Result: 121
(searched for: conference_id:(131991))
Published: 28 April 2022
Abstract:
The field of Mobile Communication has seen enormous changes in recent years that has led to drastic shifts in the ways communication is done. From second generation to now fifth generation has been possible because of time-to-time innovation of many different technologies that have provided higher bandwidth to higher transmission data rates etc. The Smart Antenna system is one such technology that not only improves channel capacity but also provides better interference rejection with improved signal-to-noise ratio. Smart antennas perform dual operation of trans-reception. They sense the angular direction that hits the antenna array at the base station and radiate beam towards the estimated direction. The paper presents a new adaptive algorithm that can be utilized by the digital signal processing unit of smart antenna to detect the direction of mobile users trying to seek access by connecting wirelessly with the nearest base station for communication. The algorithm outperforms other existing ones successfully resolving even those sources that are close to each other. The proposed method provides better resolution.
Published: 28 April 2022
Abstract:
Local wireless networks based on IEEE 802.11e Enhanced Distributed Channel Access (EDCA), which is considered an indispensable technique for Medium Access Control (MAC), have recently become one of the most widely used approaches for transferring data between nodes, allowing multimedia mobile services to become a reality by using an alternative network to actual cellular systems. The OPNET tool was used to investigate a UMTS network in this article. Simultaneously, Internet user behavior is changing, with VoIP and peer-to-peer (P2P) services joining the already-established Web browsing, file sharing, and e-mail. However, because it was not designed to support these heterogeneous traffic situations, UMTS have significant performance restrictions in this scenario, such as the problematic simultaneous coexistence of TCP and UDP flows. This dissertation examines ways for providing QoS guarantees at the flow level in UMTS, mitigating and resolving various impairments while maintaining the technology's core feature: a distributed random access MAC protocol. To address these issues, an admission and rate control mechanism based on the IEEE 802.11e EDCA standard is presented of the DCF/EDCA protocol is designed, being able to capture the non-linear and reciprocal impact between network and traffic flows. The model also takes into account the dynamics of the QoS traffic differentiation factors. The analysis focuses on the factors that contribute to the reduced maximum number of VoIP conversations that can be active at the same time, such as the existing downlink / uplink inequity and the multi-rate anomaly. Each instance has its own set of solutions. Finally, the admissions control is discussed, as well as a number of policies. Adaptive policies work by modifying the EDCA parameters in real time. The results show that using the proposed admission control increases overall UMTS performance significantly, indicating that it is a viable solution for future distributed random access multimedia wireless networks.
Published: 28 April 2022
Abstract:
The need for intellectualization of project management processes is shown, in particular, the creation of intelligent systems capable of effectively plan projects in the process of natural-language interaction with the project team. The analysis of existing theoretical and practical developments in this field is carried out. It is shown that the issue of intellectualization of the project planning process is still open. It is proposed to use a reflex approach to building an intelligent project planning system. The technology of reflex identification of actions in project planning systems, based on the model of non-force (information) interaction, is proposed. Scenarios of actions have been developed and their distribution has been performed in accordance with the content of natural language requests to the project planning system. Experimental studies are shown a high probability of correct recognition of actions in project planning systems from natural language requests of project team members. The results of the conducted experiments unequivocally testify to the effectiveness of the developed information technology of reflex identification of action scenarios in project planning systems.
Published: 28 April 2022
Abstract:
The problem of air pollution is significant, as there is a negative impact on human health. This problem is especially relevant in large cities with many people living there and many enterprises. As part of the research, a solution is proposed where a non-standard approach is implemented using moss to purify the air in specific locations. This solution, if appropriately scaled, can have a significant environmental and social impact by replacing the planting of many trees. It is planned to create a prototype of a biotechnological filter and further monitoring and analysis of the performance of systems, including the cultivation of a plant crop - moss. The article describes the planned experiments to create an autonomous control system supporting moss growth using reinforcement learning algorithms. For the algorithms, the most crucial part is available data. For this reason, the process of data collection from the biofilter is described. This approach will allow us to analyze the operation of the filter components both in the laboratory and actual conditions, as well as maintain all the requirements. In general, reducing air pollution will protect the climate and the environment. The research group develops an effective biofilter for the environment through a carefully selected and unique combination of biology and control technologies.
Published: 28 April 2022
Abstract:
The approaches that are directly suited for the implementation of the process of detecting anomalies in data are discussed in this article, and a comparison of the most widely used ones is carried out using the following criteria: the speed of implementation and the model's data needs. As a consequence, it can be stated that determining the quality of a model at the emission detection stage is challenging, and as a result, it must be examined at the final step (through subsequent analysis of the identified anomalies of various methods). Combinations of various strategies are the most often utilized and accurate procedures, as shown by experience.
Published: 28 April 2022
Abstract:
Home automation and video surveillance systems are constantly undergoing changes due to advances in electronics and communications. Starting with telephone-controlled home appliances and a simple camera-based system, home automation and video surveillance have now entered the IoT (Internet of Things) and IoE (Internet of Everything) era, where every device integrated smart are connected to worldwide network and controlled abroad. Home automation makes life easier by providing control of all home appliances at one point, which is basically by a smartphone. The need for surveillance is rapidly increasing in domestic and commercial applications due to its low cost and ease of deployment. To ensure the security of video surveillance of personal homes and small businesses, people resort to third-party organizations with expensive equipment. In turn, the solution for providing a video surveillance security system based on a Rasp berry Pi single-board computer using HomeAssistant software is more profitable and easier to implement. The choice fell on the HomeAssistant software, since HomeAssistant is an open source application and does not require additional costs. This article analyzes how home automation and video surveillance systems have been modified and implemented. For the review, the Home Assistant smart home platform was implemented with the introduction of a video surveillance system.
Published: 28 April 2022
Abstract:
This article discusses a threat and vulnerability analysis model that allows you to fully analyze the requirements related to information security in an organization and document the results of the analysis. The use of this method allows avoiding and preventing unnecessary costs for security measures arising from subjective risk assessment, planning and implementing protection at all stages of the information systems lifecycle, minimizing the time spent by an information security specialist during information system risk assessment procedures by automating this process and reducing the level of errors and professional skills of information security experts. In the initial sections, the common methods of risk analysis and risk assessment software are analyzed and conclusions are drawn based on the results of comparative analysis, calculations are carried out in accordance with the proposed model.
Published: 28 April 2022
Abstract:
"Presents the front cover, title page, or splash screen of the proceedings record."
Published: 28 April 2022
Abstract:
Artificial intelligence has long been a scientific study. Mathematicians, physicists, neurobiologists, psychologists, programmers, philosophers, engineers have concentrated their efforts on their development. In the words of the famous French mathematician Jules Henri Poincare «Science is a graveyard of hypotheses». The article covers in detail current issues on artificial intelligence systems, mobile robot control systems, virtual 3D modeling. Intelligent control systems significantly expand the capabilities of robots to master increasingly complex operations. Using a methodology, the authors have developed methods for modeling the motion of an intelligently controlled mobile robot in three different computer programs. The authors conducted the study in the Python computer environment, and the C++ programming language was also used. In the work, the coordinates of motion x, y, z and distance were calculated. This distance was calculated by the total number of steps, and the optimal trajectory was realized by selecting the movement. Using a laser remote sensor (rangefinder) of the mobile robot, a virtual 3D model was modeled in a computer navigation control program environment based on the algorithm of an intelligently controlled mobile robot. In addition, the material discusses the relevance of using a microcontroller control system for the intelligent robot. The topic under consideration will be of interest to specialists in science, engineering, and other fields.
Published: 28 April 2022
Abstract:
Nowadays the Internet of Things technologies are applied in every field of organizations and industry. Research in this area is increasing every year and many issues are not solved yet. For example, security concerns, long range communication, low power consumption, cost, and other many problems are subject for research and development. In addition, these technologies are not new for Kazakhstan. It is already installed in housing and communal services. However, when it comes to agriculture, despite many opportunities, it lacks modern solutions. Therefore, IoT can solve animal loss problems where the herd is not fenced. This work proposes a solution for real-time monitoring of cattle using Internet of Things technologies that are low-cost, low power consumption, and long range communication. Future research is also discussed.