2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
The goal of the article is to reveal the essence of the approach to managing data from various ty... more The goal of the article is to reveal the essence of the approach to managing data from various types of sources. The proposed approach as a set of methods whose operations are aimed at determining, creating, storing, supporting data, as well as ensuring access to data and processes of manipulating them in one or more sources for effective joint use of data, unlike to the known ones, is based on the concept of the dataspace taking into account the role and place of databases, built based on the schema with the universal basis of relations, in it. This approach provides an end-to-end solution of processing and understanding data expands existing capabilities for consistent processing and data management from loosely coupled diverse data sources in changing functioning conditions.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
In this paper the methods of data protection for developed by authors earlier multichannel system... more In this paper the methods of data protection for developed by authors earlier multichannel system of quantum secure communication are proposed. These methods allow closing the intercepted data from the unauthorized user. The simulation model of quantum secure communication system on optical fiber is developed. This model depends on three parameters: probabilities of an error in the fiber optic channel, time of detection of unauthorized connection to the fiber optic line and transmission rate. Results of modeling for two methods of data protection are presented.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
The paper presents and discusses a novel method for reconstructing of surface topology from only ... more The paper presents and discusses a novel method for reconstructing of surface topology from only one white light interferogram picture. The main idea of the proposed method is reversal of an interferometry channel transform function and applying computationally simple methods of polynomial approximation for single segments of the white light interferogram. The polynomial coefficients are computed at the calibration stage. A computational complexity and reconstruction errors of this method were evaluated. Research has shown that this method combines the high computational efficiency and accuracy. Also the implementation of this method on the FPGA platform is presented.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
This paper presents research results of the novel system to control traffic lights which is based... more This paper presents research results of the novel system to control traffic lights which is based on the common European model. One of the most important measures for dealing with this problem is to adopt favorable traffic signal control strategy. The main objective of this research is to develop an effective procedure to control the traffic, which tries to reduce possibility of traffic jams. Additionally, the paper proposes a design and implementation of a microcontroller based system to control traffic lights on an intersection. This traffic light system comprises of PIC32MX440F256H Programmable Integrated Circuit microcontroller, crystal oscillator, power section, and diodes emitting light. For the implementation of the intersection traffic control system, the authors have written within the MPLAB X IDE environment a C language program. The developed system has been tested by constructing a prototype that resembles the real application.
Fingerprint identification is an important part of forensic science (e.g. criminal investigations... more Fingerprint identification is an important part of forensic science (e.g. criminal investigations or identity verification). Friction ridge impressions left at the crime scene can be affected by the nonlinear distortion due to elasticity of the skin, pressure changes or finger movement during deposition. These deformations affect relative distances between fingerprint features such as minutiae point, ridge frequency and orientation, which eventually leads to difficulties in establishing a positive match between impressions of the same finger.
The article is devoted to dynamic authentication method of electronic network devices with built-... more The article is devoted to dynamic authentication method of electronic network devices with built-in analog-to-digital converters (ADCs) based on authentication templates. The following results were obtained: the authentication of each electronic device can be carried out uniquely by its internal electrical noise (like biometric authentication of a person). Uniqueness of authentication is provided by the invariants of the noise signal such as the shape of the graph of the autocorrelation function of noise and the set of resonance frequencies of the device. The electronic device authentication template is obtained from the sequence of values of the autocorrelation function of the noise. It consists from the bit template and the amplitude template. The technique of obtaining an authentication template is presented. The required duration of the noise signal is 0.5 s for reliable authentication at a sampling frequency of 44.1 kHz. The results of authentication of several computers are pr...
Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strateg... more Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends on the network parameters and the number of confirmation blocks. These results can be used to define how many confirmation blocks a vendor should wait after a correspondent transaction before sending goods or services.
Biosensors and immunosensors show an increasing attractiveness when developing current cheap and ... more Biosensors and immunosensors show an increasing attractiveness when developing current cheap and fast monitoring and detecting devices. In this work, a model of immunosensor in a class of delayed lattice differential equations is offered and studied. The spatial operator describes symmetric diffusion processes of antigenes between pixels. The main results are devoted to the qualitative research of the model. The conditions of global asymptotic stability, which are constructed with the help of Lyapunov functionals, determine a lower estimate of the time of immune response. Nonlinear analysis of the model is performed with help of a series of numerical characteristics including autocorrelation function, mutual information, embedding, and correlation dimensions, sample entropy, the largest Lyapunov exponents. We consider the influence of both symmetric and unsymmetric diffusion of antigens between pixels on the qualitative behavior of the system. The outcomes are verified with the help...
This paper presents a new estimation method of fingerprint orientation field. An accurate estimat... more This paper presents a new estimation method of fingerprint orientation field. An accurate estimation of fingerprint orientation fields is an essential step in automatic fingerprint recognition systems (AFIS). Most popular, gradient–based method is very sensitive to noise (image quality). Proposed algorithm is a modification of, more resistant to noise, mask-based method, which provides orientation limited to discrete values. This modification is based on aggregation of pixel values differentiation and was used to more precise estimation of magnitude of orientation vectors. This approach allows to obtain a continuous values of orientation field still maintaining robust to noise.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
The paper presents and discusses a novel method of biometrie identification based on ECG data. Th... more The paper presents and discusses a novel method of biometrie identification based on ECG data. The main idea of the study is to apply Deep Neural Networks (DNN) for human identification based on the raw ECG signal. To improve overall system accuracy various signal pre-processing and outlier detection techniques have been applied. Also, to make ECG identification approach more user friendly, three-finger measurement scheme has been proposed. All experiments have been made using self-collected Lviv Biometric Data Set.
Journal of Medical Informatics and Technologies, 2013
Accurate estimation of ridge orientation is a critical step in image preprocessing methods used i... more Accurate estimation of ridge orientation is a critical step in image preprocessing methods used in automatic fingerprint identification systems (AFIS). Fingerprint orientation plays important roles in fingerprint enhancement, classification and recognition. The most popular is gradient-based method. This paper reviews the algorithm parameters, determining the compromise between accuracy in high-curvature areas and robustness against noise.
This work presents an efficient algorithm to enhance the directional image. Orientation, as a glo... more This work presents an efficient algorithm to enhance the directional image. Orientation, as a global feature of fingerprint, is very important to image preprocessing methods used in automatic fingerprint identification system (AFIS). Proposed algorithm consists of two weighted averaging stages over a neighborhood. In the first stage the 2D gaussian kernel is used as a weight and in the second stage the differentiation mask is used. That strategy allows an effective smoothing of the orientation in the noisy areas, without information loss in the high curvatured ridges areas. Experimental results show that the proposed method improves the performance of the fingerprint identification, comparing to the results obtained by the conventional, gradient based method.
Third World Congress on Nature & Biologically Inspired Computing, NaBIC 2011, Salamanca, Spain, IEEE, 2011
This work is a study about the fingerprint ridge distance and presents an efficient algorithm to ... more This work is a study about the fingerprint ridge distance and presents an efficient algorithm to estimate the values of local ridge frequency. Most of fingerprint image enhancement algorithms use an anisotropic filters with frequency response. Therefore, ridges frequency, as a global feature of fingerprint, is very important to image preprocessing methods used in automatic fingerprint identification system (AFIS). In proposed algorithm, through the use of fingerprint direction image, the frequency values are calculated directly, without the use of computationally expensive spectral analysis.
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
The goal of the article is to reveal the essence of the approach to managing data from various ty... more The goal of the article is to reveal the essence of the approach to managing data from various types of sources. The proposed approach as a set of methods whose operations are aimed at determining, creating, storing, supporting data, as well as ensuring access to data and processes of manipulating them in one or more sources for effective joint use of data, unlike to the known ones, is based on the concept of the dataspace taking into account the role and place of databases, built based on the schema with the universal basis of relations, in it. This approach provides an end-to-end solution of processing and understanding data expands existing capabilities for consistent processing and data management from loosely coupled diverse data sources in changing functioning conditions.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
In this paper the methods of data protection for developed by authors earlier multichannel system... more In this paper the methods of data protection for developed by authors earlier multichannel system of quantum secure communication are proposed. These methods allow closing the intercepted data from the unauthorized user. The simulation model of quantum secure communication system on optical fiber is developed. This model depends on three parameters: probabilities of an error in the fiber optic channel, time of detection of unauthorized connection to the fiber optic line and transmission rate. Results of modeling for two methods of data protection are presented.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
The paper presents and discusses a novel method for reconstructing of surface topology from only ... more The paper presents and discusses a novel method for reconstructing of surface topology from only one white light interferogram picture. The main idea of the proposed method is reversal of an interferometry channel transform function and applying computationally simple methods of polynomial approximation for single segments of the white light interferogram. The polynomial coefficients are computed at the calibration stage. A computational complexity and reconstruction errors of this method were evaluated. Research has shown that this method combines the high computational efficiency and accuracy. Also the implementation of this method on the FPGA platform is presented.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
This paper presents research results of the novel system to control traffic lights which is based... more This paper presents research results of the novel system to control traffic lights which is based on the common European model. One of the most important measures for dealing with this problem is to adopt favorable traffic signal control strategy. The main objective of this research is to develop an effective procedure to control the traffic, which tries to reduce possibility of traffic jams. Additionally, the paper proposes a design and implementation of a microcontroller based system to control traffic lights on an intersection. This traffic light system comprises of PIC32MX440F256H Programmable Integrated Circuit microcontroller, crystal oscillator, power section, and diodes emitting light. For the implementation of the intersection traffic control system, the authors have written within the MPLAB X IDE environment a C language program. The developed system has been tested by constructing a prototype that resembles the real application.
Fingerprint identification is an important part of forensic science (e.g. criminal investigations... more Fingerprint identification is an important part of forensic science (e.g. criminal investigations or identity verification). Friction ridge impressions left at the crime scene can be affected by the nonlinear distortion due to elasticity of the skin, pressure changes or finger movement during deposition. These deformations affect relative distances between fingerprint features such as minutiae point, ridge frequency and orientation, which eventually leads to difficulties in establishing a positive match between impressions of the same finger.
The article is devoted to dynamic authentication method of electronic network devices with built-... more The article is devoted to dynamic authentication method of electronic network devices with built-in analog-to-digital converters (ADCs) based on authentication templates. The following results were obtained: the authentication of each electronic device can be carried out uniquely by its internal electrical noise (like biometric authentication of a person). Uniqueness of authentication is provided by the invariants of the noise signal such as the shape of the graph of the autocorrelation function of noise and the set of resonance frequencies of the device. The electronic device authentication template is obtained from the sequence of values of the autocorrelation function of the noise. It consists from the bit template and the amplitude template. The technique of obtaining an authentication template is presented. The required duration of the noise signal is 0.5 s for reliable authentication at a sampling frequency of 44.1 kHz. The results of authentication of several computers are pr...
Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strateg... more Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends on the network parameters and the number of confirmation blocks. These results can be used to define how many confirmation blocks a vendor should wait after a correspondent transaction before sending goods or services.
Biosensors and immunosensors show an increasing attractiveness when developing current cheap and ... more Biosensors and immunosensors show an increasing attractiveness when developing current cheap and fast monitoring and detecting devices. In this work, a model of immunosensor in a class of delayed lattice differential equations is offered and studied. The spatial operator describes symmetric diffusion processes of antigenes between pixels. The main results are devoted to the qualitative research of the model. The conditions of global asymptotic stability, which are constructed with the help of Lyapunov functionals, determine a lower estimate of the time of immune response. Nonlinear analysis of the model is performed with help of a series of numerical characteristics including autocorrelation function, mutual information, embedding, and correlation dimensions, sample entropy, the largest Lyapunov exponents. We consider the influence of both symmetric and unsymmetric diffusion of antigens between pixels on the qualitative behavior of the system. The outcomes are verified with the help...
This paper presents a new estimation method of fingerprint orientation field. An accurate estimat... more This paper presents a new estimation method of fingerprint orientation field. An accurate estimation of fingerprint orientation fields is an essential step in automatic fingerprint recognition systems (AFIS). Most popular, gradient–based method is very sensitive to noise (image quality). Proposed algorithm is a modification of, more resistant to noise, mask-based method, which provides orientation limited to discrete values. This modification is based on aggregation of pixel values differentiation and was used to more precise estimation of magnitude of orientation vectors. This approach allows to obtain a continuous values of orientation field still maintaining robust to noise.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
The paper presents and discusses a novel method of biometrie identification based on ECG data. Th... more The paper presents and discusses a novel method of biometrie identification based on ECG data. The main idea of the study is to apply Deep Neural Networks (DNN) for human identification based on the raw ECG signal. To improve overall system accuracy various signal pre-processing and outlier detection techniques have been applied. Also, to make ECG identification approach more user friendly, three-finger measurement scheme has been proposed. All experiments have been made using self-collected Lviv Biometric Data Set.
Journal of Medical Informatics and Technologies, 2013
Accurate estimation of ridge orientation is a critical step in image preprocessing methods used i... more Accurate estimation of ridge orientation is a critical step in image preprocessing methods used in automatic fingerprint identification systems (AFIS). Fingerprint orientation plays important roles in fingerprint enhancement, classification and recognition. The most popular is gradient-based method. This paper reviews the algorithm parameters, determining the compromise between accuracy in high-curvature areas and robustness against noise.
This work presents an efficient algorithm to enhance the directional image. Orientation, as a glo... more This work presents an efficient algorithm to enhance the directional image. Orientation, as a global feature of fingerprint, is very important to image preprocessing methods used in automatic fingerprint identification system (AFIS). Proposed algorithm consists of two weighted averaging stages over a neighborhood. In the first stage the 2D gaussian kernel is used as a weight and in the second stage the differentiation mask is used. That strategy allows an effective smoothing of the orientation in the noisy areas, without information loss in the high curvatured ridges areas. Experimental results show that the proposed method improves the performance of the fingerprint identification, comparing to the results obtained by the conventional, gradient based method.
Third World Congress on Nature & Biologically Inspired Computing, NaBIC 2011, Salamanca, Spain, IEEE, 2011
This work is a study about the fingerprint ridge distance and presents an efficient algorithm to ... more This work is a study about the fingerprint ridge distance and presents an efficient algorithm to estimate the values of local ridge frequency. Most of fingerprint image enhancement algorithms use an anisotropic filters with frequency response. Therefore, ridges frequency, as a global feature of fingerprint, is very important to image preprocessing methods used in automatic fingerprint identification system (AFIS). In proposed algorithm, through the use of fingerprint direction image, the frequency values are calculated directly, without the use of computationally expensive spectral analysis.
Uploads