首页 > 最新文献

2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

英文 中文
Integrated diagnostic system for winding fault detection of the three-phase PMSM 三相永磁同步电动机绕组故障综合诊断系统
Lukáš Otava, Ludek Buchta
This paper deals with the detection of the winding faults of the three-phase PMSM. The algorithm based on the three-phase model of the winding and the extended Kalman filter is used for inter-turn short detection. Additionally, the functionality of the sensors used for the detection algorithms is verified. The decision system is in charge of the diagnosis of the fault (winding/sensors). All the presented algorithms were implemented in Simulink and tested on data measured on a real inverter with the motor connected to the dynamometer. Algorithms were also tested on a microcontroller.
本文研究了三相永磁同步电动机绕组故障的检测方法。采用基于绕组三相模型和扩展卡尔曼滤波的算法进行匝间短路检测。此外,还验证了用于检测算法的传感器的功能。决策系统负责对故障(绕组/传感器)进行诊断。所有算法都在Simulink中实现,并在实际逆变器上进行了数据测试,电机连接到测功机上。算法也在微控制器上进行了测试。
{"title":"Integrated diagnostic system for winding fault detection of the three-phase PMSM","authors":"Lukáš Otava, Ludek Buchta","doi":"10.1109/ICUMT51630.2020.9222438","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222438","url":null,"abstract":"This paper deals with the detection of the winding faults of the three-phase PMSM. The algorithm based on the three-phase model of the winding and the extended Kalman filter is used for inter-turn short detection. Additionally, the functionality of the sensors used for the detection algorithms is verified. The decision system is in charge of the diagnosis of the fault (winding/sensors). All the presented algorithms were implemented in Simulink and tested on data measured on a real inverter with the motor connected to the dynamometer. Algorithms were also tested on a microcontroller.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of household electrical appliances on transmission speed in PLC networks 家用电器对PLC网络传输速度的影响
R. Duriga, M. Koppl, Stefan Pocarovsky, M. Orgon
The paper deals with the impact of switching power supplies, surge protection and current protector on the throughput in PLC (Power Line Communication) networks created with PLC adapters TL-PA8010v2 and TL-WPA8630v2. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols were used for data transmission and the PLC network itself was implemented on aluminum and copper lines. Measurements of transmission speeds made it possible to analyze the various effects of interference on data transmission on both lines and compare them. This paper is a supplement to the testing of PLC networks with the mentioned adapters, which is the subject of another paper at the conference.
本文讨论了用PLC适配器TL-PA8010v2和TL-WPA8630v2创建的PLC(电力线通信)网络中开关电源、浪涌保护和电流保护器对吞吐量的影响。TCP(传输控制协议)和UDP(用户数据报协议)协议用于数据传输,PLC网络本身在铝线和铜线上实现。对传输速度的测量使得分析干扰对两条线路上数据传输的各种影响并进行比较成为可能。本文是对使用上述适配器测试PLC网络的补充,这是会议上另一篇论文的主题。
{"title":"Impact of household electrical appliances on transmission speed in PLC networks","authors":"R. Duriga, M. Koppl, Stefan Pocarovsky, M. Orgon","doi":"10.1109/ICUMT51630.2020.9222461","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222461","url":null,"abstract":"The paper deals with the impact of switching power supplies, surge protection and current protector on the throughput in PLC (Power Line Communication) networks created with PLC adapters TL-PA8010v2 and TL-WPA8630v2. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols were used for data transmission and the PLC network itself was implemented on aluminum and copper lines. Measurements of transmission speeds made it possible to analyze the various effects of interference on data transmission on both lines and compare them. This paper is a supplement to the testing of PLC networks with the mentioned adapters, which is the subject of another paper at the conference.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132430390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Advanced Slow Denial of Service Attack Generator 先进的慢速拒绝服务攻击发生器设计
M. Sikora, Andrej Krivulcik, R. Fujdiak, Petr Blazek
This work investigates the optimization and usability of slow Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in computer networks. This paper focuses on Slowloris, Slow POST, and Slow Read attack. The reader is introduced to the principles and detection issues of these attacks, together with a closer look at the design of an advanced slow DoS attack generator. This paper also presents experimental testing of a proposed generator. The test scenarios are close to real attack cases, including distributed attacks. The proposed generator is applicable for future research or improvement of detection systems and webserver security modules.
这项工作调查了计算机网络中慢速拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击的优化和可用性。本文主要研究了慢读攻击、慢POST攻击和慢读攻击。本文向读者介绍了这些攻击的原理和检测问题,并详细介绍了一种先进的慢速DoS攻击生成器的设计。本文还对所提出的发电机进行了实验测试。测试场景接近真实的攻击案例,包括分布式攻击。该生成器适用于未来检测系统和web服务器安全模块的研究或改进。
{"title":"Design of Advanced Slow Denial of Service Attack Generator","authors":"M. Sikora, Andrej Krivulcik, R. Fujdiak, Petr Blazek","doi":"10.1109/ICUMT51630.2020.9222423","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222423","url":null,"abstract":"This work investigates the optimization and usability of slow Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in computer networks. This paper focuses on Slowloris, Slow POST, and Slow Read attack. The reader is introduced to the principles and detection issues of these attacks, together with a closer look at the design of an advanced slow DoS attack generator. This paper also presents experimental testing of a proposed generator. The test scenarios are close to real attack cases, including distributed attacks. The proposed generator is applicable for future research or improvement of detection systems and webserver security modules.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human action recognition using an image-based temporal and spatial representation 使用基于图像的时空表示的人类动作识别
Vinícius Silva, F. Soares, J. Esteves, G. Vercelli
Researchers have been using different technological solutions (platforms) as intervention tools with children with Autism Spectrum Disorder (ASD), who typically present difficulties in engaging and interacting with their peers. Social robots, one example of these technological solutions, are often unaware of their game partners, preventing the automatic adaptation of their behaviour to the user. Therefore, enriching the interaction between the user and the platform, lightening up the cognitive burden on the human operator, may be a valuable contribution. An information that can be used to enrich this interaction and, consequently, adapt the system behaviour is the recognition of different actions of the user through skeleton pose data from depth sensors. The present work proposes a method to automatically detect in real-time typical and stereotypical actions of children with ASD by using the Intel RealSense and the Nuitrack SDK to detect and extract the user joints coordinates. A Convolution Neural Network learning model trained on the different actions is used to classify the different patterns of behaviour. The model achieved an average accuracy of 92.6±0.5% on the test data. The entire pipeline runs on average at 31 FPS.
研究人员一直在使用不同的技术解决方案(平台)作为自闭症谱系障碍(ASD)儿童的干预工具,这些儿童通常在与同龄人交往和互动方面存在困难。社交机器人是这些技术解决方案的一个例子,它们通常不知道自己的游戏伙伴,因此无法自动适应用户的行为。因此,丰富用户与平台之间的交互,减轻人类操作员的认知负担,可能是一个有价值的贡献。一个可以用来丰富这种交互,从而适应系统行为的信息是通过来自深度传感器的骨骼姿势数据来识别用户的不同动作。本研究提出了一种利用Intel RealSense和Nuitrack SDK检测和提取用户关节坐标,实时自动检测ASD儿童典型和刻板动作的方法。使用基于不同动作训练的卷积神经网络学习模型对不同的行为模式进行分类。该模型对测试数据的平均准确率为92.6±0.5%。整个管道的平均运行速度为31 FPS。
{"title":"Human action recognition using an image-based temporal and spatial representation","authors":"Vinícius Silva, F. Soares, J. Esteves, G. Vercelli","doi":"10.1109/ICUMT51630.2020.9222408","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222408","url":null,"abstract":"Researchers have been using different technological solutions (platforms) as intervention tools with children with Autism Spectrum Disorder (ASD), who typically present difficulties in engaging and interacting with their peers. Social robots, one example of these technological solutions, are often unaware of their game partners, preventing the automatic adaptation of their behaviour to the user. Therefore, enriching the interaction between the user and the platform, lightening up the cognitive burden on the human operator, may be a valuable contribution. An information that can be used to enrich this interaction and, consequently, adapt the system behaviour is the recognition of different actions of the user through skeleton pose data from depth sensors. The present work proposes a method to automatically detect in real-time typical and stereotypical actions of children with ASD by using the Intel RealSense and the Nuitrack SDK to detect and extract the user joints coordinates. A Convolution Neural Network learning model trained on the different actions is used to classify the different patterns of behaviour. The model achieved an average accuracy of 92.6±0.5% on the test data. The entire pipeline runs on average at 31 FPS.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Based Predicting Student Academic Success 基于机器学习预测学生学业成绩
Khalfan Al Mayahi, M. Al-Bahri
Today, all institutions and companies are accelerating the use of AI technologies in their businesses to achieve a clear vision and quality results. The education sector is one of the sectors where AI can be used because of big data. In this work we created a machine-based learning model to predict a student’s educational performance. The developed model relied on the student’s previous data and performance in the last stage of the school. The model showed a very accurate accuracy rate that can be adopted.
今天,所有机构和公司都在加速在其业务中使用人工智能技术,以实现清晰的愿景和高质量的结果。由于大数据的存在,教育领域是人工智能可以应用的领域之一。在这项工作中,我们创建了一个基于机器的学习模型来预测学生的学习成绩。所开发的模型依赖于学生之前的数据和在学校最后阶段的表现。该模型显示出非常准确的准确率,可以采用。
{"title":"Machine Learning Based Predicting Student Academic Success","authors":"Khalfan Al Mayahi, M. Al-Bahri","doi":"10.1109/ICUMT51630.2020.9222435","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222435","url":null,"abstract":"Today, all institutions and companies are accelerating the use of AI technologies in their businesses to achieve a clear vision and quality results. The education sector is one of the sectors where AI can be used because of big data. In this work we created a machine-based learning model to predict a student’s educational performance. The developed model relied on the student’s previous data and performance in the last stage of the school. The model showed a very accurate accuracy rate that can be adopted.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"28 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices 约束设备上机密性、真实性和隐私性的加密协议
J. Hajny, Petr Dzurenda, Raúl Casanova Marqués, L. Malina
Cyber security and privacy protection play a crucial role in modern communication systems. While it is relatively easy to secure classical networks, it is a hard problem to provide even basic security properties, such as confidentiality, integrity, authenticity and privacy, in heterogeneous networks that involve devices with restricted resources. In these environments, such as industrial networks, sensor networks or IoT networks, the protection of user data is still very low. In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they’re fully implementable on constrained devices. First, we present a computationally efficient scheme for the establishment of a secure channel on a device with almost no cryptographic support and very low computational and memory resources. Second, we present a privacy-enhancing scheme for achieving so-called anonymous authentication, that is the verification of user authorization without disclosing her identity. Also in this case we use only very limited support of cryptographic operations and computational resources. Besides the full cryptographic description, we also show the benchmarks based on our implementation of protocols and the way of integration into real-world applications.
网络安全和隐私保护在现代通信系统中发挥着至关重要的作用。虽然保护经典网络相对容易,但在涉及资源有限的设备的异构网络中,提供甚至基本的安全属性(如机密性、完整性、真实性和隐私性)都是一个难题。在这些环境中,例如工业网络、传感器网络或物联网网络,对用户数据的保护仍然很低。在本文中,我们提出了加密协议的设计,这些协议提供了关键的安全和隐私保护功能,同时它们在受限设备上完全可实现。首先,我们提出了一种在几乎没有加密支持和非常低的计算和内存资源的设备上建立安全通道的计算效率方案。其次,我们提出了一种隐私增强方案来实现所谓的匿名认证,即在不泄露用户身份的情况下验证用户的授权。在这种情况下,我们只使用非常有限的加密操作和计算资源支持。除了完整的加密描述之外,我们还展示了基于我们的协议实现和集成到实际应用程序中的方式的基准测试。
{"title":"Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices","authors":"J. Hajny, Petr Dzurenda, Raúl Casanova Marqués, L. Malina","doi":"10.1109/ICUMT51630.2020.9222243","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222243","url":null,"abstract":"Cyber security and privacy protection play a crucial role in modern communication systems. While it is relatively easy to secure classical networks, it is a hard problem to provide even basic security properties, such as confidentiality, integrity, authenticity and privacy, in heterogeneous networks that involve devices with restricted resources. In these environments, such as industrial networks, sensor networks or IoT networks, the protection of user data is still very low. In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they’re fully implementable on constrained devices. First, we present a computationally efficient scheme for the establishment of a secure channel on a device with almost no cryptographic support and very low computational and memory resources. Second, we present a privacy-enhancing scheme for achieving so-called anonymous authentication, that is the verification of user authorization without disclosing her identity. Also in this case we use only very limited support of cryptographic operations and computational resources. Besides the full cryptographic description, we also show the benchmarks based on our implementation of protocols and the way of integration into real-world applications.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of application dynamics in two types of CLOUD solutions 两种云解决方案中应用程序动态的比较
Stefan Pocarovsky, M. Orgon
The cloud of applications is currently one of the significant trends in IT infrastructure. This is the next step that follows the virtualization of servers and enables greater resource efficiency. With the rediscovered paradigm, where computing power is primarily transferred to the server, it is possible to minimize client performance, which is one of the most important consequences of such a procedure. There are many variations of cloud applications and also several options for presentations of these applications. The article is concentrating on two of them. First, there is only a database in the cloud and the application is at the client (in the LAN, or installed on a specific client). The second one is the whole application with a database installed in the cloud (outside the client’s LAN). We will virtualize all system and the client can connect remotely to the virtualized application.
应用程序云是当前IT基础设施的重要趋势之一。这是服务器虚拟化之后的下一步,可以实现更高的资源效率。在重新发现的范式中,计算能力主要被转移到服务器,因此有可能将客户机性能降至最低,这是这种过程的最重要的结果之一。云应用程序有很多变体,也有一些用于展示这些应用程序的选项。本文主要讨论其中的两个。首先,云中只有一个数据库,应用程序位于客户端(在局域网中,或安装在特定的客户端上)。第二种是将数据库安装在云中(在客户端的局域网之外)的整个应用程序。我们将虚拟化所有系统,客户端可以远程连接到虚拟化的应用程序。
{"title":"Comparison of application dynamics in two types of CLOUD solutions","authors":"Stefan Pocarovsky, M. Orgon","doi":"10.1109/ICUMT51630.2020.9222425","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222425","url":null,"abstract":"The cloud of applications is currently one of the significant trends in IT infrastructure. This is the next step that follows the virtualization of servers and enables greater resource efficiency. With the rediscovered paradigm, where computing power is primarily transferred to the server, it is possible to minimize client performance, which is one of the most important consequences of such a procedure. There are many variations of cloud applications and also several options for presentations of these applications. The article is concentrating on two of them. First, there is only a database in the cloud and the application is at the client (in the LAN, or installed on a specific client). The second one is the whole application with a database installed in the cloud (outside the client’s LAN). We will virtualize all system and the client can connect remotely to the virtualized application.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of Fatigue-Induced Electrical Impedance Models of Biceps Tissues 二头肌疲劳电阻抗模型的实证研究
N. Herencsar
Electrical impedance myography (EIM) is a noninvasive approach to muscle assessment based on the measurement of the electrical impedance in frequency range of interest. In this paper, fatigue-induced electrical impedance models of biceps tissues are investigated. After the dataset used is briefly described, complete set of parameters of the modified Fricke model, utilizing Foster I RC network-based fractional-order capacitor (FOC), are computed. The goodness of fitting of proposed FOCs and bioimpedance models were evaluated visually and statistically. The fit accuracy of designed electrical impedance models is ${mathbf{R}}_{{text{R}},{text{X}}}^2 geq 0.9978$. Proposed models provide more intuitive representation of the electrical behavior of biceps tissues. EIA standard compliant E96 series lumped parameter-based practical models give an appropriate explanation of fatigue effect on biceps tissues from resistance and capacitance point of view.
电阻抗肌图(EIM)是一种基于感兴趣频率范围内电阻抗测量的无创肌肉评估方法。本文研究了二头肌组织的疲劳电阻抗模型。在对使用的数据集进行简要描述后,利用基于Foster I RC网络的分数阶电容(FOC)计算了改进的Fricke模型的完整参数集。对所提出的foc和生物阻抗模型的拟合优度进行了视觉和统计评价。所设计的电阻抗模型拟合精度为${mathbf{R}}_{{text{R}},{text{X}}}^2 geq 0.9978$。提出的模型提供了二头肌组织电行为的更直观的表示。符合EIA标准的E96系列集总参数实用模型从电阻和电容的角度对二头肌组织的疲劳效应进行了适当的解释。
{"title":"An Empirical Study of Fatigue-Induced Electrical Impedance Models of Biceps Tissues","authors":"N. Herencsar","doi":"10.1109/ICUMT51630.2020.9222426","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222426","url":null,"abstract":"Electrical impedance myography (EIM) is a noninvasive approach to muscle assessment based on the measurement of the electrical impedance in frequency range of interest. In this paper, fatigue-induced electrical impedance models of biceps tissues are investigated. After the dataset used is briefly described, complete set of parameters of the modified Fricke model, utilizing Foster I RC network-based fractional-order capacitor (FOC), are computed. The goodness of fitting of proposed FOCs and bioimpedance models were evaluated visually and statistically. The fit accuracy of designed electrical impedance models is ${mathbf{R}}_{{text{R}},{text{X}}}^2 geq 0.9978$. Proposed models provide more intuitive representation of the electrical behavior of biceps tissues. EIA standard compliant E96 series lumped parameter-based practical models give an appropriate explanation of fatigue effect on biceps tissues from resistance and capacitance point of view.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126535636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Technique for Analyzing Bytecode in a Java Project for the Purpose of an Automated Assessment of the Possibility and Effectiveness of the Hidden Investment of Information and its Volumes in a Java Project 一种在Java项目中分析字节码的技术,目的是自动评估Java项目中信息隐藏投资及其数量的可能性和有效性
A. Krasov, P. I. Sharikov
The relevance of the problem under study is due to the rapid development of the java programming language, as well as the proposed java machines. The purpose of the article is to develop a methodology for analyzing class files and the ability to embed information into java program files. It is necessary that the digital watermark is not damaged, and the class files and the entire java project are functioning without changes. Thus, first, an analysis of the java project is created, the selection of the class files most suitable for attachment, the embedding of a digital watermark in the class file of the java application, and a health check. After checking the file's functionality, it checks the safety and invariability of the digital watermark in the file. Methods proposed by the authors of the article to significantly save time for the file device and the applied nesting techniques.
所研究的问题的相关性是由于java编程语言的快速发展,以及提出的java机器。本文的目的是开发一种分析类文件的方法,以及将信息嵌入到java程序文件中的能力。必须确保数字水印不被损坏,并且类文件和整个java项目在没有更改的情况下正常运行。因此,首先对java项目进行分析,选择最适合附件的类文件,在java应用程序的类文件中嵌入数字水印,并进行健康检查。在检查文件的功能性之后,再检查文件中数字水印的安全性和不变性。本文作者提出的方法可以显著节省文件设备和应用嵌套技术的时间。
{"title":"A Technique for Analyzing Bytecode in a Java Project for the Purpose of an Automated Assessment of the Possibility and Effectiveness of the Hidden Investment of Information and its Volumes in a Java Project","authors":"A. Krasov, P. I. Sharikov","doi":"10.1109/ICUMT51630.2020.9222419","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222419","url":null,"abstract":"The relevance of the problem under study is due to the rapid development of the java programming language, as well as the proposed java machines. The purpose of the article is to develop a methodology for analyzing class files and the ability to embed information into java program files. It is necessary that the digital watermark is not damaged, and the class files and the entire java project are functioning without changes. Thus, first, an analysis of the java project is created, the selection of the class files most suitable for attachment, the embedding of a digital watermark in the class file of the java application, and a health check. After checking the file's functionality, it checks the safety and invariability of the digital watermark in the file. Methods proposed by the authors of the article to significantly save time for the file device and the applied nesting techniques.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"115 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Approaches to Modeling Blockchain Systems 区块链系统建模方法
A. Spirkina, E. A. Aptrieva, V. Elagin, A. A. Shvidkiy, A. A. Savelieva
Currently, blockchain technology has been actively developed due to decentralization and the possibility of organizing a safe, holistic exchange and storage of information. This technology is starting to be applied in various fields. At the same time, the task arises to consider the influence of this technology on the characteristics of the network to predict the behavior of traffic on the network and ensure the required indicators of the quality of services, as well as the stability of the state of the communication network elements during the operation of the distributed registry technology. However, to consider and analyze the effect of technology in a full-scale experiment is a laborious task that cannot always be performed, therefore, in this paper, the authors propose to consider approaches to modeling these systems and, as an alternative, propose using the Anylogic system.
目前,由于去中心化和组织安全、全面的信息交换和存储的可能性,区块链技术得到了积极的发展。这项技术开始在各个领域得到应用。同时,在分布式注册技术运行过程中,需要考虑该技术对网络特性的影响,以预测网络上的流量行为,保证服务质量所需的指标,以及通信网络要素状态的稳定性。然而,在全面实验中考虑和分析技术的影响是一项艰巨的任务,并不总是能够执行,因此,在本文中,作者建议考虑对这些系统建模的方法,并作为替代方案,建议使用Anylogic系统。
{"title":"Approaches to Modeling Blockchain Systems","authors":"A. Spirkina, E. A. Aptrieva, V. Elagin, A. A. Shvidkiy, A. A. Savelieva","doi":"10.1109/ICUMT51630.2020.9222437","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222437","url":null,"abstract":"Currently, blockchain technology has been actively developed due to decentralization and the possibility of organizing a safe, holistic exchange and storage of information. This technology is starting to be applied in various fields. At the same time, the task arises to consider the influence of this technology on the characteristics of the network to predict the behavior of traffic on the network and ensure the required indicators of the quality of services, as well as the stability of the state of the communication network elements during the operation of the distributed registry technology. However, to consider and analyze the effect of technology in a full-scale experiment is a laborious task that cannot always be performed, therefore, in this paper, the authors propose to consider approaches to modeling these systems and, as an alternative, propose using the Anylogic system.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1