Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061275
O. Zaichenko, Pavlo Galkin, M. Miroshnyk
The six-port receiver is very perspective in wireless application as it much cheaper than receivers with heterodyne transformation because vector information about not only modulus but phase too is derived from scalar sensor signals by processing with algorithms. There was considered principle of action of six-port receiver, mathematical model of six-port receiver, using redundancy in the algorithms for six and more port receiver in the report. There was proposed how to provide phase and clock synchronization. There was proposed constellation diagram obtained by simulation. Due to described filters the error vector magnitude (EVM) decreases almoust 10 times
{"title":"Model and Algorithms for Microwave Mutiport Receiver","authors":"O. Zaichenko, Pavlo Galkin, M. Miroshnyk","doi":"10.1109/PICST47496.2019.9061275","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061275","url":null,"abstract":"The six-port receiver is very perspective in wireless application as it much cheaper than receivers with heterodyne transformation because vector information about not only modulus but phase too is derived from scalar sensor signals by processing with algorithms. There was considered principle of action of six-port receiver, mathematical model of six-port receiver, using redundancy in the algorithms for six and more port receiver in the report. There was proposed how to provide phase and clock synchronization. There was proposed constellation diagram obtained by simulation. Due to described filters the error vector magnitude (EVM) decreases almoust 10 times","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"91 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84807165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061379
V. Bandura, Andriy Malitchuk, M. Pasieka, R. Khrabatyn
This article deals with a number of issues associated with software quality evaluation. The method for the quality evaluation of data backup systems based on an example of open source software, taking into account the needs of the end consumer, which provide the determination of indicators based on the typical functionalities.
{"title":"Evaluation of Quality of Backup Copy Systems Data in Telecommunication Systems","authors":"V. Bandura, Andriy Malitchuk, M. Pasieka, R. Khrabatyn","doi":"10.1109/PICST47496.2019.9061379","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061379","url":null,"abstract":"This article deals with a number of issues associated with software quality evaluation. The method for the quality evaluation of data backup systems based on an example of open source software, taking into account the needs of the end consumer, which provide the determination of indicators based on the typical functionalities.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"46 1","pages":"329-335"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83065711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061539
N. Pasieka, V. Sheketa, Y. Romanyshyn, M. Pasieka, Ulyana Domska, A. Struk
The algorithm of transfer of computational load without application of additional reserve resources and having offered innovative model of the organization of communication of modules within the limits of one knot and system as a whole is considered. The essence of the model is that the software is divided into logical modules, that is, by its purpose. The architecture of the Web-system is designed so that the modules contain as little logic as possible, because the main task of load redistribution is to support the system in balance. The second requirement for the software architecture is to avoid strong connectivity. Therefore, it is necessary to divide the system into small modules that work with one or a small number of «parent» modules. In the developed model, the modules are isolated from each other and do not have a general condition, but between them you can establish communication and receive notifications about their condition. Asynchronous message exchange is used for interaction of modules. An important aspect of the research is that additional free resources can be found within the existing capabilities of the Web-system.
{"title":"Models, Methods and Algorithms of Web System Architecture Optimization","authors":"N. Pasieka, V. Sheketa, Y. Romanyshyn, M. Pasieka, Ulyana Domska, A. Struk","doi":"10.1109/PICST47496.2019.9061539","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061539","url":null,"abstract":"The algorithm of transfer of computational load without application of additional reserve resources and having offered innovative model of the organization of communication of modules within the limits of one knot and system as a whole is considered. The essence of the model is that the software is divided into logical modules, that is, by its purpose. The architecture of the Web-system is designed so that the modules contain as little logic as possible, because the main task of load redistribution is to support the system in balance. The second requirement for the software architecture is to avoid strong connectivity. Therefore, it is necessary to divide the system into small modules that work with one or a small number of «parent» modules. In the developed model, the modules are isolated from each other and do not have a general condition, but between them you can establish communication and receive notifications about their condition. Asynchronous message exchange is used for interaction of modules. An important aspect of the research is that additional free resources can be found within the existing capabilities of the Web-system.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"15 1","pages":"147-152"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83301389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061533
A. Levkin, A. Petrenko, R. Levkina, Igor Chaliy
To solve the issue of economic security of the country due to providing the population with high-quality livestock products article proposed a model and a method for solving the automation and optimization tasks of embryo laser division, allowing effective computational implementation in the sense of insignificant storage and labor input. This ensures the solution of relevant practical problems in real-time, that is, directly upon receiving the embryo image, which is essential for the laser cutting process, since during the time of optimal trajectory constructing the embryo does not have time to significantly change its position. That solves the food sequrity problem in the context of the country’s economic security and will allow to bring biotechnological processes to a fundamentally new level, corresponding to the pace of modern technologies development. The research also solves the problem of animal livestock economic efficiency and the use of the latest technologies progres of fundamental areas of production.
{"title":"Economic Security as a Result of Modern Biotechnology Implementation","authors":"A. Levkin, A. Petrenko, R. Levkina, Igor Chaliy","doi":"10.1109/PICST47496.2019.9061533","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061533","url":null,"abstract":"To solve the issue of economic security of the country due to providing the population with high-quality livestock products article proposed a model and a method for solving the automation and optimization tasks of embryo laser division, allowing effective computational implementation in the sense of insignificant storage and labor input. This ensures the solution of relevant practical problems in real-time, that is, directly upon receiving the embryo image, which is essential for the laser cutting process, since during the time of optimal trajectory constructing the embryo does not have time to significantly change its position. That solves the food sequrity problem in the context of the country’s economic security and will allow to bring biotechnological processes to a fundamentally new level, corresponding to the pace of modern technologies development. The research also solves the problem of animal livestock economic efficiency and the use of the latest technologies progres of fundamental areas of production.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"129 1","pages":"139-142"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83992142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061224
Vladyslav Apukhtin, Mariya Shirokopetleva, Victoria Skovorodnikova
The paper covers main message broker protocols and the patterns which are used to manage technical problems. The article provides the reader with typical software engineering design issues which might lead to conceptual violations, software non-functional requirements nonconformity, which is high coupling problem, synchronous operation performance loss, and system constituent integration problem. The solutions which come as a result of applying messaging are brought covering each problem above, in particular establishing the communication between loosely coupled applications, researching the application performance speedup with the Amdahl’s law and applying Read Model architectural pattern leveraging message brokers capabilities.
{"title":"The Relevance of Using Message Brokers in Robust Enterprise Applications","authors":"Vladyslav Apukhtin, Mariya Shirokopetleva, Victoria Skovorodnikova","doi":"10.1109/PICST47496.2019.9061224","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061224","url":null,"abstract":"The paper covers main message broker protocols and the patterns which are used to manage technical problems. The article provides the reader with typical software engineering design issues which might lead to conceptual violations, software non-functional requirements nonconformity, which is high coupling problem, synchronous operation performance loss, and system constituent integration problem. The solutions which come as a result of applying messaging are brought covering each problem above, in particular establishing the communication between loosely coupled applications, researching the application performance speedup with the Amdahl’s law and applying Read Model architectural pattern leveraging message brokers capabilities.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"63 1","pages":"305-309"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88372702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061389
I. Shubin, S. Solonska, Stanislav Snisar, V. Slavhorodskyi, Victoria Skovorodnikova
The paper presents the information technology of low-visible air objects radar detection developed by formalizing the processes of perception and transformation of signals and signal images, taking into account the possibilities of unification of procedures for inter-period and multi-survey (multi-view) radar signals processing and information based on semantic analysis. It is also proposed to accumulate the energy and semantic component of the signal information by forming space-time images using the algebra of finite predicates.
{"title":"Semantic Radar Technology for Detecting and Recognizing Low-Visible Air Objects","authors":"I. Shubin, S. Solonska, Stanislav Snisar, V. Slavhorodskyi, Victoria Skovorodnikova","doi":"10.1109/PICST47496.2019.9061389","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061389","url":null,"abstract":"The paper presents the information technology of low-visible air objects radar detection developed by formalizing the processes of perception and transformation of signals and signal images, taking into account the possibilities of unification of procedures for inter-period and multi-survey (multi-view) radar signals processing and information based on semantic analysis. It is also proposed to accumulate the energy and semantic component of the signal information by forming space-time images using the algebra of finite predicates.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"7 1","pages":"665-670"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77972368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061549
G. Avdeyenko
Novel method of radio relay link bandwidth capacity improvement based on spatial signal processing by the wave front of the electromagnetic wave are presented. Test results of a variant of one-hop simplex radio relay link lab prototype with spatial signal processing both in the transmitting and receiving sites are shown. This prototype provides simultaneous parallel wireless transmission of two DVB-C radio signals with 64-QAM modulations at bit rates of 41.25 Mbps over 8 MHz bandwidth with the same carrier frequency of 10.56 GHz and with the same electromagnetic waves polarization at distance of 8 meters. This prototype can be used for research the possibility of radio frequency resource reuse and bandwidth capability improvement for radio relay links by applying spatial signal processing techniques.
{"title":"Application of Spatial Signal Processing for Bandwidth Capability Improvement of Radio Relay Link","authors":"G. Avdeyenko","doi":"10.1109/PICST47496.2019.9061549","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061549","url":null,"abstract":"Novel method of radio relay link bandwidth capacity improvement based on spatial signal processing by the wave front of the electromagnetic wave are presented. Test results of a variant of one-hop simplex radio relay link lab prototype with spatial signal processing both in the transmitting and receiving sites are shown. This prototype provides simultaneous parallel wireless transmission of two DVB-C radio signals with 64-QAM modulations at bit rates of 41.25 Mbps over 8 MHz bandwidth with the same carrier frequency of 10.56 GHz and with the same electromagnetic waves polarization at distance of 8 meters. This prototype can be used for research the possibility of radio frequency resource reuse and bandwidth capability improvement for radio relay links by applying spatial signal processing techniques.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"106 1","pages":"187-192"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78361580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061451
T. Radivilova, Lyudmyla Kirichenko, A. S. Alghawli
The paper proposes and implements a network traffic analysis method for detecting attacks, which is based on protocol analysis and the maximum entropy method. To analyze the quality of functioning of the proposed method, we used data from a data set that contains traffic of various protocols and DDoS attacks, UDP floods, TCP SYN streams, Ping of Death attacks, and HTTP flood attacks. The proposed method for analyzing the maximum entropy was software implemented and the results of its work showed high-quality attack detection. The method can detect various attacks with a probability of about 94%, while false-positive values did not exceed 10%. The advantage of the method is the early detection of intrusions, due to the rapid calculation of the maximum entropy using the sliding window method.
提出并实现了一种基于协议分析和最大熵法的网络流量检测方法。为了分析所提出方法的功能质量,我们使用了来自一个数据集的数据,该数据集包含各种协议和DDoS攻击、UDP洪水、TCP SYN流、Ping of Death攻击和HTTP洪水攻击的流量。所提出的最大熵分析方法已在软件上实现,其工作结果显示出高质量的攻击检测。该方法检测各种攻击的概率约为94%,而假阳性率不超过10%。该方法利用滑动窗口法快速地计算出最大熵,其优点是可以较早地检测到入侵。
{"title":"Entropy Analysis Method for Attacks Detection","authors":"T. Radivilova, Lyudmyla Kirichenko, A. S. Alghawli","doi":"10.1109/PICST47496.2019.9061451","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061451","url":null,"abstract":"The paper proposes and implements a network traffic analysis method for detecting attacks, which is based on protocol analysis and the maximum entropy method. To analyze the quality of functioning of the proposed method, we used data from a data set that contains traffic of various protocols and DDoS attacks, UDP floods, TCP SYN streams, Ping of Death attacks, and HTTP flood attacks. The proposed method for analyzing the maximum entropy was software implemented and the results of its work showed high-quality attack detection. The method can detect various attacks with a probability of about 94%, while false-positive values did not exceed 10%. The advantage of the method is the early detection of intrusions, due to the rapid calculation of the maximum entropy using the sliding window method.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"443-446"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75351240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061536
O. Pliushch
Signal processing algorithms in adaptive antenna arrays are analyzed with respect to their application in mobile telecommunication systems. It is established that both in literature and in practice insufficient attention is paid to search for and design of such simple adaptation algorithms that do not require presence of the reference signal. Gradient method of adaptation is considered and its limitations are exposed. It is shown that the gradient method requires a reference signal that can be presented as the signal in a selected antenna element or a reference signal generated in the antenna array. A simple algorithm of antenna array adaptation is deduced that operates in the absence of the reference signal. Computer simulation of adaptive antenna arrays with the designed algorithm in different situations is carried out, which singles out inherent deficiency in the algorithm. Improvements to eliminate this deficiency are offered. High performance of the improved gradient algorithm is confirmed in difficult interference environments.
{"title":"Gradient Signal Processing Algorithm for Adaptive Antenna Arrays Obviating Reference Signal Presence","authors":"O. Pliushch","doi":"10.1109/PICST47496.2019.9061536","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061536","url":null,"abstract":"Signal processing algorithms in adaptive antenna arrays are analyzed with respect to their application in mobile telecommunication systems. It is established that both in literature and in practice insufficient attention is paid to search for and design of such simple adaptation algorithms that do not require presence of the reference signal. Gradient method of adaptation is considered and its limitations are exposed. It is shown that the gradient method requires a reference signal that can be presented as the signal in a selected antenna element or a reference signal generated in the antenna array. A simple algorithm of antenna array adaptation is deduced that operates in the absence of the reference signal. Computer simulation of adaptive antenna arrays with the designed algorithm in different situations is carried out, which singles out inherent deficiency in the algorithm. Improvements to eliminate this deficiency are offered. High performance of the improved gradient algorithm is confirmed in difficult interference environments.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"635-638"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73890538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061331
Kirill Smelyakov, Dariia Tovchyrechko, Igor Ruban, A. Chupryna, O. Ponomarenko
The article puts an experiment on application of widely used ORB, SIFT and SURF feature point detectors represented by the corresponding functions in the OpenCV library, to the images of the most common object classes such as human faces, fine details and artificial images. The considered detectors display as a result a huge number of points that are not classified or structured. Building an appropriate classifier would greatly increase the efficiency of subsequent image processing operations: localization, recognition, search, and tracking of objects. The article analyzes the effectiveness of the experimental results at a quantitative and qualitative level taking into account the conditions and limitations (primarily temporal) on solving practical problems in the era of Big Data, as well as taking into account the fact that some detectors are proprietary. According to the analysis results of the usage effectiveness of the features points detectors considered in the work the practical recommendations for specific use cases are given at the end of the work.
{"title":"Local Feature Detectors Performance Analysis on Digital Image","authors":"Kirill Smelyakov, Dariia Tovchyrechko, Igor Ruban, A. Chupryna, O. Ponomarenko","doi":"10.1109/PICST47496.2019.9061331","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061331","url":null,"abstract":"The article puts an experiment on application of widely used ORB, SIFT and SURF feature point detectors represented by the corresponding functions in the OpenCV library, to the images of the most common object classes such as human faces, fine details and artificial images. The considered detectors display as a result a huge number of points that are not classified or structured. Building an appropriate classifier would greatly increase the efficiency of subsequent image processing operations: localization, recognition, search, and tracking of objects. The article analyzes the effectiveness of the experimental results at a quantitative and qualitative level taking into account the conditions and limitations (primarily temporal) on solving practical problems in the era of Big Data, as well as taking into account the fact that some detectors are proprietary. According to the analysis results of the usage effectiveness of the features points detectors considered in the work the practical recommendations for specific use cases are given at the end of the work.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"6 1","pages":"644-648"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80253190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}