Pavlo Bykovyy - Academia.edu (original) (raw)
Papers by Pavlo Bykovyy
International Journal of Computing, 2016
The paper presents modification of the image contour segmentation method based on Canny method. A... more The paper presents modification of the image contour segmentation method based on Canny method. A distinctive feature of proposed approach is the usage of wavelet-functions as underlining transformation. It allows to obtain a sequence of hierarchical object contour preparations with an adjusted detailing. This approach is a part of the object recognition information technology that significantly reduces the size of information processing of video surveillance system.
2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET)
A vital scientific and applied problem of increasing efficiency of automated video surveillance s... more A vital scientific and applied problem of increasing efficiency of automated video surveillance systems in conditions of limited computing resources was solved. For its solution methods and basic information technologies of contour segmentation, contour inflection points selection and structural and statistical identification for object hierarchical identification and classification were developed. This allowed to decrease the automated video surveillance systems operation time and, as a result, to increase efficiency of these systems.
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
The rapid growth of the connected devices driven by Internet of Things (IoT) concept requires a c... more The rapid growth of the connected devices driven by Internet of Things (IoT) concept requires a complete rethinking of the conventional approaches for the network design. One of the key constraints of the IoT devices are their low capabilities in order to optimize energy consumption. On the other hand, many IoT applications require high level of data protection and privacy, which can be provided only by advanced cryptographic algorithms, which are not feasible for IoT devices. In this paper, we propose a scalable quadrature modulation aiming to solve the problem of secure communications at the physical layer. The key idea of the proposed approach is to transmit only part of information in way that allows target receiver to retrieve the complete information. Such approach allows to ensure the security of wireless channel, while reducing the overhead of advanced cryptographic algorithms.
Computer Modeling and Intelligent Systems
In modern instrumentation, the number of soldered joints in printed circuit boards can reach seve... more In modern instrumentation, the number of soldered joints in printed circuit boards can reach several thousand. Diagnostics of the soldered joints defects within the optical wave length range is carried out using automated diagnostic systems. A number of stages of the existing information technologies for such systems are implemented on the basis of target functions extremum search using the gradient estimation. In the large batches of products production, the use of expensive automated diagnostic systems within lighting subsystems and high cost positioning are justified. These subsystems can provide improved noise immunity. However, in conditions when small batches of products are produced, and at some stages (for example, when positioning by comparison with a standard/prototype images) in general, such objective functions can be noisy and can be multi-extremes. For such cases, information technologies based on methods of enhanced noise immunity are required. Such an increase in noise immunity can be provided by methods using wavelet transformation. For this purpose, information technologies were proposed using wavelet transformation-based procedures that improve noise immunity and reduce the error of procedures in the diagnostic systems of printed circuit boards and their soldered joints.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
Current study performs a comparison of the contour inflection point selection methods according t... more Current study performs a comparison of the contour inflection point selection methods according to the following criteria: probability of the correct selection, probability of the incorrect selection and an error in the coordinate estimation based on the results of model tasks. Results of the interpolation and differential methods and the method based on wavelet analysis of the contour inflection point were analyzed and graphically illustrated. It is shown that for simple geometric shapes the interpolation method has low precision (it shifts the contour inflection points) while differential method has the best precision properties, however it selects redundant inflection points (it has a low noise resistance) and the method based on the wavelet analysis of the curvature function shows the best results under noisy conditions.
2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2020
The algorithm of reliable distributed data storage system based on residue number system correcti... more The algorithm of reliable distributed data storage system based on residue number system correction codes is proposed in this work. An important feature of the storage systems is a high speed of recording and reading information from the drives. Given that the storage system is based on correction codes, it is necessary to obtain a faster process of data encoding and decoding. An advantage of the proposed solution is a reduced redundancy for data recovery, compared to RAID technology and other systems which are based on correction codes. Algorithms for fragmentation and recovery of tiles using redundant residue number system has been developed.
Communications in Computer and Information Science, 2019
The 3D character development process is long, heavy and requires a high level of professional ski... more The 3D character development process is long, heavy and requires a high level of professional skills. For today, traditional approaches require from the developer a lot of time, resources and high-professional skills for making a 3D character model. To facilitate this work, we propose the approach with using the textures maps module. This module includes a set of prepared and it has divided into segments textures of different types (diffuse, specular, displacement, bump, SSS). It enables to simplify the texture stage and requires less professional skills, since the developer no longer needs to create a new texture. In addition, the module enables to skip the stages of sculpting and retopology, and get various visual outcomes for same 3D model geometry. The result of texturing affects directly the quality of both shader and visualization. The implementation of the proposed approach is described, and case-study results are presented.
2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2020
A system for controlling a traffic flow within loT environment is described. The system has a mod... more A system for controlling a traffic flow within loT environment is described. The system has a modular layout and is divided into the low level (driver) and high level (the server part). This separation enables to provide the flexibility property for the system with the ability to adapt to different roadways. Moreover, installation costs are reduced by using the inexpensive equipment, as well as all computing load is transferred to the cloud. The hardware such as Raspberry Pi, BeagleBone, Arduino board and webcams are implemented for lower level, the HW model is determined by the needs of road marking. The LabView is used for developing the low level because it provides many operation functions and the ability to transfer directly a code from a PC to a microcomputer. The ThingSpeak is selected as the high level (SW server, cloud) because it has an open source for storing and receiving data using HTTP and MQTT protocols within IoT environment. Moreover, the ThingSpeak has an integrated MATLAB support, and such property enables to improve Control System productivity by combining LabView and MATLAB.
International Journal of Computing, 2014
The low-cost network controller for security systems detectors was designed. The controller’s spe... more The low-cost network controller for security systems detectors was designed. The controller’s specifics lies in two-wired network interface with the “common bus” topology support. This design reduces the amount of data communication channels from detectors.
International Journal of Computing, 2019
This paper is dedicated to the problem of the circuit checkability of components in the safety-re... more This paper is dedicated to the problem of the circuit checkability of components in the safety-related systems, which operate objects of the increased risk and are aimed at ensuring safety of both a system and a control object for accident prevention and a decrease in their consequences. Importance of the checkability of the circuits for ensuring safety in critical applications is emphasized as safety is based on the use of fault tolerant circuitry decisions and their efficiency is defined by the circuit checkability. Development of a logical checkability from testability to structurally functional and dual-mode model which formalizes a problem of the hidden faults and defines ways of its solution is shown. The limitation of a logical checkability in detection of faults in chains of the common signals and the need for development of checkability out of the limits of a logical form, including suitability to checking the circuits on the basis of their power consumption is considered. ...
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2019
Recognition of multidimensional images based on the Hamming distance, as well as development of e... more Recognition of multidimensional images based on the Hamming distance, as well as development of estimation criteria of certain image classes and new methods for determining the Hemming distance differentiating between identical objects with different number of coding parameters are highly topical problems facing various areas of knowledge and activity. The paper proposes a method of encoding of multidimensional objects for diagnosis with the same and different number of parameters, which represent multidimensional vectors at nodes of a two-dimensional plane as a model of a multichannel object for diagnosis in the Hemming space. The monitoring system scheme of the nodes of the object for diagnosis is developed. Coding methods for priority and prohibitory road signs are proposed. The value of the Hamming distance estimate for these categories is determined. A method and algorithm for the Hamming distance estimate for objects with different number of parameters are proposed. In addition, a method of value of the Hamming distance estimate for some road sign categories with different number of informative parameters is proposed.
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020
nowadays, living space, food and water for the rapidly growing urban population are not used quit... more nowadays, living space, food and water for the rapidly growing urban population are not used quite sparingly, which makes them extremely vulnerable resources. Therefore, the trend has emerged where people in urban areas choose to have a small garden (for example, a balcony garden), and want to grow healthy and environmentally friendly food. To achieve this, a compact plant growing system "Grow Box" is needed, which gives an optimal use of space and can provide an automated plant growing process. The authors proposed the concept of IoT based smart system using the augmented reality for growing plants in the city. System implementation has a modular structure and can act as an experimental site or a full-fledged tool with some changes for greenhouses.
The advanced stabilization subsystem for balancing and maneuvering of the mobile robot was develo... more The advanced stabilization subsystem for balancing and maneuvering of the mobile robot was developed. It is based on improved control algorithm for conditional tilt sensor.
The operation of programmable computer systems is determined by their program code. Possibilities... more The operation of programmable computer systems is determined by their program code. Possibilities of maliciously changing program code potentially pose a security risk. Therefore, monitoring the program code integrity is one of the main components of security for programmable systems. This paper is devoted to program code integrity monitoring of computer systems built on the FPGA chips. Integrity monitoring methods are considered, within which monitoring data are embedded into the program code in the form of a digital watermark. Such digital watermark does not affect the operation of the FPGA and does not change the characteristics of the system. The advantages of this approach are that the fact of the presence of monitoring data in the program code and the fact of performing integrity monitoring is hidden from an outside observer. The paper notes the problem of the need to recovery the initial state of program code when performing integrity monitoring. To perform this procedure, th...
A modified Canny’s method for contour image segmentation was developed. It is based on the config... more A modified Canny’s method for contour image segmentation was developed. It is based on the configuration of the Gaussian filter core for the proposed image types. The method has been implemented using Matlab software in the form of executable m-scripts with the user interface developed in App Designer. The implementation of the developed method allows improvement of the laser scribes contour detection for the organic thin-film solar cells.
In present study the problem of an alarm systems optimization was presented and the stages of the... more In present study the problem of an alarm systems optimization was presented and the stages of the multicriteria structured optimization method in costfunctional characteristics of the alarm system were also described. The method represents a combination of the proposed reflection and selection schemes in the genetic algorithm that solves the extreme combinatorics problem. WIELOKRYTERIALNY PROBLEM OPTYMIZACJI CENOWO-FUNKCJONALNYCH CECH SYSTEMÓW ALARMOWYCH Streszczenie. W proponowanym badaniu przedstawiono problem optymalizacji systemów alarmowych oraz zostały opisane etapy metody wielokryterialnej strukturalnej cenowo-funkcjonalnej optymalizacji systemu alarmowego. Metoda stanowi kombinację refleksji i planu wyboru algorytmu genetycznego, który rozwiązuje problem ekstremalnej kombinatoryki.
In this paper, a detailed analysis is made of the possibility of reducing the energy consumption ... more In this paper, a detailed analysis is made of the possibility of reducing the energy consumption of the measuring and control modules when they are powered by an autonomous source, a battery, without the possibility of restoring its charge. These modules are designed, in particular, to work in the system for emergency and post-emergency monitoring of equipment and the territory of complex technical systems (for example, nuclear power plants), which must ensure a long (according to regulatory documents at least 72 hours) data and commands exchanging. The issue of saving energy consumption is considered: (i) at all levels of building measurement and control modules from wireless data interchange and commands at the level of the structure of the system as a whole to the structure of the most measurement-control modules and circuits of their nodes (ii) in the context of providing informativity, survivability and reliability of data exchange and commands in the system of emergency and po...
2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018
Intrusion Detection System (IDS) is designed to detect attacks against computer systems and netwo... more Intrusion Detection System (IDS) is designed to detect attacks against computer systems and networks. The IDS needs to process huge amounts of data, where irrelevant or redundant feature data can lead to degraded detection accuracy. In order to improve the accuracy of intrusion detection, feature selection can be used to delete irrelevant feature data. Considering that Elephant Herd Optimization (EHO) algorithm has a good classification ability in reducing feature redundancy, it can be applied to network intrusion detection. But the EHO algorithm converges too quickly in the searching process and it is then easy to fall into the local optimum, which constrains the classification performance of the algorithm. In this paper, an improved Elephant Herd Optimization based on Levy Flight strategy (LFEHO) is proposed, which overcomes the defects of easy precocity and low convergence accuracy of the original EHO algorithm. The classification performance is improved under the premise of ensuring the accuracy rate. This paper uses KDD CUP 99 as a simulation data set to test, and the experimental results show that the classification accuracy is improved. Compared with the basic EHO algorithm, classical Particle Swarm Optimization (PSO) algorithm and Moth-Flame Optimization (MFO) algorithm, the proposed LFEHO algorithm is superior to other algorithms in the optimization accuracy and convergence performance.
International Journal of Computing, 2020
In this work, we draw attention to prediction of football (soccer) match winner. We propose the d... more In this work, we draw attention to prediction of football (soccer) match winner. We propose the deep multilayer neural network based on elastic net regularization that predicts the winner of the English Premier League football matches. Our main interest is to predict the match result (win, loss or draw). In our experimental study, we prove that using open access limited data such as team shots, shots on target, yellow and red cards, etc. the system has a good prediction accuracy and profitability. The proposed approach should be considered as a basis of Oracle engine for predicting the match outcomes.
International Journal of Computing, 2016
The paper presents modification of the image contour segmentation method based on Canny method. A... more The paper presents modification of the image contour segmentation method based on Canny method. A distinctive feature of proposed approach is the usage of wavelet-functions as underlining transformation. It allows to obtain a sequence of hierarchical object contour preparations with an adjusted detailing. This approach is a part of the object recognition information technology that significantly reduces the size of information processing of video surveillance system.
2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET)
A vital scientific and applied problem of increasing efficiency of automated video surveillance s... more A vital scientific and applied problem of increasing efficiency of automated video surveillance systems in conditions of limited computing resources was solved. For its solution methods and basic information technologies of contour segmentation, contour inflection points selection and structural and statistical identification for object hierarchical identification and classification were developed. This allowed to decrease the automated video surveillance systems operation time and, as a result, to increase efficiency of these systems.
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
The rapid growth of the connected devices driven by Internet of Things (IoT) concept requires a c... more The rapid growth of the connected devices driven by Internet of Things (IoT) concept requires a complete rethinking of the conventional approaches for the network design. One of the key constraints of the IoT devices are their low capabilities in order to optimize energy consumption. On the other hand, many IoT applications require high level of data protection and privacy, which can be provided only by advanced cryptographic algorithms, which are not feasible for IoT devices. In this paper, we propose a scalable quadrature modulation aiming to solve the problem of secure communications at the physical layer. The key idea of the proposed approach is to transmit only part of information in way that allows target receiver to retrieve the complete information. Such approach allows to ensure the security of wireless channel, while reducing the overhead of advanced cryptographic algorithms.
Computer Modeling and Intelligent Systems
In modern instrumentation, the number of soldered joints in printed circuit boards can reach seve... more In modern instrumentation, the number of soldered joints in printed circuit boards can reach several thousand. Diagnostics of the soldered joints defects within the optical wave length range is carried out using automated diagnostic systems. A number of stages of the existing information technologies for such systems are implemented on the basis of target functions extremum search using the gradient estimation. In the large batches of products production, the use of expensive automated diagnostic systems within lighting subsystems and high cost positioning are justified. These subsystems can provide improved noise immunity. However, in conditions when small batches of products are produced, and at some stages (for example, when positioning by comparison with a standard/prototype images) in general, such objective functions can be noisy and can be multi-extremes. For such cases, information technologies based on methods of enhanced noise immunity are required. Such an increase in noise immunity can be provided by methods using wavelet transformation. For this purpose, information technologies were proposed using wavelet transformation-based procedures that improve noise immunity and reduce the error of procedures in the diagnostic systems of printed circuit boards and their soldered joints.
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017
Current study performs a comparison of the contour inflection point selection methods according t... more Current study performs a comparison of the contour inflection point selection methods according to the following criteria: probability of the correct selection, probability of the incorrect selection and an error in the coordinate estimation based on the results of model tasks. Results of the interpolation and differential methods and the method based on wavelet analysis of the contour inflection point were analyzed and graphically illustrated. It is shown that for simple geometric shapes the interpolation method has low precision (it shifts the contour inflection points) while differential method has the best precision properties, however it selects redundant inflection points (it has a low noise resistance) and the method based on the wavelet analysis of the curvature function shows the best results under noisy conditions.
2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2020
The algorithm of reliable distributed data storage system based on residue number system correcti... more The algorithm of reliable distributed data storage system based on residue number system correction codes is proposed in this work. An important feature of the storage systems is a high speed of recording and reading information from the drives. Given that the storage system is based on correction codes, it is necessary to obtain a faster process of data encoding and decoding. An advantage of the proposed solution is a reduced redundancy for data recovery, compared to RAID technology and other systems which are based on correction codes. Algorithms for fragmentation and recovery of tiles using redundant residue number system has been developed.
Communications in Computer and Information Science, 2019
The 3D character development process is long, heavy and requires a high level of professional ski... more The 3D character development process is long, heavy and requires a high level of professional skills. For today, traditional approaches require from the developer a lot of time, resources and high-professional skills for making a 3D character model. To facilitate this work, we propose the approach with using the textures maps module. This module includes a set of prepared and it has divided into segments textures of different types (diffuse, specular, displacement, bump, SSS). It enables to simplify the texture stage and requires less professional skills, since the developer no longer needs to create a new texture. In addition, the module enables to skip the stages of sculpting and retopology, and get various visual outcomes for same 3D model geometry. The result of texturing affects directly the quality of both shader and visualization. The implementation of the proposed approach is described, and case-study results are presented.
2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2020
A system for controlling a traffic flow within loT environment is described. The system has a mod... more A system for controlling a traffic flow within loT environment is described. The system has a modular layout and is divided into the low level (driver) and high level (the server part). This separation enables to provide the flexibility property for the system with the ability to adapt to different roadways. Moreover, installation costs are reduced by using the inexpensive equipment, as well as all computing load is transferred to the cloud. The hardware such as Raspberry Pi, BeagleBone, Arduino board and webcams are implemented for lower level, the HW model is determined by the needs of road marking. The LabView is used for developing the low level because it provides many operation functions and the ability to transfer directly a code from a PC to a microcomputer. The ThingSpeak is selected as the high level (SW server, cloud) because it has an open source for storing and receiving data using HTTP and MQTT protocols within IoT environment. Moreover, the ThingSpeak has an integrated MATLAB support, and such property enables to improve Control System productivity by combining LabView and MATLAB.
International Journal of Computing, 2014
The low-cost network controller for security systems detectors was designed. The controller’s spe... more The low-cost network controller for security systems detectors was designed. The controller’s specifics lies in two-wired network interface with the “common bus” topology support. This design reduces the amount of data communication channels from detectors.
International Journal of Computing, 2019
This paper is dedicated to the problem of the circuit checkability of components in the safety-re... more This paper is dedicated to the problem of the circuit checkability of components in the safety-related systems, which operate objects of the increased risk and are aimed at ensuring safety of both a system and a control object for accident prevention and a decrease in their consequences. Importance of the checkability of the circuits for ensuring safety in critical applications is emphasized as safety is based on the use of fault tolerant circuitry decisions and their efficiency is defined by the circuit checkability. Development of a logical checkability from testability to structurally functional and dual-mode model which formalizes a problem of the hidden faults and defines ways of its solution is shown. The limitation of a logical checkability in detection of faults in chains of the common signals and the need for development of checkability out of the limits of a logical form, including suitability to checking the circuits on the basis of their power consumption is considered. ...
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2019
Recognition of multidimensional images based on the Hamming distance, as well as development of e... more Recognition of multidimensional images based on the Hamming distance, as well as development of estimation criteria of certain image classes and new methods for determining the Hemming distance differentiating between identical objects with different number of coding parameters are highly topical problems facing various areas of knowledge and activity. The paper proposes a method of encoding of multidimensional objects for diagnosis with the same and different number of parameters, which represent multidimensional vectors at nodes of a two-dimensional plane as a model of a multichannel object for diagnosis in the Hemming space. The monitoring system scheme of the nodes of the object for diagnosis is developed. Coding methods for priority and prohibitory road signs are proposed. The value of the Hamming distance estimate for these categories is determined. A method and algorithm for the Hamming distance estimate for objects with different number of parameters are proposed. In addition, a method of value of the Hamming distance estimate for some road sign categories with different number of informative parameters is proposed.
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020
nowadays, living space, food and water for the rapidly growing urban population are not used quit... more nowadays, living space, food and water for the rapidly growing urban population are not used quite sparingly, which makes them extremely vulnerable resources. Therefore, the trend has emerged where people in urban areas choose to have a small garden (for example, a balcony garden), and want to grow healthy and environmentally friendly food. To achieve this, a compact plant growing system "Grow Box" is needed, which gives an optimal use of space and can provide an automated plant growing process. The authors proposed the concept of IoT based smart system using the augmented reality for growing plants in the city. System implementation has a modular structure and can act as an experimental site or a full-fledged tool with some changes for greenhouses.
The advanced stabilization subsystem for balancing and maneuvering of the mobile robot was develo... more The advanced stabilization subsystem for balancing and maneuvering of the mobile robot was developed. It is based on improved control algorithm for conditional tilt sensor.
The operation of programmable computer systems is determined by their program code. Possibilities... more The operation of programmable computer systems is determined by their program code. Possibilities of maliciously changing program code potentially pose a security risk. Therefore, monitoring the program code integrity is one of the main components of security for programmable systems. This paper is devoted to program code integrity monitoring of computer systems built on the FPGA chips. Integrity monitoring methods are considered, within which monitoring data are embedded into the program code in the form of a digital watermark. Such digital watermark does not affect the operation of the FPGA and does not change the characteristics of the system. The advantages of this approach are that the fact of the presence of monitoring data in the program code and the fact of performing integrity monitoring is hidden from an outside observer. The paper notes the problem of the need to recovery the initial state of program code when performing integrity monitoring. To perform this procedure, th...
A modified Canny’s method for contour image segmentation was developed. It is based on the config... more A modified Canny’s method for contour image segmentation was developed. It is based on the configuration of the Gaussian filter core for the proposed image types. The method has been implemented using Matlab software in the form of executable m-scripts with the user interface developed in App Designer. The implementation of the developed method allows improvement of the laser scribes contour detection for the organic thin-film solar cells.
In present study the problem of an alarm systems optimization was presented and the stages of the... more In present study the problem of an alarm systems optimization was presented and the stages of the multicriteria structured optimization method in costfunctional characteristics of the alarm system were also described. The method represents a combination of the proposed reflection and selection schemes in the genetic algorithm that solves the extreme combinatorics problem. WIELOKRYTERIALNY PROBLEM OPTYMIZACJI CENOWO-FUNKCJONALNYCH CECH SYSTEMÓW ALARMOWYCH Streszczenie. W proponowanym badaniu przedstawiono problem optymalizacji systemów alarmowych oraz zostały opisane etapy metody wielokryterialnej strukturalnej cenowo-funkcjonalnej optymalizacji systemu alarmowego. Metoda stanowi kombinację refleksji i planu wyboru algorytmu genetycznego, który rozwiązuje problem ekstremalnej kombinatoryki.
In this paper, a detailed analysis is made of the possibility of reducing the energy consumption ... more In this paper, a detailed analysis is made of the possibility of reducing the energy consumption of the measuring and control modules when they are powered by an autonomous source, a battery, without the possibility of restoring its charge. These modules are designed, in particular, to work in the system for emergency and post-emergency monitoring of equipment and the territory of complex technical systems (for example, nuclear power plants), which must ensure a long (according to regulatory documents at least 72 hours) data and commands exchanging. The issue of saving energy consumption is considered: (i) at all levels of building measurement and control modules from wireless data interchange and commands at the level of the structure of the system as a whole to the structure of the most measurement-control modules and circuits of their nodes (ii) in the context of providing informativity, survivability and reliability of data exchange and commands in the system of emergency and po...
2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018
Intrusion Detection System (IDS) is designed to detect attacks against computer systems and netwo... more Intrusion Detection System (IDS) is designed to detect attacks against computer systems and networks. The IDS needs to process huge amounts of data, where irrelevant or redundant feature data can lead to degraded detection accuracy. In order to improve the accuracy of intrusion detection, feature selection can be used to delete irrelevant feature data. Considering that Elephant Herd Optimization (EHO) algorithm has a good classification ability in reducing feature redundancy, it can be applied to network intrusion detection. But the EHO algorithm converges too quickly in the searching process and it is then easy to fall into the local optimum, which constrains the classification performance of the algorithm. In this paper, an improved Elephant Herd Optimization based on Levy Flight strategy (LFEHO) is proposed, which overcomes the defects of easy precocity and low convergence accuracy of the original EHO algorithm. The classification performance is improved under the premise of ensuring the accuracy rate. This paper uses KDD CUP 99 as a simulation data set to test, and the experimental results show that the classification accuracy is improved. Compared with the basic EHO algorithm, classical Particle Swarm Optimization (PSO) algorithm and Moth-Flame Optimization (MFO) algorithm, the proposed LFEHO algorithm is superior to other algorithms in the optimization accuracy and convergence performance.
International Journal of Computing, 2020
In this work, we draw attention to prediction of football (soccer) match winner. We propose the d... more In this work, we draw attention to prediction of football (soccer) match winner. We propose the deep multilayer neural network based on elastic net regularization that predicts the winner of the English Premier League football matches. Our main interest is to predict the match result (win, loss or draw). In our experimental study, we prove that using open access limited data such as team shots, shots on target, yellow and red cards, etc. the system has a good prediction accuracy and profitability. The proposed approach should be considered as a basis of Oracle engine for predicting the match outcomes.