Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061363
Berezovsky Stanislav
The models of the topology of information tunnels with the number of channels n≥1 of telecommunication systems in the polar coordinate system using switching patterns on Berezovsky’s elements, as well as the introduction of retaining rings as points of decentralized control / access to the "tunnel" information, which in general can be represented as a digital double, are considered.
{"title":"3D Intellectual Heuristic Topology of Communication Devices of Telecommunication Structures on the Elements by Berezovsky","authors":"Berezovsky Stanislav","doi":"10.1109/PICST47496.2019.9061363","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061363","url":null,"abstract":"The models of the topology of information tunnels with the number of channels n≥1 of telecommunication systems in the polar coordinate system using switching patterns on Berezovsky’s elements, as well as the introduction of retaining rings as points of decentralized control / access to the \"tunnel\" information, which in general can be represented as a digital double, are considered.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"6 1","pages":"881-884"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88358565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061356
Kirill Smelyakov, Mykyta Hvozdiev, A. Chupryna, Denys Sandrkin, V. Martovytskyi
The paper provides a comparative analysis of the application of the most demanded gradational correction models (power, exponential and logarithmic) of a highly lighted digital image, which capable of automatic adaptation to different brightness scales, discusses the features of their practical application, sets up an experiment to improve the highly lighted photo. In the experiment, the test image is modified with use of different gradation correction models and different parameters, this helps to show the practical value of such modifications and the coefficient of image enhancement is given to provide comparative analysis of influence of input parameters to final result. After considering the results of the experiment, analysis and recommendations for the practical use of the models are given which helps to solve actual applied tasks of digital image quality improvement
{"title":"Comparative Efficiency Analysis of Gradational Correction Models of Highly Lighted Image","authors":"Kirill Smelyakov, Mykyta Hvozdiev, A. Chupryna, Denys Sandrkin, V. Martovytskyi","doi":"10.1109/PICST47496.2019.9061356","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061356","url":null,"abstract":"The paper provides a comparative analysis of the application of the most demanded gradational correction models (power, exponential and logarithmic) of a highly lighted digital image, which capable of automatic adaptation to different brightness scales, discusses the features of their practical application, sets up an experiment to improve the highly lighted photo. In the experiment, the test image is modified with use of different gradation correction models and different parameters, this helps to show the practical value of such modifications and the coefficient of image enhancement is given to provide comparative analysis of influence of input parameters to final result. After considering the results of the experiment, analysis and recommendations for the practical use of the models are given which helps to solve actual applied tasks of digital image quality improvement","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"57 5","pages":"703-708"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91503150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061432
V. Pavlikov, S. Zhyla, N. Huu, A. Sobkolov
The aperture synthesis systems allow imaging with high spatial resolution. These images are important for solving problems of Earth remote sensing. One of the promising directions for development of such systems is the transition to UWB spatiotemporal signals processing. This raises a number of difficulties in the physical interpretation of the main UWB radio systems characteristics due to the fact that the classical definitions were introduced with regard to the narrowband systems description. Thus, there is a need for additional research and further definition of UWB systems characteristics and parameters. Among these characteristics is the spatial-spectral sensitivity domain, which, along with the uncertainty function, determines the quality of the radio system. Unlike in radio systems for narrowband signals processing, for systems with UWB signal processing the spectral sensitivity domain depends on both temporal and spatial frequencies. Analysis of this area is complicated by the fact that the temporal and spatial frequencies in the UWB system are not divided. In this work, the physical essence of the spatial-spectral sensitivity domain was studied and it was shown how its analysis will allow to develop requirements for the choice of antenna system geometry and to justify the expediency of using the working frequency band.
{"title":"Spectral Aperture Synthesis Method","authors":"V. Pavlikov, S. Zhyla, N. Huu, A. Sobkolov","doi":"10.1109/PICST47496.2019.9061432","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061432","url":null,"abstract":"The aperture synthesis systems allow imaging with high spatial resolution. These images are important for solving problems of Earth remote sensing. One of the promising directions for development of such systems is the transition to UWB spatiotemporal signals processing. This raises a number of difficulties in the physical interpretation of the main UWB radio systems characteristics due to the fact that the classical definitions were introduced with regard to the narrowband systems description. Thus, there is a need for additional research and further definition of UWB systems characteristics and parameters. Among these characteristics is the spatial-spectral sensitivity domain, which, along with the uncertainty function, determines the quality of the radio system. Unlike in radio systems for narrowband signals processing, for systems with UWB signal processing the spectral sensitivity domain depends on both temporal and spatial frequencies. Analysis of this area is complicated by the fact that the temporal and spatial frequencies in the UWB system are not divided. In this work, the physical essence of the spatial-spectral sensitivity domain was studied and it was shown how its analysis will allow to develop requirements for the choice of antenna system geometry and to justify the expediency of using the working frequency band.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"1 1","pages":"625-630"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90594161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061380
V. Lukin, G. Proskura, Irina V. Vasilyeva
A post-classification processing technique for multi-channel images that includes three stages is proposed. The purpose of the first stage is to correct decisions of pixel-by-pixel classifiers based on estimates of classes’ posterior probabilities. At the second stage, a logical convolution of the classification layers is performed which makes it possible to select the most probable class. At the final stage, local spatial filtering of pre-segmented image is done which is performed in the neighborhood of detected segments’ edges. The post-classification processing effectiveness is verified for satellite images. It is demonstrated that the proposed post-classification processing procedure can significantly increase the probability of recognizing poorly distinguishable classes and improve overall accuracy of image classification.
{"title":"Improvement of Multichannel Image Classification by Combining Elementary Classifiers","authors":"V. Lukin, G. Proskura, Irina V. Vasilyeva","doi":"10.1109/PICST47496.2019.9061380","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061380","url":null,"abstract":"A post-classification processing technique for multi-channel images that includes three stages is proposed. The purpose of the first stage is to correct decisions of pixel-by-pixel classifiers based on estimates of classes’ posterior probabilities. At the second stage, a logical convolution of the classification layers is performed which makes it possible to select the most probable class. At the final stage, local spatial filtering of pre-segmented image is done which is performed in the neighborhood of detected segments’ edges. The post-classification processing effectiveness is verified for satellite images. It is demonstrated that the proposed post-classification processing procedure can significantly increase the probability of recognizing poorly distinguishable classes and improve overall accuracy of image classification.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"37 1","pages":"660-664"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85575876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061525
Serhiy Mashkovskyi
This paper describes the author's algorithm for semantic search of related data in large text arrays, as well as the development of a program for its approbation. The algorithm has been tested in several commonly known social networks. The research technique is described, the analysis of the results is carried out, and the disadvantages found are indicated. Further directions of the algorithm development are suggested, as well as possible spheres of its application are described.
{"title":"New Approaches to Search the Relations Between Distributed Data in Social Networks","authors":"Serhiy Mashkovskyi","doi":"10.1109/PICST47496.2019.9061525","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061525","url":null,"abstract":"This paper describes the author's algorithm for semantic search of related data in large text arrays, as well as the development of a program for its approbation. The algorithm has been tested in several commonly known social networks. The research technique is described, the analysis of the results is carried out, and the disadvantages found are indicated. Further directions of the algorithm development are suggested, as well as possible spheres of its application are described.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"184 1","pages":"129-132"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85684848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061256
Sergii M. Korotin, Y. Kravchenko, O. Starkova, K. Herasymenko, Roman A. Mykolaichuk
In the article the author analyzed the known simple types of self-tuning automatic control systems, the order of choosing the parameters of the main control circuit for a given structure and parameters of the self-tuning circuit. In the article the theory of P.L. Chebyshev ҆ s approximations for the study of control systems with limit cycle was used. The mathematical formulas give the possibility to construct a transitional process in a control system arising from parametric perturbations under initial conditions. The proposed method allows it possible to calculate the parameters and to simulate a specific control system.
{"title":"Analytical Determination of the Parameters of the Self-Tuning Circuit of the Traffic Control System on the Limit of Vibrational Stability","authors":"Sergii M. Korotin, Y. Kravchenko, O. Starkova, K. Herasymenko, Roman A. Mykolaichuk","doi":"10.1109/PICST47496.2019.9061256","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061256","url":null,"abstract":"In the article the author analyzed the known simple types of self-tuning automatic control systems, the order of choosing the parameters of the main control circuit for a given structure and parameters of the self-tuning circuit. In the article the theory of P.L. Chebyshev ҆ s approximations for the study of control systems with limit cycle was used. The mathematical formulas give the possibility to construct a transitional process in a control system arising from parametric perturbations under initial conditions. The proposed method allows it possible to calculate the parameters and to simulate a specific control system.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"19 1","pages":"471-476"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86024086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061475
L. Koliechkina, A. Nahirna
The mathematical definition of the optimal choice problem for software package for an enterprise information system is considered. The problem of the optimal software package choice is a mathematical model of combinatorial optimization on a set of combinations. The algorithm for solving this problem is presented for finding the minimum value of the target function considering additional linear constraints. This method makes it possible to significantly simplify the finding procedure of the optimal solution, since inequalities in the growth of constraints allow us to immediately determine whether a point in the set of combinations will be a support solution or not. In the positive case, the support solution is improved, taking into account the properties of many combinations when directly checking the growth of the target function. The algorithm and its realization are demonstrated by a numerical example. The proposed mathematical model and solution algorithm can be used for a similar class of problems that are modeled by optimization models, where the set of feasible solutions is presented in the many combinations form.
{"title":"The Mathematical Model of the Optimal Choice of a Software Package for an Enterprise Information System","authors":"L. Koliechkina, A. Nahirna","doi":"10.1109/PICST47496.2019.9061475","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061475","url":null,"abstract":"The mathematical definition of the optimal choice problem for software package for an enterprise information system is considered. The problem of the optimal software package choice is a mathematical model of combinatorial optimization on a set of combinations. The algorithm for solving this problem is presented for finding the minimum value of the target function considering additional linear constraints. This method makes it possible to significantly simplify the finding procedure of the optimal solution, since inequalities in the growth of constraints allow us to immediately determine whether a point in the set of combinations will be a support solution or not. In the positive case, the support solution is improved, taking into account the properties of many combinations when directly checking the growth of the target function. The algorithm and its realization are demonstrated by a numerical example. The proposed mathematical model and solution algorithm can be used for a similar class of problems that are modeled by optimization models, where the set of feasible solutions is presented in the many combinations form.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"153 1","pages":"455-458"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86453286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061568
Hleb Shpyta, Y. Dorogyy
This article contains a comparative analysis of the effectiveness of machine learning algorithms in finding optimal strategy by result in a competitive environment without the possibility of prior training using an example game based on the dilemma of the prisoner. Results of using of adaptive algorithms in comparison with constant strategies are considered from the point of view of game design. Based on the data obtained, the article offers a set of approaches for implementing an adaptive gaming environment as an alternative to the decision trees which are often used in videogame programming.
{"title":"Using of Machine Learning Algorithms without Preliminary Training in Unconstant Game Systems","authors":"Hleb Shpyta, Y. Dorogyy","doi":"10.1109/PICST47496.2019.9061568","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061568","url":null,"abstract":"This article contains a comparative analysis of the effectiveness of machine learning algorithms in finding optimal strategy by result in a competitive environment without the possibility of prior training using an example game based on the dilemma of the prisoner. Results of using of adaptive algorithms in comparison with constant strategies are considered from the point of view of game design. Based on the data obtained, the article offers a set of approaches for implementing an adaptive gaming environment as an alternative to the decision trees which are often used in videogame programming.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"51 1","pages":"369-374"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81409697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061295
S. Hrushko, I. Zeleneva, G. Kirichek, A. Timenko
Certain ways of combined finite state mashine implementing on chips of different architectures and manufacturers are considered. Each discussed method allows achieving a certain reduction of hardware amount in the control device logic circuit. The aim of studies is to define the range of efficiency for each method correspondently to chips of the top manufactorers – Xilinx, Altera/Intel, Microsemi. The studies were conducted on chips of different series. Analysis of the experimental results is proposed and it may be used as a tip in practice of control unit design and optimization.
{"title":"Comparative Analysis of Combined Finite State Machine Implementation on Chips of Different Manufacturers","authors":"S. Hrushko, I. Zeleneva, G. Kirichek, A. Timenko","doi":"10.1109/PICST47496.2019.9061295","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061295","url":null,"abstract":"Certain ways of combined finite state mashine implementing on chips of different architectures and manufacturers are considered. Each discussed method allows achieving a certain reduction of hardware amount in the control device logic circuit. The aim of studies is to define the range of efficiency for each method correspondently to chips of the top manufactorers – Xilinx, Altera/Intel, Microsemi. The studies were conducted on chips of different series. Analysis of the experimental results is proposed and it may be used as a tip in practice of control unit design and optimization.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"20 1","pages":"25-28"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86963773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/PICST47496.2019.9061242
Taylor Rodriguez Vance, Andrew Vance
Cybercriminals and nation-state hackers are investing heavily in strategies devised to disrupt critical infrastructure systems. Nearly one out of two Industrial Control System (ICS) computers in the energy sector had been impacted by malicious cyber activity in 2018. With threats increasing and attack vectors expanding, critical infrastructure sectors like energy need to implement innovative technology to ensure Critical Infrastructure Protection. This study reviewed blockchain research published between 2015 and 2019 in order to examine the development of blockchain, evaluate current applications of blockchain in the energy sector, and propose additional opportunities for the application of blockchain technology. Quantitative analysis revealed that blockchain-based cybersecurity research and application in the energy sector is increasing at an annual average growth rate of 169% since 2015 with intensified focus on Internet of Things (IoT) and Smart Grid infrastructures. Computed projections forecast a continued increase in the research and application of IoT and Smart Grids. Calculations indicate that nearly 50% of the new research will be in blockchain-based cybersecurity solutions such as cryptographic communications and secure email. Qualitative analysis indicates potential for blockchain- based cybersecurity solutions to provide enhanced Critical Infrastructure Protection in those sectors against pervasive phishing and social engineering threats.
{"title":"Cybersecurity in the Blockchain Era : A Survey on Examining Critical Infrastructure Protection with Blockchain-Based Technology","authors":"Taylor Rodriguez Vance, Andrew Vance","doi":"10.1109/PICST47496.2019.9061242","DOIUrl":"https://doi.org/10.1109/PICST47496.2019.9061242","url":null,"abstract":"Cybercriminals and nation-state hackers are investing heavily in strategies devised to disrupt critical infrastructure systems. Nearly one out of two Industrial Control System (ICS) computers in the energy sector had been impacted by malicious cyber activity in 2018. With threats increasing and attack vectors expanding, critical infrastructure sectors like energy need to implement innovative technology to ensure Critical Infrastructure Protection. This study reviewed blockchain research published between 2015 and 2019 in order to examine the development of blockchain, evaluate current applications of blockchain in the energy sector, and propose additional opportunities for the application of blockchain technology. Quantitative analysis revealed that blockchain-based cybersecurity research and application in the energy sector is increasing at an annual average growth rate of 169% since 2015 with intensified focus on Internet of Things (IoT) and Smart Grid infrastructures. Computed projections forecast a continued increase in the research and application of IoT and Smart Grids. Calculations indicate that nearly 50% of the new research will be in blockchain-based cybersecurity solutions such as cryptographic communications and secure email. Qualitative analysis indicates potential for blockchain- based cybersecurity solutions to provide enhanced Critical Infrastructure Protection in those sectors against pervasive phishing and social engineering threats.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"27 1","pages":"107-112"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85552263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}