault tolerance. There are classic ways to increase fault tolerance, which focus on high redundancy of technological solution. Small and medium Internet business cannot always afford the creation of a separate solution to ensure the security of resources. Therefore, it is relevant to implement nested virtualization technology that gives the opportunity to use a cloud server with a hypervisor inside, in which, in turn, virtual machines are launched. Firewall software can be directly implemented on these virtual machines. Improving the fault tolerance of a cloud firewall is possible using of a set of nested virtual machines of the cloud server, which can be instantly restored by its hypervisor. To analyze the impact of the resource allocation plan of the cloud server, to detect a failed or incorrectly running nested virtual machine, the calculation of the virtual machine efficiency indicator is given. The paper proposed three scenarios for the use of nested virtualization technology: nested virtualization of services, nested virtualization of machines and virtualization of the entire infrastructure. For each of them, experimental studies have been carried out in order to identify patterns of time delay values for restoring the full functionality of the cloud firewall after a network attack on its various elements. By conducting experiments, it has been established that the use of nested virtualization technology in the first scenario allows to get a time gain of 7 times; in the second scenario there is a gain of 1.5 times; in the third one, it has been allowed to fully restart the cloud firewall infrastructure in a new cloud.
目前,使用云防火墙不仅可以保护单个网络资源,还可以保护大型数据中心的整个基础设施。对云防火墙的主要要求是高容错性。提高容错能力的经典方法主要集中在技术方案的高冗余性上。中小型互联网企业不能总是负担得起创建一个单独的解决方案,以确保资源的安全。因此,实现嵌套虚拟化技术是相关的,这种技术提供了使用内部有管理程序的云服务器的机会,而虚拟机又在其中启动。防火墙软件可以直接在这些虚拟机上实现。使用云服务器的一组嵌套虚拟机可以提高云防火墙的容错性,这些虚拟机可以由其管理程序立即恢复。为了分析云服务器资源分配计划的影响,检测嵌套虚拟机失败或不正确运行,给出了虚拟机效率指标的计算。本文提出了使用嵌套虚拟化技术的三种场景:服务的嵌套虚拟化、机器的嵌套虚拟化和整个基础设施的虚拟化。对于它们中的每一个,都进行了实验研究,以确定在网络攻击其各种元素后恢复云防火墙全部功能的时间延迟值模式。通过实验确定,在第一种场景中使用嵌套虚拟化技术可以获得7倍的时间增益;在第二种情况下,增益是1.5倍;在第三个版本中,允许在新的云中完全重新启动云防火墙基础设施。
{"title":"Scenarios for Implementation of Nested Virtualization Technology in Task of Improving Cloud Firewall Fault Tolerance","authors":"Vitalii Tkachov, Mykhailo Hunko, Vadym Volotka","doi":"10.1109/PICST47496.2019.9061473","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061473","url":null,"abstract":"Currently, the use of cloud firewalls allows protecting not only individual network resources, but also the entire infrastructure of large data centers. The main requirement for a cloud firewall is high fault tolerance. There are classic ways to increase fault tolerance, which focus on high redundancy of technological solution. Small and medium Internet business cannot always afford the creation of a separate solution to ensure the security of resources. Therefore, it is relevant to implement nested virtualization technology that gives the opportunity to use a cloud server with a hypervisor inside, in which, in turn, virtual machines are launched. Firewall software can be directly implemented on these virtual machines. Improving the fault tolerance of a cloud firewall is possible using of a set of nested virtual machines of the cloud server, which can be instantly restored by its hypervisor. To analyze the impact of the resource allocation plan of the cloud server, to detect a failed or incorrectly running nested virtual machine, the calculation of the virtual machine efficiency indicator is given. The paper proposed three scenarios for the use of nested virtualization technology: nested virtualization of services, nested virtualization of machines and virtualization of the entire infrastructure. For each of them, experimental studies have been carried out in order to identify patterns of time delay values for restoring the full functionality of the cloud firewall after a network attack on its various elements. By conducting experiments, it has been established that the use of nested virtualization technology in the first scenario allows to get a time gain of 7 times; in the second scenario there is a gain of 1.5 times; in the third one, it has been allowed to fully restart the cloud firewall infrastructure in a new cloud.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"34 1","pages":"759-763"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84875029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bispectrum-Based Detection Homogeneous Areas in the Digital Images 基于双谱的数字图像均匀区域检测
V. Naumenko, A. Totsky
A novel bispectrum-based strategy applied to digital image processing is suggested for solving the problems of detection the homogeneous areas in digital images. Novel classification features evaluated in the form of bispectrum magnitude estimates and computed for the certain image areas are suggested and studied. Decision about homogeneous area has been made by comparative analysis of the bimagnitude peak values. Small biamplitude values indicate homogeneous area and large biamplitude values indicate non- homogeneous area contained in the image. Results of computer simulations performed for grayscale images are represented and discussed. Performance of detection the homogeneous areas has been examined both for various noiseless and contaminated by noise test images. The biamplitude computations have been performed under influence of four various noise types. It has been examined the following noises: Gaussian, Poisson, salt & pepper, and speckle. According to the experimental results, proposed technique provides high accuracy for detecting homogeneous areas in the noiseless images. But in the presence of noise, the proposed technique is less effective.
为了解决数字图像中均匀区域的检测问题,提出了一种新的基于双谱的数字图像处理策略。提出并研究了以双谱幅度估计的形式评估并计算特定图像区域的新分类特征。通过对峰幅值的对比分析,确定了均匀区。小的双幅值表示图像中包含的均匀区域,大的双幅值表示图像中包含的非均匀区域。对灰度图像的计算机模拟结果进行了描述和讨论。对各种无噪声和受噪声污染的图像均质区域的检测性能进行了研究。在四种不同噪声类型的影响下进行了双幅值计算。研究了高斯噪声、泊松噪声、盐胡椒噪声和斑点噪声。实验结果表明,该方法对检测无噪声图像中的均匀区域具有较高的精度。但在噪声存在的情况下,该方法的效果较差。
{"title":"Bispectrum-Based Detection Homogeneous Areas in the Digital Images","authors":"V. Naumenko, A. Totsky","doi":"10.1109/PICST47496.2019.9061418","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061418","url":null,"abstract":"A novel bispectrum-based strategy applied to digital image processing is suggested for solving the problems of detection the homogeneous areas in digital images. Novel classification features evaluated in the form of bispectrum magnitude estimates and computed for the certain image areas are suggested and studied. Decision about homogeneous area has been made by comparative analysis of the bimagnitude peak values. Small biamplitude values indicate homogeneous area and large biamplitude values indicate non- homogeneous area contained in the image. Results of computer simulations performed for grayscale images are represented and discussed. Performance of detection the homogeneous areas has been examined both for various noiseless and contaminated by noise test images. The biamplitude computations have been performed under influence of four various noise types. It has been examined the following noises: Gaussian, Poisson, salt & pepper, and speckle. According to the experimental results, proposed technique provides high accuracy for detecting homogeneous areas in the noiseless images. But in the presence of noise, the proposed technique is less effective.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"557-560"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80857077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal Processing in UWB Subsurface Radiolocation by Artificial Neural Networks 人工神经网络在超宽带地下无线电定位中的信号处理
O. Dumin, V. Plakhtii, O. Prishchenko, D. Shyrokorad
The signal processing problem for identification of underground objects is considered. The source of signals is the ultra short impulse electromagnetic waves reflected from air-ground interface and underground objects and received by subsurface radar antenna system. The source of the irradiated ultrawideband field is the plane electromagnetic wave with Gaussian time dependence that is incident normally to the air-ground interface. The numerical simulation of the electromagnetic problem to find the electrical field strength in receiving points above the ground at some fixed height is carried out by Finite Difference Time Domain method The received signals are processed by artificial neural networks for the object identification and classification of its position. The electrically small metal cylinder is used as an example of an object for the classification and recognition. The influence of the structure of an artificial neural network and its training peculiarities on the precision of the classification is investigated.
研究了地下目标识别中的信号处理问题。信号源是地空界面和地下物体反射的超短脉冲电磁波,由地下雷达天线系统接收。辐照的超宽带场源为具有高斯时间依赖性的平面电磁波,正常入射到地空界面。采用时域有限差分法对电磁问题进行数值模拟,求出地面以上某一固定高度接收点的电场强度,并对接收到的信号进行人工神经网络处理,对目标进行识别和位置分类。电子小的金属圆柱体被用作分类和识别的对象示例。研究了人工神经网络的结构及其训练特性对分类精度的影响。
{"title":"Signal Processing in UWB Subsurface Radiolocation by Artificial Neural Networks","authors":"O. Dumin, V. Plakhtii, O. Prishchenko, D. Shyrokorad","doi":"10.1109/PICST47496.2019.9061427","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061427","url":null,"abstract":"The signal processing problem for identification of underground objects is considered. The source of signals is the ultra short impulse electromagnetic waves reflected from air-ground interface and underground objects and received by subsurface radar antenna system. The source of the irradiated ultrawideband field is the plane electromagnetic wave with Gaussian time dependence that is incident normally to the air-ground interface. The numerical simulation of the electromagnetic problem to find the electrical field strength in receiving points above the ground at some fixed height is carried out by Finite Difference Time Domain method The received signals are processed by artificial neural networks for the object identification and classification of its position. The electrically small metal cylinder is used as an example of an object for the classification and recognition. The influence of the structure of an artificial neural network and its training peculiarities on the precision of the classification is investigated.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"16 1","pages":"383-386"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85818904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Performance Evaluation of Sensor Nodes in the Home Automation System based on Arduino 基于Arduino的家庭自动化系统传感器节点性能评估
I. Kuzminykh, Anders Carlsson, M. Yevdokymenko
In this paper, a home automation system model was constructed with purpose to investigate of the correlation between the performance of wireless communication, power consumption of the constrained IoT devices and security. The series of experiments were conducted using sensor nodes connected to Arduino microcontroller and an RF 433 MHz wireless communication module. Measurements of the execution time and power consumption of the Arduino during data transfer with different security levels, as well as the analysis of the experimental results, were performed. The results show that the lifetime of the IoT device is determined by the communication speed, sleep mode management and depends on encryption. The obtained results can be used to minimize the power consumption of the device and improve communication efficiency. The results show that applied security reduces the productivity and lifetime of the sensor node not significantly.
本文构建了一个家庭自动化系统模型,旨在研究受约束物联网设备的无线通信性能、功耗与安全性之间的相关性。通过连接Arduino微控制器和RF 433 MHz无线通信模块的传感器节点进行一系列实验。测量了不同安全级别下Arduino在数据传输过程中的执行时间和功耗,并对实验结果进行了分析。结果表明,物联网设备的寿命由通信速度、睡眠模式管理和加密决定。所得结果可用于降低设备功耗,提高通信效率。结果表明,应用安全性对传感器节点的生产率和寿命的影响并不显著。
{"title":"A Performance Evaluation of Sensor Nodes in the Home Automation System based on Arduino","authors":"I. Kuzminykh, Anders Carlsson, M. Yevdokymenko","doi":"10.1109/PICST47496.2019.9061442","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061442","url":null,"abstract":"In this paper, a home automation system model was constructed with purpose to investigate of the correlation between the performance of wireless communication, power consumption of the constrained IoT devices and security. The series of experiments were conducted using sensor nodes connected to Arduino microcontroller and an RF 433 MHz wireless communication module. Measurements of the execution time and power consumption of the Arduino during data transfer with different security levels, as well as the analysis of the experimental results, were performed. The results show that the lifetime of the IoT device is determined by the communication speed, sleep mode management and depends on encryption. The obtained results can be used to minimize the power consumption of the device and improve communication efficiency. The results show that applied security reduces the productivity and lifetime of the sensor node not significantly.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"13 1","pages":"511-516"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84088551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1